{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T21:18:05Z","timestamp":1773523085528,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2568225.2568320","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"414-423","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":150,"title":["Dictionary learning based software defect prediction"],"prefix":"10.1145","author":[{"given":"Xiao-Yuan","family":"Jing","sequence":"first","affiliation":[{"name":"Wuhan University, China \/ Nanjing University of Posts and Telecommunications, China"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Shi","family":"Ying","sequence":"additional","affiliation":[{"name":"Wuhan University, China"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Zhi-Wu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Wuhan University, China \/ Nanjing University of Posts and Telecommunications, China"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Shan-Shan","family":"Wu","sequence":"additional","affiliation":[{"name":"Wuhan University, China \/ Nanjing University of Posts and Telecommunications, China"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Jin","family":"Liu","sequence":"additional","affiliation":[{"name":"Wuhan University, China"}],"role":[{"role":"author","vocab":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.24"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486839"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.10.027"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.103"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.07.040"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03969-0_21"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13318-3_3"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2012.19"},{"key":"e_1_3_2_1_9_1","first-page":"203","volume-title":"IEEE Symp. Software Metrics","author":"Khoshgoftaar T.M.","year":"2002","unstructured":"T.M. Khoshgoftaar , N. Seliya , \u201cTree-based software quality esti-mation models for fault prediction ,\u201d IEEE Symp. Software Metrics , pp. 203 - 214 , 2002 . T.M. Khoshgoftaar, N. Seliya, \u201cTree-based software quality esti-mation models for fault prediction,\u201d IEEE Symp. Software Metrics, pp. 203-214, 2002."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_11_1","first-page":"124","volume-title":"The World Congress on Engineering and Computer Science","author":"Gayatri N.","year":"2010","unstructured":"N. Gayatri , S. Nickolas , A.V. Reddy , \u201c Feature Selection Using Decision Tree Induction in Class level Metrics Dataset for Software Defect Predictions ,\u201d The World Congress on Engineering and Computer Science , pp. 124 - 129 , 2010 . N. Gayatri, S. Nickolas, A.V. Reddy, \u201cFeature Selection Using Decision Tree Induction in Class level Metrics Dataset for Software Defect Predictions,\u201d The World Congress on Engineering and Computer Science, pp. 124- 129, 2010."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2004.05.001"},{"issue":"5","key":"e_1_3_2_1_13_1","article-title":"Defect Prediction Using Case-Based Reasoning: An Attribute Weighting Technique Based Upon Sensitivity Analysis In Neural Networks","volume":"22","author":"Paikari E.","year":"2012","unstructured":"E. Paikari , M.M. Richter , G. Ruhe , \u201c Defect Prediction Using Case-Based Reasoning: An Attribute Weighting Technique Based Upon Sensitivity Analysis In Neural Networks ,\u201d Int. Journal of Software Engineering and Knowledge Engineering , vol. 22 , no. 5 , 2012 . E. Paikari, M.M. Richter, G. Ruhe, \u201cDefect Prediction Using Case-Based Reasoning: An Attribute Weighting Technique Based Upon Sensitivity Analysis In Neural Networks,\u201d Int. Journal of Software Engineering and Knowledge Engineering, vol. 22, no. 5, 2012.","journal-title":"Int. Journal of Software Engineering and Knowledge Engineering"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISE.2010.5677057"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/951952.952380"},{"key":"e_1_3_2_1_16_1","first-page":"244","volume-title":"Int. Conf. Software and Data Technologies","author":"Turhan B.","year":"2007","unstructured":"B. Turhan , A. Bener , \u201c Software Defect Prediction: Heuristics for Weighted Na\u00efve Bayes ,\u201d Int. Conf. Software and Data Technologies , pp. 244 - 249 , 2007 . B. Turhan, A. Bener, \u201cSoftware Defect Prediction: Heuristics for Weighted Na\u00efve Bayes,\u201d Int. Conf. Software and Data Technologies, pp. 244-249, 2007."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2008.10.005"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.12.056"},{"key":"e_1_3_2_1_19_1","first-page":"2515","volume-title":"Int. Conf. Systems, Man, and Cybernetics","author":"Miguel E.","year":"2011","unstructured":"Bezerra, E. Miguel , A.L.I. Oliveiray , P.J.L. Adeodatoz , \u201c Predicting software defects: A cost-sensitive approach ,\u201d Int. Conf. Systems, Man, and Cybernetics , pp. 2515 - 2522 , 2011 . Bezerra, E. Miguel, A.L.I. Oliveiray, P.J.L. Adeodatoz, \u201cPredicting software defects: A cost-sensitive approach,\u201d Int. Conf. Systems, Man, and Cybernetics, pp. 2515-2522, 2011."