{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T02:18:10Z","timestamp":1775787490029,"version":"3.50.1"},"reference-count":122,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100000646","name":"JSPS","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000646","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Advancing Strategic International Networks to Accelerate the Circulation of Talented Researchers"},{"name":"Interdisciplinary Global Networks for Accelerating Theory and Practice in Software Ecosystem"},{"DOI":"10.13039\/501100000646","name":"JSPS Fellows","doi-asserted-by":"publisher","award":["16J03360"],"award-info":[{"award-number":["16J03360"]}],"id":[{"id":"10.13039\/501100000646","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada\u00a0(NSERC)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2017,1,1]]},"DOI":"10.1109\/tse.2016.2584050","type":"journal-article","created":{"date-parts":[[2016,6,23]],"date-time":"2016-06-23T00:14:16Z","timestamp":1466640856000},"page":"1-18","source":"Crossref","is-referenced-by-count":468,"title":["An Empirical Comparison of Model Validation Techniques for Defect Prediction Models"],"prefix":"10.1109","volume":"43","author":[{"given":"Chakkrit","family":"Tantithamthavorn","sequence":"first","affiliation":[]},{"given":"Shane","family":"McIntosh","sequence":"additional","affiliation":[]},{"given":"Ahmed E.","family":"Hassan","sequence":"additional","affiliation":[]},{"given":"Kenichi","family":"Matsumoto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1148\/radiology.143.1.7063747"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.103"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-4541-9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.2307\/2965703"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.2307\/2685844"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2307\/2289236"},{"key":"ref37","first-page":"417","article-title":"Robust prediction of fault-proneness by random forests","author":"guo","year":"0","journal-title":"Proc 8th Int Symp Softw Rel Eng"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.91"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1975.10479865"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2007.896761"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2174\/157489310790596385"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007413511361"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2307\/2288636"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/45.3-4.562"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9173-9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463279"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/79.2.279"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143874"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1186\/cc3765"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1097\/EDE.0b013e3181c30fb2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.55"},{"key":"ref100","author":"steyerberg","year":"2008","journal-title":"Clinical Prediction Models A Practical Approach to Development Validation and Updating"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194013500447"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2009.13"},{"key":"ref59","first-page":"275","article-title":"Bias plus variance decomposition for zero-one loss functions","author":"kohavi","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref58","first-page":"1137","article-title":"A study of cross-validation and bootstrap for accuracy estimation and model selection","author":"kohavi","year":"0","journal-title":"Proc Int Joint Conf Artif Intell"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.02.053"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985859"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2009.04.009"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1023\/B:EMSE.0000027781.18360.9b"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v028.c01","article-title":"Beanplot: A boxplot alternative for visual comparison of distributions","volume":"28","author":"kampstra","year":"2008","journal-title":"J Statist Softw"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868342"},{"key":"ref40","author":"harrell","year":"2002","journal-title":"Regression Modeling Strategies"},{"key":"ref4","first-page":"33","article-title":"On parameter tuning in search based software engineering","author":"arcuri","year":"0","journal-title":"Proc 3rd Int Conf Search Based Softw Eng"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985795"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1177\/0962280214558972"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.055"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.chemolab.2005.04.008"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.01.028"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1390817.1390822"},{"key":"ref9","first-page":"4","article-title":"Don&#x2019;t touch my code! Examining the effects of ownership on software quality","author":"bird","year":"0","journal-title":"Proc 19th ACM SIGSOFT Symp 13th Eur Conf Found Softw Eng"},{"key":"ref46","author":"jelihovschi","year":"2014","journal-title":"The ScottKnott Clustering Algorithm"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.06.018"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2007.24"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9079-3"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0258(19960229)15:4<361::AID-SIM168>3.0.CO;2-4"},{"key":"ref41","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-19425-7","author":"harrell","year":"2015","journal-title":"rms Regression Modeling Strategies"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-84858-7","author":"hastie","year":"2009","journal-title":"The Elements of Statistical Learning"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.45"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1002\/sim.4780100805"},{"key":"ref71","author":"meyer","year":"2014","journal-title":"E1071 Misc Functions of the Department of Statistics (e1071) TU Wien"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9193-5"},{"key":"ref76","author":"moore","year":"2007","journal-title":"The Basic Practice of Statistics"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.58"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.2229"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bti499"},{"key":"ref78","first-page":"1","article-title":"Validity and reliability of evaluation procedures in comparative