{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T08:31:16Z","timestamp":1771489876716,"version":"3.50.1"},"reference-count":80,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,1,22]],"date-time":"2019-01-22T00:00:00Z","timestamp":1548115200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s10664-018-9679-5","type":"journal-article","created":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T15:02:37Z","timestamp":1548428557000},"page":"1925-1963","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":82,"title":["The impact of feature reduction techniques on defect prediction models"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6317-7001","authenticated-orcid":false,"given":"Masanari","family":"Kondo","sequence":"first","affiliation":[]},{"given":"Cor-Paul","family":"Bezemer","sequence":"additional","affiliation":[]},{"given":"Yasutaka","family":"Kamei","sequence":"additional","affiliation":[]},{"given":"Ahmed E.","family":"Hassan","sequence":"additional","affiliation":[]},{"given":"Osamu","family":"Mizuno","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,22]]},"reference":[{"key":"9679_CR1","doi-asserted-by":"crossref","unstructured":"Abaei G, Rezaei Z, Selamat A (2013) Fault prediction by utilizing self-organizing map and threshold. In: Proceedings of the international conference on control system, computing and engineering (ICCSCE), IEEE, pp 465\u2013470","DOI":"10.1109\/ICCSCE.2013.6720010"},{"key":"9679_CR2","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1016\/j.procs.2015.02.161","volume":"46","author":"I Arora","year":"2015","unstructured":"Arora I, Tetarwal V, Saha A (2015) Open issues in software defect prediction. Procedia Comput Sci 46:906\u2013912","journal-title":"Procedia Comput Sci"},{"issue":"10","key":"9679_CR3","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1109\/32.544352","volume":"22","author":"VR Basili","year":"1996","unstructured":"Basili VR, Briand LC, Melo WL (1996) A validation of object-oriented design metrics as quality indicators. IEEE Trans Softw Eng (TSE) 22(10):751\u2013761","journal-title":"IEEE Trans Softw Eng (TSE)"},{"key":"9679_CR4","volume-title":"Dynamic Programming","author":"R Bellman","year":"1957","unstructured":"Bellman R (1957) Dynamic Programming. Princeton University Press, Princeton"},{"key":"9679_CR5","doi-asserted-by":"crossref","unstructured":"Bingham E, Mannila H (2001) Random projection in dimensionality reduction: applications to image and text data. In: Proceedings of the 7th international conference on knowledge discovery and data mining, ACM, pp 245\u2013250","DOI":"10.1145\/502512.502546"},{"issue":"6","key":"9679_CR6","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1109\/TKDE.2011.163","volume":"24","author":"PS Bishnu","year":"2012","unstructured":"Bishnu PS, Bhattacherjee V (2012) Software fault prediction using quad tree-based k-means clustering algorithm. IEEE Trans Knowl Data Eng 24(6):1146\u20131150","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"02","key":"9679_CR7","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1142\/S0218213008003947","volume":"17","author":"VUB Challagulla","year":"2008","unstructured":"Challagulla VUB, Bastani FB, Yen IL, Paul RA (2008) Empirical assessment of machine learning based software defect prediction techniques. Int J Artif Intell Tools 17(02):389\u2013400","journal-title":"Int J Artif Intell Tools"},{"issue":"6","key":"9679_CR8","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1109\/32.295895","volume":"20","author":"SR Chidamber","year":"1994","unstructured":"Chidamber SR, Kemerer CF (1994) A metrics suite for object oriented design. IEEE Trans Softw Eng (TSE) 20(6):476\u2013493","journal-title":"IEEE Trans Softw Eng (TSE)"},{"key":"9679_CR9","unstructured":"Cohen J (1988) Statistical power analysis for the behavioral sciences"},{"key":"9679_CR10","doi-asserted-by":"crossref","unstructured":"D\u2019Ambros M, Lanza M, Robbes R (2010) An extensive comparison of bug prediction approaches. In: Proceedings of the 7th international conference on mining software repositories (MSR), IEEE, pp 31\u201341","DOI":"10.1109\/MSR.2010.5463279"},{"issue":"1","key":"9679_CR11","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/S0004-3702(03)00079-1","volume":"151","author":"M