{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T19:15:58Z","timestamp":1772738158989,"version":"3.50.1"},"reference-count":92,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/saner.2018.8330264","type":"proceedings-article","created":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T04:41:53Z","timestamp":1522989713000},"page":"592-601","source":"Crossref","is-referenced-by-count":22,"title":["Re-evaluating method-level bug prediction"],"prefix":"10.1109","author":[{"given":"Luca","family":"Pascarella","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Palomba","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Bacchelli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393669"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606589"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606591"},{"key":"ref70","author":"pascarella","year":"2018","journal-title":"Re-evaluating method-level bug prediction-online appendix"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.2307\/2529204"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393670"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609530"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884848"},{"key":"ref38","first-page":"81","article-title":"Free software offer and software diffusion: The monopolist case","author":"jiang","year":"2003","journal-title":"Proc ICIS 2003"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.43"},{"key":"ref79","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1082983.1083147","article-title":"When do changes induce fixes?","volume":"30","author":"sliwerski","year":"2005","journal-title":"SIGSOFT Softw Eng Notes"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1148\/radiology.143.1.7063747"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.103"},{"key":"ref31","author":"hall","year":"1999","journal-title":"Correlation-based feature selection for machine learning"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.112"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.51"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1080\/01431160110040323"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227193"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s11135-006-9018-6"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.49"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/32.553637"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868357"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.91"},{"key":"ref64","article-title":"Empirical analysis of software fault content and fault proneness using bayesian methods","volume":"33","author":"pai","year":"2007","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597075"},{"key":"ref65","first-page":"1","article-title":"On the diffuseness and the impact on maintainability of code smells: a large scale empirical investigation","author":"palomba","year":"2017","journal-title":"Empirical Software Engineering"},{"key":"ref66","article-title":"The scent of a smell: An extensive comparison between textual and structural smells","author":"palomba","year":"2017","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2372251.2372285"},{"key":"ref67","first-page":"244","article-title":"Smells like teen spirit: Improving bug prediction performance using the intensity of code smells","author":"palomba","year":"2016","journal-title":"2016 IEEE International Conference on Software Maintenance and Evolution"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747166"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1994.296790"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/E14-1058"},{"key":"ref1","first-page":"2c","article-title":"Why software is eating the world","volume":"20","author":"andreessen","year":"2011","journal-title":"The Wall Street Journal"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2371536.2371572"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2699224"},{"key":"ref21","article-title":"A developer centered bug prediction model","author":"di nucci","year":"2017","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/212094.212114"},{"key":"ref23","article-title":"The top programming languages 2016","author":"diakopoulos","year":"2016","journal-title":"IEEE Spectrum"},{"key":"ref26","volume":"1","author":"friedman","year":"2001","journal-title":"The Elements of Statistical Learning"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2003.1235403"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.11.023"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.10"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595713"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884839"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2003.1232479"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985950"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.25"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134349"},{"key":"ref55","first-page":"580","article-title":"Static analysis tools as early indicators of pre-release defect density","author":"nagappan","year":"2005","journal-title":"Proceedings of the 27th international Conference on Software Engineering ICSE '05"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414063"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.256941"},{"key":"ref52","article-title":"Are fix-inducing changes a moving target? a longitudinal case study of just-in-time defect prediction","author":"mcintosh","year":"2017","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref10","first-page":"281","article-title":"Random search for hyper-parameter optimization","volume":"13","author":"bergstra","year":"2012","journal-title":"Journal of Machine Learning Research"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.38"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.70"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.19"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"875","DOI":"10.1007\/978-0-387-09823-4_45","article-title":"Data mining for imbalanced datasets: An overview","author":"chawla","year":"2009","journal-title":"Data Mining and Knowledge Discovery Handbook"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.139"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9187-3"},{"key":"ref81","first-page":"364","article-title":"Detection of software modules with high debug code churn in a very large legacy system","author":"taghi","year":"1996","journal-title":"Software Reliability Engineering"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2616306"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2584050"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2010.58"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884857"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9173-9"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1191795"},{"key":"ref89","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/QRS.2015.14","article-title":"Deep learning for just-in-time defect prediction","author":"yang","year":"2015","journal-title":"Software Quality Reliability and Security (QRS) 2015 IEEE International Conference on"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12029-9_5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1463788.1463819"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.44.4.433"},{"key":"ref5","volume":"463","author":"baeza-yates","year":"1999","journal-title":"Modern Information Retrieval"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1109\/32.859533","article-title":"Predicting fault incidence using software change history","volume":"26","author":"todd","year":"2000","journal-title":"Software Engineering IEEE Transactions on"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2012.20"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.06.006"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/32.544352"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606583"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9103-7"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025120"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9178-4"},{"key":"ref46","author":"krippendorff","year":"2004","journal-title":"Content Analysis An Introduction to Its Methodology"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-010-9151-7"},{"key":"ref48","author":"lehman","year":"1985","journal-title":"Program Evolution Processes of Software Change"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.156"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9171-y"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00086-8"},{"key":"ref44","author":"kittler","year":"1982","journal-title":"Pattern Recognition a Statistical Approach"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70773"}],"event":{"name":"2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)","location":"Campobasso","start":{"date-parts":[[2018,3,20]]},"end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8326467\/8330182\/08330264.pdf?arnumber=8330264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T04:23:23Z","timestamp":1643171003000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8330264\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":92,"URL":"https:\/\/doi.org\/10.1109\/saner.2018.8330264","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}