{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T00:10:11Z","timestamp":1759018211789,"version":"3.44.0"},"reference-count":28,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2002,4,1]],"date-time":"2002-04-01T00:00:00Z","timestamp":1017619200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2002,4,1]],"date-time":"2002-04-01T00:00:00Z","timestamp":1017619200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Fuzzy Sets and Systems"],"published-print":{"date-parts":[[2002,4]]},"DOI":"10.1016\/s0165-0114(01)00128-2","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T07:38:44Z","timestamp":1027582724000},"page":"199-208","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":18,"title":["Empirical evaluation of a fuzzy logic-based software quality prediction model"],"prefix":"10.1016","volume":"127","author":[{"given":"Sun Sup","family":"So","sequence":"first","affiliation":[]},{"given":"Sung Deok","family":"Cha","sequence":"additional","affiliation":[]},{"given":"Yong Rae","family":"Kwon","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0165-0114(01)00128-2_BIB1","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/52.268958","article-title":"Managing code inspection information","volume":"11","author":"Barnard","year":"1994","journal-title":"IEEE Software"},{"key":"10.1016\/S0165-0114(01)00128-2_BIB2","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.1109\/TSE.1989.559782","article-title":"A two-person inspection method to improve programming productivity","volume":"15","author":"Bisant","year":"1989","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/S0165-0114(01)00128-2_BIB3","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1109\/32.44387","article-title":"Analysis of faults in an N-version software experiment","volume":"16","author":"Brilliant","year":"1990","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/S0165-0114(01)00128-2_BIB4","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/0165-0114(95)00385-1","article-title":"System failure engineering and fuzzy methodology","volume":"83","author":"Cai","year":"1996","journal-title":"Fuzzy Sets and Systems"},{"first-page":"18","year":"1998","series-title":"Software Defect and Operational Profile Modeling","key":"10.1016\/S0165-0114(01)00128-2_BIB5"},{"key":"10.1016\/S0165-0114(01)00128-2_BIB6","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/49.46872","article-title":"Statistical quality control applied to code inspections","volume":"8","author":"Christenson","year":"1990","journal-title":"IEEE J. Selected Areas Commun."},{"key":"10.1016\/S0165-0114(01)00128-2_BIB7","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1002\/spe.4380220205","article-title":"Experience with Fagan's inspection method","volume":"22","author":"Doolan","year":"1992","journal-title":"Software Practice Experience"},{"year":"1990","series-title":"Probability and Statistics for the Engineering","author":"Dougherty","key":"10.1016\/S0165-0114(01)00128-2_BIB8"},{"first-page":"147","year":"1996","series-title":"Predictive quality control with software inspection, in software inspection: an industry best practice","key":"10.1016\/S0165-0114(01)00128-2_BIB9"},{"first-page":"115","year":"1993","series-title":"Software Inspection Process","key":"10.1016\/S0165-0114(01)00128-2_BIB10"},{"key":"10.1016\/S0165-0114(01)00128-2_BIB11","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1016\/0165-0114(94)90221-6","article-title":"Rule-based fuzzy classification for software quality control","volume":"63","author":"Ebert","year":"1993","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0165-0114(01)00128-2_BIB12","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1145\/267896.267916","article-title":"Experiences with criticality predictions in software development","volume":"22","author":"Ebert","year":"1997","journal-title":"Software Eng. Notes"},{"key":"10.1016\/S0165-0114(01)00128-2_BIB13","series-title":"Computational Intelligence in Software Engineering","first-page":"295","article-title":"Knowledge-based techniques for software quality management","author":"Ebert","year":"1998"},{"key":"10.1016\/S0165-0114(01)00128-2_BIB14","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1147\/sj.153.0182","article-title":"Design and code inspections to reduce errors in program development","volume":"15","author":"Fagan","year":"1976","journal-title":"IBM Systems J."