{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,20]],"date-time":"2026-05-20T14:31:34Z","timestamp":1779287494548,"version":"3.51.4"},"reference-count":61,"publisher":"World Scientific Pub Co Pte Ltd","issue":"05","funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62172205"],"award-info":[{"award-number":["62172205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62072194"],"award-info":[{"award-number":["62072194"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62202306"],"award-info":[{"award-number":["62202306"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Soft. Eng. Knowl. Eng."],"published-print":{"date-parts":[[2023,5]]},"abstract":"<jats:p> Many studies have explored the methods of deriving thresholds of object-oriented (i.e. OO) metrics. Unsupervised methods are mainly based on the distributions of metric values, while supervised methods principally rest on the relationships between metric values and defect-proneness of classes. The objective of this study is to empirically examine whether there are effective threshold values of OO metrics by analyzing existing threshold derivation methods with a large-scale meta-analysis. Based on five representative threshold derivation methods (i.e. VARL, ROC, BPP, MFM, and MGM) and 3268 releases from 65 Java projects, we first employ statistical meta-analysis and sensitivity analysis techniques to derive thresholds for 62 OO metrics on the training data. Then, we investigate the predictive performance of five candidate thresholds for each metric on the validation data to explore which of these candidate thresholds can be served as the threshold. Finally, we evaluate their predictive performance on the test data. The experimental results show that 26 of 62 metrics have the threshold effect and the derived thresholds by meta-analysis achieve promising results of GM values and significantly outperform almost all five representative (baseline) thresholds. <\/jats:p>","DOI":"10.1142\/s0218194023500110","type":"journal-article","created":{"date-parts":[[2023,3,5]],"date-time":"2023-03-05T05:19:42Z","timestamp":1677993582000},"page":"651-695","source":"Crossref","is-referenced-by-count":3,"title":["Deriving Thresholds of Object-Oriented Metrics to Predict Defect-Proneness of Classes: A Large-Scale Meta-Analysis"],"prefix":"10.1142","volume":"33","author":[{"given":"Yuanqing","family":"Mei","sequence":"first","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, P.\u00a0R.\u00a0China"}]},{"given":"Yi","family":"Rong","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, P.\u00a0R.\u00a0China"}]},{"given":"Shiran","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, P.\u00a0R.\u00a0China"}]},{"given":"Zhaoqiang","family":"Guo","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, P.\u00a0R.\u00a0China"}]},{"given":"Yibiao","family":"Yang","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, P.\u00a0R.\u00a0China"}]},{"given":"Hongmin","family":"Lu","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, P.\u00a0R.\u00a0China"}]},{"given":"Yutian","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, ShanghaiTech University, Shanghai, P.\u00a0R.\u00a0China"}]},{"given":"Yuming","family":"Zhou","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, P.\u00a0R.\u00a0China"}]}],"member":"219","published-online":{"date-parts":[[2023,4,20]]},"reference":[{"key":"S0218194023500110BIB001","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/978-3-319-66854-3_7","volume-title":"Int. Conf. Model and Data Engineering","author":"Mau\u0161a G.","year":"2017"},{"key":"S0218194023500110BIB002","first-page":"1","volume-title":"Proc. 12th Int. Conf. Predictive Models and Data Analytics in Software Engineering","author":"Lavazza L.","year":"2016"},{"key":"S0218194023500110BIB003","first-page":"1","volume-title":"Proc. 6th Int. Conf. Predictive Models in Software Engineering","author":"Jureczko M.","year":"2010"},{"issue":"1","key":"S0218194023500110BIB004","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/smr.404","volume":"22","author":"Shatnawi R.","year":"2010","journal-title":"J. Softw. Maint. Evol.: Res. Pract."},{"issue":"6","key":"S0218194023500110BIB005","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1109\/32.295895","volume":"20","author":"Chidamber S. R.","year":"1994","journal-title":"IEEE Trans. Softw. Eng."},{"key":"S0218194023500110BIB006","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1002\/(SICI)1521-4036(199906)41:3<305::AID-BIMJ305>3.0.CO;2-Y","volume":"41","author":"Bender R.","year":"1999","journal-title":"Biom. J."},{"issue":"1","key":"S0218194023500110BIB007","doi-asserted-by":"crossref","first-page":"10:11","DOI":"10.1145\/2556777","volume":"23","author":"Zhou Y.","year":"2014","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"2","key":"S0218194023500110BIB008","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1109\/TSE.2010.9","volume":"36","author":"Shatnawi R.","year":"2010","journal-title":"IEEE Trans. Softw. Eng."},{"key":"S0218194023500110BIB009","first-page":"1","volume-title":"IEEE Int. Conf. Software Maintenance","author":"Alves T. L.","year":"2010"},{"issue":"2","key":"S0218194023500110BIB010","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.jss.2011.05.044","volume":"85","author":"Ferreira K. A. M.","year":"2012","journal-title":"J. Syst. Softw."