{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T14:01:20Z","timestamp":1775311280323,"version":"3.50.1"},"reference-count":130,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2018,1,31]],"date-time":"2018-01-31T00:00:00Z","timestamp":1517356800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Basic Research and Development Program of China","award":["2014CB340702"],"award-info":[{"award-number":["2014CB340702"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61432001, 61772259, 61472175, 61472178, 61702256, 61562015 and 61403187"],"award-info":[{"award-number":["61432001, 61772259, 61472175, 61472178, 61702256, 61562015 and 61403187"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2018,1,31]]},"abstract":"<jats:p>\n            <jats:bold>Background.<\/jats:bold>\n            Recent years have seen an increasing interest in cross-project defect prediction (CPDP), which aims to apply defect prediction models built on source projects to a target project. Currently, a variety of (complex) CPDP models have been proposed with a promising prediction performance.\n          <\/jats:p>\n          <jats:p>\n            <jats:bold>Problem.<\/jats:bold>\n            Most, if not all, of the existing CPDP models are not compared against those simple module size models that are easy to implement and have shown a good performance in defect prediction in the literature.\n          <\/jats:p>\n          <jats:p>\n            <jats:bold>Objective.<\/jats:bold>\n            We aim to investigate how far we have really progressed in the journey by comparing the performance in defect prediction between the existing CPDP models and simple module size models.\n          <\/jats:p>\n          <jats:p>\n            <jats:bold>Method.<\/jats:bold>\n            We first use module size in the target project to build two simple defect prediction models, ManualDown and ManualUp, which do not require any training data from source projects. ManualDown considers a larger module as more defect-prone, while ManualUp considers a smaller module as more defect-prone. Then, we take the following measures to ensure a fair comparison on the performance in defect prediction between the existing CPDP models and the simple module size models: using the same publicly available data sets, using the same performance indicators, and using the prediction performance reported in the original cross-project defect prediction studies.\n          <\/jats:p>\n          <jats:p>\n            <jats:bold>Result.<\/jats:bold>\n            The simple module size models have a prediction performance comparable or even superior to most of the existing CPDP models in the literature, including many newly proposed models.\n          <\/jats:p>\n          <jats:p>\n            <jats:bold>Conclusion.<\/jats:bold>\n            The results caution us that, if the prediction performance is the goal, the real progress in CPDP is not being achieved as it might have been envisaged. We hence recommend that future studies should include ManualDown\/ManualUp as the baseline models for comparison when developing new CPDP models to predict defects in a complete target project.\n          <\/jats:p>","DOI":"10.1145\/3183339","type":"journal-article","created":{"date-parts":[[2018,4,18]],"date-time":"2018-04-18T17:21:50Z","timestamp":1524072110000},"page":"1-51","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":169,"title":["How Far We Have Progressed in the Journey? An Examination of Cross-Project Defect Prediction"],"prefix":"10.1145","volume":"27","author":[{"given":"Yuming","family":"Zhou","sequence":"first","affiliation":[{"name":"Nanjing University, Jiangsu Province, P.R. China"}]},{"given":"Yibiao","family":"Yang","sequence":"additional","affiliation":[{"name":"Nanjing University, Jiangsu Province, P.R. China"}]},{"given":"Hongmin","family":"Lu","sequence":"additional","affiliation":[{"name":"Nanjing University, Jiangsu Province, P.R. China"}]},{"given":"Lin","family":"Chen","sequence":"additional","affiliation":[{"name":"Nanjing University, Jiangsu Province, P.R. China"}]},{"given":"Yanhui","family":"Li","sequence":"additional","affiliation":[{"name":"Nanjing University, Jiangsu Province, P.R. China"}]},{"given":"Yangyang","family":"Zhao","sequence":"additional","affiliation":[{"name":"Nanjing University, Jiangsu Province, P.R. China"}]},{"given":"Junyan","family":"Qian","sequence":"additional","affiliation":[{"name":"Guilin University of Electronic Technology, Guilin, Guangxi Province, P.R. China"}]},{"given":"Baowen","family":"Xu","sequence":"additional","affiliation":[{"name":"Nanjing University, Jiangsu Province, P.R. China"}]}],"member":"320","published-online":{"date-parts":[[2018,4,16]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-016-0439-x"},{"key":"e_1_2_2_2_1","volume-title":"Proceedings of International Federation of Information Processing Societies Congress (IFIPS\u201971)","author":"Akiyama Fumio","year":"1971","unstructured":"Fumio Akiyama . 