},{"key":"10.1016\/S0165-0114(01)00128-2_BIB15","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1109\/TSE.1986.6312976","article-title":"Advances in software inspections","volume":"12","author":"Fagan","year":"1986","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/S0165-0114(01)00128-2_BIB16","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/49.272878","article-title":"A comparative study of pattern recognition techniques for quality evaluation of telecommunications software","volume":"12","author":"Khoshgoftaar","year":"1994","journal-title":"IEEE J. Selected Areas Commun."},{"key":"10.1016\/S0165-0114(01)00128-2_BIB17","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1109\/32.135775","article-title":"The detection of fault-prone programs","volume":"18","author":"Munson","year":"1992","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/S0165-0114(01)00128-2_BIB18","doi-asserted-by":"crossref","unstructured":"W. Pedrycz, J.F. Peters (Eds.), Computational Intelligence in Software Engineering,World Scientific, Singapore, 1998.","DOI":"10.1142\/9789812816153"},{"key":"10.1016\/S0165-0114(01)00128-2_BIB19","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1016\/0164-1212(90)90041-J","article-title":"Evaluating techniques for generating metric-based classification trees","volume":"12","author":"Porter","year":"1990","journal-title":"J. Systems Software"},{"key":"10.1016\/S0165-0114(01)00128-2_BIB20","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/52.62929","article-title":"Experience with inspection in ultralarge-scale developments","volume":"8","author":"Russell","year":"1991","journal-title":"IEEE Software"},{"key":"10.1016\/S0165-0114(01)00128-2_BIB21","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1109\/32.135774","article-title":"Methodology for validating software metrics","volume":"18","author":"Schneidewind","year":"1992","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/S0165-0114(01)00128-2_BIB22","unstructured":"T.J. Shimeall, An experimental in software fault tolerance and fault elimination, Ph.D. Dissertation, Univ. of California Irvine, 1989."},{"key":"10.1016\/S0165-0114(01)00128-2_BIB23","unstructured":"S.S. So, S.D. Cha, Y.R. Kwon, T.J. Shimeall, An empirical evaluation of six methods to detect errors in software, J. Software Testing, Verification and Reliability, in revision."},{"key":"10.1016\/S0165-0114(01)00128-2_BIB24","unstructured":"S.S. So, Y. Lim, S.D. Cha, Y.R. Kwon, An empirical study on software error detection: voting, instrumentation, and fagan inspection, Proceedings of the Asia-Pacific Software Engineering Conference, IEEE Computer Society Press, Silver Spring, MD, 1995, pp. 345\u2013351."},{"key":"10.1016\/S0165-0114(01)00128-2_BIB25","doi-asserted-by":"crossref","unstructured":"L.G. Votta, Does Every Inspection Need a Meeting?, SIGSOFT \u201993-Proceedings 1st ACM SIGSOFT Symposium on Software Development Engineering, ACM Press, New York, 1993, pp. 107\u2013114.","DOI":"10.1145\/256428.167070"},{"key":"10.1016\/S0165-0114(01)00128-2_BIB26","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/52.232397","article-title":"Lessons from three years of inspection data","volume":"10","author":"Weller","year":"1993","journal-title":"IEEE Software"},{"year":"1996","series-title":"Software Inspection: An Industry Best Practice","author":"Wheeler","key":"10.1016\/S0165-0114(01)00128-2_BIB27"},{"year":"1991","series-title":"Fuzzy Set Theory and its Applications","author":"Zimmermann","key":"10.1016\/S0165-0114(01)00128-2_BIB28"}],"container-title":["Fuzzy Sets and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165011401001282?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165011401001282?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T23:37:26Z","timestamp":1759016246000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0165011401001282"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,4]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2002,4]]}},"alternative-id":["S0165011401001282"],"URL":"https:\/\/doi.org\/10.1016\/s0165-0114(01)00128-2","relation":{},"ISSN":["0165-0114"],"issn-type":[{"type":"print","value":"0165-0114"}],"subject":[],"published":{"date-parts":[[2002,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Empirical evaluation of a fuzzy logic-based software quality prediction model","name":"articletitle","label":"Article Title"},{"value":"Fuzzy Sets and Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/S0165-0114(01)00128-2","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"converted-article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2002 Elsevier Science B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}