},{"key":"S0218194023500110BIB011","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/SBES.2015.9","volume-title":"2015 29th Brazilian Symposium on Software Engineering","author":"Vale G. A. D.","year":"2015"},{"key":"S0218194023500110BIB012","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.infsof.2017.11.005","volume":"96","author":"Boucher A.","year":"2018","journal-title":"Inf. Softw. Technol."},{"key":"S0218194023500110BIB013","first-page":"41","volume-title":"2018 IEEE\/ACM Int. Conf. on Technical Debt","author":"Mori A.","year":"2018"},{"key":"S0218194023500110BIB014","volume-title":"Proc. of 17th Int. Conf. Mining Software Repositories","author":"Spadini D.","year":"2020"},{"issue":"3","key":"S0218194023500110BIB015","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/s40012-014-0057-1","volume":"2","author":"Singh S.","year":"2014","journal-title":"CSI Trans. ICT"},{"issue":"2","key":"S0218194023500110BIB016","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1111\/exsy.12078","volume":"32","author":"Malhotra R.","year":"2015","journal-title":"Expert Syst."},{"key":"S0218194023500110BIB017","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1016\/j.eswa.2016.05.018","volume":"61","author":"Arar O. F.","year":"2016","journal-title":"Expert Syst. Appl."},{"key":"S0218194023500110BIB018","first-page":"169","volume-title":"2016 4th Int. Conf. Applied Computing and Information Technology","author":"Boucher A.","year":"2016"},{"issue":"1","key":"S0218194023500110BIB019","first-page":"39","volume":"38","author":"Malhotra R.","year":"2017","journal-title":"J. Inf. Optim. Sci."},{"issue":"2","key":"S0218194023500110BIB020","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s11334-017-0295-0","volume":"13","author":"Shatnawi R.","year":"2017","journal-title":"Innov. Syst. Softw. Eng."},{"issue":"4","key":"S0218194023500110BIB022","first-page":"33","volume":"14","author":"Malhotra R.","year":"2012","journal-title":"Softw. Qual. Prof."},{"issue":"5","key":"S0218194023500110BIB023","doi-asserted-by":"crossref","first-page":"3977","DOI":"10.1007\/s10664-020-09861-4","volume":"25","author":"Morasca S.","year":"2020","journal-title":"Empir. Softw. Eng."},{"issue":"1","key":"S0218194023500110BIB024","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TSE.2007.256941","volume":"33","author":"Menzies T.","year":"2007","journal-title":"IEEE Trans. Softw. Eng."},{"key":"S0218194023500110BIB025","first-page":"1","volume-title":"Proc. ACM SIGSOFT 20th Int. Symposium on the Foundations of Software Engineering","author":"Rahman F.","year":"2012"},{"issue":"2","key":"S0218194023500110BIB028","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/TSE.2017.2770124","volume":"45","author":"Hosseini S.","year":"2017","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"3","key":"S0218194023500110BIB029","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/s10664-011-9170-z","volume":"17","author":"Lu H.","year":"2012","journal-title":"Empir. Softw. Eng."},{"key":"S0218194023500110BIB030","doi-asserted-by":"crossref","first-page":"106349","DOI":"10.1016\/j.chb.2020.106349","volume":"109","author":"Scherer R.","year":"2020","journal-title":"Comput. Hum. Behav."},{"issue":"6","key":"S0218194023500110BIB031","doi-asserted-by":"crossref","first-page":"835","DOI":"10.1109\/TSE.2012.28","volume":"39","author":"Rafique Y.","year":"2013","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"7","key":"S0218194023500110BIB032","doi-asserted-by":"crossref","first-page":"1110","DOI":"10.1016\/j.infsof.2009.02.001","volume":"51","author":"Hannay J. E.","year":"2009","journal-title":"Inf. Softw. Technol."},{"key":"S0218194023500110BIB033","doi-asserted-by":"crossref","first-page":"8718571","DOI":"10.1155\/2019\/8718571","volume":"2019","author":"Mohammed H. M.","year":"2019","journal-title":"Comput. Intell. Neurosci."},{"issue":"6","key":"S0218194023500110BIB034","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1109\/TSE.2014.2322358","volume":"40","author":"Shepperd M.","year":"2014","journal-title":"IEEE Trans. Softw. Eng."},{"key":"S0218194023500110BIB035","volume-title":"Introduction to Meta-analysis","author":"Michael Borenstein L. V. H.","year":"2009"},{"issue":"2","key":"S0218194023500110BIB036","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1111\/j.0006-341X.2000.00455.x","volume":"56","author":"Duval S.","year":"2000","journal-title":"Biometrics"},{"issue":"6","key":"S0218194023500110BIB037","doi-asserted-by":"crossref","first-page":"3219","DOI":"10.1007\/s10664-017-9512-6","volume":"22","author":"Munaiah N.","year":"2017","journal-title":"Empir. Softw. Eng."},{"issue":"2","key":"S0218194023500110BIB038","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/3433928","volume":"30","author":"Vandehei B.","year":"2021","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"3","key":"S0218194023500110BIB039","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/S0164-1212(99)00102-8","volume":"51","author":"Briand L. C.","year":"2000","journal-title":"J. Syst. Softw."},{"issue":"11","key":"S0218194023500110BIB040","doi-asserted-by":"crossref","first-page":"963","DOI":"10.1109\/32.965338","volume":"27","author":"Briand L. C.","year":"2001","journal-title":"IEEE Trans. Softw. Eng."