{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T10:27:55Z","timestamp":1750933675153,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319094915"},{"type":"electronic","value":"9783319094922"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09492-2_13","type":"book-chapter","created":{"date-parts":[[2014,7,24]],"date-time":"2014-07-24T11:33:31Z","timestamp":1406201611000},"page":"209-225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Bayesian Prediction of Fault-Proneness of Agile-Developed Object-Oriented System"],"prefix":"10.1007","author":[{"given":"Lianfa","family":"Li","sequence":"first","affiliation":[]},{"given":"Hareton","family":"Leung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,25]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/s10664-011-9173-9","volume":"17","author":"M D\u2019Ambros","year":"2012","unstructured":"D\u2019Ambros, M., Lanza, M., Robbes, R.: Evaluating defect prediction approaches: a benchmark and an extensive comparison. Empir. Softw. Eng. 17, 531\u2013577 (2012)","journal-title":"Empir. Softw. Eng."},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1109\/TSE.2007.70722","volume":"33","author":"GJ Pai","year":"2007","unstructured":"Pai, G.J., Dugan, J.B.: Empirical analysis of software fault content and fault proneness using Bayesian methods. IEEE Trans. Software Eng. 33, 675\u2013686 (2007)","journal-title":"IEEE Trans. Software Eng."},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TSE.2007.256941","volume":"33","author":"T Menzies","year":"2007","unstructured":"Menzies, T., Greenwald, J., Frank, A.: Data mining static code attributes to learn defect predictors. IEEE Trans. Software Eng. 33, 2\u201313 (2007)","journal-title":"IEEE Trans. Software Eng."},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/S0164-1212(99)00102-8","volume":"51","author":"LC Briand","year":"2000","unstructured":"Briand, L.C., Wust, J., Daly, J.W., Porter, D.V.: Exploring the relationships between design measures and software quality in object-oriented systems. J. Syst. Softw. 51, 245\u2013273 (2000)","journal-title":"J. Syst. Softw."},{"key":"13_CR5","unstructured":"Singh Y., Kaur, A., Malhotra, R.: Application of decision trees for predicting fault proneness. In: International Conference on Information Systems, Technology and Management-Information Technology, Ghaziabad, India (2009)"},{"key":"13_CR6","unstructured":"Guo, L., Ma, Y., Cukic, B., Singh, H.: Robust prediction of fault proneness by random forests. In: 15th International Symposium on Software Reliability Engineering, pp. 417\u2013428. IEEE Computer Society, Washington, DC (2004)"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-540-69566-0_18","volume-title":"Product-Focused Software Process Improvement","author":"Y Singh","year":"2008","unstructured":"Singh, Y., Kaur, A., Malhotra, R.: Predicting software fault proneness model using neural network. In: Jedlitschka, A., Salo, O. (eds.) PROFES 2008. LNCS, vol. 5089, pp. 204\u2013214. Springer, Heidelberg (2008)"},{"key":"13_CR8","unstructured":"Singh, Y., Kaur, A., Malhotra, R.: Software fault proneness prediction using support vector machines. In: Proceedings of the World Congress on Engineering (2009)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Hosmer, D., Lemeshow, S.: Applied Logistic Regression. Wiley, New York (2000)","DOI":"10.1002\/0471722146"},{"key":"13_CR10","unstructured":"Gokhale, S.S., Lyn, M.R.: Regression tree modeling for the prediction of software quality. In: Proceedings Of Third ISSAT Intl. Conference on Reliability, pp. 31\u201336 (1997)"},{"key":"13_CR11","unstructured":"John, G.H., Langley, P.: Estimating continuous distributions in Bayesian classifiers. In: the Eleventh Conference on Uncertainty in Artificial Intelligence, pp. 338\u2013346 (1995)"},{"key":"13_CR12","unstructured":"Ambler, S.W.: Agile Modeling: Effective Practices for Extreme Programming and the Unified Process. Wiley, New York (2002)"},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/52.914732","volume":"18","author":"JD Herbsleb","year":"2001","unstructured":"Herbsleb, J.D.: Global software development. IEEE Softw. 18, 16\u201320 (2001)","journal-title":"IEEE Softw."},{"key":"13_CR14","unstructured":"http:\/\/www.agilealliance.org"},{"key":"13_CR15","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/TSE.2007.1015","volume":"33","author":"HM Olague","year":"2007","unstructured":"Olague, H.M., Etzkorn, L.H., Gholston, S., Quattlebaum, S.: Empirical validation of three software metrics suites to predict fault-proneness of object-oriented classes developed using highly iterative or agile software development processes. IEEE Trans. Softw. Eng. 33, 402\u2013419 (2007)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"13_CR16","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1109\/32.544352","volume":"22","author":"VR Basili","year":"1996","unstructured":"Basili, V.R., Briand, L.C., Melo, W.L.: A validation of object-oriented design metrics as quality indicators. IEEE Trans. Softw. Eng. 22, 751\u2013761 (1996)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Cardoso, J.: Process control-flow complexity metric: an empirical validation. In: IEEE International Conference on Services Computing (IEEE SCC 06), pp. 167\u2013173. IEEE Computer Society (2006)","DOI":"10.1109\/SCC.2006.82"},{"key":"13_CR18","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1109\/32.689404","volume":"24","author":"R Harrison","year":"1998","unstructured":"Harrison, R., Counsell, S., Nithi, R.: An evaluation of the MOOD set of object oriented software metrics. IEEE Trans. Softw. Eng. 24, 150\u2013157 (1998)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"13_CR19","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"2","author":"TJ McCabe","year":"1976","unstructured":"McCabe, T.J.: A complexity measure. IEEE Trans. Softw. Eng. 2, 308\u2013320 (1976)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"13_CR20","unstructured":"http:\/\/www.mozilla.org\/rhino"},{"key":"13_CR21","unstructured":"https:\/\/bugzilla.mozilla.org\/"},{"key":"13_CR22","unstructured":"Spinellis, D.: Code Quality: The Open Source Perspective. Addison Wesley, Boston (2006)"},{"key":"13_CR23","unstructured":"http:\/\/cyvis.sourceforge.net\/index.html"},{"key":"13_CR24","unstructured":"Elomaa, T., Rousu, J.: Finding optimal multi-splits for numerical attributes in decision tree learning (1996)"},{"key":"13_CR25","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1111\/j.1539-6924.2010.01429.x","volume":"30","author":"L Li","year":"2010","unstructured":"Li, L., Wang, J., Leung, H., Jiang, C.: Assessment of catastrophic risk using bayesian network constructed from domain knowledge and spatial data. Risk Anal. 30, 1157\u20131175 (2010)","journal-title":"Risk Anal."},{"key":"13_CR26","unstructured":"Bouckaert, R.R.: Bayesian Belief Network: from Construction to Inference (1995)"},{"key":"13_CR27","volume-title":"A Chain-Model Genetic Algorithm for Bayesian Network Structure Learning","author":"R Kabli","year":"2007","unstructured":"Kabli, R., Herrmann, F., McCall, J.: A Chain-Model Genetic Algorithm for Bayesian Network Structure Learning. GECCO, London (2007)"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Larranaga, P., Murga, R., Poza, M., Kuijpers, C.: Structure learning of Bayesian network by hybrid genetic algorithms. In: Fisher, D., Lenz, H.J. (eds.) Learning from Data: AI and Statistics. Springer, New York (1996)","DOI":"10.1007\/978-1-4612-2404-4_16"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Korb, K.B., Nicholson, A.E.: Bayesian Artificial Intelligence. Chapman & Hall\/CRC, Boca Raton (2004)","DOI":"10.1201\/9780203491294"},{"key":"13_CR30","unstructured":"Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kauffman, San Francisco (1993)"},{"key":"13_CR31","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/S0377-2217(03)00069-9","volume":"157","author":"VP Dirk","year":"2004","unstructured":"Dirk, V.P., Bart, L.: Customer attrition analysis for financial services using proportional hazard models. Eur. J. Oper. Res. 157, 196\u2013217 (2004)","journal-title":"Eur. J. Oper. Res."},{"key":"13_CR32","unstructured":"http:\/\/white.stanford.edu\/~heeger\/sdt\/sdt.html"},{"key":"13_CR33","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/TSE.2007.70721","volume":"33","author":"T Menzies","year":"2007","unstructured":"Menzies, T., Dekhtyar, A., Distefano, J., Greenwald, J.: Problems with precision: a response to \u201ccomments on \u2018data mining static code attributes to learn defect predictors\u2019\u201d. IEEE Trans. Softw. Eng. 33, 637\u2013640 (2007)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"13_CR34","first-page":"33","volume":"1","author":"Y Liu","year":"2008","unstructured":"Liu, Y., Cheah, W., Kim, B., Park, H.: Predict software failure-prone by learning Bayesian network. Int. J. Adv. Sci. Technol. 1, 33\u201342 (2008)","journal-title":"Int. J. Adv. Sci. Technol."},{"key":"13_CR35","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/s10664-008-9072-x","volume":"13","author":"N Fenton","year":"2008","unstructured":"Fenton, N., Neil, M., Marsh, W., Hearty, P., Radlinski, L., Krause, P.: On the effectiveness of early life cycle defect prediction with Bayesian nets. Empir. Softw. Eng. 13, 499\u2013537 (2008)","journal-title":"Empir. Softw. Eng."},{"key":"13_CR36","doi-asserted-by":"crossref","unstructured":"Li, L., Leung, H.: Mining static code metrics for a robust prediction of software defect-proneness. In: ACM \/IEEE International Symposium on Empirical Software Engineering and Measurement Anaheim, CA (2011)","DOI":"10.1109\/ESEM.2011.29"},{"key":"13_CR37","volume-title":"Risk Analysis: Foundations, Models and Methods","author":"AL Cox","year":"2001","unstructured":"Cox, A.L.: Risk Analysis: Foundations, Models and Methods. Springer, Heidelberg (2001)"},{"key":"13_CR38","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1214\/ss\/1009212519","volume":"14","author":"AJ Hoeting","year":"1999","unstructured":"Hoeting, A.J., Madigan, D., Raftery, E.A., Volinsky, T.C.: Bayesian model averaging: a tutorial. Stat. Sci. 14, 382\u2013417 (1999)","journal-title":"Stat. Sci."},{"key":"13_CR39","doi-asserted-by":"crossref","unstructured":"Li, L., Leung, H.: Using the number of faults to improve fault-proneness prediction of the probability models. In: 2009 World Congress on Computer Science and Information Engineering, Los Angeles\/Anaheim (2009)","DOI":"10.1109\/CSIE.2009.349"}],"container-title":["Lecture Notes in Business Information Processing","Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09492-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T03:04:04Z","timestamp":1675825444000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-09492-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319094915","9783319094922"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09492-2_13","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"25 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}