{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:46:54Z","timestamp":1772041614310,"version":"3.50.1"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T00:00:00Z","timestamp":1624406400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T00:00:00Z","timestamp":1624406400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100005967","name":"Linnaeus University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100005967","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2021,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>It is a well-known practice in software engineering to aggregate software metrics to assess software artifacts for various purposes, such as their maintainability or their proneness to contain bugs. For different purposes, different metrics might be relevant. However, weighting these software metrics according to their contribution to the respective purpose is a challenging task. Manual approaches based on experts do not scale with the number of metrics. Also, experts get confused if the metrics are not independent, which is rarely the case. Automated approaches based on supervised learning require reliable and generalizable training data, a ground truth, which is rarely available. We propose an automated approach to weighted metrics aggregation that is based on unsupervised learning. It sets metrics scores and their weights based on probability theory and aggregates them. To evaluate the effectiveness, we conducted two empirical studies on defect prediction, one on ca. 200 000 code changes, and another ca. 5 000 software classes. The results show that our approach can be used as an agnostic unsupervised predictor in the absence of a ground truth.<\/jats:p>","DOI":"10.1007\/s10664-021-09984-2","type":"journal-article","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T12:02:46Z","timestamp":1624449766000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Weighted software metrics aggregation and its application to defect prediction"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3906-7611","authenticated-orcid":false,"given":"Maria","family":"Ulan","sequence":"first","affiliation":[]},{"given":"Welf","family":"L\u00f6we","sequence":"additional","affiliation":[]},{"given":"Morgan","family":"Ericsson","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Wingkvist","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,23]]},"reference":[{"issue":"1","key":"9984_CR1","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.jss.2009.06.055","volume":"83","author":"E Arisholm","year":"2010","unstructured":"Arisholm E, Briand LC, Johannessen EB (2010) A systematic and comprehensive investigation of methods to build and evaluate fault prediction models. J Sys Softw 83(1):2\u201317","journal-title":"J Sys Softw"},{"issue":"2","key":"9984_CR2","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s11219-011-9144-9","volume":"20","author":"R Baggen","year":"2012","unstructured":"Baggen R, Correia JP, Schill K, Visser J (2012) Standardized code quality benchmarking for improving software maintainability. Software Quality Journal 20(2):287\u2013307","journal-title":"Software Quality Journal"},{"issue":"1","key":"9984_CR3","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/32.979986","volume":"28","author":"J Bansiya","year":"2002","unstructured":"Bansiya J, Davis CG (2002) A hierarchical model for object-oriented design quality assessment. IEEE Transactions on Software Engineering 28(1):4\u201317","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"10","key":"9984_CR4","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1109\/32.544352","volume":"22","author":"VR Basili","year":"1996","unstructured":"Basili VR, Briand LC, Melo WL (1996) A validation of object-oriented design metrics as quality indicators. IEEE Trans Softw Eng 22(10):751\u2013761","journal-title":"IEEE Trans Softw Eng"},{"issue":"2","key":"9984_CR5","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1037\/0033-295X.110.2.203","volume":"110","author":"D Borsboom","year":"2003","unstructured":"Borsboom D, Mellenbergh GJ, Van Heerden J (2003) The theoretical status of latent variables. Psychol Rev 110(2):203","journal-title":"Psychol Rev"},{"key":"9984_CR6","doi-asserted-by":"crossref","unstructured":"Calvo T, Koles\u00e1rov\u00e1 A, Komorn\u00edkov\u00e1 M, Mesiar R (2002) Aggregation operators: properties, classes and construction methods. In: Aggregation operators. Springer, pp 