{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T20:04:14Z","timestamp":1776197054796,"version":"3.50.1"},"reference-count":154,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"JSPS Program for Advancing Strategic International Networks to Accelerate the Circulation of Talented Researchers","award":["16J03360"],"award-info":[{"award-number":["16J03360"]}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2019,7,1]]},"DOI":"10.1109\/tse.2018.2794977","type":"journal-article","created":{"date-parts":[[2018,1,18]],"date-time":"2018-01-18T19:37:42Z","timestamp":1516304262000},"page":"683-711","source":"Crossref","is-referenced-by-count":317,"title":["The Impact of Automated Parameter Optimization on Defect Prediction Models"],"prefix":"10.1109","volume":"45","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5516-9984","authenticated-orcid":false,"given":"Chakkrit","family":"Tantithamthavorn","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0193-3975","authenticated-orcid":false,"given":"Shane","family":"McIntosh","sequence":"additional","affiliation":[]},{"given":"Ahmed E.","family":"Hassan","sequence":"additional","affiliation":[]},{"given":"Kenichi","family":"Matsumoto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.18"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.91"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106256"},{"key":"ref32","article-title":"neuralnet: Training of neural networks","author":"fritsch","year":"2015"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176347963"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-1809.1936.tb02137.x"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401928"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597075"},{"key":"ref35","article-title":"Why is differential evolution better than grid search for tuning defect predictors?","volume":"abs 1609 2613","author":"fu","year":"2016","journal-title":"CoRR"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.04.017"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-4541-9"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2307\/2288636"},{"key":"ref29","first-page":"3133","article-title":"Do we need hundreds of classifiers to solve real world classification problems?","volume":"15","author":"fern\u00e1ndez-delgado","year":"2014","journal-title":"J Mach Learning Res"},{"key":"ref20","author":"cohen","year":"1988","journal-title":"Statistical Power Analysis for the Behavioral Sciences"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463279"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.112.1.155"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143874"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9173-9"},{"key":"ref101","article-title":"Distribution-free multiple comparisons","author":"nemenyi","year":"1963"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/978-3-642-21843-9_20","article-title":"A genetic algorithm to configure support vector machines for predicting fault-prone components","author":"di martino","year":"2011","journal-title":"Proceedings of the Product-Focused Software Process Improvement"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.58"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1186\/cc3765"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"ref51","first-page":"9","article-title":"A comparative study on differential evolution and genetic algorithms for some combinatorial problems","author":"hegerty","year":"2009","journal-title":"Proc Mexican Int Conf Artif Intell"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.10"},{"key":"ref153","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1007\/978-0-387-73003-5_293","article-title":"Ensemble learning","author":"zhou","year":"2009","journal-title":"Encyclopedia of Biometrics"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597078"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70706"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9396-2"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2259203"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9082-8"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025120"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.13"},{"key":"ref59","first-page":"540","article-title":"Learning combinatorial interaction test generation strategies using hyperheuristic search","author":"jia","year":"2015","journal-title":"Proceedings of the International Conference on Software Engineering ICSE'94"},{"key":"ref58","author":"jelihovschi","year":"2014","journal-title":"The ScottKnott Clustering Algorithm"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.50"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2006.04.007"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/321062.321069"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022631118932"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606585"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9468-y"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022602019183"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1159733.1159738"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9249-9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882308"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.055"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1287\/opre.31.4.670"},{"key":"ref49","article-title":"RMS: Regression modeling strategies","author":"harrell","year":"2015"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0305-0483(83)90038-5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.6.2.154"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.29"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25231-0_1"},{"key":"ref48","author":"harrell","year":"2002","journal-title":"Regression Modelling Strategies"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(01)00189-6"},{"key":"ref42","first-page":"417","article-title":"Robust prediction of fault-proneness by random forests","author":"guo","year":"2004","journal-title":"Proc 8th Int Symp Softw Rel Eng"},{"key":"ref41","first-page":"1","article-title":"An investigation of the effect of module size on defect prediction using static measures","author":"g\u00fcnes koru","year":"2005","journal-title":"Proc Third Int'l Workshop Predictor Models Software Eng"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.103"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/2499393.2499394"},{"key":"ref126","first-page":"36","article-title":"Neural networks in data mining","volume":"5","author":"singh","year":"2009","journal-title":"J Inform Technol Theory Applicat"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025155"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393670"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332457"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.27"},{"key":"ref129","author":"steyerberg","year":"2008","journal-title":"Clinical Prediction Models A Practical Approach to Development Validation and Updating"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985859"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.90"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1023\/B:EMSE.0000027781.18360.9b"},{"key":"ref76","article-title":"C50: C5.0 decision trees and rule-based models","author":"kuhn","year":"2015"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1097\/EDE.0b013e3181c30fb2"},{"key":"ref77","article-title":"caret: Classification and regression training","author":"kuhn","year":"2016"},{"key":"ref74","first-page":"249","article-title":"Supervised machine learning: A review of