{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T14:50:43Z","timestamp":1770821443579,"version":"3.50.1"},"reference-count":89,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T00:00:00Z","timestamp":1532476800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s10664-018-9638-1","type":"journal-article","created":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T07:01:34Z","timestamp":1532502094000},"page":"779-825","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":72,"title":["Balancing the trade-off between accuracy and interpretability in software defect prediction"],"prefix":"10.1007","volume":"24","author":[{"given":"Toshiki","family":"Mori","sequence":"first","affiliation":[]},{"given":"Naoshi","family":"Uchihira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,25]]},"reference":[{"key":"9638_CR1","doi-asserted-by":"crossref","unstructured":"Agterberg FP, Bonham-Carter GF, Wright DF (1990) Statistical pattern integration for mineral exploration. Computer Applications in Resource Estimation Prediction and Assessment for Metals and Petroleum, pp 1\u201321","DOI":"10.1016\/B978-0-08-037245-7.50006-8"},{"key":"9638_CR2","unstructured":"Akaike H (1973) Information theory and an extension of the maximum likelihood principle. In: Second international symposium on information theory, pp 267\u2013281"},{"key":"9638_CR3","doi-asserted-by":"crossref","unstructured":"Allahyari H, Lavesson N (2011) User-oriented assessment of classification model understandability. In: 11th Scandinavian conference on artificial intelligence, pp 11\u201319","DOI":"10.3233\/978-1-60750-754-3-11"},{"key":"9638_CR4","first-page":"1","volume":"19","author":"M Aly","year":"2005","unstructured":"Aly M (2005) Survey on multiclass classification methods. Neural Netw 19:1\u20139","journal-title":"Neural Netw"},{"issue":"1-2","key":"9638_CR5","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1023\/A:1007515423169","volume":"36","author":"E Bauer","year":"1999","unstructured":"Bauer E, Kohavi R (1999) An empirical comparison of voting classification algorithms: bagging, boosting, and variants. Mach Learn 36(1-2):105\u2013139","journal-title":"Mach Learn"},{"key":"9638_CR6","unstructured":"Bishop CM (2006) Pattern recognition and machine learning. Springer"},{"key":"9638_CR7","unstructured":"Bonham-Carter GF, Agterberg FP, Wright DF (1988) Integration of geological datasets for gold exploration in Nova Scotia. Digital Geologic and Geographic Information Systems, pp 15\u201323"},{"key":"9638_CR8","doi-asserted-by":"crossref","unstructured":"Bouckaert RR (2004) Naive bayes classifiers that perform well with continuous variables. In: Australasian joint conference on artificial intelligence, pp 1089\u20131094","DOI":"10.1007\/978-3-540-30549-1_106"},{"issue":"2","key":"9638_CR9","first-page":"123","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman L (1996) Bagging predictors. Mach Learn 24(2):123\u2013140","journal-title":"Mach Learn"},{"issue":"1","key":"9638_CR10","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"issue":"11","key":"9638_CR11","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1109\/32.177363","volume":"18","author":"LC Briand","year":"1992","unstructured":"Briand LC, Basili VR, Thomas WM (1992) A pattern recognition approach for software engineering data analysis. IEEE Trans Softw Eng 18(11):931\u2013942","journal-title":"IEEE Trans Softw Eng"},{"issue":"2","key":"9638_CR12","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"CJC Burges","year":"1998","unstructured":"Burges CJC (1998) A tutorial on support vector machines for pattern recognition. Data Min Knowl Disc 2(2):121\u2013167","journal-title":"Data Min Knowl Disc"},{"key":"9638_CR13","first-page":"153","volume-title":"New approaches in automation and robotics","author":"H Bury","year":"2008","unstructured":"Bury H, Wagner D (2008) Group judgement with ties. Distance-based methods. In: Aschemann H (ed) New approaches