1971 . An example of software system debugging . In Proceedings of International Federation of Information Processing Societies Congress (IFIPS\u201971) . 353--359. Fumio Akiyama. 1971. An example of software system debugging. In Proceedings of International Federation of Information Processing Societies Congress (IFIPS\u201971). 353--359."},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25945-1_9"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609747"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2015.25"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.055"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1995.tb02031.x"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019484"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1671248.1671307"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.38"},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1570"},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRSE.2015.7366475"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.3906\/elk-1409-137"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.01.014"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.08.004"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194016710017"},{"key":"e_1_2_2_18_1","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen Jacob","unstructured":"Jacob Cohen . 1988. Statistical Power Analysis for the Behavioral Sciences . Lawrence Erlbaum Associates . Jacob Cohen. 1988. Statistical Power Analysis for the Behavioral Sciences. Lawrence Erlbaum Associates."},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9173-9"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.935855"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03193146"},{"key":"e_1_2_2_22_1","volume-title":"Ferguson and Yoshio Takane","author":"George","year":"2005","unstructured":"George A. Ferguson and Yoshio Takane . 2005 . Statistical Analysis in Psychology and Education. McGraw--Hill Ryerson Limited . George A. Ferguson and Yoshio Takane. 2005. Statistical Analysis in Psychology and Education. McGraw--Hill Ryerson Limited."},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.103"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1148\/radiology.143.1.7063747"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.11.006"},{"key":"e_1_2_2_27_1","volume-title":"Towards cross-project defect prediction with imbalanced feature sets. CoRR abs\/1411.4228","author":"He Peng","year":"2014","unstructured":"Peng He , Bing Li , and Yutao Ma. 2014. Towards cross-project defect prediction with imbalanced feature sets. CoRR abs\/1411.4228 ( 2014 ). arxiv:1411.4228 https:\/\/arxiv.org\/abs\/1411.4228 Peng He, Bing Li, and Yutao Ma. 2014. Towards cross-project defect prediction with imbalanced feature sets. CoRR abs\/1411.4228 (2014). arxiv:1411.4228 https:\/\/arxiv.org\/abs\/1411.4228"},{"key":"e_1_2_2_28_1","volume-title":"Simplification of training data for cross-project defect prediction. CoRR","author":"He Peng","year":"2014","unstructured":"Peng He , Bing Li , Deguang Zhang , and Yutao Ma. 2014. Simplification of training data for cross-project defect prediction. CoRR ( 2014 ). arxiv:1405.0773 https:\/\/arxiv.org\/abs\/1405.0773 Peng He, Bing Li, Deguang Zhang, and Yutao Ma. 2014. Simplification of training data for cross-project defect prediction. CoRR (2014). arxiv:1405.0773 https:\/\/arxiv.org\/abs\/1405.0773"},{"key":"e_1_2_2_29_1","volume-title":"TDSelector: A training data selection method for cross-project defect prediction. CoRR abs\/1612.09065","author":"He Peng","year":"2016","unstructured":"Peng He , Yutao Ma , and Bing Li. 2016. TDSelector: A training data selection method for cross-project defect prediction. CoRR abs\/1612.09065 ( 2016 ). http:\/\/arxiv.org\/abs\/1612.09065 Peng He, Yutao Ma, and Bing Li. 2016. TDSelector: A training data selection method for cross-project defect prediction. CoRR abs\/1612.09065 (2016). http:\/\/arxiv.org\/abs\/1612.09065"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2875913.2875944"},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2013.20"},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-011-0090-3"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499393.2499395"},{"key":"e_1_2_2_34_1","volume-title":"sherbold\/replication-kit-tse-2017-benchmark: Release of the replication kit. (May","author":"Herbold Steffen","year":"2017","unstructured":"Steffen Herbold . 2017. sherbold\/replication-kit-tse-2017-benchmark: Release of the replication kit. (May 2017 ). Steffen Herbold. 2017. sherbold\/replication-kit-tse-2017-benchmark: Release of the replication kit. (May 2017)."