{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T06:03:07Z","timestamp":1773295387683,"version":"3.50.1"},"reference-count":103,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2018YFB1003904"],"award-info":[{"award-number":["2018YFB1003904"]}]},{"name":"NSFC Program","award":["61602403"],"award-info":[{"award-number":["61602403"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2020,11,1]]},"DOI":"10.1109\/tse.2018.2877678","type":"journal-article","created":{"date-parts":[[2018,10,24]],"date-time":"2018-10-24T02:29:10Z","timestamp":1540348150000},"page":"1241-1266","source":"Crossref","is-referenced-by-count":118,"title":["Perceptions, Expectations, and Challenges in Defect Prediction"],"prefix":"10.1109","volume":"46","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7657-6653","authenticated-orcid":false,"given":"Zhiyuan","family":"Wan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6302-3256","authenticated-orcid":false,"given":"Xin","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Ahmed E.","family":"Hassan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4367-7201","authenticated-orcid":false,"given":"David","family":"Lo","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Yin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4111-4189","authenticated-orcid":false,"given":"Xiaohu","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"63","article-title":"Personal opinion surveys","author":"kitchenham","year":"2004","journal-title":"Guide to Advanced Empirical Software Engineering"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.66"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786813"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693087"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1145\/3183519.3183550","article-title":"Advantages and disadvantages of a monolithic repository - a case study at google","author":"jaspan","year":"2018","journal-title":"Proc Int Conf Softw Eng Softw Eng Practice Track"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606585"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.70"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.56"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568320"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2597849"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1205177"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227193"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/S0048-7333(03)00047-7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106257"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568260"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.91"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.103"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1177\/1525822X05279903"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/2556777"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-016-0198-6"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2629648"},{"key":"ref50","first-page":"18","article-title":"Classification and regression by randomforest","volume":"2","author":"liaw","year":"0","journal-title":"R News"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786809"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.56"},{"key":"ref58","first-page":"580","article-title":"Static analysis tools as early indicators of pre-release defect density","author":"nagappan","year":"2005","journal-title":"Proc 27th Int l Conf Software Eng"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2357438"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.21"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.2229"},{"key":"ref54","first-page":"1","article-title":"Empirical analysis of programming language adoption","author":"meyerovich","year":"2013","journal-title":"Proc ACM SIGPLAN Int Conf Object Oriented Program Syst Languages Appl"},{"key":"ref53","first-page":"343","article-title":"Local vs. global models for effort estimation and defect prediction","author":"menzies","year":"2011","journal-title":"Proc 26th IEEE\/ACM Int Conf Automated Softw Eng"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.83"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138012"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2009.8.5.c5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1005"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2012.6224300"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568233"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.138"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606583"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/2.962984"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2961111.2962597"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.156"},{"key":"ref45","article-title":"Modeling the effect of size on defect proneness for open-source software","author":"koru","year":"2007","journal-title":"Proc 3rd Int Workshop Predictor Models Softw Eng"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2550458"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134355"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931051"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.45"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.90"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9080-x"},{"key":"ref73","article-title":"Diffusion of innovations","author":"rogers","year":"2010"},{"key":"ref72","author":"raymond","year":"2001","journal-title":"The Cathedral & the Bazaar Musings on Linux and Open Source by an Accidental Revolutionary"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491418"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393669"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393670"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.43"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693126"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2322358"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.90"},{"key":"ref79","author":"spencer","year":"2009","journal-title":"Card Sorting Designing Usable Categories"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786814"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001445"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606584"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227194"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.6"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.92"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453105"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985860"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606589"},{"key":"ref2","first-page":"353","article-title":"An example of software system debugging","volume":"71","author":"akiyama","year":"1971","journal-title":"Proc IFIP Congr (1)"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568269"},{"key":"ref1","year":"2018"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970353"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531722"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2543218"},{"key":"ref92","first-page":"267","article-title":"automated debugging considered harmful considered harmful: A user study revisiting the usefulness of spectra-based fault localization techniques with professionals using real bugs from large systems","author":"xia","year":"2016","journal-title":"Proc IEEE Intern Conf on Software Maintenance"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786816"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9082-8"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.10"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595713"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2599161"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884839"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950353"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2370048"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.05.015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1986.13596"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.24"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2616306"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.20"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884812"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884812"},{"key":"ref82","first-page":"812","article-title":"The impact of mislabelling on the performance and interpretation of defect prediction models","author":"tantithamthavorn","year":"2015","journal-title":"Proceedings of the International Conference on Software Engineering ICSE'94"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/32.879815"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.139"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2307\/2340521"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2553030"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1037\/h0031619"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884857"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2361131"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2584050"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2081.2794977"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/BF02729815"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771797"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9257116\/08502824.pdf?arnumber=8502824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,4]],"date-time":"2022-09-04T14:29:02Z","timestamp":1662301742000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8502824\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,1]]},"references-count":103,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tse.2018.2877678","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,1]]}}}