in automation and robotics. IntechOpen, London, pp 153\u2013172"},{"issue":"3","key":"9638_CR14","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1023\/B:NARR.0000046919.87758.f5","volume":"13","author":"EJM Carranza","year":"2004","unstructured":"Carranza EJM (2004) Weights of evidence modeling of mineral potential: a case study using small number of prospects, Abra, Philippines. Nat Resour Res 13(3):173\u2013187","journal-title":"Nat Resour Res"},{"key":"9638_CR15","unstructured":"Cestnik B (1990) Estimating probabilities: a crucial task in machine learning. In: Proceedings of the 9th European conference on artificial intelligence, ECAI '90, pp 147\u2013149"},{"key":"9638_CR16","doi-asserted-by":"crossref","unstructured":"Choetkiertikul M, Dam HK, Tran T, Ghose A (2015) Characterization and prediction of issue-related risks in software projects. In: Proceedings of the 12th working conference on mining software repositories, pp 280\u2013291","DOI":"10.1109\/MSR.2015.33"},{"key":"9638_CR17","doi-asserted-by":"crossref","unstructured":"Cohen WW (1995) Fast effective rule induction. In: Proceedings of the twelfth international conference on machine learning, ICML\u201995, pp 115\u2013123","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"issue":"2","key":"9638_CR18","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s00254-007-0818-3","volume":"54","author":"RK Dahal","year":"2008","unstructured":"Dahal RK, Hasegawa S, Nonomura A, Yamanaka M, Masuda T, Nishino K (2008) GIS-based weights-of-evidence modelling of rainfall-induced landslides in small catchments for landslide susceptibility mapping. Environ Geol 54(2):311\u2013324","journal-title":"Environ Geol"},{"issue":"2","key":"9638_CR19","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1109\/TSE.2011.55","volume":"38","author":"K Dejaeger","year":"2012","unstructured":"Dejaeger K, Verbeke W, Martens D, Baesens B (2012) Data mining techniques for software effort estimation: a comparative study. IEEE Trans Softw Eng 38(2):375\u2013397","journal-title":"IEEE Trans Softw Eng"},{"issue":"2","key":"9638_CR20","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1109\/TSE.2012.20","volume":"39","author":"K Dejaeger","year":"2013","unstructured":"Dejaeger K, Verbraken T, Baesens B (2013) Toward comprehensible software fault prediction models using bayesian network classifiers. IEEE Trans Softw Eng 39(2):237\u2013257","journal-title":"IEEE Trans Softw Eng"},{"issue":"2","key":"9638_CR21","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1023\/A:1007413511361","volume":"29","author":"P Domingos","year":"1997","unstructured":"Domingos P, Pazzani M (1997) On the optimality of the simple Bayesian classifier under zero-one loss. Mach Learn 29(2):103\u2013130","journal-title":"Mach Learn"},{"issue":"8","key":"9638_CR22","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett T (2006) An introduction to ROC analysis. Pattern Recogn Lett 27(8):861\u2013874","journal-title":"Pattern Recogn Lett"},{"key":"9638_CR23","unstructured":"Fayyad U, Irani K (1993) Multi-interval discretization of continuous-valued attributes for classification learning. In: Proceedings of the 13th international joint conference on artificial intelligence, IJCAI\u201993, pp 1022\u20131029"},{"issue":"3","key":"9638_CR24","first-page":"37","volume":"17","author":"U Fayyad","year":"1996","unstructured":"Fayyad U, Piatetsky-Shapiro G, Smyth P (1996) From data mining to knowledge discovery in databases. AI Mag 17(3):37\u201354","journal-title":"AI Mag"},{"issue":"5","key":"9638_CR25","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1109\/32.815326","volume":"25","author":"NE Fenton","year":"1999","unstructured":"Fenton NE, Neil M (1999) A critique of software defect prediction models. IEEE Trans Softw Eng 25(5):675\u2013689","journal-title":"IEEE Trans Softw Eng"},{"issue":"5","key":"9638_CR26","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/s10664-008-9072-x","volume":"13","author":"N