{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T16:36:12Z","timestamp":1773678972704,"version":"3.50.1"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/ase.2011.6100072","type":"proceedings-article","created":{"date-parts":[[2011,12,16]],"date-time":"2011-12-16T13:30:08Z","timestamp":1324042208000},"page":"343-351","source":"Crossref","is-referenced-by-count":108,"title":["Local vs. global models for effort estimation and defect prediction"],"prefix":"10.1109","author":[{"given":"Tim","family":"Menzies","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Butcher","sequence":"additional","affiliation":[]},{"given":"Andrian","family":"Marcus","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Zimmermann","sequence":"additional","affiliation":[]},{"given":"David","family":"Cok","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009872202035"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2007.13"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.34"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2009.40"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/32.637387"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5316010"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"34","author":"witten","year":"2011","journal-title":"Data Mining Practical Machine Learning Tools and Techniques with Java Implementations"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/52.877854"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1004"},{"key":"14","first-page":"11","article-title":"The rosetta stone: Making cocomo 81 estimates work with cocomo ii","author":"reifer","year":"1999","journal-title":"Crosstalk"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/ISBIM.2008.101"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/223784.223812"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/69.204087"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1996.546732"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.27"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859061"},{"key":"22","author":"baker","year":"2007","journal-title":"A Hybrid Approach to Expert and Model-based Effort Estimation"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134349"},{"key":"24","first-page":"249","article-title":"Locally weighted naive bayes","author":"frank","year":"2003","journal-title":"Proceedings of the Conference on Uncertainty in Artificial Intelligence"},{"key":"25","first-page":"202","article-title":"Scaling up the accuracy of naive-bayes classifiers: A decision-tree hybrid","author":"kohavi","year":"1996","journal-title":"Knowledge Discovery and data mining"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1390817.1390824"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814075"},{"key":"28","article-title":"Is evidence based software engineering mature enough for practice & policy?","author":"budgen","year":"0","journal-title":"33rd Annual IEEE Software Engineering Workshop 2009 (SEW-33) Skvde Sweden 2009"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1083165.1083171"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1001"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595713"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1177\/1094342007088380"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2005.1541858"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.114"},{"key":"7","author":"boehm","year":"2000","journal-title":"Software Cost Estimation with COCOMO II"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.08.005"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1001"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985859"},{"key":"31","article-title":"Understanding the value of software engineering technologies","author":"green","year":"0","journal-title":"IEEE ASE'09 2009"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9103-7"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859027"},{"key":"8","author":"brooks","year":"1995","journal-title":"The Mythical Man-Month Anniversary Edition"}],"event":{"name":"2011 26th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","location":"Lawrence, KS, USA","start":{"date-parts":[[2011,11,6]]},"end":{"date-parts":[[2011,11,10]]}},"container-title":["2011 26th IEEE\/ACM International Conference on Automated Software Engineering (ASE 2011)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6093623\/6100039\/06100072.pdf?arnumber=6100072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T08:59:49Z","timestamp":1490086789000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6100072\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/ase.2011.6100072","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}