{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:48:53Z","timestamp":1729648133002,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icacci.2016.7732104","type":"proceedings-article","created":{"date-parts":[[2016,11,8]],"date-time":"2016-11-08T15:57:45Z","timestamp":1478620665000},"page":"554-560","source":"Crossref","is-referenced-by-count":2,"title":["Common threats to software quality predictive modeling studies using search-based techniques"],"prefix":"10.1109","author":[{"given":"Ruchika","family":"Malhotra","sequence":"first","affiliation":[]},{"given":"Megha","family":"Khanna","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.03.032"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/s11859-014-1032-2","article-title":"Software defect prediction using fuzzy integral fusion based on GA-FM","volume":"19","author":"kewen","year":"2014","journal-title":"Wuhan University Journal of Natural Sciences"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2231967"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.01.039"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.09.034"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21843-9_20"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09940-8_19"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s40595-013-0008-z"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.38"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2013.6561670"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.11.023"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.04.045"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.32"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-012-0095-7"},{"key":"ref13","first-page":"625","article-title":"Application of genetic algorithms to software testing","author":"xanthakis","year":"1992","journal-title":"Proceedings of 5th International Conference on Software Engineering and its Applications"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1996.558759"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1997.630844"},{"key":"ref16","first-page":"127","article-title":"Genetic programming model for software quality classification","author":"khoshgoftaar","year":"2001","journal-title":"Proc 6th Int High Assurance Systems Engineering Symp"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2003.1250214"},{"key":"ref18","first-page":"56","article-title":"Reducing overfitting in genetic programming models for software quality classification","author":"liu","year":"2004","journal-title":"Proceedings of 9th IEEE International symposium on High-Assurance Systems Engineering"},{"key":"ref19","first-page":"295","article-title":"Application of Genetic Programming in Software Engineering Empirical Data Modeling","author":"tsakonas","year":"2008","journal-title":"3rd International Conference on Software and Data Technologies"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2009.10.001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25231-0_1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.51"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868330"},{"journal-title":"Quasi-Experimentation Design and analysis issues for field settings","year":"1979","author":"cook","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.09.136"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379787"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2460999.2461011"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1201\/b19292","author":"malhotra","year":"2016","journal-title":"Empirical Research in Software Engineering Concepts Analysis and Applications"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/S0950-5849(01)00189-6","article-title":"Search based Software Engineering","volume":"43","author":"harman","year":"2001","journal-title":"Information & Software Technology"},{"key":"ref9","article-title":"Threats to validity in search-based software engineering empirical studies","author":"de oliveira barros","year":"2011","journal-title":"UNIRIO-Universidade Federal do Estado do Rio de Janeiro Tech Rep TR 0006\/2011"},{"key":"ref1","first-page":"1","article-title":"Software Engineering Predictive Modeling using Search-based Techniques: Systematic Review and Future Directions","author":"malhotra","year":"2015","journal-title":"Proceedings of North American Search Based Software Engineering Symposium (NASBASE 2015)"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.52"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87881-0_42"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2015.7275614"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.12.001"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009815306478"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.07.034"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.11.013"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2010.54"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.07.006"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02152-7_5"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2593868.2593870"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MMIT.2010.11"},{"key":"ref43","first-page":"17","article-title":"The ability of search-based algorithms to predict change-prone classes","volume":"17","author":"malhotra","year":"2014","journal-title":"Software Quality Professional"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.12.023"}],"event":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2016,9,21]]},"location":"Jaipur, India","end":{"date-parts":[[2016,9,24]]}},"container-title":["2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7592392\/7732013\/07732104.pdf?arnumber=7732104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T07:18:37Z","timestamp":1568531917000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7732104\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/icacci.2016.7732104","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}