Fenton","year":"2008","unstructured":"Fenton N, Neil M, Marsh W, Hearty P, Radli\u0144ski \u0141, Krause P (2008) On the effectiveness of early life cycle defect prediction with Bayesian nets. Empir Softw Eng 13(5):499\u2013537","journal-title":"Empir Softw Eng"},{"issue":"2","key":"9638_CR27","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/1046456.1046467","volume":"6","author":"AA Freitas","year":"2004","unstructured":"Freitas AA (2004) A critical review of multi-objective optimization in data mining: a position paper. ACM SIGKDD Explorations Newsletter 6(2):77\u201386","journal-title":"ACM SIGKDD Explorations Newsletter"},{"issue":"1","key":"9638_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2594473.2594475","volume":"15","author":"AA Freitas","year":"2014","unstructured":"Freitas AA (2014) Comprehensible classification models: a position paper. ACM SIGKDD Explorations Newsletter 15(1):1\u201310","journal-title":"ACM SIGKDD Explorations Newsletter"},{"issue":"1","key":"9638_CR29","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y Freund","year":"1997","unstructured":"Freund Y, Schapire RE (1997) A decision-theoretic generalization of on-line learning and an application to boosting. J Comput Syst Sci 55(1):119\u2013139","journal-title":"J Comput Syst Sci"},{"issue":"5","key":"9638_CR30","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1214\/aos\/1013203451","volume":"29","author":"JH Friedman","year":"2001","unstructured":"Friedman JH (2001) Greedy function approximation: a gradient boosting machine. Ann Stat 29(5):1189\u20131232","journal-title":"Ann Stat"},{"issue":"4","key":"9638_CR31","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/S0167-9473(01)00065-2","volume":"38","author":"JH Friedman","year":"2002","unstructured":"Friedman JH (2002) Stochastic gradient boosting. Comput Stat Data Anal 38(4):367\u2013378","journal-title":"Comput Stat Data Anal"},{"issue":"2-3","key":"9638_CR32","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1023\/A:1007465528199","volume":"29","author":"N Friedman","year":"1997","unstructured":"Friedman N, Geiger D, Goldszmidt M (1997) Bayesian network classifiers. Mach Learn 29(2-3):131\u2013163","journal-title":"Mach Learn"},{"key":"9638_CR33","doi-asserted-by":"crossref","unstructured":"Ghotra B, McIntosh S, Hassan AE (2015) Revisiting the impact of classification techniques on the performance of defect prediction models. In: Proceedings of the 37th international conference on software engineering. ICSE\u201915, pp 789\u2013800","DOI":"10.1109\/ICSE.2015.91"},{"issue":"1","key":"9638_CR34","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1080\/10618600.2014.907095","volume":"24","author":"A Goldstein","year":"2015","unstructured":"Goldstein A, Kapelner A, Bleich J, Pitkin E (2015) Peeking inside the black box: Visualizing statistical learning with plots of individual conditional expectation. J Comput Graph Stat 24(1):44\u201365","journal-title":"J Comput Graph Stat"},{"key":"9638_CR35","unstructured":"Good IJ (1985) Weight of evidence: a brief survey. In: Bernardo JM, DeGroot MH, Lindley DV, Smith AFM (eds) Bayesian Statistics 2: Proceedings of the second valencia international meeting: September 6\/10, 1983, New York: North Holland, pp 249\u2013269 (including discussion)"},{"issue":"12","key":"9638_CR36","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.7326\/0003-4819-130-12-199906150-00019","volume":"130","author":"SN Goodman","year":"1999","unstructured":"Goodman SN (1999) Toward evidence-based medical statistics. 