studies of effort prediction models","volume":"17","author":"myrtveit","year":"2011","journal-title":"Empirical Softw Eng"},{"key":"ref79","first-page":"284","article-title":"Use of relative code churn measures to predict system defect density","author":"nagappan","year":"0","journal-title":"Proc 27th Int l Conf Software Eng"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v028.i05","article-title":"Building predictive models in R using caret package","volume":"28","author":"kuhn","year":"2008","journal-title":"J Statist Softw"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.35"},{"key":"ref61","author":"kuhn","year":"2015"},{"key":"ref63","author":"liaw","year":"2014"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.1"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.09.007"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2010.18"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868336"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.256941"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0258(20000229)19:4<453::AID-SIM350>3.0.CO;2-5"},{"key":"ref69","author":"menzies","year":"2015"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1093\/jnci\/86.11.829"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2008.21"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393670"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2553030"},{"key":"ref94","article-title":"An exploration of challenges limiting pragmatic software defect prediction","author":"shihab","year":"2012"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884857"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.11"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/32.965341"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.93"},{"key":"ref91","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-01899-2","author":"seni","year":"2010","journal-title":"Ensemble Methods in Data Mining Improving Accuracy Through Combining Predictions"},{"key":"ref105","first-page":"867","article-title":"Towards a better understanding of the impact of experimental components on defect prediction modelling","author":"tantithamthavorn","year":"0","journal-title":"Proc 38th Int Conf Softw Eng Companion"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.2307\/2529204"},{"key":"ref104","author":"tantithamthavorn","year":"2015","journal-title":"ScottKnottESD An R package of the Scott-Knott effect size difference (ESD) test"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.139"},{"key":"ref102","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1111\/j.2517-6161.1974.tb00994.x","article-title":"Cross-validatory choice and assessment of statistical predictions","volume":"36","author":"stone","year":"1974","journal-title":"J Royal Statist Soc"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414066"},{"key":"ref112","first-page":"1","article-title":"On the dataset shift problem in software engineering prediction models","volume":"17","author":"turhan","year":"2011","journal-title":"Empirical Softw Eng"},{"key":"ref110","author":"torchiano","year":"2015","journal-title":"Effsize Efficient effect size computation"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.90"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0258(20000430)19:8<1059::AID-SIM412>3.0.CO;2-0"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025155"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/2499393.2499394"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1111\/j.2517-6161.1964.tb00553.x","article-title":"An analysis of transformations","author":"box","year":"1964","journal-title":"J Royal Statist Soc"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btg419"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2307\/1403680"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1175\/1520-0493(1950)078<0001:VOFEIT>2.0.CO;2"},{"key":"ref15","author":"canty","year":"2014"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025120"},{"key":"ref16","author":"cohen","year":"1988","journal-title":"Statistical Power Analysis for the Behavioral Sciences"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/S0895-4356(96)00236-3"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(05)80023-1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.112.1.155"},{"key":"ref81","first-page":"1","article-title":"Improving your data transformations: Applying the box-cox transformation","volume":"15","author":"osborne","year":"2010","journal-title":"Practical Assessment Res Eval"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.7326\/0003-4819-118-3-199302010-00009"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1117\/3.633187"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368161"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868335"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.6"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.10.003"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.12.028"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/CISE.2010.5677057"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368160"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2010.27"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2007.19"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclinepi.2009.11.009"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595713"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.10"},{"key":"ref85","year":"2013","journal-title":"R Core Team R A Language and Environment for Statistical Computing R Foundation for Statistical Computing Vienna Austria"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606589"},{"key":"ref87","first-page":"147","article-title":"Sample size versus bias in defect prediction","author":"rahman","year":"0","journal-title":"Proc 9th Joint Meeting Found Softw Eng"},{"key":"ref88","article-title":"Recalling the &#x201C;Imprecision&#x201D; of cross-project defect prediction categories and subject descriptors","author":"rahman","year":"0","journal-title":"Proc Int'l Symp the Foundations of Software Eng"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/7809237\/07497471.pdf?arnumber=7497471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T20:26:22Z","timestamp":1718655982000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7497471\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,1]]},"references-count":122,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tse.2016.2584050","relation":{},"ISSN":["0098-5589","1939-3520"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,1]]}}}