3\u2013104","DOI":"10.1007\/978-3-7908-1787-4_1"},{"issue":"3","key":"9984_CR7","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0305-0548(94)E0023-Z","volume":"22","author":"C Carlsson","year":"1995","unstructured":"Carlsson C, Full\u00e9r R (1995) Multiple criteria decision making: the case for interdependence. Comput Oper Res 22(3):251\u2013260","journal-title":"Comput Oper Res"},{"key":"9984_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.infsof.2017.08.004","volume":"93","author":"X Chen","year":"2018","unstructured":"Chen X, Zhao Y, Wang Q, Yuan Z (2018) Multi: Multi-objective effort-aware just-in-time software defect prediction. Inf Softw Technol 93:1\u201313","journal-title":"Inf Softw Technol"},{"issue":"6","key":"9984_CR9","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1109\/32.295895","volume":"20","author":"SR Chidamber","year":"1994","unstructured":"Chidamber SR, Kemerer CF (1994) A metrics suite for object oriented design. IEEE Trans Softw Eng 20(6):476\u2013493","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"9984_CR10","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/S0360-8352(00)00019-X","volume":"37","author":"EU Choo","year":"1999","unstructured":"Choo EU, Schoner B, Wedley WC (1999) Interpretation of criteria weights in multicriteria decision making. Computers & Industrial Engineering 37 (3):527\u2013541","journal-title":"Computers & Industrial Engineering"},{"key":"9984_CR11","doi-asserted-by":"crossref","unstructured":"D\u2019Ambros M, Lanza M, Robbes R (2010) An extensive comparison of bug prediction approaches. In: 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010). IEEE, pp 31\u201341","DOI":"10.1109\/MSR.2010.5463279"},{"issue":"4-5","key":"9984_CR12","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/s10664-011-9173-9","volume":"17","author":"M D\u2019Ambros","year":"2012","unstructured":"D\u2019Ambros M, Lanza M, Robbes R (2012) Evaluating defect prediction approaches: a benchmark and an extensive comparison. Empirical Softw Eng 17(4-5):531\u2013577","journal-title":"Empirical Softw Eng"},{"key":"9984_CR13","doi-asserted-by":"crossref","unstructured":"Easterbrook S, Singer J, Storey MA, Damian D (2008) Selecting empirical methods for software engineering research. In: Guide to Advanced Empirical Software Engineering. Springer, pp 285\u2013311","DOI":"10.1007\/978-1-84800-044-5_11"},{"key":"9984_CR14","doi-asserted-by":"publisher","DOI":"10.1201\/b17461","volume-title":"Software metrics: a rigorous and practical approach","author":"N Fenton","year":"2014","unstructured":"Fenton N, Bieman J (2014) Software metrics: a rigorous and practical approach. CRC press, Boca Raton"},{"key":"9984_CR15","doi-asserted-by":"crossref","unstructured":"Ferenc R, Gyimesi P, Gyimesi G, T\u00f3th Z, Gyim\u00f3thy T (2020) An automatically created novel bug dataset and its validation in bug prediction. J Sys Softw, pp 110691","DOI":"10.1016\/j.jss.2020.110691"},{"key":"9984_CR16","doi-asserted-by":"crossref","unstructured":"Fu W, Menzies T (2017) Revisiting unsupervised learning for defect prediction. In: Proceedings of the 2017 11th joint meeting on foundations of software engineering, pp 72\u201383","DOI":"10.1145\/3106237.3106257"},{"key":"9984_CR17","unstructured":"Garvin DA (1984) What does \u201cproduct quality\u201d really mean. Sloan management review 25"},{"issue":"5","key":"9984_CR18","doi-asserted-by":"publisher","first-page":"2585","DOI":"10.1007\/s10664-017-9513-5","volume":"22","author":"Y Gil","year":"2017","unstructured":"Gil Y, Lalouche G (2017) On the correlation between size and metric validity. Empir Softw Eng 22(5):2585\u20132611","journal-title":"Empir Softw Eng"},{"issue":"7","key":"9984_CR19","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/32.859533","volume":"26","author":"TL Graves","year":"2000","unstructured":"Graves TL, Karr AF, Marron JS, Siy H (2000) Predicting fault incidence using software change history. IEEE Trans Softw Eng 26(7):653\u2013661","journal-title":"IEEE Trans Softw Eng"},{"issue":"10","key":"9984_CR20","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1109\/TSE.2005.112","volume":"31","author":"T Gyimothy","year":"2005","unstructured":"Gyimothy T, Ferenc R, Siket I (2005) Empirical validation of object-oriented metrics on open source software for fault prediction. IEEE Trans Softw Eng 31(10):897\u2013910","journal-title":"IEEE Trans Softw Eng"},{"key":"9984_CR21","doi-asserted-by":"crossref","unstructured":"Hassan AE (2009) Predicting faults using the complexity of code changes. In: 2009 IEEE 31st international conference on software engineering. IEEE, pp 78\u201388","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"9984_CR22","unstructured":"Henderson-Sellers B (1995) Object-oriented metrics: measures of complexity. Prentice-Hall, Inc."