2: the Bayes factor. Ann Intern Med 130(12):1005\u20131013","journal-title":"Ann Intern Med"},{"key":"9638_CR37","unstructured":"Guo L, Ma Y, Cukic B, Singh H (2004) Robust prediction of fault-proneness by random forests. In: IEEE 15th international symposium on software reliability engineering, ISSRE, pp 417\u2013428"},{"issue":"6","key":"9638_CR38","doi-asserted-by":"publisher","first-page":"1276","DOI":"10.1109\/TSE.2011.103","volume":"38","author":"T Hall","year":"2012","unstructured":"Hall T, Beecham S, Bowes D, Gray D, Counsell S (2012) A systematic literature review on fault prediction performance in software engineering. IEEE Trans Softw Eng 38(6):1276\u20131304","journal-title":"IEEE Trans Softw Eng"},{"key":"9638_CR39","unstructured":"Halstead MH (1977) Elements of software science. Elsevier"},{"key":"9638_CR40","doi-asserted-by":"crossref","unstructured":"Hastie T, Tibshirani R, Friedman J (2009) The elements of statistical learning, 2nd edn. Springer","DOI":"10.1007\/978-0-387-84858-7"},{"issue":"2","key":"9638_CR41","first-page":"90","volume":"31","author":"DE Heckerman","year":"1991","unstructured":"Heckerman DE, Horvitz EJ, Nathwani BN (1991) Toward normative expert systems: the Pathfinder project. Methods Inf Med 31(2):90\u2013105","journal-title":"Methods Inf Med"},{"issue":"1","key":"9638_CR42","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1023\/A:1022631118932","volume":"11","author":"RC Holte","year":"1993","unstructured":"Holte RC (1993) Very simple classification rules perform well on most commonly used datasets. Mach Learn 11(1):63\u201390","journal-title":"Mach Learn"},{"key":"9638_CR43","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/j.dss.2012.11.001","volume":"56","author":"Y Hu","year":"2013","unstructured":"Hu Y, Zhang X, Ngai EWT, Cai R, Liu M (2013) Software project risk analysis using Bayesian networks with causality constraints. Decis Support Syst 56:439\u2013449","journal-title":"Decis Support Syst"},{"issue":"1","key":"9638_CR44","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.dss.2010.12.003","volume":"51","author":"J Huysmans","year":"2011","unstructured":"Huysmans J, Dejaeger K, Mues C, Vanthienen J, Baesens B (2011) An empirical evaluation of the comprehensibility of decision table, tree and rule based predictive models. Decis Support Syst 51(1):141\u2013154","journal-title":"Decis Support Syst"},{"issue":"3","key":"9638_CR45","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/2.485891","volume":"29","author":"AK Jain","year":"1996","unstructured":"Jain AK, Mao J, Mohiuddin KM (1996) Artificial neural networks: a tutorial. IEEE Comput 29(3):31\u201344","journal-title":"IEEE Comput"},{"issue":"1","key":"9638_CR46","first-page":"003","volume":"15","author":"E Jelihovschi","year":"2014","unstructured":"Jelihovschi E, Faria JC, Allaman IB (2014) ScottKnott: a package for performing the Scott-Knott clustering algorithm in R. Trends in Applied and Computational Mathematics 15(1):003\u2013017","journal-title":"Trends in Applied and Computational Mathematics"},{"issue":"5","key":"9638_CR47","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/s10664-008-9079-3","volume":"13","author":"Y Jiang","year":"2008","unstructured":"Jiang Y, Cukic B, Ma Y (2008a) Techniques for evaluating fault prediction models. Empir Softw Eng 13(5):561\u2013595","journal-title":"Empir Softw Eng"},{"key":"9638_CR48","doi-asserted-by":"crossref","unstructured":"Jiang Y, Cukic B, Menzies T, Bartlow N (2008b) Comparing design and code metrics for software quality prediction. In: Proceedings of the 4th international workshop on Predictor models in software engineering, pp 11\u201318","DOI":"10.1145\/1370788.1370793"},{"issue":"10","key":"9638_CR49","doi-asserted-by":"publisher","first-page":"1361","DOI":"10.1109\/TKDE.2008.234","volume":"21","author":"L Jiang","year":"2009","unstructured":"Jiang L, Zhang H, Cai Z (2009) A novel Bayes model: hidden naive Bayes. IEEE Trans Knowl Data Eng 21(10):1361\u20131371","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"9638_CR50","unstructured":"John GH, Langley P (1995) Estimating continuous distributions in Bayesian classifiers. In: Proceedings of the 11th conference on uncertainty in artificial intelligence, pp 338\u2013345"},{"key":"9638_CR51","doi-asserted-by":"crossref","unstructured":"Kamei