{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:41Z","timestamp":1750306301647,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,22]],"date-time":"2016-03-22T00:00:00Z","timestamp":1458604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,22]]},"DOI":"10.1145\/2896387.2900324","type":"proceedings-article","created":{"date-parts":[[2016,4,22]],"date-time":"2016-04-22T13:54:08Z","timestamp":1461333248000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Software Defect Prediction Using Feature Space Transformation"],"prefix":"10.1145","author":[{"given":"Md. Habibur","family":"Rahman","sequence":"first","affiliation":[{"name":"Institute of Information Technology, University of Dhaka"}]},{"given":"Sadia","family":"Sharmin","sequence":"additional","affiliation":[{"name":"Institute of Information Technology, University of Dhaka"}]},{"given":"Sheikh Muhammad","family":"Sarwar","sequence":"additional","affiliation":[{"name":"Institute of Information Technology, University of Dhaka"}]},{"given":"Mohammad","family":"Shoyaib","sequence":"additional","affiliation":[{"name":"Institute of Information Technology, University of Dhaka"}]}],"member":"320","published-online":{"date-parts":[[2016,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1043"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2010.27"},{"key":"e_1_3_2_1_3_1","first-page":"423","article-title":"New feature selection methods for qualification of the patients for cardiac pacemaker implantation,\" in Computers in Cardiology, 2007","author":"Ilczuk G.","year":"2007","unstructured":"G. Ilczuk , R. Mlynarski , W. Kargul , and A. Wakulicz-Deja , \" New feature selection methods for qualification of the patients for cardiac pacemaker implantation,\" in Computers in Cardiology, 2007 . IEEE , 2007 , pp. 423 -- 426 . G. Ilczuk, R. Mlynarski, W. Kargul, and A. Wakulicz-Deja, \"New feature selection methods for qualification of the patients for cardiac pacemaker implantation,\" in Computers in Cardiology, 2007. IEEE, 2007, pp. 423--426.","journal-title":"IEEE"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2009.18"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.10"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.90"},{"key":"e_1_3_2_1_7_1","first-page":"96","volume-title":"15th Annual Conference on. IET","author":"Gray D.","year":"2011","unstructured":"D. Gray , D. Bowes , N. Davey , Y. Sun , and B. Christianso , \" The misuse of the nasa metrics data program data sets for automated software defect prediction,\" in Evaluation and Assessment in Software Engineering (EASE 2011) , 15th Annual Conference on. IET , 2011 , pp. 96 -- 103 . D. Gray, D. Bowes, N. Davey, Y. Sun, and B. Christianso, \"The misuse of the nasa metrics data program data sets for automated software defect prediction,\" in Evaluation and Assessment in Software Engineering (EASE 2011), 15th Annual Conference on. IET, 2011, pp. 96--103."},{"key":"e_1_3_2_1_8_1","first-page":"382","volume-title":"Transfer defect learning,\" in Proceedings of the 2013 International Conference on Software Engineering","author":"Nam J.","year":"2013","unstructured":"J. Nam , S. J. Pan , and S. Kim , \" Transfer defect learning,\" in Proceedings of the 2013 International Conference on Software Engineering . IEEE Press , 2013 , pp. 382 -- 391 . J. Nam, S. J. Pan, and S. Kim, \"Transfer defect learning,\" in Proceedings of the 2013 International Conference on Software Engineering. IEEE Press, 2013, pp. 382--391."},{"key":"e_1_3_2_1_9_1","first-page":"1","volume-title":"Electronics & Vision (ICIEV), 2014 International Conference on. IEEE","author":"Khan J. I.","year":"2014","unstructured":"J. I. Khan , A. U. Gias , M. S. Siddik , M. H. Rahman , S. M. Khaled , and M. Shoyaib , \" An attribute selection process for software defect prediction,\" in Informatics , Electronics & Vision (ICIEV), 2014 International Conference on. IEEE , 2014 , pp. 1 -- 4 . J. I. Khan, A. U. Gias, M. S. Siddik, M. H. Rahman, S. M. Khaled, and M. Shoyaib, \"An attribute selection process for software defect prediction,\" in Informatics, Electronics & Vision (ICIEV), 2014 International Conference on. IEEE, 2014, pp. 1--4."},{"key":"e_1_3_2_1_10_1","first-page":"667","volume-title":"IRI 2007. IEEE International Conference on. IEEE","author":"Rodriguez D.","year":"2007","unstructured":"D. Rodriguez , R. Ruiz , J. Cuadrado-Gallego , and J. Aguilar-Ruiz , \" Detecting fault modules applying feature selection to classifiers,\" in Information Reuse and Integration, 2007 . IRI 2007. IEEE International Conference on. IEEE , 2007 , pp. 667 -- 672 . D. Rodriguez, R. Ruiz, J. Cuadrado-Gallego, and J. Aguilar-Ruiz, \"Detecting fault modules applying feature selection to classifiers,\" in Information Reuse and Integration, 2007. IRI 2007. IEEE International Conference on. IEEE, 2007, pp. 667--672."