{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T12:09:28Z","timestamp":1772021368729,"version":"3.50.1"},"reference-count":71,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[1997,1]]},"DOI":"10.1016\/s0950-5849(96)00006-7","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T12:27:49Z","timestamp":1027600069000},"page":"425-437","source":"Crossref","is-referenced-by-count":130,"title":["A comparison of techniques for developing predictive models of software metrics"],"prefix":"10.1016","volume":"39","author":[{"given":"Andrew R.","family":"Gray","sequence":"first","affiliation":[]},{"given":"Stephen G.","family":"MacDonell","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0950-5849(96)00006-7_BIB1","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1109\/TSE.1978.231521","article-title":"A general empirical solution to the macro software sizing and estimating problem","volume":"4","author":"Putnam","year":"1978","journal-title":"IEEE Trans. Soft. Eng."},{"key":"10.1016\/S0950-5849(96)00006-7_BIB2","series-title":"Software Engineering Economics","author":"Boehm","year":"1981"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB3","doi-asserted-by":"crossref","first-page":"931","DOI":"10.1109\/32.177363","article-title":"A pattern recognition approach for software data analysis","volume":"18","author":"Briand","year":"1992","journal-title":"IEEE Trans. Soft. Eng."},{"key":"10.1016\/S0950-5849(96)00006-7_BIB4","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1049\/sej.1990.0024","article-title":"Calibrating estimation tools for software development","volume":"5","author":"Jeffery","year":"1990","journal-title":"Soft. Eng. Journal"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB5","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1145\/22899.22906","article-title":"An empirical validation of software cost estimation models","volume":"30","author":"Kemerer","year":"1987","journal-title":"Comm. ACM"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB6","unstructured":"S.G. MacDonell and A.R. Gray, A review of model building techniques found in software metrics literature, in preparation."},{"key":"10.1016\/S0950-5849(96)00006-7_BIB7","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1049\/sej.1993.0002","article-title":"Shotgun correlations in software measures","volume":"8","author":"Courtney","year":"1993","journal-title":"Software Eng. Journal"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/1924403","article-title":"Data mining","volume":"LXV","author":"Lovell","year":"1983","journal-title":"The Review of Economics and Statistics"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB9","doi-asserted-by":"crossref","first-page":"140","DOI":"10.2307\/2684155","article-title":"Data splitting","volume":"44","author":"Picard","year":"1990","journal-title":"The American Statistician"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB10","doi-asserted-by":"crossref","first-page":"415","DOI":"10.2307\/1267881","article-title":"Validation of regression models: Methods and examples","volume":"19","author":"Snee","year":"1977","journal-title":"Technometrics"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB11","article-title":"The prediction sum of squares as a criterion for selecting predictor variables","author":"Allen","year":"1971"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1214\/aos\/1176344552","article-title":"Bootstrap methods: Another look at the jack-knife","volume":"7","author":"Efron","year":"1979","journal-title":"Annals of Statistics"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB13","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1214\/ss\/1177010383","article-title":"Bootstrap: More than a stab in the dark?","volume":"9","author":"Young","year":"1994","journal-title":"Statistical Science"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB14","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/0164-1212(90)90048-Q","article-title":"Factor analysis of source code metrics","volume":"12","author":"Coupal","year":"1990","journal-title":"J. Systems Software"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB15","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/0164-1212(92)90115-Z","article-title":"A factor analysis of software complexity measures","volume":"17","author":"Mata-Toledo","year":"1992","journal-title":"J. Systems Software"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB16","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/0164-1212(93)90041-U","article-title":"Dimensionality reduction in software development effort estimation","volume":"21","author":"Subramanian","year":"1993","journal-title":"J. Systems Software"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB17","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1214\/ss\/1177013439","article-title":"Collinearity and least squares regression","volume":"2","author":"Stewart","year":"1987","journal-title":"Statistical Science"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB18","series-title":"Quantitative functional complexity analysis of commercial software