Dash","year":"2003","unstructured":"Dash M, Liu H (2003) Consistency-based search in feature selection. Artif Intell 151(1):155\u2013176","journal-title":"Artif Intell"},{"key":"9679_CR12","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1080\/01969727308546046","volume":"3","author":"JC Dunn","year":"1973","unstructured":"Dunn JC (1973) A fuzzy relative of the isodata process and its use in detecting compact well-separated clusters. J Cybernet 3:32\u201357","journal-title":"J Cybernet"},{"key":"9679_CR13","doi-asserted-by":"crossref","unstructured":"Faloutsos C, Lin KI (1995) FastMap: a fast algorithm for indexing, data-mining and visualization of traditional and multimedia datasets. In: Proceedings of the ACM SIGMOD international conference on management of data, ACM, pp 163\u2013174","DOI":"10.1145\/568271.223812"},{"issue":"1","key":"9679_CR14","doi-asserted-by":"publisher","first-page":"92","DOI":"10.2307\/1937887","volume":"49","author":"DE Farrar","year":"1967","unstructured":"Farrar DE, Glauber RR (1967) Multicollinearity in regression analysis: the problem revisited. Rev Econ Stat 49(1):92\u2013107","journal-title":"Rev Econ Stat"},{"issue":"5","key":"9679_CR15","first-page":"579","volume":"41","author":"K Gao","year":"2011","unstructured":"Gao K, Khoshgoftaar TM, Wang H, Seliya N (2011) Choosing software metrics for defect prediction: an investigation on feature selection techniques. Software: Practice and Experience 41(5):579\u2013606","journal-title":"Software: Practice and Experience"},{"key":"9679_CR16","doi-asserted-by":"crossref","unstructured":"Ghotra B, McIntosh S, Hassan AE (2015) Revisiting the impact of classification techniques on the performance of defect prediction models. In: Proceedings of the 37th international conference on software engineering (ICSE), IEEE Press, pp 789\u2013800","DOI":"10.1109\/ICSE.2015.91"},{"key":"9679_CR17","doi-asserted-by":"crossref","unstructured":"Ghotra B, Mcintosh S, Hassan AE (2017) A large-scale study of the impact of feature selection techniques on defect classification models. In: Proceedings of the 14th international conference on mining software repositories (MSR), IEEE Press, pp 146\u2013157","DOI":"10.1109\/MSR.2017.18"},{"issue":"4","key":"9679_CR18","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1023\/A:1009849100780","volume":"4","author":"AR Gray","year":"1999","unstructured":"Gray AR, Macdonell SG (1999) Software metrics data analysis\u2013exploring the relative performance of some commonly used modeling techniques. Empir Softw Eng 4 (4):297\u2013316","journal-title":"Empir Softw Eng"},{"key":"9679_CR19","doi-asserted-by":"crossref","unstructured":"Guo L, Cukic B, Singh H (2003) Predicting fault prone modules by the dempster-shafer belief networks. In: Proceedings of the 18th international conference on automated software engineering (ASE), IEEE, pp 249\u2013252","DOI":"10.1109\/ASE.2003.1240314"},{"issue":"1","key":"9679_CR20","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The WEKA data mining software: an update. ACM SIGKDD Explorations Newsletter 11(1):10\u201318","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"9679_CR21","unstructured":"Hall MA (1999) Correlation-based feature selection for machine learning. Ph.D. thesis, University of Waikato Hamilton"},{"issue":"6","key":"9679_CR22","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1109\/TKDE.2003.1245283","volume":"15","author":"MA Hall","year":"2003","unstructured":"Hall MA, Holmes G (2003) Benchmarking attribute selection techniques for discrete class data mining. IEEE Trans Knowl Data Eng 15(6):1437\u20131447","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"9679_CR23","volume-title":"Elements of Software Science, vol 7","author":"MH Halstead","year":"1977","unstructured":"Halstead MH (1977) Elements of Software Science, vol 7. Elsevier, New York"},{"key":"9679_CR24","doi-asserted-by":"crossref","unstructured":"Han J, Moraga C (1995) The influence of the sigmoid function parameters on the speed of backpropagation learning. In: Proceedings of the international workshop on artificial neural networks, Springer, pp 