Y, Shihab E (2016) Defect prediction: accomplishments and future challenges. In: 23rd International conference on software analysis, evolution, and reengineering, SANER, vol 5, pp 33\u201345","DOI":"10.1109\/SANER.2016.56"},{"issue":"6","key":"9638_CR52","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/TSE.2012.70","volume":"39","author":"Y Kamei","year":"2013","unstructured":"Kamei Y, Shihab E, Adams B, Hassan AE, Mockus A, Sinha A, Ubayashi N (2013) A large-scale empirical study of just-in-time quality assurance. IEEE Trans Softw Eng 39(6):757\u2013773","journal-title":"IEEE Trans Softw Eng"},{"issue":"2","key":"9638_CR53","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/TSE.2007.70773","volume":"34","author":"S Kim","year":"2008","unstructured":"Kim S, Whitehead EJ Jr, Zhang Y (2008) Classifying software changes: clean or buggy? IEEE Trans Softw Eng 34(2):181\u2013196","journal-title":"IEEE Trans Softw Eng"},{"key":"9638_CR54","unstructured":"Kohavi R (1996) Scaling up the accuracy of Naive-Bayes classifiers: a decision-tree hybrid. In: Proceedings of the 2nd international conference on knowledge discovery and data mining. KDD96, pp 202\u2013207"},{"issue":"4","key":"9638_CR55","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1080\/08839519308949993","volume":"7","author":"I Kononenko","year":"1993","unstructured":"Kononenko I (1993) Inductive and Bayesian learning in medical diagnosis. Appl Artif Intell 7(4):317\u2013337","journal-title":"Appl Artif Intell"},{"key":"9638_CR56","first-page":"249","volume":"31","author":"SB Kotsiantis","year":"2007","unstructured":"Kotsiantis SB, Zaharakis I, Pintelas P (2007) Supervised machine learning: a review of classification techniques. Informatica 31:249\u2013268","journal-title":"Informatica"},{"key":"9638_CR57","doi-asserted-by":"crossref","unstructured":"Kulesza T, Burnett M, Wong WK, Stumpf S (2015) Principles of explanatory debugging to personalize interactive machine learning. In: Proceedings of the 20th International Conference on Intelligent User Interfaces, pp 126\u2013137","DOI":"10.1145\/2678025.2701399"},{"key":"9638_CR58","doi-asserted-by":"crossref","unstructured":"Le Cessie S, Van Houwelingen JC (1992) Ridge estimators in logistic regression. Appl Stat 191\u2013201","DOI":"10.2307\/2347628"},{"issue":"4","key":"9638_CR59","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/TSE.2008.35","volume":"34","author":"S Lessmann","year":"2008","unstructured":"Lessmann S, Baesens B, Mues C, Pietsch S (2008) Benchmarking classification models for software defect prediction: a proposed framework and novel findings. IEEE Trans Softw Eng 34(4):485\u2013496","journal-title":"IEEE Trans Softw Eng"},{"key":"9638_CR60","doi-asserted-by":"crossref","unstructured":"Lewis DD (1998) Naive (Bayes) at forty: the independence assumption in information retrieval. In: European conference on machine learning, pp 4\u201315","DOI":"10.1007\/BFb0026666"},{"key":"9638_CR61","unstructured":"Lipton ZC (2016) The mythos of model interpretability. In: 2016 ICML workshop on human interpretability in machine learning. WHI 2016"},{"issue":"2","key":"9638_CR62","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1080\/10618600.1997.10474735","volume":"6","author":"D Madigan","year":"1997","unstructured":"Madigan D, Mosurski K, Almond RG (1997) Graphical explanation in belief networks. J Comput Graph Stat 6(2):160\u2013181","journal-title":"J Comput Graph Stat"},{"key":"9638_CR63","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1016\/j.asoc.2014.11.023","volume":"27","author":"R Malhotra","year":"2015","unstructured":"Malhotra R (2015) A systematic review of machine learning techniques for software fault prediction. Appl Soft Comput 27:504\u2013518","journal-title":"Appl Soft Comput"},{"issue":"4","key":"9638_CR64","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1016\/j.dss.2011.01.013","volume":"51","author":"D Martens","year":"2011","unstructured":"Martens