},{"key":"S0218194023500110BIB041","volume-title":"Object-Oriented Software Metrics: A Practical Guide","author":"Lorenz M.","year":"1994"},{"key":"S0218194023500110BIB042","volume-title":"Software Metrics","author":"Henderson-Sellers B.","year":"1996"},{"issue":"3","key":"S0218194023500110BIB043","first-page":"241","volume":"13","author":"Tegarden D. P.","year":"1992","journal-title":"Decis. Support Syst."},{"key":"S0218194023500110BIB044","first-page":"334","volume-title":"Proc. 21st Int. Conf. Software Engineering","author":"Benlarbi S.","year":"1999"},{"issue":"1","key":"S0218194023500110BIB045","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1023\/A:1009783721306","volume":"3","author":"Briand L. C.","year":"1998","journal-title":"Empir. Softw. Eng."},{"key":"S0218194023500110BIB046","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1145\/223427.211856","volume":"20","author":"Bieman J. M.","year":"1995","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"issue":"1","key":"S0218194023500110BIB047","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1023\/B:EMSE.0000048324.12188.a2","volume":"10","author":"Succi G.","year":"2005","journal-title":"Empir. Softw. Eng."},{"key":"S0218194023500110BIB048","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1002\/pst.126","volume":"3","author":"Julious S.","year":"2004","journal-title":"Pharm. Stat."},{"issue":"1","key":"S0218194023500110BIB049","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1093\/jis\/3.1.34","volume":"3","author":"Payton M. E.","year":"2003","journal-title":"J. Insect Sci."},{"key":"S0218194023500110BIB050","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1007\/s12065-019-00201-0","volume":"14","author":"Padhy N.","year":"2019","journal-title":"Evol. Intell."},{"issue":"7","key":"S0218194023500110BIB051","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1109\/TSE.2018.2794977","volume":"45","author":"Tantithamthavorn C.","year":"2019","journal-title":"IEEE Trans. Softw. Eng."},{"key":"S0218194023500110BIB054","doi-asserted-by":"crossref","first-page":"106664","DOI":"10.1016\/j.infsof.2021.106664","volume":"139","author":"Yao J.","year":"2021","journal-title":"Inf. Softw. Technol."},{"issue":"1","key":"S0218194023500110BIB055","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/32.481535","volume":"22","author":"Briand L. C.","year":"1996","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"9","key":"S0218194023500110BIB056","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/TSE.2007.70721","volume":"33","author":"Menzies T.","year":"2007","journal-title":"IEEE Trans. Softw. Eng."},{"key":"S0218194023500110BIB057","first-page":"197","volume-title":"Conf. Proc. Object-Oriented Programming Systems, Languages, and Applications","author":"Chidamber S. R.","year":"1991"},{"key":"S0218194023500110BIB058","volume-title":"Proc. Int. Symp. Applied Corporate Computing","author":"Hitz M.","year":"1995"},{"key":"S0218194023500110BIB059","first-page":"81","volume-title":"Proc. Int. Conf. Software Quality","author":"Lee Y.-S.","year":"1995"},{"key":"S0218194023500110BIB060","first-page":"102","volume-title":"Proc. Fifth Joint Conf. Knowledge-based Software Engineering","author":"Aman H.","year":"2002"},{"issue":"4","key":"S0218194023500110BIB061","doi-asserted-by":"crossref","first-page":"145","DOI":"10.5381\/jot.2004.3.4.a8","volume":"3","author":"Badri L.","year":"2004","journal-title":"J. Object Technol."},{"issue":"2","key":"S0218194023500110BIB062","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1145\/1131421.1131422","volume":"15","author":"Counsell S.","year":"2006","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"S0218194023500110BIB063","first-page":"412","volume-title":"Proc. 19th Int. Conf. Software Engineering","author":"Briand L.","year":"1997"},{"issue":"1","key":"S0218194023500110BIB064","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/32.748920","volume":"25","author":"Briand L. C.","year":"1999","journal-title":"IEEE Trans. Softw. Eng."},{"key":"S0218194023500110BIB065","first-page":"104","volume-title":"Proc. 20th Int. Computer Software and Applications Conference: COMPSAC\u201996","author":"Kim E. M.","year":"1996"},{"issue":"2","key":"S0218194023500110BIB066","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/0164-1212(93)90077-B","volume":"23","author":"Li W.","year":"1993","journal-title":"J. Syst. Softw."}],"container-title":["International Journal of Software Engineering and Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218194023500110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,19]],"date-time":"2023-05-19T05:15:26Z","timestamp":1684473326000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218194023500110"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,20]]},"references-count":61,"journal-issue":{"issue":"05","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["10.1142\/S0218194023500110"],"URL":"https:\/\/doi.org\/10.1142\/s0218194023500110","relation":{},"ISSN":["0218-1940","1793-6403"],"issn-type":[{"value":"0218-1940","type":"print"},{"value":"1793-6403","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,20]]}}}