systems","author":"MacDonell","year":"1993"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB19","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/0164-1212(94)90110-4","article-title":"Robust regression for developing software estimation models","volume":"27","author":"Miyazaki","year":"1994","journal-title":"J. Systems Software"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB20","doi-asserted-by":"crossref","first-page":"871","DOI":"10.2307\/2288718","article-title":"Least median of squares regression","volume":"79","author":"Rousseeuw","year":"1984","journal-title":"J. American Statistical Association"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB21","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/S0003-2670(00)82910-4","article-title":"Least median of squares: A robust method for outlier and model error detection in regression and calibration","volume":"187","author":"Massart","year":"1986","journal-title":"Analytica Chimica Acta"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB22","series-title":"Robust Regression and Outlier Detection","author":"Rousseeuw","year":"1987"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB23","doi-asserted-by":"crossref","first-page":"79","DOI":"10.2307\/2684169","article-title":"A cautionary note on the method of least median squares","volume":"46","author":"Hettmansperger","year":"1992","journal-title":"The American Statistician"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB24","doi-asserted-by":"crossref","first-page":"633","DOI":"10.2307\/2289995","article-title":"Unmasking multivariate outliers and leverage points","volume":"85","author":"Rousseeuw","year":"1990","journal-title":"J. American Statistical Association"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB25","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1214\/ss\/1177013622","article-title":"Influential observations, high leverage points, and outliers in linear regression","volume":"1","author":"Chatterjee","year":"1986","journal-title":"Statistical Science"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB26","series-title":"Proc. 1990 ACM SIGSMALL\/PC Symp. Small Systems","first-page":"262","article-title":"Using a competitive learning neural network to evaluate software complexity","author":"Sheppard","year":"1990"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB27","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1109\/32.148475","article-title":"Prediction of software reliability using connectionist models","volume":"18","author":"Karunanithi","year":"1992","journal-title":"IEEE Trans. Soft. Eng."},{"key":"10.1016\/S0950-5849(96)00006-7_BIB28","series-title":"Proc. 26th Hawaii Int. Conf. System Sciences","first-page":"626","article-title":"Neural networks in specification level software size estimation","author":"Hakkarainen","year":"1993"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB29","article-title":"Estimating software development effort with connectionist models","author":"Wittig","year":"1995"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB30","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/BF00872054","article-title":"Fuzzy systems and neural networks in software engineering project management","volume":"4","author":"Kumar","year":"1994","journal-title":"J. Applied Intelligence"},{"issue":"2","key":"10.1016\/S0950-5849(96)00006-7_BIB31","first-page":"87","article-title":"Using artificial neural networks and function points to estimate 4GL software development effort","volume":"1","author":"Wittig","year":"1994","journal-title":"Australian Journal of Information Systems"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB32","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/32.345828","article-title":"Machine learning approaches to estimating software development effort","volume":"21","author":"Srinivasan","year":"1995","journal-title":"IEEE Trans. Soft. Eng"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB33","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/0164-1212(94)00130-F","article-title":"A neural network approach for early detection of program modules having high risk in the maintenance phase","volume":"29","author":"Khoshgoftaar","year":"1995","journal-title":"J. Systems Software"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB34","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/0164-1212(94)00051-N","article-title":"Software fault prediction","volume":"29","author":"Sherer","year":"1995","journal-title":"J. Systems Software"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB35","series-title":"Proc. 19th Annual SAS Users Group Int. Conf.","first-page":"1538","article-title":"Neural networks and statistical models","author":"Sarle","year":"1994"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB36","unstructured":"A.R. Gray and S.G. MacDonell, Guidelines for the development of neural network-based software metric models, in preparation."