{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T00:07:37Z","timestamp":1772928457422,"version":"3.50.1"},"reference-count":82,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"General Research Fund of the Research Grants Council of Hong Kong","award":["11208017"],"award-info":[{"award-number":["11208017"]}]},{"name":"General Research Fund of the Research Grants Council of Hong Kong","award":["11214116"],"award-info":[{"award-number":["11214116"]}]},{"DOI":"10.13039\/100007567","name":"City University of Hong Kong","doi-asserted-by":"crossref","award":["7004683"],"award-info":[{"award-number":["7004683"]}],"id":[{"id":"10.13039\/100007567","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100007567","name":"City University of Hong Kong","doi-asserted-by":"crossref","award":["7004474"],"award-info":[{"award-number":["7004474"]}],"id":[{"id":"10.13039\/100007567","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100007567","name":"City University of Hong Kong","doi-asserted-by":"crossref","award":["9678149"],"award-info":[{"award-number":["9678149"]}],"id":[{"id":"10.13039\/100007567","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/tr.2018.2839718","type":"journal-article","created":{"date-parts":[[2018,6,14]],"date-time":"2018-06-14T18:56:05Z","timestamp":1529002565000},"page":"1176-1198","source":"Crossref","is-referenced-by-count":14,"title":["Investigating the Significance of the Bellwether Effect to Improve Software Effort Prediction: Further Empirical Study"],"prefix":"10.1109","volume":"67","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5629-2661","authenticated-orcid":false,"given":"Solomon","family":"Mensah","sequence":"first","affiliation":[]},{"given":"Jacky","family":"Keung","sequence":"additional","affiliation":[]},{"given":"Stephen G.","family":"MacDonell","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0737-9346","authenticated-orcid":false,"given":"Michael Franklin","family":"Bosu","sequence":"additional","affiliation":[]},{"given":"Kwabena Ebo","family":"Bennin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","first-page":"476","article-title":"Combining deep learning\n with information retrieval to localize buggy files for bug reports","author":"lam","year":"0","journal-title":"Proc 30th IEEE\/ACM Int Conf Autom Softw Eng"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep\n learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref70","first-page":"508","article-title":"Heterogeneous defect prediction","author":"nam","year":"0","journal-title":"Proc 10th Joint Meet Eur Softw Eng Conf ACM SIGSOFT Symp Foundations Softw Eng"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2012.2232321"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.02.053"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ACII.2013.58"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9300-5"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.08.124"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1137\/0111030"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.12.008"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1037\/1082-989X.8.3.254"},{"key":"ref31","first-page":"212","article-title":"Robust statistical methods for empirical\n software engineering","volume":"21","author":"kitchenham","year":"2016","journal-title":"Empirical Softw Eng"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/9781119152743"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884830"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1245300"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/61.1.165"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.114.3.494"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.09.012"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9187-3"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.09.009"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9207-y"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/32.637387"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2004.1357920"},{"key":"ref27","article-title":"Analyse statistique de la productivitie des projets informatique a\n partie de la technique des point des fonction","author":"desharnais","year":"1989"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.2307\/1268249"},{"key":"ref66","author":"belsley","year":"2005","journal-title":"Regression Diagnostics Identifying Influential Data and Sources of Collinearity"},{"key":"ref29","first-page":"20","article-title":"A review of kernel density estimation with applications to econometrics","volume":"5","author":"zambom","year":"2012","journal-title":"Intern Econom Rev"},{"key":"ref67","author":"montgomery","year":"2012","journal-title":"Introduction to Linear Regression Analysis"},{"key":"ref68","author":"wilcox","year":"2003","journal-title":"Applying contemporary statistical techniques"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.1599418"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9516-2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.64"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(02)00021-3"},{"key":"ref22","first-page":"1","article-title":"Towards reporting guidelines for experimental replications: A\n proposal","author":"carver","year":"0","journal-title":"Proceedings of the 1st International Workshop on Replication in Empirical Software Engineering Research"},{"key":"ref21","article-title":"The PROMISE\n Repository of empirical software engineering data","author":"menzies","year":"2016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2738037"},{"key":"ref23","first-page":"481","article-title":"A Stratification and sampling model for Bellwether moving window","author":"mensah","year":"0","journal-title":"Proc Int Conf on Software Eng Knowledge Eng"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.55"},{"key":"ref25","first-page":"527","article-title":"Multi-objective optimization\n for software testing effort estimation","author":"mensah","year":"0","journal-title":"Proc Int Conf on Software Eng Knowledge Eng"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1486"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"1073","DOI":"10.1016\/j.infsof.2007.02.015","article-title":"A systematic review of\n effect size in software engineering experiments","volume":"49","author":"kampenes","year":"2007","journal-title":"Inf Soft Technol"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.07.004"},{"key":"ref58","article-title":"The ISBSG development & enhancement project data in: ISBSG (Ed.)","year":"2013"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/52.951491"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2020390.2020407"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.07.062"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9104-6"},{"key":"ref53","first-page":"727","article-title":"X-means: Extending K-means with efficient estimation of the number of clusters","author":"pelleg","year":"0","journal-title":"Proc 17th Int Conf Mach Learning Table of Contents"},{"key":"ref52","volume":"1","author":"tukey","year":"1977","journal-title":"Exploratory Data Analysis"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/9781118740712.ch5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2017.44"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.208"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2915970.2915983"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1063","DOI":"10.1016\/j.infsof.2014.02.008","article-title":"Investigating the use of duration-based moving windows to improve software effort prediction: A\n replicated study","volume":"56","author":"lokan","year":"2014","journal-title":"Inf Softw Technol"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9446-4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1672"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/34.1000239"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5316019"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2013.21"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2012.74"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49094-6_49"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1007\/978-3-642-39259-7_18","article-title":"The evaluation of weighted moving windows for software effort estimation","volume":"7983","author":"amasaki","year":"0","journal-title":"Proc Int Conf Prod Focused Softw Process Improvement"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/72.329697"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9472-2"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.infsof.2017.09.010","article-title":"Duplex output software\n effort estimation model with self-guided interpretation","volume":"94","author":"mensah","year":"2017","journal-title":"Inf Softw Technol"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970339"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2522920.2522928"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1497577.1497582"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.biopsych.2005.09.014"},{"key":"ref9","first-page":"655","article-title":"Bellwether analysis:\n Predicting global aggregates from local regions","author":"chen","year":"0","journal-title":"Proc 32nd Int Conf Very Large Data Bases"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9434-8"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.22237\/jmasm\/1177993800"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/29.3-4.350"},{"key":"ref47","article-title":"Robust statistical methods in R using the WRS2 package","author":"mair","year":"2016"},{"key":"ref42","author":"fischer","year":"2010","journal-title":"A History of the Central Limit Theorem From Classical to Modern Probability Theory"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/0197-2456(81)90001-5"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-3758(02)00269-0"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2015.2466080"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/8452065\/08386445.pdf?arnumber=8386445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T16:52:20Z","timestamp":1643215940000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8386445\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":82,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tr.2018.2839718","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9]]}}}