},{"key":"9984_CR23","unstructured":"Hinton GE, Roweis S (2003) Stochastic neighbor embedding. In: Becker S, Thrun S, Obermayer K (eds) Advances in neural information processing systems, vol 15. MIT Press. https:\/\/proceedings.neurips.cc\/paper\/2002\/file\/6150ccc6069bea6b5716254057a194ef-Paper.pdf"},{"issue":"5","key":"9984_CR24","doi-asserted-by":"publisher","first-page":"2823","DOI":"10.1007\/s10664-018-9661-2","volume":"24","author":"Q Huang","year":"2019","unstructured":"Huang Q, Xia X, Lo D (2019) Revisiting supervised and unsupervised models for effort-aware just-in-time defect prediction. Empir Softw Eng 24 (5):2823\u20132862","journal-title":"Empir Softw Eng"},{"key":"9984_CR25","doi-asserted-by":"publisher","unstructured":"IEEE (1990) IEEE std 610.12-1990, standard glossary of software engineering terminology. https:\/\/doi.org\/10.1109\/IEEESTD.1990.101064","DOI":"10.1109\/IEEESTD.1990.101064"},{"key":"9984_CR26","unstructured":"ISO\/IEC (2010) ISO\/IEC 25010 system and software quality models. Tech. rep."},{"key":"9984_CR27","doi-asserted-by":"crossref","unstructured":"Jiarpakdee J, Tantithamthavorn C, Treude C (2020) The impact of automated feature selection techniques on the interpretation of defect models. Empir Softw Eng, pp 1\u201349","DOI":"10.1007\/s10664-020-09848-1"},{"issue":"6","key":"9984_CR28","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/TSE.2012.70","volume":"39","author":"Y Kamei","year":"2013","unstructured":"Kamei Y, Shihab E, Adams B, Hassan AE, Mockus A, Sinha A, Ubayashi N (2013) A large-scale empirical study of just-in-time quality assurance. IEEE Trans Softw Eng 39(6):757\u2013773","journal-title":"IEEE Trans Softw Eng"},{"issue":"2","key":"9984_CR29","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1023\/A:1009876418873","volume":"4","author":"TM Khoshgoftaar","year":"1999","unstructured":"Khoshgoftaar TM, Allen EB (1999) A comparative study of ordering and classification of fault-prone software modules. Empir Softw Eng 4 (2):159\u2013186","journal-title":"Empir Softw Eng"},{"key":"9984_CR30","doi-asserted-by":"crossref","unstructured":"Kim S, Zimmermann T, Whitehead Jr EJ, Zeller A (2007) Predicting faults from cached history. In: 29th International Conference on Software Engineering (ICSE\u201907). IEEE, pp 489\u2013498","DOI":"10.1109\/ICSE.2007.66"},{"issue":"2","key":"9984_CR31","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1109\/TSE.2008.90","volume":"35","author":"AG Koru","year":"2008","unstructured":"Koru AG, Zhang D, El Emam K, Liu H (2008) An investigation into the functional form of the size-defect relationship for software modules. IEEE Trans Softw Eng 35(2):293\u2013304","journal-title":"IEEE Trans Softw Eng"},{"key":"9984_CR32","doi-asserted-by":"crossref","unstructured":"Letouzey JL, Coq T (2010) The sqale analysis model: An analysis model compliant with the representation condition for assessing the quality of software source code. In: 2010 Second International Conference on Advances in System Testing and Validation Lifecycle (VALID). IEEE, pp 43\u201348","DOI":"10.1109\/VALID.2010.31"},{"key":"9984_CR33","volume-title":"The delphi method","author":"HA Linstone","year":"1975","unstructured":"Linstone HA, Turoff M, et al. (1975) The delphi method. Addison-Wesley Reading, Boston"},{"key":"9984_CR34","doi-asserted-by":"crossref","unstructured":"Liu J, Zhou Y, Yang Y, Lu H, Xu B (2017) Code churn: A neglected metric in effort-aware just-in-time defect prediction. In: 2017 ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM). IEEE, pp 11\u201319","DOI":"10.1109\/ESEM.2017.8"},{"issue":"86","key":"9984_CR35","first-page":"2579","volume":"9","author":"L van der Maaten","year":"2008","unstructured":"van der Maaten L, Hinton G (2008) Visualizing data using t-sne. J Mach Learn Res 9(86):2579\u20132605. http:\/\/jmlr.org\/papers\/v9\/vandermaaten08a.html","journal-title":"J Mach Learn Res"},{"key":"9984_CR36","first-page":"66","volume":"10","author":"L van der Maaten","year":"2009","unstructured":"van der Maaten L, Postma E, van den Herik J (2009) Dimensionality reduction: a comparative review. J Mach Learn Res 10:66\u201371","journal-title":"J Mach Learn