classification techniques","volume":"31","author":"kotsiantis","year":"2007","journal-title":"Inform"},{"key":"ref75","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v028.i05","article-title":"Building predictive models in R using caret package","volume":"28","author":"kuhn","year":"2008","journal-title":"J Statist Softw"},{"key":"ref133","article-title":"ScottKnottESD: The Scott-Knott effect size difference (ESD) test","author":"tantithamthavorn","year":"2017"},{"key":"ref134","first-page":"867","article-title":"Towards a better understanding of the impact of experimental components on defect prediction modelling","author":"tantithamthavorn","year":"2016","journal-title":"Proc Int Conf Softw Eng"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008202821328"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/5326.661099"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.139"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.07.005"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2876537"},{"key":"ref135","doi-asserted-by":"crossref","DOI":"10.1145\/3183519.3183547","article-title":"An experience report on defect modelling in practice: Pitfalls and challenges","author":"tantithamthavorn","year":"2018","journal-title":"Proc Int Conf Softw Eng Softw Eng Practice (ICSE-SEIP&#x2018;18)"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884857"},{"key":"ref137","first-page":"812","article-title":"The impact of mislabelling on the performance and interpretation of defect prediction models","author":"tantithamthavorn","year":"2015","journal-title":"Proceedings of the International Conference on Software Engineering ICSE'94"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693087"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2553030"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1390817.1390822"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9079-3"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2462848"},{"key":"ref64","article-title":"The impact of correlated metrics on defect models","author":"jiarpakdee","year":"2018"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2584050"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2016.30"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2004.03.005"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.256943"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.27"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868342"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884852"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609530"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414066"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/978-3-642-23716-4_6","article-title":"On parameter tuning in search based software engineering","author":"arcuri","year":"2011","journal-title":"Proc 3rd Int Conf Search Based Softw Eng"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1037\/0022-006X.67.3.332"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5316006"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1093\/jnci\/86.11.829"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.92"},{"key":"ref95","article-title":"The promise repository of empirical software engineering data","author":"menzies","year":"2015"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.6"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.256941"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227194"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/1540438.1540448"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/S0895-4356(96)00236-3"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868336"},{"key":"ref105","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2009.55"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747166"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9381-9"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606598"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2010.37"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/20.4.367"},{"key":"ref112","article-title":"R: A language and environment for statistical computing","year":"2013"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/2915970.2916007"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081827"},{"key":"ref99","article-title":"Deoptim: Global optimization by differential evolution","author":"mullen","year":"2016"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9193-5"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.45"},{"key":"ref10","first-page":"281","article-title":"Random search for hyper-parameter optimization","volume":"13","author":"bergstra","year":"2012","journal-title":"J Mach Learn Res"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9205-0"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1109\/AICCSA.2006.205110","article-title":"software defect prediction using regression via classification","author":"bibi","year":"2006","journal-title":"IEEE International Conference on Computer Systems and Applications 2006"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595716"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.312.7038.1079"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2810146.2810149"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclinepi.2009.11.009"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btg419"},{"key":"ref82","article-title":"BIGRF: Big random forests: Classification and regression forests for large data sets","author":"lim","year":"2014"},{"key":"ref117","article-title":"nnet: Feed-forward neural networks and multinomial log-linear models","author":"ripley","year":"2015"},{"key":"ref17","article-title":"Bias, variance and arcing classifiers","author":"breiman","year":"1996"},{"key":"ref81","article-title":"randomforest: Breiman and Cutler's random forests for classification and regression","author":"liaw","year":"2015"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.1"},{"key":"ref119","article-title":"The varclus procedure","author":"sarle","year":"1990","journal-title":"SAS\/STAT User's Guide SAS Institute Inc 4th Edition"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1175\/1520-0493(1950)078<0001:VOFEIT>2.0.CO;2"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491432"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491418"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606589"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.4"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.35"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393669"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2231967"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597076"},{"key":"ref121","article-title":"Ga: Genetic algorithms","author":"scrucca","year":"2016"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2322358"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.11"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.09.007"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8191(94)00071-H"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2005.1541858"},{"key":"ref88","year":"2015","journal-title":"version 8 5 0 (R2015a)"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/8764373\/08263202.pdf?arnumber=8263202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:14:29Z","timestamp":1657746869000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8263202\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,1]]},"references-count":154,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tse.2018.2794977","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,1]]}}}