{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T00:06:25Z","timestamp":1777421185561,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"UKRI Future Leaders Fellowship","award":["MR\/S017062\/1"],"award-info":[{"award-number":["MR\/S017062\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416617","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:39:02Z","timestamp":1611790742000},"page":"573-584","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["BiLO-CPDP"],"prefix":"10.1145","author":[{"given":"Ke","family":"Li","sequence":"first","affiliation":[{"name":"University of Exeter, Exeter, UK"}]},{"given":"Zilin","family":"Xiang","sequence":"additional","affiliation":[{"name":"UESTC, Chengdu, China"}]},{"given":"Tao","family":"Chen","sequence":"additional","affiliation":[{"name":"Loughborough University, Loughborough, UK"}]},{"given":"Kay Chen","family":"Tan","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Tat Chee Avenue, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"A. Agrawal W. Fu D. Chen X. Shen and T. Menzies. 2019. How to \"DODGE\" Complex Software Analytics. IEEE Transactions on Software Engineering (2019) 1--1."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180197"},{"key":"e_1_3_2_1_3_1","volume-title":"ICSE'11: Proc. of the 33rd International Conference on Software Engineering. ACM, 1--10","author":"Arcuri Andrea","unstructured":"Andrea Arcuri and Lionel C. Briand. 2011. A practical guide for using statistical tests to assess randomized algorithms in software engineering. In ICSE'11: Proc. of the 33rd International Conference on Software Engineering. ACM, 1--10."},{"key":"e_1_3_2_1_4_1","volume-title":"Algorithms for Hyper-Parameter Optimization. In NIPS'11: Proc. of the 25th Annual Conference on Neural Information Processing Systems. 2546--2554","author":"Bergstra James","year":"2011","unstructured":"James Bergstra, R\u00e9mi Bardenet, Yoshua Bengio, and Bal\u00e1zs K\u00e9gl. 2011. Algorithms for Hyper-Parameter Optimization. In NIPS'11: Proc. of the 25th Annual Conference on Neural Information Processing Systems. 2546--2554."},{"key":"e_1_3_2_1_5_1","volume-title":"ICML'13: Proc. of the 30th International Conference on Machine Learning","volume":"28","author":"Bergstra James","unstructured":"James Bergstra, Daniel Yamins, and David D. Cox. 2013. Making a Science of Model Search: Hyperparameter Optimization in Hundreds of Dimensions for Vision Architectures. In ICML'13: Proc. of the 30th International Conference on Machine Learning, Vol. 28. 115--123."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463279"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Matthias Feurer and Frank Hutter. 2019. Hyperparameter Optimization. In Automated Machine Learning - Methods Systems Challenges. 3--33.","DOI":"10.1007\/978-3-030-05318-5_1"},{"key":"e_1_3_2_1_8_1","volume-title":"Efficient and Robust Automated Machine Learning. In NIPS'15: Proc. of the 2015 Annual Conference on Neural Information Processing Systems. 2962--2970","author":"Feurer Matthias","year":"2015","unstructured":"Matthias Feurer, Aaron Klein, Katharina Eggensperger, Jost Tobias Springenberg, Manuel Blum, and Frank Hutter. 2015. Efficient and Robust Automated Machine Learning. In NIPS'15: Proc. of the 2015 Annual Conference on Neural Information Processing Systems. 2962--2970."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.04.017"},{"key":"e_1_3_2_1_10_1","volume-title":"Tabu Search","author":"Glover Fred","year":"2093","unstructured":"Fred Glover and Manuel Laguna. 1998. Tabu Search. Vol. 1--3. Springer US, 2093--2229."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2013.20"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499393.2499395"},{"key":"e_1_3_2_1_13_1","volume-title":"A systematic mapping study on cross-project defect prediction. CoRR abs\/1705.06429","author":"Herbold Steffen","year":"2017","unstructured":"Steffen Herbold. 2017. A systematic mapping study on cross-project defect prediction. CoRR abs\/1705.06429 (2017)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2724538"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2770124"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.06.004"},{"key":"e_1_3_2_1_17_1","volume-title":"LION5: Proc. of the 5th International Conference Learning and Intelligent Optimization (Lecture Notes in Computer Science)","author":"Hutter Frank","unstructured":"Frank Hutter, Holger H. Hoos, and Kevin Leyton-Brown. 2011. Sequential Model-Based Optimization for General Algorithm Configuration. In LION5: Proc. of the 5th International Conference Learning and Intelligent Optimization (Lecture Notes in Computer Science), Vol. 6683. Springer, 507--523."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Yue Jiang Bojan Cukic and Tim Menzies. 2008. Can data transformation help in the detection of fault-prone modules?. In DEFECTS. ACM 16--20.","DOI":"10.1145\/1390817.1390822"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868342"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1082983.1083172","article-title":"An investigation of the effect of module size on defect prediction using static measures","volume":"30","author":"Koru Akif G\u00fcnes","year":"2005","unstructured":"Akif G\u00fcnes Koru and Hongfang Liu. 2005. An investigation of the effect of module size on defect prediction using static measures. ACM SIGSOFT Software Engineering Notes 30,4 (2005), 1--5.","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"e_1_3_2_1_21_1","volume-title":"ICSE'20: Proc. of the 42th International Conference on Software Engineering. accepted for publication.","author":"Li Ke","unstructured":"Ke Li, Zilin Xiang, Tao Chen, Shuo Wang, and Kay Chen Tan. 2020. Understanding the Automated Parameter Optimization on Transfer Learning for CPDP: An Empirical Study. In ICSE'20: Proc. of the 42th International Conference on Software Engineering. accepted for publication."