},{"key":"e_1_2_2_35_1","doi-asserted-by":"crossref","unstructured":"Steffen Herbold Alexander Trautsch and Jens Grabowski. 2017. A comparative study to benchmark cross-project defect prediction approaches (unpublished).  Steffen Herbold Alexander Trautsch and Jens Grabowski. 2017. A comparative study to benchmark cross-project defect prediction approaches (unpublished).","DOI":"10.1145\/3180155.3182542"},{"key":"e_1_2_2_36_1","volume-title":"CoRR abs\/1707.09281","author":"Herbold Steffen","year":"2017","unstructured":"Steffen Herbold , Alexander Trautsch , and Jens Grabowski . 2017. Correction of \u201cA comparative study to benchmark cross-project defect prediction approaches .\u201d CoRR abs\/1707.09281 ( 2017 ). arxiv:1707.09281 http:\/\/arxiv.org\/abs\/1707.09281 Steffen Herbold, Alexander Trautsch, and Jens Grabowski. 2017. Correction of \u201cA comparative study to benchmark cross-project defect prediction approaches.\u201d CoRR abs\/1707.09281 (2017). arxiv:1707.09281 http:\/\/arxiv.org\/abs\/1707.09281"},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9468-y"},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698911"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2972958.2972964"},{"key":"e_1_2_2_40_1","unstructured":"Seyedrebvar Hosseini Burak Turhan and Dimuthu Gunarathna. 2017. A systematic literature review and meta-analysis on cross project defect prediction (unpublished).  Seyedrebvar Hosseini Burak Turhan and Dimuthu Gunarathna. 2017. A systematic literature review and meta-analysis on cross project defect prediction (unpublished)."},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786813"},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2597849"},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868342"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9400-x"},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CINE.2016.34"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTICT.2016.7514581"},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT-CSI.2015.104"},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-008-9058-3"},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9080-x"},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-010-9132-x"},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.90"},{"key":"e_1_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970339"},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.156"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2972958.2972965"},{"key":"e_1_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2961111.2962595"},{"key":"e_1_2_2_56_1","volume-title":"Proceedings of the 35th International Conference on Software Engineering (ICSE\u201913)","author":"Lewis Chris","unstructured":"Chris Lewis , Zhongpeng Lin , Caitlin Sadowski , Xiaoyan Zhu , Rong Ou , and E. James Whitehead Jr . 2013. Does bug prediction support human developers? Findings from a google case study . In Proceedings of the 35th International Conference on Software Engineering (ICSE\u201913) . 372--381. Chris Lewis, Zhongpeng Lin, Caitlin Sadowski, Xiaoyan Zhu, Rong Ou, and E. James Whitehead Jr. 2013. Does bug prediction support human developers? Findings from a google case study. In Proceedings of the 35th International Conference on Software Engineering (ICSE\u201913). 372--381."},{"key":"e_1_2_2_57_1","volume-title":"Proceedings of the 33rd International Conference on Software Maintenance and Evolution (ICSME\u201917)","author":"Li Zhiqiang","year":"2017","unstructured":"Zhiqiang Li , XiaoYuan Jing , Xiaoke Zhu , and Hongyu Zhang . 2017 . Heterogeneous defect prediction through nultiple kernel learning and ensemble learning . In Proceedings of the 33rd International Conference on Software Maintenance and Evolution (ICSME\u201917) . 91--102. Zhiqiang Li, XiaoYuan Jing, Xiaoke Zhu, and Hongyu Zhang. 2017. Heterogeneous defect prediction through nultiple kernel learning and ensemble learning. In Proceedings of the 33rd International Conference on Software Maintenance and Evolution (ICSME\u201917). 91--102."},{"key":"e_1_2_2_58_1","volume-title":"Fei Wu, Xiaoke Zhu, Baowen Xu, and Shi Ying.","author":"Li Zhiqiang","year":"2017","unstructured":"Zhiqiang Li , Xiao Yuan Jing , Fei Wu, Xiaoke Zhu, Baowen Xu, and Shi Ying. 2017 . Cost-sensitive transfer kernel canonical correlation analysis for heterogeneous defect prediction. (unpublished). Zhiqiang Li, Xiao Yuan Jing, Fei Wu, Xiaoke Zhu, Baowen Xu, and Shi Ying. 2017. Cost-sensitive transfer kernel canonical correlation analysis for heterogeneous defect prediction. (unpublished)."},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.51"},{"key":"e_1_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021819401450003X"},{"key":"e_1_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.09.007"},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.481535"},{"key":"e_1_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100072"},{"key":"e_1_2_2_64_1","unstructured":"Tim Menzies Rahul Krishna and David Pryor. 