{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T11:38:45Z","timestamp":1772192325337,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,13]],"date-time":"2014-05-13T00:00:00Z","timestamp":1399939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,13]]},"DOI":"10.1145\/2601248.2601294","type":"proceedings-article","created":{"date-parts":[[2014,7,15]],"date-time":"2014-07-15T12:20:56Z","timestamp":1405426856000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":84,"title":["Preliminary comparison of techniques for dealing with imbalance in software defect prediction"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Rodriguez","sequence":"first","affiliation":[{"name":"University of Alcala, Madrid, Spain"}]},{"given":"Israel","family":"Herraiz","sequence":"additional","affiliation":[{"name":"Technical Univ of Madrid (UPM), Madrid, Spain"}]},{"given":"Rachel","family":"Harrison","sequence":"additional","affiliation":[{"name":"Oxford Brookes University, Oxford, UK"}]},{"given":"Javier","family":"Dolado","sequence":"additional","affiliation":[{"name":"Univ of the Basque Country, Donostia, Spain"}]},{"given":"Jos\u00e9 C.","family":"Riquelme","sequence":"additional","affiliation":[{"name":"University of Seville, Seville, Spain"}]}],"member":"320","published-online":{"date-parts":[[2014,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.055"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2006.205110"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018054314350"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.10.027"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39804-2_12"},{"key":"e_1_3_2_1_8_1","volume-title":"Smote: Synthetic minority over-sampling technique. J. Artif. Intell. Res. (JAIR), 16:321--357","author":"Chawla N. V.","year":"2002","unstructured":"N. V. Chawla , K. W. Bowyer , L. O. Hall , and W. P. Kegelmeyer . Smote: Synthetic minority over-sampling technique. J. Artif. Intell. Res. (JAIR), 16:321--357 , 2002 . N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer. Smote: Synthetic minority over-sampling technique. J. Artif. Intell. Res. (JAIR), 16:321--357, 2002."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143874"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1248547.1248548"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312220"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.07.040"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/3091696.3091715"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2161285"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.05.006"},{"key":"e_1_3_2_1_18_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1007\/978-3-642-15819-3_57","volume-title":"Artificial Neural Networks - ICANN","author":"Garc\u00eda S.","year":"2010","unstructured":"S. Garc\u00eda , R. Aler , and I. M. Galv\u00e1n . Using evolutionary multiobjective techniques for imbalanced classification data . In K. Diamantaras, W. Duch, and L. S. Iliadis, editors, Artificial Neural Networks - ICANN 2010 , volume 6352 of Lecture Notes in Computer Science , pages 422 -- 427 . Springer Berlin Heidelberg , 2010. S. Garc\u00eda, R. Aler, and I. M. Galv\u00e1n. Using evolutionary multiobjective techniques for imbalanced classification data. In K. Diamantaras, W. Duch, and L. S. Iliadis, editors, Artificial Neural Networks - ICANN 2010, volume 6352 of Lecture Notes in Computer Science, pages 422--427. Springer Berlin Heidelberg, 2010."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.103"},{"key":"e_1_3_2_1_20_1","series-title":"Operating And Programming Systems Series","volume-title":"Elsevier Computer Science Library","author":"Halstead M.","year":"1977","unstructured":"M. Halstead . Elements of software science. Elsevier Computer Science Library . Operating And Programming Systems Series ; 2. Elsevier , New York; Oxford, 1977 . M. Halstead. Elements of software science. Elsevier Computer Science Library. Operating And Programming Systems Series; 2. Elsevier, New York; Oxford, 1977."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2009.08.005"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2002-6504"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2002.804488"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.595888"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025316301168"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.35"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.09.038"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.12.043"},{"key":"e_1_3_2_1_29_1","volume-title":"Oct.","author":"Matthews B. W.","year":"1975","unstructured":"B. W. Matthews . Comparison of the predicted and observed secondary structure of t4 phage lysozyme. Biochimica et biophysica acta, 405(2):442--451 , Oct. 1975 . B. W. Matthews. Comparison of the predicted and observed secondary structure of t4 phage lysozyme. Biochimica et biophysica acta, 405(2):442--451, Oct. 1975."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1540438.1540448"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2010.18"},{"key":"e_1_3_2_1_33_1","volume-title":"June","author":"Menzies T.","year":"2012","unstructured":"T. Menzies , B. Caglayan , E. Kocaguneli , J. Krall , F. Peters , and B. Turhan . The promise repository of empirical software engineering data , June 2012 . T. Menzies, B. Caglayan, E. Kocaguneli, J. Krall, F. Peters, and B. Turhan. The promise repository of empirical software engineering data, June 2012."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70721"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.10"},{"key":"e_1_3_2_1_36_1","unstructured":"T. Mitchell. Machine Learning. McGraw Hill 1997.   T. Mitchell. Machine Learning . McGraw Hill 1997."},{"key":"e_1_3_2_1_37_1","volume-title":"International Journal of Information Technology & Decision Making (IJITDM), 08(04):749--767","author":"Peng Y.","year":"2009","unstructured":"Y. Peng , G. Kou , G. Wang , H. Wang , and F. Ko . Empirical evaluation of classifiers for software risk management . International Journal of Information Technology & Decision Making (IJITDM), 08(04):749--767 , 2009 . Y. Peng, G. Kou, G. Wang, H. Wang, and F. Ko. Empirical evaluation of classifiers for software risk management. International Journal of Information Technology & Decision Making (IJITDM), 08(04):749--767, 2009."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.04.019"},{"key":"e_1_3_2_1_39_1","volume-title":"San Mateo","author":"Quinlan J.","year":"1993","unstructured":"J. Quinlan . C4.5 : Programs for machine learning. Morgan Kaufmann , San Mateo , California , 1993 . J. Quinlan. C4.5: Programs for machine learning. Morgan Kaufmann, San Mateo, California, 1993."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.211"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2027131"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2029559"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.11"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273614"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.07.034"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1972.4309137"},{"key":"e_1_3_2_1_47_1","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"Witten I. H.","year":"2011","unstructured":"I. H. Witten , E. Frank , and M. A. Hall . Data Mining: Practical Machine Learning Tools and Techniques ( Third Edition). Morgan Kaufmann , 2011 . I. H. Witten, E. Frank, and M. A. Hall. Data Mining: Practical Machine Learning Tools and Techniques (Third Edition). Morgan Kaufmann, 2011."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70706"}],"event":{"name":"EASE '14: 18th International Conference on Evaluation and Assessment in Software Engineering","location":"London England United Kingdom","acronym":"EASE '14","sponsor":["Brunel University Brunel University"]},"container-title":["Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2601248.2601294","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2601248.2601294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:00:52Z","timestamp":1750276852000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2601248.2601294"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,13]]},"references-count":48,"alternative-id":["10.1145\/2601248.2601294","10.1145\/2601248"],"URL":"https:\/\/doi.org\/10.1145\/2601248.2601294","relation":{},"subject":[],"published":{"date-parts":[[2014,5,13]]},"assertion":[{"value":"2014-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}