{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T13:52:44Z","timestamp":1772891564729,"version":"3.50.1"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Top. Comput. Intell."],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/tetci.2017.2699224","type":"journal-article","created":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T18:10:04Z","timestamp":1496081404000},"page":"202-212","source":"Crossref","is-referenced-by-count":68,"title":["Dynamic Selection of Classifiers in Bug Prediction: An Adaptive Method"],"prefix":"10.1109","volume":"1","author":[{"given":"Dario","family":"Di Nucci","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Palomba","sequence":"additional","affiliation":[]},{"given":"Rocco","family":"Oliveto","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"De Lucia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9178-4"},{"key":"ref38","author":"devijver","year":"1982","journal-title":"Pattern Recognition a Statistical Approach"},{"key":"ref33","article-title":"Dynamic selection of classifiers in bug prediction: An adaptive method&#x2014;replication package","author":"nucci","year":"2016"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.03.007"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2543218"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595713"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/32.707698"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref35","first-page":"124","article-title":"The alternating decision tree learning algorithm","author":"freund","year":"0","journal-title":"Proc Int Conf Mach Learning"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.4018\/jdwm.2007070101"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985859"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1463788.1463819"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-011-0090-3"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.83"},{"key":"ref13","article-title":"Building an ensemble for software defect prediction based on diversity selection","author":"petri?","year":"0","journal-title":"Proc ACM\/IEEE Int'l Symp Empirical Software Eng and Measurement"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-016-9353-3"},{"key":"ref15","article-title":"The promise repository of empirical software engineering data","author":"menzies","year":"2016","journal-title":"Dept Comp Sci"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2659747"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2016.2588139"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.58"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.91"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2908812.2908938"},{"key":"ref3","author":"alpaydin","year":"2014","journal-title":"Introduction to Machine Learning"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-009-9124-7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.38"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747166"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-010-9128-1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.51"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.11.023"},{"key":"ref9","first-page":"4241","article-title":"Software defect prediction based on classifiers ensemble","volume":"8","author":"wang","year":"2011","journal-title":"J Inf Comput Sci"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9173-9"},{"key":"ref46","first-page":"211","article-title":"Tree induction vs. logistic regression: A learning-curve analysis","volume":"4","author":"perlich","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref20","first-page":"119","author":"bezerra","year":"2008","journal-title":"Enhancing RBF-DDA Algorithm's Robustness Neural Networks Applied to Prediction of Fault-Prone Software Modules"},{"key":"ref45","author":"grissom","year":"2005","journal-title":"Effect Sizes for Research A Broad Practical Approach"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9348-9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2007.4371415"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70773"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1016\/j.asoc.2016.04.032","article-title":"An empirical framework for defect prediction using machine learning techniques with android software","volume":"49","author":"malhotra","year":"2016","journal-title":"Appl Soft Comput"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502041"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70722"},{"key":"ref44","author":"conover","year":"1998","journal-title":"Practical Nonparametric Statistics"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.11"},{"key":"ref43","author":"witten","year":"2016","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.35"}],"container-title":["IEEE Transactions on Emerging Topics in Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7433297\/7935475\/07935483.pdf?arnumber=7935483","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:14:52Z","timestamp":1642004092000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7935483\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":46,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tetci.2017.2699224","relation":{},"ISSN":["2471-285X"],"issn-type":[{"value":"2471-285X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6]]}}}