},{"key":"e_1_3_2_1_11_1","first-page":"41","volume-title":"CIBCB'04","author":"Jong K.","year":"2004","unstructured":"K. Jong , E. Marchiori , M. Sebag , and A. van der Vaart, \"Feature selection in proteomic pattern data with support vector machines,\" in Computational Intelligence in Bioinformatics and Computational Biology, 2004 . CIBCB'04 . Proceedings of the 2004 IEEE Symposium on. IEEE, 2004, pp. 41 -- 48 . K. Jong, E. Marchiori, M. Sebag, and A. van der Vaart, \"Feature selection in proteomic pattern data with support vector machines,\" in Computational Intelligence in Bioinformatics and Computational Biology, 2004. CIBCB'04. Proceedings of the 2004 IEEE Symposium on. IEEE, 2004, pp. 41--48."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944974"},{"key":"e_1_3_2_1_13_1","volume-title":"How many software metrics should be selected for defect prediction?\" in FLAIRS Conference-","author":"Wang H.","year":"2011","unstructured":"H. Wang , T. M. Khoshgoftaar , and N. Seliya , \" How many software metrics should be selected for defect prediction?\" in FLAIRS Conference- , 2011 . H. Wang, T. M. Khoshgoftaar, and N. Seliya, \"How many software metrics should be selected for defect prediction?\" in FLAIRS Conference-, 2011."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.11.006"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025156"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.65"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2673313.2673386"},{"key":"e_1_3_2_1_18_1","first-page":"311","volume-title":"2012 International Conference on. IEEE","author":"Verma R.","year":"2012","unstructured":"R. Verma and A. Gupta , \" Software defect prediction using two level data pre-processing,\" in Recent Advances in Computing and Software Systems (RACSS) , 2012 International Conference on. IEEE , 2012 , pp. 311 -- 317 . R. Verma and A. Gupta, \"Software defect prediction using two level data pre-processing,\" in Recent Advances in Computing and Software Systems (RACSS), 2012 International Conference on. IEEE, 2012, pp. 311--317."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9218-8"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337592"},{"key":"e_1_3_2_1_21_1","first-page":"4106","volume-title":"2013 25th Chinese. IEEE","author":"Can H.","year":"2013","unstructured":"H. Can , X. Jianchuna , Z. Ruide , L. Juelong , Y. Qiliang , and X. Liqiang , \" A new model for software defect prediction using particle swarm optimization and support vector machine,\" in Control and Decision Conference (CCDC) , 2013 25th Chinese. IEEE , 2013 , pp. 4106 -- 4110 . H. Can, X. Jianchuna, Z. Ruide, L. Juelong, Y. Qiliang, and X. Liqiang, \"A new model for software defect prediction using particle swarm optimization and support vector machine,\" in Control and Decision Conference (CCDC), 2013 25th Chinese. IEEE, 2013, pp. 4106--4110."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.01.026"},{"key":"e_1_3_2_1_23_1","first-page":"1","volume-title":"CVPR 2008. IEEE Conference on. IEEE","author":"Maji S.","year":"2008","unstructured":"S. Maji , A. C. Berg , and J. Malik , \" Classification using intersection kernel support vector machines is efficient,\" in Computer Vision and Pattern Recognition, 2008 . CVPR 2008. IEEE Conference on. IEEE , 2008 , pp. 1 -- 8 . S. Maji, A. C. Berg, and J. Malik, \"Classification using intersection kernel support vector machines is efficient,\" in Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on. IEEE, 2008, pp. 1--8."},{"key":"e_1_3_2_1_24_1","first-page":"244","volume-title":"Software defect prediction: Heuristics for weighted na\u00efve bayes.\" in ICSOFT (SE)","author":"Turhan B.","year":"2007","unstructured":"B. Turhan and A. Bener , \" Software defect prediction: Heuristics for weighted na\u00efve bayes.\" in ICSOFT (SE) , 2007 , pp. 244 -- 249 . B. Turhan and A. Bener, \"Software defect prediction: Heuristics for weighted na\u00efve bayes.\" in ICSOFT (SE), 2007, pp. 244--249."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568320"}],"event":{"name":"ICC '16: International Conference on Internet of things and Cloud Computing","acronym":"ICC '16","location":"Cambridge United Kingdom"},"container-title":["Proceedings of the International Conference on Internet of things and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2896387.2900324","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2896387.2900324","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:18Z","timestamp":1750221558000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2896387.2900324"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,22]]},"references-count":25,"alternative-id":["10.1145\/2896387.2900324","10.1145\/2896387"],"URL":"https:\/\/doi.org\/10.1145\/2896387.2900324","relation":{},"subject":[],"published":{"date-parts":[[2016,3,22]]},"assertion":[{"value":"2016-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}