{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:00:18Z","timestamp":1772042418475,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T00:00:00Z","timestamp":1503273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,21]]},"DOI":"10.1145\/3106237.3106257","type":"proceedings-article","created":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T19:36:18Z","timestamp":1501702578000},"page":"72-83","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":100,"title":["Revisiting unsupervised learning for defect prediction"],"prefix":"10.1145","author":[{"given":"Wei","family":"Fu","sequence":"first","affiliation":[{"name":"North Carolina State University, USA"}]},{"given":"Tim","family":"Menzies","sequence":"additional","affiliation":[{"name":"North Carolina State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,8,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"CoRR abs\/1705.03697","author":"Agrawal Amritanshu","year":"2017","unstructured":"Amritanshu Agrawal and Tim Menzies . 2017. \" Better Data\" is Better than \" Better Data Miners\" ( Beneits of Tuning SMOTE for Defect Prediction). CoRR abs\/1705.03697 ( 2017 ). http:\/\/arxiv.org\/abs\/1705.03697 Amritanshu Agrawal and Tim Menzies. 2017. \"Better Data\" is Better than \"Better Data Miners\" (Beneits of Tuning SMOTE for Defect Prediction). CoRR abs\/1705.03697 (2017). http:\/\/arxiv.org\/abs\/1705.03697"},{"key":"e_1_3_2_1_2_1","volume-title":"IFIP Congress (1)","volume":"71","author":"Akiyama Fumio","year":"1971","unstructured":"Fumio Akiyama . 1971 . An example of software system debugging . In IFIP Congress (1) , Vol. 71 . 353\u015b359. Fumio Akiyama. 1971. An example of software system debugging. In IFIP Congress (1), Vol. 71. 353\u015b359."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159733.1159738"},{"key":"e_1_3_2_1_4_1","series-title":"Series B (Methodological)","volume-title":"Controlling the false discovery rate: a practical and powerful approach to multiple testing. Journal of the Royal Statistical Society","author":"Benjamini Yoav","year":"1995","unstructured":"Yoav Benjamini and Yosef Hochberg . 1995. Controlling the false discovery rate: a practical and powerful approach to multiple testing. Journal of the Royal Statistical Society . Series B (Methodological) ( 1995 ), 289\u015b300. Yoav Benjamini and Yosef Hochberg. 1995. Controlling the false discovery rate: a practical and powerful approach to multiple testing. Journal of the Royal Statistical Society. Series B (Methodological) (1995), 289\u015b300."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463279"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.04.017"},{"key":"e_1_3_2_1_8_1","volume-title":"Why is diferential evolution better than grid search for tuning defect predictors? arXiv preprint arXiv:1609.02613","author":"Fu Wei","year":"2016","unstructured":"Wei Fu , Vivek Nair , and Tim Menzies . 2016. Why is diferential evolution better than grid search for tuning defect predictors? arXiv preprint arXiv:1609.02613 ( 2016 ). Wei Fu, Vivek Nair, and Tim Menzies. 2016. Why is diferential evolution better than grid search for tuning defect predictors? arXiv preprint arXiv:1609.02613 (2016)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597075"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.859533"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806871"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.103"},{"key":"e_1_3_2_1_14_1","volume-title":"Elements of software science","author":"Halstead Maurice Howard","unstructured":"Maurice Howard Halstead . 1977. Elements of software science . Vol. 7 . Elsevier New York . Maurice Howard Halstead. 1977. Elements of software science. Vol. 7. Elsevier New York."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.3"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.51"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693087"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568320"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233164"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.70"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1142\/9789812811868_0015"},{"key":"e_1_3_2_1_23_1","article-title":"Software quality classiication modeling using the SPRINT decision tree algorithm","volume":"12","author":"Khoshgoftaar Taghi M","year":"2003","unstructured":"Taghi M Khoshgoftaar and Naeem Seliya . 2003 . Software quality classiication modeling using the SPRINT decision tree algorithm . International Journal on Artiicial Intelligence Tools 12 , 03 (2003), 207\u015b225. Taghi M Khoshgoftaar and Naeem Seliya. 2003. Software quality classiication modeling using the SPRINT decision tree algorithm. International Journal on Artiicial Intelligence Tools 12, 03 (2003), 207\u015b225.","journal-title":"International Journal on Artiicial Intelligence Tools"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009896203228"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70773"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.66"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.27"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.90"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025156"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.35"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2017.8"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868356"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2010.18"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.10"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-010-0069-5"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v32i2.2348"},{"key":"e_1_3_2_1_38_1","article-title":"Predicting risk of software changes","volume":"5","author":"Mockus Audris","year":"2000","unstructured":"Audris Mockus and David M Weiss . 2000 . Predicting risk of software changes . Bell Labs Technical Journal 5 , 2 (2000), 169\u015b180. Audris Mockus and David M Weiss. 2000. Predicting risk of software changes. Bell Labs Technical Journal 5, 2 (2000), 169\u015b180.","journal-title":"Bell Labs Technical Journal"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.21"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062514"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134349"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486839"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1013886.1007524"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.49"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390635"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568269"},{"key":"e_1_3_2_1_48_1","volume-title":"Annual Meeting of the Southern Association for Institutional Research.","author":"Romano Jeanine","year":"2006","unstructured":"Jeanine Romano , Jefrey D Kromrey , Jesse Coraggio , Jef Skowronek , and Linda Devine . 2006 . Exploring methods for evaluating group diferences on the NSSE and other surveys: Are the t-test and Cohen\u00e2\u0102\u0179sd indices the most appropriate choices . In Annual Meeting of the Southern Association for Institutional Research. Jeanine Romano, Jefrey D Kromrey, Jesse Coraggio, Jef Skowronek, and Linda Devine. 2006. Exploring methods for evaluating group diferences on the NSSE and other surveys: Are the t-test and Cohen\u00e2\u0102\u0179sd indices the most appropriate choices. In Annual Meeting of the Southern Association for Institutional Research."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/381473.381612"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9103-7"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/4449"},{"key":"e_1_3_2_1_53_1","volume-title":"Soft Computing and Industry","author":"Wolpert David H","unstructured":"David H Wolpert . 2002. The supervised learning no-free-lunch theorems . In Soft Computing and Industry . Springer , 25\u015b42. David H Wolpert. 2002. The supervised learning no-free-lunch theorems. In Soft Computing and Industry. Springer, 25\u015b42."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950353"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025121"}],"event":{"name":"ESEC\/FSE'17: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Paderborn Germany","acronym":"ESEC\/FSE'17","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3106257","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106237.3106257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:36Z","timestamp":1750217436000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3106257"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,21]]},"references-count":55,"alternative-id":["10.1145\/3106237.3106257","10.1145\/3106237"],"URL":"https:\/\/doi.org\/10.1145\/3106237.3106257","relation":{},"subject":[],"published":{"date-parts":[[2017,8,21]]},"assertion":[{"value":"2017-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}