195\u2013201","DOI":"10.1007\/3-540-59497-3_175"},{"issue":"1","key":"9679_CR25","first-page":"100","volume":"28","author":"JA Hartigan","year":"1979","unstructured":"Hartigan JA, Wong MA (1979) Algorithm as 136: a k-means clustering algorithm. J R Stat Soc Ser C Appl Stat 28(1):100\u2013108","journal-title":"J R Stat Soc Ser C Appl Stat"},{"key":"9679_CR26","doi-asserted-by":"crossref","unstructured":"Hassan AE (2009) Predicting faults using the complexity of code changes. In: Proceedings of the 31st international conference on software engineering (ICSE), IEEE Computer Society, pp 78\u201388","DOI":"10.1109\/ICSE.2009.5070510"},{"issue":"2","key":"9679_CR27","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s10515-011-0090-3","volume":"19","author":"Z He","year":"2012","unstructured":"He Z, Shu F, Yang Y, Li M, Wang Q (2012) An investigation on the feasibility of cross-project defect prediction. Autom Softw Eng 19(2):167\u2013199","journal-title":"Autom Softw Eng"},{"key":"9679_CR28","doi-asserted-by":"crossref","unstructured":"Herbold S (2013) Training data selection for cross-project defect prediction. In: Proceedings of the 9th international conference on predictive models in software engineering, ACM, p 6","DOI":"10.1145\/2499393.2499395"},{"issue":"5786","key":"9679_CR29","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1126\/science.1127647","volume":"313","author":"GE Hinton","year":"2006","unstructured":"Hinton GE, Salakhutdinov RR (2006) Reducing the dimensionality of data with neural networks. Science 313(5786):504\u2013507","journal-title":"Science"},{"key":"9679_CR30","doi-asserted-by":"crossref","unstructured":"Hira ZM, Gillies DF (2015) A review of feature selection and feature extraction methods applied on microarray data. Adv Bioinforma 2015. Article ID 198363, 13 pp","DOI":"10.1155\/2015\/198363"},{"key":"9679_CR31","unstructured":"Ho TK (1995) Random decision forests. In: Proceedings of the 3rd international conference on document analysis and recognition, vol 1. IEEE, pp 278\u2013282"},{"key":"9679_CR32","doi-asserted-by":"crossref","unstructured":"Jureczko M, Madeyski L (2010) Towards identifying software project clusters with regard to defect prediction. In: Proceedings of the 6th international conference on predictive models in software engineering, ACM, p 9","DOI":"10.1145\/1868328.1868342"},{"issue":"5","key":"9679_CR33","doi-asserted-by":"publisher","first-page":"2072","DOI":"10.1007\/s10664-015-9400-x","volume":"21","author":"Y Kamei","year":"2016","unstructured":"Kamei Y, Fukushima T, McIntosh S, Yamashita K, Ubayashi N, Hassan AE (2016) Studying just-in-time defect prediction using cross-project models. Empir Softw Eng 21(5):2072\u20132106","journal-title":"Empir Softw Eng"},{"key":"9679_CR34","volume-title":"Finding Groups in Data: an Introduction to Cluster Analysis, vol 344","author":"L Kaufman","year":"2009","unstructured":"Kaufman L, Rousseeuw PJ (2009) Finding Groups in Data: an Introduction to Cluster Analysis, vol 344. Wiley, Hoboken"},{"key":"9679_CR35","doi-asserted-by":"crossref","unstructured":"Kim S, Zimmermann T, Whitehead EJ Jr, Zeller A (2007) Predicting faults from cached history. In: Proceedings of the 29th international conference on software engineering (ICSE), IEEE Computer Society, pp 489\u2013498","DOI":"10.1109\/ICSE.2007.66"},{"issue":"9","key":"9679_CR36","doi-asserted-by":"publisher","first-page":"1464","DOI":"10.1109\/5.58325","volume":"78","author":"T Kohonen","year":"1990","unstructured":"Kohonen T (1990) The self-organizing map. Proc IEEE 78(9):1464\u20131480","journal-title":"Proc IEEE"},{"key":"9679_CR37","unstructured":"Kuhn M (2015) Caret: classification and regression training. Astrophysics Source Code Library"},{"issue":"1","key":"9679_CR38","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10994-005-0466-3","volume":"59","author":"N Landwehr","year":"2005","unstructured":"Landwehr N, Hall M, Frank E (2005) Logistic model trees. Mach Learn 59 (1):161\u2013205","journal-title":"Mach Learn"},{"issue":"1","key":"9679_CR39","first-page":"3221","volume":"15","author":"L Maaten van der","year":"2014","unstructured":"van der Maaten L (2014) Accelerating t-SNE using tree-based algorithms. J