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.38"},{"key":"e_1_3_2_1_21_1","first-page":"15","volume-title":"Int. Conf. Machine Learning","author":"Turney P.D.","year":"2000","unstructured":"P.D. Turney , \u201c Types of cost in inductive concept learning ,\u201d Int. Conf. Machine Learning , pp. 15 - 21 , 2000 . P.D. Turney, \u201cTypes of cost in inductive concept learning,\u201d Int. Conf. Machine Learning, pp. 15-21, 2000."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312220"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.10"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.17"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2010.27"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2012.2226152"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2012.145"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2259203"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.258082"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.881199"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1756008"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2040671"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2010.5652363"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995354"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2012.2209871"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539989"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587408"},{"key":"e_1_3_2_1_39_1","volume-title":"IEEE Conf. Computer Vision and Pattern Recognition","author":"Mairal J.","year":"2008","unstructured":"J. Mairal , F. Bach , J. Ponce , G. Sapiro , A. Zisserman , \u201c Supervised dictionary learning ,\u201d IEEE Conf. Computer Vision and Pattern Recognition , 2008 . J. Mairal, F. Bach, J. Ponce, G. Sapiro, A. Zisserman, \u201cSupervised dictionary learning,\u201d IEEE Conf. Computer Vision and Pattern Recognition, 2008."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"e_1_3_2_1_41_1","volume-title":"New York: Elsevier North-Holland","author":"Halstead M.H.","year":"1977","unstructured":"M.H. Halstead , \u201c Elements of Software Science (Operating and programming systems series) ,\u201d New York: Elsevier North-Holland , 1977 . M.H. Halstead, \u201cElements of Software Science (Operating and programming systems series),\u201d New York: Elsevier North-Holland, 1977."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.90"},{"key":"e_1_3_2_1_43_1","first-page":"1","article-title":"Ensemble Methods in Machine Learning","author":"Dietterich T.G.","year":"2000","unstructured":"T.G. Dietterich , \u201c Ensemble Methods in Machine Learning , \u201d Multiple Classier Systems , pp. 1 - 15 , 2000 . T.G. Dietterich, \u201cEnsemble Methods in Machine Learning, \u201d Multiple Classier Systems, pp. 1-15, 2000.","journal-title":"Multiple Classier Systems"},{"key":"e_1_3_2_1_44_1","first-page":"3","article-title":"Ensembles of learning machines","author":"Valentini G.","year":"2002","unstructured":"G. Valentini , F. Masulli , \u201c Ensembles of learning machines ,\u201d Neural Networks , pp. 3 - 20 , 2002 . G. Valentini, F. Masulli, \u201cEnsembles of learning machines,\u201d Neural Networks, pp. 3-20, 2002.","journal-title":"Neural Networks"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539964"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28551-6_29"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126286"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2011.6012083"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.79"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025156"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.49"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306304"},{"key":"e_1_3_2_1_55_1","volume-title":"Workshop on Empirical Evaluation in Computer Vision","author":"Yambor W.S.","year":"2000","unstructured":"W.S. Yambor , B.A. Draper , J.R. Beveridge , \u201c Analyzing PCA-based Face Recognition Algorithms: Eigenvector Selection and Distance Measures ,\u201d Workshop on Empirical Evaluation in Computer Vision , 2000 . W.S. Yambor, B.A. Draper, J.R. Beveridge, \u201cAnalyzing PCA-based Face Recognition Algorithms: Eigenvector Selection and Distance Measures,\u201d Workshop on Empirical Evaluation in Computer Vision, 2000."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.10"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2010.29"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2008.54"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.35"}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","location":"Hyderabad India","acronym":"ICSE '14","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."]},"container-title":["Proceedings of the 36th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568225.2568320","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2568225.2568320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:37Z","timestamp":1750230097000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568225.2568320"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":58,"alternative-id":["10.1145\/2568225.2568320","10.1145\/2568225"],"URL":"https:\/\/doi.org\/10.1145\/2568225.2568320","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}