2016. The PROMISE repository of empirical software engineering data. Retrieved from http:\/\/openscience.us\/repo.  Tim Menzies Rahul Krishna and David Pryor. 2016. The PROMISE repository of empirical software engineering data. Retrieved from http:\/\/openscience.us\/repo."},{"key":"e_1_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-010-0069-5"},{"key":"e_1_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWESEP.2014.9"},{"key":"e_1_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.21"},{"key":"e_1_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568324"},{"key":"e_1_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2915970.2915997"},{"key":"e_1_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"e_1_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851777"},{"key":"e_1_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70045-9"},{"key":"e_1_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2006.50"},{"key":"e_1_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134349"},{"key":"e_1_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368160"},{"key":"e_1_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.25"},{"key":"e_1_2_2_77_1","unstructured":"Jaechang Nam and Sunghun Kim. 2015. CLAMI. Retrieved from https:\/\/github.com\/lifove\/CLAMI.  Jaechang Nam and Sunghun Kim. 2015. CLAMI. Retrieved from https:\/\/github.com\/lifove\/CLAMI."},{"key":"e_1_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.56"},{"key":"e_1_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786814"},{"key":"e_1_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486839"},{"key":"e_1_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747177"},{"key":"e_1_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747166"},{"key":"e_1_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337246"},{"key":"e_1_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.6"},{"key":"e_1_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818851"},{"key":"e_1_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487161"},{"key":"e_1_2_2_87_1","first-page":"1","article-title":"Feature subset selection and instance filtering for cross-project defect prediction: Classification and ranking","volume":"19","author":"Porto Faimison","year":"2016","unstructured":"Faimison Porto and Adenilso Simao . 2016 . Feature subset selection and instance filtering for cross-project defect prediction: Classification and ranking . CLEI Electr. J. 19 , 3 (2016), 1 -- 17 . Faimison Porto and Adenilso Simao. 2016. Feature subset selection and instance filtering for cross-project defect prediction: Classification and ranking. CLEI Electr. J. 19, 3 (2016), 1--17.","journal-title":"CLEI Electr. J."},{"key":"e_1_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.30"},{"key":"e_1_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.17"},{"key":"e_1_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393669"},{"key":"e_1_2_2_91_1","volume-title":"Proceedings of Annual Meeting of the Florida Association of Institutional Research. 1--33","author":"Romano Jeanine","year":"2006","unstructured":"Jeanine Romano , Jeffrey D. Kromrey , Jesse Coraggio , and Jeff Skowronek . 2006 . Appropriate statistics for ordinal level data: Should we really be using t-test and Cohen\u2019s d for evaluating group differences on the NSSE and other surveys . In Proceedings of Annual Meeting of the Florida Association of Institutional Research. 1--33 . Jeanine Romano, Jeffrey D. Kromrey, Jesse Coraggio, and Jeff Skowronek. 2006. Appropriate statistics for ordinal level data: Should we really be using t-test and Cohen\u2019s d for evaluating group differences on the NSSE and other surveys. In Proceedings of Annual Meeting of the Florida Association of Institutional Research. 1--33."},{"key":"e_1_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2016.04.009"},{"key":"e_1_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9346-4"},{"key":"e_1_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-015-1575-5"},{"key":"e_1_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-015-9287-1"},{"key":"e_1_2_2_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLEI.2015.7360033"},{"key":"e_1_2_2_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.11"},{"key":"e_1_2_2_98_1","doi-asserted-by":"publisher","DOI":"10.1080\/10629360600635245"},{"key":"e_1_2_2_99_1","first-page":"800","article-title":"Cross project software fault prediction at design phase","volume":"9","author":"Singh Pradeep","year":"2015","unstructured":"Pradeep Singh and Shrish Verma . 