Mach Learn Res 15(1):3221\u20133245","journal-title":"J Mach Learn Res"},{"issue":"Nov","key":"9679_CR40","first-page":"2579","volume":"9","author":"L Maaten van der","year":"2008","unstructured":"van der Maaten L, Hinton G (2008) Visualizing data using t-SNE. J Mach Learn Res 9(Nov):2579\u20132605","journal-title":"J Mach Learn Res"},{"key":"9679_CR41","first-page":"397","volume":"1","author":"T Martinetz","year":"1991","unstructured":"Martinetz T, Schulten K (1991) A \u201cneural-gas\u201d network learns topologies. Artificial Neural Networks 1:397\u2013402","journal-title":"Artificial Neural Networks"},{"issue":"4","key":"9679_CR42","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"SE-2","author":"TJ McCabe","year":"1976","unstructured":"McCabe TJ (1976) A complexity measure. IEEE Trans Softw Eng (TSE) SE-2 (4):308\u2013320","journal-title":"IEEE Trans Softw Eng (TSE)"},{"key":"9679_CR43","volume-title":"Handbook of Biological Statistics","author":"JH McDonald","year":"2014","unstructured":"McDonald JH (2014) Handbook of Biological Statistics, 3rd edn. Sparky House Publishing, Baltimore","edition":"3rd edn."},{"issue":"1","key":"9679_CR44","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TSE.2007.256941","volume":"33","author":"T Menzies","year":"2007","unstructured":"Menzies T, Greenwald J, Frank A (2007a) Data mining static code attributes to learn defect predictors. IEEE Trans Softw Eng (TSE) 33(1):2\u201313","journal-title":"IEEE Trans Softw Eng (TSE)"},{"issue":"1","key":"9679_CR45","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2007.37","volume":"40","author":"T Menzies","year":"2007","unstructured":"Menzies T, Owen D, Richardson J (2007b) The strangest thing about software. Computer 40(1):54\u201360","journal-title":"Computer"},{"key":"9679_CR46","doi-asserted-by":"crossref","unstructured":"Moser R, Pedrycz W, Succi G (2008) A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction. In: Proceedings of the 30th international conference on software engineering (ICSE), IEEE, pp 181\u2013190","DOI":"10.1145\/1368088.1368114"},{"key":"9679_CR47","doi-asserted-by":"crossref","unstructured":"Muthukumaran K, Rallapalli A, Murthy N (2015) Impact of feature selection techniques on bug prediction models. In: Proceedings of the 8th India software engineering conference, ACM, pp 120\u2013129","DOI":"10.1145\/2723742.2723754"},{"key":"9679_CR48","doi-asserted-by":"crossref","unstructured":"Nagappan N, Ball T, Zeller A (2006) Mining metrics to predict component failures. In: Proceedings of the 28th international conference on software engineering (ICSE), ACM, pp 452\u2013461","DOI":"10.1145\/1134285.1134349"},{"key":"9679_CR49","unstructured":"Nam J (2014) Survey on software defect prediction. HKUST PhD Qualifying Examination, Department of Compter Science and Engineerning. The Hong Kong University of Science and Technology, Tech. Rep"},{"key":"9679_CR50","doi-asserted-by":"crossref","unstructured":"Nam J, Fu W, Kim S, Menzies T, Tan L (2017) Heterogeneous defect prediction. IEEE Transactions on Software Engineering","DOI":"10.1109\/TSE.2017.2720603"},{"key":"9679_CR51","doi-asserted-by":"crossref","unstructured":"Nam J, Kim S (2015) CLAMI: defect prediction on unlabeled datasets. In: Proceedings of the 30th international conference on automated software engineering (ASE), IEEE, pp 452\u2013463","DOI":"10.1109\/ASE.2015.56"},{"key":"9679_CR52","doi-asserted-by":"crossref","unstructured":"Nam J, Kim S (2015) Heterogeneous defect prediction. In: Proceedings of the 10th joint meeting on foundations of software engineering (FSE), ACM, pp 508\u2013519","DOI":"10.1145\/2786805.2786814"},{"key":"9679_CR53","doi-asserted-by":"crossref","unstructured":"Nam J, Pan SJ, Kim S (2013) Transfer defect learning. In: Proceedings of the 2013 international conference on software engineering (ICSE), IEEE Press, pp 382\u2013391","DOI":"10.1109\/ICSE.2013.6606584"},{"issue":"9","key":"9679_CR54","doi-asserted-by":"publisher","first-page":"904","DOI":"10.1109\/TSE.2002.1033229","volume":"28","author":"DE Neumann","year":"2002","unstructured":"Neumann DE (2002) An enhanced neural network technique for software risk analysis. IEEE Trans Softw Eng (TSE) 