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2017.0148"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.04.001"},{"key":"e_1_3_2_1_24_1","volume-title":"IJCAI'03: Proc. of the 8th International Joint Conference on Artificial Intelligence. 519--526","author":"Ling Charles X.","year":"2003","unstructured":"Charles X. Ling, Jin Huang, and Harry Zhang. 2003. AUC: a Statistically Consistent and more Discriminating Measure than Accuracy. In IJCAI'03: Proc. of the 8th International Joint Conference on Artificial Intelligence. 519--526."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868336"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1540438.1540448"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.45"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134349"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606584"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-017-1785-0"},{"key":"e_1_3_2_1_31_1","first-page":"85","article-title":"The impact of parameter optimization of ensemble learning on defect prediction","volume":"27","author":"\u00d6zt\u00fcrk Muhammed Maruf","year":"2019","unstructured":"Muhammed Maruf \u00d6zt\u00fcrk. 2019. The impact of parameter optimization of ensemble learning on defect prediction. The Computer Science Journal of Moldova 27, 1 (2019), 85--128.","journal-title":"The Computer Science Journal of Moldova"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.6"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2017.0111"},{"key":"e_1_3_2_1_34_1","first-page":"1291","article-title":"Impact of Hyper Parameter Optimization for Cross-Project Software Defect Prediction","volume":"14","author":"Qu Yubin","year":"2018","unstructured":"Yubin Qu, Xiang Chen, Yingquan Zhao, and Xiaolin Ju. 2018. Impact of Hyper Parameter Optimization for Cross-Project Software Defect Prediction. International Journal of Performability Engineering 14, 6 (2018), 1291--1299.","journal-title":"International Journal of Performability Engineering"},{"key":"e_1_3_2_1_35_1","article-title":"Impact of Hyper Parameter Optimization for Cross-Project Software Defect Prediction","volume":"14","author":"Qu Yubin","year":"2018","unstructured":"Yubin Qu, Xiang Chen, Yingquan Zhao, and Xiaolin Ju. 2018. Impact of Hyper Parameter Optimization for Cross-Project Software Defect Prediction. International Journal of Performability Engineering 14, 6 (2018).","journal-title":"International Journal of Performability Engineering"},{"key":"e_1_3_2_1_36_1","volume-title":"FSE'12: Proc. of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering. ACM, 61","author":"Rahman Foyzur","unstructured":"Foyzur Rahman, Daryl Posnett, and Premkumar T. Devanbu. 2012. Recalling the \"imprecision\" of cross-project defect prediction. In FSE'12: Proc. of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering. ACM, 61."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9346-4"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-015-1575-5"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675067"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1735"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.11"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2017.2712906"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884857"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2794977"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9103-7"},{"key":"e_1_3_2_1_46_1","volume-title":"Delaney","author":"Vargha Andr\u00e1s","year":"2000","unstructured":"Andr\u00e1s Vargha and Harold D. Delaney. 2000. A Critique and Improvement of the CL Common Language Effect Size Statistics of McGraw and Wong."},{"key":"e_1_3_2_1_47_1","volume-title":"Market structure and equilibrium","author":"Stackelberg Heinrich Von","unstructured":"Heinrich Von Stackelberg. 2010. Market structure and equilibrium. Springer Science & Business Media."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Frank Wilcoxon. 1945. Individual Comparisons by Ranking Methods.","DOI":"10.2307\/3001968"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025120"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597078"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183339"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595713"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416617","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:38Z","timestamp":1750197698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416617"}},"subtitle":["bi-level programming for automated model discovery in cross-project defect prediction"],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":52,"alternative-id":["10.1145\/3324884.3416617","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416617","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}