{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:01:42Z","timestamp":1774450902543,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T00:00:00Z","timestamp":1463184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,14]]},"DOI":"10.1145\/2884781.2884857","type":"proceedings-article","created":{"date-parts":[[2016,5,13]],"date-time":"2016-05-13T18:21:10Z","timestamp":1463163670000},"page":"321-332","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":242,"title":["Automated parameter optimization of classification techniques for defect prediction models"],"prefix":"10.1145","author":[{"given":"Chakkrit","family":"Tantithamthavorn","sequence":"first","affiliation":[{"name":"Nara Institute of Science and Technology, Japan"}]},{"given":"Shane","family":"McIntosh","sequence":"additional","affiliation":[{"name":"McGill University, Canada"}]},{"given":"Ahmed E.","family":"Hassan","sequence":"additional","affiliation":[{"name":"Queen's University, Canada"}]},{"given":"Kenichi","family":"Matsumoto","sequence":"additional","affiliation":[{"name":"Nara Institute of Science and Technology, Japan"}]}],"member":"320","published-online":{"date-parts":[[2016,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/2188385.2188395"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2006.205110"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btg419"},{"key":"e_1_3_2_1_4_1","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen J.","year":"1988","unstructured":"J. Cohen . Statistical Power Analysis for the Behavioral Sciences . 1988 . J. Cohen. Statistical Power Analysis for the Behavioral Sciences. 1988."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.112.1.155"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463279"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9173-9"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1983.10477973"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-4541-9"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2697065"},{"key":"e_1_3_2_1_11_1","unstructured":"S. Fritsch and F. Guenther. neuralnet: Training of neural networks. http:\/\/CRAN.R-project.org\/package=neuralnet 2015.  S. Fritsch and F. Guenther. neuralnet: Training of neural networks. http:\/\/CRAN.R-project.org\/package=neuralnet 2015."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818850"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083165.1083172"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.103"},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"Search based software engineering: Techniques, taxonomy, tutorial","author":"Harman M.","year":"2012","unstructured":"M. Harman , P. McMinn , J. De Souza , and S. Yoo . Search based software engineering: Techniques, taxonomy, tutorial . pages 1 -- 59 , 2012 . M. Harman, P. McMinn, J. De Souza, and S. Yoo. Search based software engineering: Techniques, taxonomy, tutorial. pages 1--59, 2012."},{"key":"e_1_3_2_1_17_1","volume-title":"Regression Modeling Strategies","author":"Harrell F. E.","year":"2002","unstructured":"F. E. Harrell Jr . Regression Modeling Strategies . Springer , 1 st edition, 2002 . F. E. Harrell Jr. Regression Modeling Strategies. Springer, 1st edition, 2002.","edition":"1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"e_1_3_2_1_19_1","volume-title":"Ilheus","author":"Jelihovschi E. G.","year":"2014","unstructured":"E. G. Jelihovschi , J. C. Faria , and I. B. Allaman . The ScottKnott Clustering Algorithm. Universidade Estadual de Santa Cruz - UESC , Ilheus , Bahia, Brasil , 2014 . E. G. Jelihovschi, J. C. Faria, and I. B. Allaman. The ScottKnott Clustering Algorithm. Universidade Estadual de Santa Cruz - UESC, Ilheus, Bahia, Brasil, 2014."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818821"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9079-3"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390817.1390822"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.3"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868342"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-012-0108-5"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985859"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.27"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v028.i05"},{"key":"e_1_3_2_1_29_1","unstructured":"M. Kuhn. C50: C5.0 decision trees and rule-based models. http:\/\/CRAN.R-project.org\/package=C50 2015.  M. Kuhn. C50: C5.0 decision trees and rule-based models. http:\/\/CRAN.R-project.org\/package=C50 2015."},{"key":"e_1_3_2_1_30_1","unstructured":"M. Kuhn. caret: Classification and regression training. http:\/\/CRAN.R-project.org\/package=caret 2015.  M. Kuhn. caret: Classification and regression training. http:\/\/CRAN.R-project.org\/package=caret 2015."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.07.005"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.35"},{"key":"e_1_3_2_1_33_1","unstructured":"A. Liaw and M. Wiener. randomforest: Breiman and cutler's random forests for classification and regression. http:\/\/CRAN.R-project.org\/package=randomForest 2015.  A. Liaw and M. Wiener. randomforest: Breiman and cutler's random forests for classification and regression. http:\/\/CRAN.R-project.org\/package=randomForest 2015."