28(9):904\u2013912","journal-title":"IEEE Trans Softw Eng (TSE)"},{"issue":"2","key":"9679_CR55","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/TNN.2010.2091281","volume":"22","author":"SJ Pan","year":"2011","unstructured":"Pan SJ, Tsang IW, Kwok JT, Yang Q (2011) Domain adaptation via transfer component analysis. IEEE Trans Neural Netw 22(2):199\u2013210","journal-title":"IEEE Trans Neural Netw"},{"issue":"8","key":"9679_CR56","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1109\/TSE.2013.6","volume":"39","author":"F Peters","year":"2013","unstructured":"Peters F, Menzies T, Gong L, Zhang H (2013) Balancing privacy and utility in cross-company defect prediction. IEEE Trans Softw Eng 39(8):1054\u20131068","journal-title":"IEEE Trans Softw Eng"},{"key":"9679_CR57","doi-asserted-by":"crossref","unstructured":"Petric J., Bowes D, Hall T, Christianson B, Baddoo N (2016) The jinx on the NASA software defect data sets. In: Proceedings of the 20th international conference on evaluation and assessment in software engineering, ACM, pp 1\u20135","DOI":"10.1145\/2915970.2916007"},{"key":"9679_CR58","unstructured":"Quinlan R (1993) C4.5: programs for machine learning. morgan kaufmann publishers"},{"key":"9679_CR59","doi-asserted-by":"crossref","unstructured":"Rathore SS, Gupta A (2014) A comparative study of feature-ranking and feature-subset selection techniques for improved fault prediction. In: Proceedings of the 7th India software engineering conference, ACM, p 7","DOI":"10.1145\/2590748.2590755"},{"key":"9679_CR60","doi-asserted-by":"crossref","unstructured":"Ren J, Qin K, Ma Y, Luo G (2014) On software defect prediction using machine learning. J Appl Math 2014. Article ID 785435, 8 pp","DOI":"10.1155\/2014\/785435"},{"key":"9679_CR61","doi-asserted-by":"crossref","unstructured":"Rodr\u00edguez D, Ruiz R, Cuadrado-Gallego J, Aguilar-Ruiz J (2007a) Detecting fault modules applying feature selection to classifiers. In: Proceedings of the 2007 international conference on information reuse and integration, IEEE, pp 667\u2013672","DOI":"10.1109\/IRI.2007.4296696"},{"key":"9679_CR62","doi-asserted-by":"crossref","unstructured":"Rodriguez D, Ruiz R, Cuadrado-Gallego J, Aguilar-Ruiz J, Garre M (2007b) Attribute selection in software engineering datasets for detecting fault modules. In: Proceedings of the 2007 EUROMICRO conference on software engineering and advanced applications, IEEE, pp 418\u2013423","DOI":"10.1109\/EUROMICRO.2007.20"},{"key":"9679_CR63","doi-asserted-by":"crossref","unstructured":"Rokach L, Maimon O (2005) Clustering methods. In: Data mining and knowledge discovery handbook, Springer, pp 321\u2013352","DOI":"10.1007\/0-387-25465-X_15"},{"issue":"9","key":"9679_CR64","doi-asserted-by":"publisher","first-page":"1208","DOI":"10.1109\/TSE.2013.11","volume":"39","author":"M Shepperd","year":"2013","unstructured":"Shepperd M, Song Q, Sun Z, Mair C (2013) Data quality: some comments on the NASA software defect datasets. IEEE Trans Softw Eng (TSE) 39(9):1208\u20131215","journal-title":"IEEE Trans Softw Eng (TSE)"},{"key":"9679_CR65","doi-asserted-by":"crossref","unstructured":"Shihab E (2014) Practical software quality prediction. In: Proceedings of the 2014 international conference on software maintenance and evolution (ICSME), IEEE, pp 639\u2013644","DOI":"10.1109\/ICSME.2014.114"},{"key":"9679_CR66","doi-asserted-by":"crossref","unstructured":"Shihab E, Jiang ZM, Ibrahim WM, Adams B, Hassan AE (2010) Understanding the impact of code and process metrics on post-release defects: A case study on the Eclipse project. In: Proceedings of the international symposium on empirical software engineering and measurement (ESEM), ACM, pp 4:1\u20134:10","DOI":"10.1145\/1852786.1852792"},{"issue":"4","key":"9679_CR67","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1109\/TSE.2012.43","volume":"39","author":"S Shivaji","year":"2013","unstructured":"Shivaji S, Whitehead EJ, Akella R, Kim S (2013) Reducing features to improve code change-based bug prediction. IEEE Trans Softw Eng (TSE) 39(4):552\u2013569","journal-title":"IEEE Trans Softw Eng (TSE)"},{"key":"9679_CR68","unstructured":"Smolensky P (1986) Information processing in dynamical systems: Foundations of harmony