D, Vanthienen J, Verbeke W, Baesens B (2011) Performance of classification models from a user perspective. Decis Support Syst 51(4):782\u2013793","journal-title":"Decis Support Syst"},{"issue":"4","key":"9638_CR65","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"2","author":"TJ McCabe","year":"1976","unstructured":"McCabe TJ (1976) A complexity measure. IEEE Trans Softw Eng 2(4):308\u2013320","journal-title":"IEEE Trans Softw Eng"},{"issue":"1","key":"9638_CR66","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TSE.2007.256941","volume":"33","author":"T Menzies","year":"2007","unstructured":"Menzies T, Greenwald J, Frank A (2007) Data mining static code attributes to learn defect predictors. IEEE Trans Softw Eng 33(1):2\u201313","journal-title":"IEEE Trans Softw Eng"},{"key":"9638_CR67","unstructured":"Menzies T, Krishna R, Pryor D (2016) The Promise Repository of Empirical Software Engineering Data; http:\/\/openscience.us\/repo . North Carolina State University, Department of Computer Science bibtex"},{"key":"9638_CR68","unstructured":"Mori T (2015) Superposed Naive Bayes for Accurate and Interpretable Prediction. In: Proceedings of the 14th IEEE international conference on machine learning and applications. ICMLA 2015, pp 1228\u20131233"},{"key":"9638_CR69","unstructured":"Mori T, Tamura S, Kakui S (2013) Incremental estimation of project failure risk with Naive Bayes classifier. In: Proceedings of 7th ACM\/IEEE international symposium on empirical software engineering and measurement. ESEM 2013, pp 283\u2013286"},{"key":"9638_CR70","unstructured":"Platt JC (1999) Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods. Advances in Large Margin Classifiers, 10(3):61\u201374"},{"key":"9638_CR71","volume-title":"C4.5: programs for machine learning","author":"JR Quinlan","year":"1993","unstructured":"Quinlan JR (1993) C4.5: programs for machine learning. Morgan Kaufmann, San Mateo"},{"key":"9638_CR72","doi-asserted-by":"crossref","unstructured":"Ribeiro MT, Singh S, Guestrin C (2016) Why should I trust you?: Explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp 1135\u20131144","DOI":"10.1145\/2939672.2939778"},{"key":"9638_CR73","unstructured":"Ridgeway G, Madigan D, Richardson T, O'Kane J (1998) Interpretable boosted Naive Bayes classification. In: Proceedings of the 4th international conference on knowledge discovery and data mining. KDD98, pp 101\u2013104"},{"key":"9638_CR74","unstructured":"Rish I (2001) An empirical study of the naive Bayes classifier. In: IJCAI 2001 workshop on empirical methods in artificial intelligence, 3(22):41\u201346"},{"issue":"1","key":"9638_CR75","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/0377-2217(90)90057-I","volume":"48","author":"TL Saaty","year":"1990","unstructured":"Saaty TL (1990) How to make a decision: the analytic hierarchy process. Eur J Oper Res 48(1):9\u201326","journal-title":"Eur J Oper Res"},{"issue":"1","key":"9638_CR76","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/BF02480213","volume":"30","author":"Y Sakamoto","year":"1978","unstructured":"Sakamoto Y, Akaike H (1978) Analysis of cross classified data by AIC. Ann Inst Stat Math 30(1):185\u2013197","journal-title":"Ann Inst Stat Math"},{"issue":"2","key":"9638_CR77","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1214\/aos\/1176344136","volume":"6","author":"G Schwarz","year":"1978","unstructured":"Schwarz G (1978) Estimating the dimension of a model. Ann Stat 6(2):461\u2013464","journal-title":"Ann Stat"},{"issue":"9","key":"9638_CR78","doi-asserted-by":"publisher","first-page":"1208","DOI":"10.1109\/TSE.2013.11","volume":"39","author":"M Shepperd","year":"2013","unstructured":"Shepperd M, Song Q, Sun Z, Mair C (2013) Data quality: some comments on the NASA software defect datasets. IEEE Trans Softw Eng 39(9):1208\u20131215","journal-title":"IEEE Trans Softw Eng"},{"key":"9638_CR79","doi-asserted-by":"crossref","unstructured":"Spiegelhalter