Res"},{"issue":"7","key":"9984_CR37","doi-asserted-by":"publisher","first-page":"1567","DOI":"10.1016\/j.jmva.2009.01.010","volume":"100","author":"JF Mai","year":"2009","unstructured":"Mai JF, Scherer M (2009) L\u00e9vy-frailty copulas. J Multivar Anal 100(7):1567\u20131585","journal-title":"J Multivar Anal"},{"issue":"6","key":"9984_CR38","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1109\/91.890347","volume":"8","author":"JL Marichal","year":"2000","unstructured":"Marichal JL (2000) An axiomatic approach of the discrete choquet integral as a tool to aggregate interacting criteria. IEEE Trans Fuzzy Syst 8(6):800\u2013807","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"9984_CR39","unstructured":"Martin RC (2002) Agile software development: principles, patterns, and practices. Prentice Hall"},{"key":"9984_CR40","doi-asserted-by":"crossref","unstructured":"Mende T, Koschke R (2009) Revisiting the evaluation of defect prediction models. In: Proceedings of the 5th International Conference on Predictor Models in Software Engineering, pp 1\u201310","DOI":"10.1145\/1540438.1540448"},{"key":"9984_CR41","doi-asserted-by":"crossref","unstructured":"Mende T, Koschke R (2010) Effort-aware defect prediction models. In: 2010 14th European conference on software maintenance and reengineering. IEEE, pp 107\u2013116","DOI":"10.1109\/CSMR.2010.18"},{"issue":"1","key":"9984_CR42","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TSE.2007.256941","volume":"33","author":"T Menzies","year":"2006","unstructured":"Menzies T, Greenwald J, Frank A (2006) Data mining static code attributes to learn defect predictors. IEEE Trans Softw Eng 33(1):2\u201313","journal-title":"IEEE Trans Softw Eng"},{"issue":"4","key":"9984_CR43","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/s10515-010-0069-5","volume":"17","author":"T Menzies","year":"2010","unstructured":"Menzies T, Milton Z, Turhan B, Cukic B, Jiang Y, Bener A (2010) Defect prediction from static code features: current results, limitations, new approaches. Automated Softw Eng 17(4):375\u2013407","journal-title":"Automated Softw Eng"},{"issue":"2","key":"9984_CR44","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1002\/bltj.2229","volume":"5","author":"A Mockus","year":"2000","unstructured":"Mockus A, Weiss DM (2000) Predicting risk of software changes. Bell Labs Technical Journal 5(2):169\u2013180","journal-title":"Bell Labs Technical Journal"},{"key":"9984_CR45","doi-asserted-by":"crossref","unstructured":"Moser R, Pedrycz W, Succi G (2008) A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction. In: Proceedings of the 30th international conference on software engineering, pp 181\u2013190","DOI":"10.1145\/1368088.1368114"},{"key":"9984_CR46","doi-asserted-by":"crossref","unstructured":"Nagappan N, Ball T (2005) Use of relative code churn measures to predict system defect density. In: Proceedings of the 27th international conference on software engineering, pp 284\u2013292","DOI":"10.1145\/1062455.1062514"},{"key":"9984_CR47","volume-title":"An introduction to copulas","author":"RB Nelsen","year":"2007","unstructured":"Nelsen RB (2007) An introduction to copulas. Springer Science & Business Media, Berlin"},{"key":"9984_CR48","volume-title":"Statistics for business and economics","author":"P Newbold","year":"2013","unstructured":"Newbold P, Carlson WL, Thorne B (2013) Statistics for business and economics. Pearson , Boston"},{"key":"9984_CR49","unstructured":"Nikora AP, Munson JC (2004) Developing fault predictors for evolving software systems. In: Proceedings. 5th International workshop on enterprise networking and computing in healthcare industry (IEEE Cat. No. 03EX717). IEEE, pp 338\u2013350"},{"issue":"12","key":"9984_CR50","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1109\/32.553637","volume":"22","author":"N Ohlsson","year":"1996","unstructured":"Ohlsson N, Alberg H (1996) Predicting fault-prone software modules in telephone switches. IEEE Trans Softw Eng 22(12):886\u2013894","journal-title":"IEEE Trans Softw Eng"},{"issue":"4","key":"9984_CR51","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/TSE.2005.49","volume":"31","author":"TJ Ostrand","year":"2005","unstructured":"Ostrand TJ, Weyuker EJ, Bell RM (2005) Predicting the location and number of faults in large software systems. IEEE Trans Softw Eng 31(4):340\u2013355","journal-title":"IEEE Trans Softw Eng"},{"issue":"11","key":"9984_CR52","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1080\/14786440109462720","volume":"2","author":"K