},{"key":"e_1_3_2_1_34_1","unstructured":"A. Lim L. Breiman and A. Cutler. bigrf: Big random forests: Classification and regression forests for large data sets. http:\/\/CRAN.R-project.org\/package=bigrf 2015.  A. Lim L. Breiman and A. Cutler. bigrf: Big random forests: Classification and regression forests for large data sets. http:\/\/CRAN.R-project.org\/package=bigrf 2015."},{"key":"e_1_3_2_1_35_1","volume-title":"Natick","author":"MATLAB.","year":"2015","unstructured":"MATLAB. version 8.5.0 (R2015a). The MathWorks Inc ., Natick , Massachusetts , 2015 . MATLAB. version 8.5.0 (R2015a). The MathWorks Inc., Natick, Massachusetts, 2015."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868336"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1540438.1540448"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2009.55"},{"key":"e_1_3_2_1_39_1","unstructured":"T. Menzies C. Pape R. Krishna and M. Rees-Jones. The Promise Repository of Empirical Software Engineering Data. http:\/\/openscience.us\/repo 2015.  T. Menzies C. Pape R. Krishna and M. Rees-Jones. The Promise Repository of Empirical Software Engineering Data. http:\/\/openscience.us\/repo 2015."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9193-5"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.45"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.58"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0895-4356(96)00236-3"},{"key":"e_1_3_2_1_46_1","unstructured":"R Core Team. R: A language and environment for statistical computing. http:\/\/www.R-project.org\/ 2013.  R Core Team. R: A language and environment for statistical computing. http:\/\/www.R-project.org\/ 2013."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486846"},{"key":"e_1_3_2_1_48_1","unstructured":"B. Ripley. nnet: Feed-forward neural networks and multinomial log-linear models. http:\/\/CRAN.R-project.org\/package=nnet 2015.  B. Ripley. nnet: Feed-forward neural networks and multinomial log-linear models. http:\/\/CRAN.R-project.org\/package=nnet 2015."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2322358"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.11"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499393.2499394"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.90"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889256"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818852"},{"key":"e_1_3_2_1_55_1","unstructured":"C. Tantithamthavorn S. McIntosh A. E. Hassan and K. Matsumoto. An Empirical Comparison of Model Validation Techniques for Defect Prediction Model. Under Review at a Software Engineering Journal http:\/\/sailhome.cs.queensu.ca\/replication\/kla\/model-validation.pdf 2015.  C. Tantithamthavorn S. McIntosh A. E. Hassan and K. Matsumoto. An Empirical Comparison of Model Validation Techniques for Defect Prediction Model. Under Review at a Software Engineering Journal http:\/\/sailhome.cs.queensu.ca\/replication\/kla\/model-validation.pdf 2015."},{"key":"e_1_3_2_1_56_1","first-page":"e1543","article-title":"Comments on \"Researcher Bias: the Use of Machine Learning in Software Defect Prediction","volume":"3","author":"Tantithamthavorn C.","year":"2015","unstructured":"C. Tantithamthavorn , S. McIntosh , A. E. Hassan , and K. Matsumoto . Comments on \"Researcher Bias: the Use of Machine Learning in Software Defect Prediction \". PeerJ PrePrints, page 3 : e1543 , 2015 . C. Tantithamthavorn, S. McIntosh, A. E. Hassan, and K. Matsumoto. Comments on \"Researcher Bias: the Use of Machine Learning in Software Defect Prediction\". PeerJ PrePrints, page 3:e1543, 2015.","journal-title":"PeerJ PrePrints, page"},{"key":"e_1_3_2_1_57_1","unstructured":"M. Torchiano. effsize: Efficient effect size computation. http:\/\/CRAN.R-project.org\/package=effsize 2015.  M. Torchiano. effsize: Efficient effect size computation. http:\/\/CRAN.R-project.org\/package=effsize 2015."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/1671248.1671311"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9182-8"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370788.1370792"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025120"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2007.19"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595713"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.10"}],"event":{"name":"ICSE '16: 38th International Conference on Software Engineering","location":"Austin Texas","acronym":"ICSE '16","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS\\TCSE TC on Software Engineering","IEEE-CS\\DATC IEEE Computer Society"]},"container-title":["Proceedings of the 38th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2884781.2884857","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2884781.2884857","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:06Z","timestamp":1750221546000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2884781.2884857"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,14]]},"references-count":63,"alternative-id":["10.1145\/2884781.2884857","10.1145\/2884781"],"URL":"https:\/\/doi.org\/10.1145\/2884781.2884857","relation":{},"subject":[],"published":{"date-parts":[[2016,5,14]]},"assertion":[{"value":"2016-05-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}