DJ, Knill-Jones RP (1984) Statistical and knowledge-based approaches to clinical decision-support systems, with an application in gastroenterology. Journal of the Royal Statistical Society. Series A (General):35\u201377","DOI":"10.2307\/2981737"},{"issue":"5","key":"9638_CR80","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1016\/j.jss.2007.07.034","volume":"81","author":"O Vandecruys","year":"2008","unstructured":"Vandecruys O, Martens D, Baesens B, Mues C, De Backer M, Haesen R (2008) Mining software repositories for comprehensible software fault prediction models. J Syst Softw 81(5):823\u2013839","journal-title":"J Syst Softw"},{"issue":"2","key":"9638_CR81","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1023\/A:1007659514849","volume":"40","author":"GI Webb","year":"2000","unstructured":"Webb GI (2000) Multiboosting: a technique for combining boosting and wagging. Mach Learn 40(2):159\u2013196","journal-title":"Mach Learn"},{"issue":"1","key":"9638_CR82","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10994-005-4258-6","volume":"58","author":"GI Webb","year":"2005","unstructured":"Webb GI, Boughton JR, Wang Z (2005) Not so naive Bayes: aggregating one-dependence estimators. Mach Learn 58(1):5\u201324","journal-title":"Mach Learn"},{"issue":"1","key":"9638_CR83","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.infsof.2011.09.002","volume":"54","author":"J Wen","year":"2012","unstructured":"Wen J, Li S, Lin Z, Hu Y, Huang C (2012) Systematic literature review of machine learning based software development effort estimation models. Inf Softw Technol 54(1):41\u201359","journal-title":"Inf Softw Technol"},{"key":"9638_CR84","doi-asserted-by":"crossref","unstructured":"Witten IH, Frank E, Hall MA, Pal CJ (2011) Data mining: practical machine learning tools and techniques, 3rd edn. Morgan Kaufmann","DOI":"10.1016\/B978-0-12-374856-0.00001-8"},{"issue":"1","key":"9638_CR85","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s10994-008-5083-5","volume":"74","author":"Y Yang","year":"2009","unstructured":"Yang Y, Webb GI (2009) Discretization for naive-Bayes learning: managing discretization bias and variance. Mach Learn 74(1):39\u201374","journal-title":"Mach Learn"},{"key":"9638_CR86","doi-asserted-by":"crossref","unstructured":"Zadrozny B, Elkan C (2002) Transforming classifier scores into accurate multiclass probability estimates. In: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pp 694\u2013699","DOI":"10.1145\/775047.775151"},{"key":"9638_CR87","unstructured":"Zhang H (2004) The optimality of naive Bayes. In: Proceedings of the 17th Florida artificial intelligence research society conference. FLAIRS2004, pp 562\u2013567"},{"key":"9638_CR88","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Premraj R, Zeller A (2007) Predicting defects for eclipse. In: Proceedings of the third international workshop on predictor models in software engineering, IEEE Computer Society, pp 9","DOI":"10.1109\/PROMISE.2007.10"},{"key":"9638_CR89","unstructured":"Zimmermann T, Nagappan N, Gall H, Giger E, Murphy B (2009) Cross-project defect prediction: a large scale experiment on data vs. domain vs. process. In: Proceedings of the the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, pp 91\u2013100"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-018-9638-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-018-9638-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-018-9638-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T00:58:05Z","timestamp":1751763485000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-018-9638-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,25]]},"references-count":89,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["9638"],"URL":"https:\/\/doi.org\/10.1007\/s10664-018-9638-1","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,25]]},"assertion":[{"value":"25 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}