theory. Tech. rep., DTIC Document"},{"key":"9679_CR69","doi-asserted-by":"crossref","unstructured":"Tantithamthavorn C, Hassan AE (2018) An experience report on defect modelling in practice: Pitfalls and challenges. In: Proceedings of the 40th international conference on software engineering: software engineering in practice track (ICSE-SEIP), ACM, pp 286\u2013295","DOI":"10.1145\/3183519.3183547"},{"key":"9679_CR70","doi-asserted-by":"crossref","unstructured":"Tantithamthavorn C, McIntosh S, Hassan AE, Matsumoto K (2016) Automated parameter optimization of classification techniques for defect prediction models. In: Proceedings of the 38th international conference on software engineering (ICSE), ACM, pp 321\u2013332","DOI":"10.1145\/2884781.2884857"},{"issue":"1","key":"9679_CR71","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSE.2016.2584050","volume":"43","author":"C Tantithamthavorn","year":"2017","unstructured":"Tantithamthavorn C, McIntosh S, Hassan AE, Matsumoto K (2017) An empirical comparison of model validation techniques for defect prediction models. IEEE Trans Softw Eng (TSE) 43(1):1\u201318","journal-title":"IEEE Trans Softw Eng (TSE)"},{"key":"9679_CR72","unstructured":"Tassey G (2002) The economic impacts of inadequate infrastructure for software testing. National Institute of Standards and Technology"},{"issue":"4","key":"9679_CR73","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s11222-007-9033-z","volume":"17","author":"U Von Luxburg","year":"2007","unstructured":"Von Luxburg U (2007) A tutorial on spectral clustering. Stat Comput 17 (4):395\u2013416","journal-title":"Stat Comput"},{"key":"9679_CR74","doi-asserted-by":"crossref","unstructured":"Xu Z, Liu J, Yang Z, An G, Jia X (2016) The impact of feature selection on defect prediction performance: an empirical comparison. In: Proceedings of the 27th international symposium on software reliability engineering (ISSRE), IEEE, pp 309\u2013320","DOI":"10.1109\/ISSRE.2016.13"},{"key":"9679_CR75","unstructured":"Yang B, Yin Q, Xu S, Guo P (2008) Software quality prediction using affinity propagation algorithm. In: Proceedings of the international joint conference on neural networks, IEEE, pp 1891\u20131896"},{"key":"9679_CR76","doi-asserted-by":"crossref","unstructured":"Zhang F, Zheng Q, Zou Y, Hassan AE (2016) Cross-project defect prediction using a connectivity-based unsupervised classifier. In: Proceedings of the 38th international conference on software engineering (ICSE), ACM, pp 309\u2013320","DOI":"10.1145\/2884781.2884839"},{"key":"9679_CR77","unstructured":"Zhang H (2004) The optimality of Naive Bayes. In: FLAIRS conference, AAAI press"},{"key":"9679_CR78","unstructured":"Zhong S, Khoshgoftaar TM, Seliya N (2004) Unsupervised learning for expert-based software quality estimation. In: HASE, Citeseer, pp 149\u2013155"},{"key":"9679_CR79","unstructured":"Zimmermann T, Nagappan N, Gall H, Giger E, Murphy B (2009) Cross-project defect prediction: a large scale experiment on data vs. domain vs. process. In: Proceedings of the the 7th joint meeting of the european software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering (ESEC-FSE), ACM, pp 91\u2013100"},{"key":"9679_CR80","doi-asserted-by":"publisher","DOI":"10.1201\/9781420050264","volume-title":"CRC Standard Probability and Statistics Tables and Formulae","author":"D Zwillinger","year":"1999","unstructured":"Zwillinger D, Kokoska S (1999) CRC Standard Probability and Statistics Tables and Formulae. Crc Press, Boca Raton"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-018-9679-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-018-9679-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-018-9679-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,21]],"date-time":"2020-01-21T20:23:23Z","timestamp":1579638203000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-018-9679-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,22]]},"references-count":80,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["9679"],"URL":"https:\/\/doi.org\/10.1007\/s10664-018-9679-5","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,22]]},"assertion":[{"value":"22 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}