2015 . Cross project software fault prediction at design phase . Int. J. Comput. Electr. Automat. Control Inf. Eng. 9 , 3 (2015), 800 -- 805 . Pradeep Singh and Shrish Verma. 2015. Cross project software fault prediction at design phase. Int. J. Comput. Electr. Automat. Control Inf. Eng. 9, 3 (2015), 800--805.","journal-title":"Int. J. Comput. Electr. Automat. Control Inf. Eng."},{"key":"e_1_2_2_100_1","doi-asserted-by":"publisher","DOI":"10.5120\/12903-9587"},{"key":"e_1_2_2_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2016.2630503"},{"key":"e_1_2_2_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2361131"},{"key":"e_1_2_2_103_1","volume-title":"Proceedings of the International Conference on Software Engineering Research and Practice (SERP\u201903)","author":"Thongmak Mathupayas","year":"2003","unstructured":"Mathupayas Thongmak and Pornsiri Muenchaisri . 2003 . Predicting faulty classes using design metrics with discriminant analysis . In Proceedings of the International Conference on Software Engineering Research and Practice (SERP\u201903) . 621--627. Mathupayas Thongmak and Pornsiri Muenchaisri. 2003. Predicting faulty classes using design metrics with discriminant analysis. In Proceedings of the International Conference on Software Engineering Research and Practice (SERP\u201903). 621--627."},{"key":"e_1_2_2_104_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13792-1_11"},{"key":"e_1_2_2_105_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.12.028"},{"key":"e_1_2_2_106_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9103-7"},{"key":"e_1_2_2_107_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.10.003"},{"key":"e_1_2_2_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2012.34"},{"key":"e_1_2_2_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"e_1_2_2_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370788.1370794"},{"key":"e_1_2_2_111_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-009-9111-2"},{"key":"e_1_2_2_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/2738037"},{"key":"e_1_2_2_113_1","doi-asserted-by":"publisher","DOI":"10.2307\/3001968"},{"key":"e_1_2_2_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"e_1_2_2_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025120"},{"key":"e_1_2_2_116_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2543218"},{"key":"e_1_2_2_117_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2016.31"},{"key":"e_1_2_2_118_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194016400155"},{"key":"e_1_2_2_119_1","doi-asserted-by":"publisher","DOI":"10.1080\/16843703.2012.11673302"},{"key":"e_1_2_2_120_1","doi-asserted-by":"publisher","DOI":"10.1109\/SATE.2016.22"},{"key":"e_1_2_2_121_1","doi-asserted-by":"publisher","DOI":"10.18293\/SEKE2016-120"},{"key":"e_1_2_2_122_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9516-2"},{"key":"e_1_2_2_123_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9396-2"},{"key":"e_1_2_2_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884839"},{"key":"e_1_2_2_125_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2007.20"},{"key":"e_1_2_2_126_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.58"},{"key":"e_1_2_2_127_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.11.704"},{"key":"e_1_2_2_128_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556777"},{"key":"e_1_2_2_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595713"},{"key":"e_1_2_2_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.10"},{"key":"e_1_2_2_131_1","volume-title":"Proceedings of the 2nd International Workshop on Mining Software Repositories (MSR\u201905)","author":"Zimmermann Thomas","year":"2005","unstructured":"Thomas Zimmermann and Andreas Zeller . 2005 . When do changes induce fixes? In Proceedings of the 2nd International Workshop on Mining Software Repositories (MSR\u201905) . 1--5. Thomas Zimmermann and Andreas Zeller. 2005. When do changes induce fixes? In Proceedings of the 2nd International Workshop on Mining Software Repositories (MSR\u201905). 1--5."}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3183339","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3183339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:13Z","timestamp":1750210753000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3183339"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,31]]},"references-count":130,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1,31]]}},"alternative-id":["10.1145\/3183339"],"URL":"https:\/\/doi.org\/10.1145\/3183339","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"value":"1049-331X","type":"print"},{"value":"1557-7392","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,31]]},"assertion":[{"value":"2016-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-04-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}