{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:48:02Z","timestamp":1778168882504,"version":"3.51.4"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,2,21]]},"DOI":"10.1109\/maltesque.2017.7882013","type":"proceedings-article","created":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T07:01:51Z","timestamp":1490338911000},"page":"27-32","source":"Crossref","is-referenced-by-count":28,"title":["Automatic feature selection by regularization to improve bug prediction accuracy"],"prefix":"10.1109","author":[{"given":"Haidar","family":"Osman","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Ghafari","sequence":"additional","affiliation":[]},{"given":"Oscar","family":"Nierstrasz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACT.2009.212"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2007.4385500"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-006-7597-z"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9218-8"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCRD.2011.5763845"},{"key":"ref30","first-page":"24","article-title":"On the applicability of machine learning techniques for object oriented software fault prediction","volume":"1","author":"malhotra","year":"2011","journal-title":"Software Engineering An International Journal"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.256941"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595713"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"8","DOI":"10.5120\/525-685","article-title":"Prediction of fault-prone software modules using statistical and machine learning methods","volume":"1","author":"singh","year":"2010","journal-title":"International Journal of Computer Applications"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.07.005"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-010-9128-1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.31"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.01.033"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597078"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2528228.2528238"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453105"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.49"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134349"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.055"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1043"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICACTE.2008.204"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1142\/S0218213008003947"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISISE.2012.114"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.12.023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2020390.2020397"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2008.10.005"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.12.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.43"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463279"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.11.023"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.10"},{"key":"ref22","first-page":"59","article-title":"Are popular classes more defect prone?","author":"bacchelli","year":"2010","journal-title":"Proc of FASE 2010 (13th Intl Conf on Fundamental Approaches to Software Engineering)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368161"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.05.035"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2284-x"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2013.33"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2007.896761"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.07.040"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/BF02985802","article-title":"The elements of statistical learning: data mining, inference and prediction","volume":"27","author":"hastie","year":"2005","journal-title":"The Mathematical Intelligencer"}],"event":{"name":"2017 IEEE Workshop on Machine Learning Techniques for Software Quality Evaluation (MaLTeSQuE)","location":"Klagenfurt","start":{"date-parts":[[2017,2,21]]},"end":{"date-parts":[[2017,2,21]]}},"container-title":["2017 IEEE Workshop on Machine Learning Techniques for Software Quality Evaluation (MaLTeSQuE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7879540\/7882004\/07882013.pdf?arnumber=7882013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T20:18:24Z","timestamp":1580761104000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7882013\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,21]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/maltesque.2017.7882013","relation":{},"subject":[],"published":{"date-parts":[[2017,2,21]]}}}