{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:00:23Z","timestamp":1762430423506},"reference-count":38,"publisher":"World Scientific Pub Co Pte Ltd","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Info. Tech. Dec. Mak."],"published-print":{"date-parts":[[2009,12]]},"abstract":"<jats:p>Software development involves plenty of risks, and errors exist in software modules represent a major kind of risk. Software defect prediction techniques and tools that identify software errors play a crucial role in software risk management. Among software defect prediction techniques, classification is a commonly used approach. Various types of classifiers have been applied to software defect prediction in recent years. How to select an adequate classifier (or set of classifiers) to identify error prone software modules is an important task for software development organizations. There are many different measures for classifiers and each measure is intended for assessing different aspect of a classifier. This paper developed a performance metric that combines various measures to evaluate the quality of classifiers for software defect prediction. The performance metric is analyzed experimentally using 13 classifiers on 11 public domain software defect datasets. The results of the experiment indicate that support vector machines (SVM), C4.5 algorithm, and K-nearest-neighbor algorithm ranked the top three classifiers.<\/jats:p>","DOI":"10.1142\/s0219622009003715","type":"journal-article","created":{"date-parts":[[2010,1,27]],"date-time":"2010-01-27T01:22:19Z","timestamp":1264555339000},"page":"749-767","source":"Crossref","is-referenced-by-count":45,"title":["EMPIRICAL EVALUATION OF CLASSIFIERS FOR SOFTWARE RISK MANAGEMENT"],"prefix":"10.1142","volume":"08","author":[{"given":"YI","family":"PENG","sequence":"first","affiliation":[{"name":"School of Management and Economics, University of Electronic Science and Technology of China, Chengdu, 610054, P. R. China"}]},{"given":"GANG","family":"KOU","sequence":"additional","affiliation":[{"name":"School of Management and Economics, University of Electronic Science and Technology of China, Chengdu, 610054, P. R. China"}]},{"given":"GUOXUN","family":"WANG","sequence":"additional","affiliation":[{"name":"School of Management and Economics, University of Electronic Science and Technology of China, Chengdu, 610054, P. R. China"}]},{"given":"HONGGANG","family":"WANG","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Massachusetts, Dartmouth, USA"}]},{"given":"FRANZ I. S.","family":"KO","sequence":"additional","affiliation":[{"name":"Department of Computer and Multimedia, Dongguk University, Korea"}]}],"member":"219","published-online":{"date-parts":[[2011,11,20]]},"reference":[{"key":"rf1","doi-asserted-by":"publisher","DOI":"10.1109\/52.62930"},{"key":"rf2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.35"},{"key":"rf3","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622008003204"},{"key":"rf4","doi-asserted-by":"publisher","DOI":"10.1109\/32.135775"},{"key":"rf5","doi-asserted-by":"publisher","DOI":"10.1142\/S0218539399000292"},{"key":"rf6","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2002.804488"},{"key":"rf8","doi-asserted-by":"publisher","DOI":"10.1109\/24.855532"},{"key":"rf10","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(90)90041-J"},{"key":"rf11","doi-asserted-by":"publisher","DOI":"10.1109\/72.595888"},{"key":"rf12","doi-asserted-by":"publisher","DOI":"10.1007\/BF02249049"},{"key":"rf13","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00079-0"},{"key":"rf14","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1142\/S0218194000000092","volume":"10","author":"Ganesan K.","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"key":"rf15","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025316301168"},{"key":"rf16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.07.040"},{"key":"rf17","doi-asserted-by":"publisher","DOI":"10.1109\/32.815326"},{"key":"rf18","doi-asserted-by":"publisher","DOI":"10.1109\/32.799947"},{"key":"rf19","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.58"},{"key":"rf20","doi-asserted-by":"publisher","DOI":"10.1109\/32.965341"},{"key":"rf23","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"Witten I. H.","year":"2005"},{"key":"rf24","volume-title":"Classification and Regression Trees","author":"Breiman L.","year":"1984"},{"key":"rf26","volume-title":"C4.5: Programs for Machine Learning","author":"Quinlan J. R.","year":"1993"},{"key":"rf27","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622006001824"},{"key":"rf28","doi-asserted-by":"publisher","DOI":"10.2307\/2347628"},{"key":"rf29","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198538493.001.0001","volume-title":"Neural Networks for Pattern Recognition","author":"Bishop C. M.","year":"1995"},{"key":"rf30","unstructured":"J. C.\u00a0Platt, Advances in Kernel Methods-Support Vector Learning, eds. B.\u00a0Schotolkopf, C. J. C.\u00a0Burges and A.\u00a0Smola (MIT press, 1998)\u00a0pp. 185\u2013208."},{"key":"rf31","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"rf32","volume-title":"Data Mining: Concepts and Techniques","author":"Han J.","year":"2006"},{"key":"rf33","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622006001861"},{"key":"rf34","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007413511361"},{"key":"rf35","volume-title":"Computer Systems that Learn: Classification and Predication Methods from Statistics, Neural Nets, Machine Learning and Expert Systems","author":"Weiss S. M.","year":"1991"},{"key":"rf36","volume-title":"Nearest Neighbor (NN) Norms: NN Pattern Classification Techniques","author":"Dasarathy B. V.","year":"1991"},{"key":"rf40","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024099825458"},{"key":"rf44","first-page":"27","author":"Ferri C.","journal-title":"Pattern Recognit. Lett."},{"key":"rf45","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00005-4"},{"key":"rf46","doi-asserted-by":"publisher","DOI":"10.1142\/S0218213008003947"},{"key":"rf47","volume-title":"Modern Information Retrieval","author":"Baeza-Yates R.","year":"1999"},{"key":"rf48","doi-asserted-by":"publisher","DOI":"10.1002\/0471660264"},{"key":"rf50","doi-asserted-by":"publisher","DOI":"10.1109\/32.9061"}],"container-title":["International Journal of Information Technology &amp; Decision Making"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219622009003715","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,23]],"date-time":"2024-03-23T05:03:20Z","timestamp":1711170200000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219622009003715"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":38,"journal-issue":{"issue":"04","published-online":{"date-parts":[[2011,11,20]]},"published-print":{"date-parts":[[2009,12]]}},"alternative-id":["10.1142\/S0219622009003715"],"URL":"https:\/\/doi.org\/10.1142\/s0219622009003715","relation":{},"ISSN":["0219-6220","1793-6845"],"issn-type":[{"value":"0219-6220","type":"print"},{"value":"1793-6845","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,12]]}}}