Pearson","year":"1901","unstructured":"Pearson K (1901) On lines and planes of closest fit to systems of points in space. The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science 2(11):559\u2013572. https:\/\/doi.org\/10.1080\/14786440109462720","journal-title":"The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science"},{"issue":"1","key":"9984_CR53","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1504\/IJSSCI.2008.017590","volume":"1","author":"T Saaty","year":"2008","unstructured":"Saaty T (2008) Decision making with the analytic hierarchy process. International Journal of Services Sciences 1(1):83\u201398","journal-title":"International Journal of Services Sciences"},{"key":"9984_CR54","unstructured":"Saaty TL (1996) Decision making with dependence and feedback: The analytic network process, vol 4922. RWS Publ"},{"issue":"2","key":"9984_CR55","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1111\/j.1540-5915.1991.tb00352.x","volume":"22","author":"S Schenkerman","year":"1991","unstructured":"Schenkerman S (1991) Use and abuse of weights in multiple objective decision support models. Decision Sciences 22(2):369\u2013378","journal-title":"Decision Sciences"},{"issue":"2","key":"9984_CR56","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1037\/0033-2909.87.2.245","volume":"87","author":"JH Steiger","year":"1980","unstructured":"Steiger JH (1980) Tests for comparing elements of a correlation matrix. Psychol Bull 87(2):245","journal-title":"Psychol Bull"},{"key":"9984_CR57","doi-asserted-by":"crossref","unstructured":"Triantaphyllou E (2000) Multi-criteria decision making methods. In: Multi-criteria decision making methods: A comparative study. Springer, pp 5\u201321","DOI":"10.1007\/978-1-4757-3157-6_2"},{"key":"9984_CR58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38571-1","volume-title":"Software product quality control","author":"S Wagner","year":"2013","unstructured":"Wagner S (2013) Software product quality control. Springer, Berlin"},{"key":"9984_CR59","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.infsof.2015.02.009","volume":"62","author":"S Wagner","year":"2015","unstructured":"Wagner S, Goeb A, Heinemann L, Kl\u00e4s M, Lampasona C, Lochmann K, Mayr A, Pl\u00f6sch R, Seidl A, Streit J, et al. (2015) Operationalised product quality models and assessment: The quamoco approach. Inf Softw Technol 62:101\u2013123","journal-title":"Inf Softw Technol"},{"issue":"5","key":"9984_CR60","doi-asserted-by":"publisher","first-page":"663","DOI":"10.3102\/00346543040005663","volume":"40","author":"MW Wang","year":"1970","unstructured":"Wang MW, Stanley JC (1970) Differential weighting: A review of methods and empirical studies. Rev Educ Res 40(5):663\u2013705","journal-title":"Rev Educ Res"},{"key":"9984_CR61","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1016\/j.infsof.2017.03.007","volume":"87","author":"X Yang","year":"2017","unstructured":"Yang X, Lo D, Xia X, Sun J (2017) Tlel: A two-layer ensemble learning approach for just-in-time defect prediction. Inf Softw Technol 87:206\u2013220","journal-title":"Inf Softw Technol"},{"key":"9984_CR62","doi-asserted-by":"crossref","unstructured":"Yang Y, Zhou Y, Liu J, Zhao Y, Lu H, Xu L, Xu B, Leung H (2016) Effort-aware just-in-time defect prediction: simple unsupervised models could be better than supervised models. In: Proceedings of the 2016 24th ACM SIGSOFT International symposium on foundations of software engineering, pp 157\u2013168","DOI":"10.1145\/2950290.2950353"},{"key":"9984_CR63","volume-title":"Multiple criteria decision making, vol 123","author":"M Zeleny","year":"2012","unstructured":"Zeleny M (2012) Multiple criteria decision making, vol 123. Springer Science & Business Media, Berlin"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-09984-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-021-09984-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-09984-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T10:30:31Z","timestamp":1631529031000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-021-09984-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,23]]},"references-count":63,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["9984"],"URL":"https:\/\/doi.org\/10.1007\/s10664-021-09984-2","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,23]]},"assertion":[{"value":"26 May 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}],"article-number":"86"}}