},{"key":"10.1016\/S0950-5849(96)00006-7_BIB37","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/0378-7206(94)90024-8","article-title":"Applications artificial neural networks and their business applications","volume":"27","author":"Li","year":"1994","journal-title":"Information and Management"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB38","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1214\/ss\/1177010638","article-title":"Neural networks: A review from a statistical perspective","volume":"9","author":"Cheng","year":"1994","journal-title":"Statistical Science"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB39","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/0893-6080(89)90020-8","article-title":"Multilayer feedforward networks are universal approximators","volume":"2","author":"Hornik","year":"1989","journal-title":"Neural Networks"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB40","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1016\/0893-6080(90)90004-5","article-title":"Connectionist nonparametric regression: Multilayer feedforward networks can learn arbitrary mappings","volume":"3","author":"White","year":"1990","journal-title":"Neural Networks"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB41","series-title":"Proc. 8th Ann. Conf. Cognitive Science Society","first-page":"823","article-title":"Two problems with backpropagation and other steepestdescent learning procedures for networks","author":"Sutton","year":"1989"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB42","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/0893-6080(89)90021-X","article-title":"A new approach for finding the global minimum of error function in neural networks","volume":"2","author":"Baba","year":"1989","journal-title":"Neural Networks"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB43","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/0893-6080(89)90014-2","article-title":"Neural networks and principal component analysis: Learning from examples without local minima","volume":"2","author":"Baldi","year":"1989","journal-title":"Neural Networks"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB44","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1109\/72.165592","article-title":"Avoiding false local minima by proper initialization of connections","volume":"3","author":"Wessels","year":"1992","journal-title":"IEEE Trans. Neural Networks"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB45","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/0893-6080(93)90003-F","article-title":"Initializing back propagation networks with prototypes","volume":"6","author":"Denoeux","year":"1993","journal-title":"Neural Networks"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB46","doi-asserted-by":"crossref","first-page":"738","DOI":"10.1109\/72.317726","article-title":"On the initialisation and optimisation of multilayer perceptrons","author":"Weymaere","year":"1994","journal-title":"IEEE Trans. Neural Networks"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB47","series-title":"Proc. 9th European Conf. Artificial Intelligence","first-page":"222","article-title":"An explanation component for a connectionist inference system","author":"Diederich","year":"1990"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB48","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/0004-3702(77)90003-0","article-title":"Production rules as a representation for a knowledge-based consultation program","volume":"8","author":"Davis","year":"1977","journal-title":"Artificial Intelligence"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB49","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1080\/09540099550039318","article-title":"Catastrophic forgetting, rehearsal and pseudorehearsal","volume":"7","author":"Robins","year":"1995","journal-title":"Connection Science"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB50","series-title":"Proc. 15th Int. Conf. Software Engineering","first-page":"45","article-title":"Experimental evaluation of a fuzzy-set based measure of software correctness using program mutation","author":"Bastani","year":"1993"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB51","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1145\/175247.175254","article-title":"Fuzzy systems: An overview","volume":"37","author":"Munakata","year":"1994","journal-title":"Comm. ACM"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB52","doi-asserted-by":"crossref","first-page":"1329","DOI":"10.1109\/12.324566","article-title":"Fuzzy systems as universal approximators","volume":"43","author":"Kosko","year":"1994","journal-title":"IEEE Trans. Computers"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB53","doi-asserted-by":"crossref","first-page":"1414","DOI":"10.1109\/21.199466","article-title":"Generating fuzzy rules by learning from examples","volume":"22","author":"Wang","year":"1992","journal-title":"IEEE Trans. Systems, Man, and Cybernetics"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB54","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1109\/21.370193","article-title":"Fuzzy logic controllers are universal approximators","volume":"25","author":"Castro","year":"1995","journal-title":"IEEE Trans. Systems, Man, and Cybernetics"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB55","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1109\/21.256541","article-title":"ANFIS: Adaptive-network-based fuzzy inference system","volume":"23","author":"Jang","year":"1993","journal-title":"IEEE Trans. Systems, Man, and Cybernetics"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB56","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1109\/72.159069","article-title":"On fuzzy modelling using fuzzy neural networks with the back-propagation algorithm","volume":"3","author":"Horikawa","year":"1992","journal-title":"IEEE Trans. Neural Networks"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB57","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/0165-0114(94)90283-6","article-title":"Can fuzzy neural nets approximate continuous fuzzy functions","volume":"61","author":"Buckley","year":"1994","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB58","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1109\/32.24728","article-title":"An evaluation of expert systems for software engineering management","volume":"15","author":"Ramsey","year":"1989","journal-title":"IEEE Trans. Soft. Eng."},{"key":"10.1016\/S0950-5849(96)00006-7_BIB59","series-title":"Proc. 15th Int. Conf. Software Engineering","first-page":"35","article-title":"Rule-based approach to computing module cohesion","author":"Lakhotia","year":"1993"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB60","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/BF01975435","article-title":"Design and implementation of a knowledge-based decision support system for estimating software development work-Effort","volume":"4","author":"Griech","year":"1994","journal-title":"J. Systems Integration"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB61","series-title":"Proc. DARPA Case-Based Reasoning Workshop","first-page":"147","article-title":"Case-based learning algorithms","author":"Aha","year":"1991"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB62","doi-asserted-by":"crossref","first-page":"155","DOI":"10.2307\/249573","article-title":"Examining the feasibility of a case-based reasoning model for software effort estimation","volume":"16","author":"Mukhopadhyay","year":"1992","journal-title":"MIS Quarterly"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB63","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1287\/isre.2.4.243","article-title":"Software effort estimation: An exploratory study of expert performance","volume":"2","author":"Vicinanza","year":"1991","journal-title":"Information Systems Research"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB64","series-title":"Classification and Regression Trees","author":"Breiman","year":"1993"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB65","doi-asserted-by":"crossref","first-page":"1743","DOI":"10.1109\/32.9061","article-title":"Learning from examples: Generation and evaluation of decision trees for software resource analysis","volume":"14","author":"Selby","year":"1988","journal-title":"IEEE Trans. Soft. Eng."},{"key":"10.1016\/S0950-5849(96)00006-7_BIB66","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1016\/0164-1212(90)90041-J","article-title":"Evaluating techniques for generating metric-based classification trees","volume":"12","author":"Porter","year":"1990","journal-title":"J. Systems Software"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB67","series-title":"Proceedings of the IFPUG Fall Conference","first-page":"279.1","article-title":"Alternatives to regression models for estimating software projects","author":"MacDonell","year":"1996"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB68","article-title":"Analyse statistique de la productivitie des projects de development en informatique apartir de la technique des points des fonction","author":"Desharnais","year":"1989"},{"key":"10.1016\/S0950-5849(96)00006-7_BIB69","unstructured":"B. Samson, D. Ellison and P. Dugard, Software cost estimation using an albus perceptron (CMAC), To appear in Information and Software Technology."},{"key":"10.1016\/S0950-5849(96)00006-7_BIB70","doi-asserted-by":"crossref","first-page":"674","DOI":"10.1109\/32.403791","article-title":"Experience with the accuracy of software maintenance task effort prediction models","volume":"21","author":"Jorgensen","year":"1995","journal-title":"IEEE Trans. Soft. Eng."},{"key":"10.1016\/S0950-5849(96)00006-7_BIB71","series-title":"Proc. 18th Int. Conf. on Software Engineering","first-page":"170","article-title":"Effort estimation using analogy","author":"Shepperd","year":"1996"}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584996000067?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584996000067?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T16:28:19Z","timestamp":1556641699000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950584996000067"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,1]]},"references-count":71,"journal-issue":{"issue":"6","published-print":{"date-parts":[[1997,1]]}},"alternative-id":["S0950584996000067"],"URL":"https:\/\/doi.org\/10.1016\/s0950-5849(96)00006-7","relation":{},"ISSN":["0950-5849"],"issn-type":[{"value":"0950-5849","type":"print"}],"subject":[],"published":{"date-parts":[[1997,1]]}}}