{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:58:43Z","timestamp":1768424323678,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T00:00:00Z","timestamp":1566864000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,27]]},"DOI":"10.1145\/3340482.3342744","type":"proceedings-article","created":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T12:38:04Z","timestamp":1565267884000},"page":"19-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["On the role of data balancing for machine learning-based code smell detection"],"prefix":"10.1145","author":[{"given":"Fabiano","family":"Pecorelli","sequence":"first","affiliation":[{"name":"University of Salerno, Italy"}]},{"given":"Dario","family":"Di Nucci","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Brussel, Belgium"}]},{"given":"Coen","family":"De Roover","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Brussel, Belgium"}]},{"given":"Andrea","family":"De Lucia","sequence":"additional","affiliation":[{"name":"University of Salerno, Italy"}]}],"member":"320","published-online":{"date-parts":[[2019,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381819"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1041053"},{"key":"e_1_3_2_1_3_1","volume-title":"Machine learning techniques for code smell detection: A systematic literature review and meta-analysis. Information and Software Technology, page in press","author":"Azeem M. I.","year":"2019","unstructured":"M. I. Azeem , F. Palomba , L. Shi , and Q. Wang . Machine learning techniques for code smell detection: A systematic literature review and meta-analysis. Information and Software Technology, page in press ., 2019 . M. I. Azeem, F. Palomba, L. Shi, and Q. Wang. Machine learning techniques for code smell detection: A systematic literature review and meta-analysis. Information and Software Technology, page in press., 2019."},{"key":"e_1_3_2_1_4_1","volume-title":"d. A. N. Ribeiro, et al. Modern information retrieval","author":"Baeza-Yates R.","year":"2011","unstructured":"R. Baeza-Yates , B. d. A. N. Ribeiro, et al. Modern information retrieval . New York : ACM Press ; Harlow, England : Addison-Wesley\u201e 2011 . R. Baeza-Yates, B. d. A. N. Ribeiro, et al. Modern information retrieval. New York: ACM Press; Harlow, England: Addison-Wesley\u201e 2011."},{"key":"e_1_3_2_1_5_1","volume-title":"Random search for hyper-parameter optimization. Journal of Machine Learning Research, 13(Feb):281\u2013305","author":"Bergstra J.","year":"2012","unstructured":"J. Bergstra and Y. Bengio . Random search for hyper-parameter optimization. Journal of Machine Learning Research, 13(Feb):281\u2013305 , 2012 . J. Bergstra and Y. Bengio. Random search for hyper-parameter optimization. Journal of Machine Learning Research, 13(Feb):281\u2013305, 2012."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/QUATIC.2010.16"},{"key":"e_1_3_2_1_7_1","volume-title":"Smote: synthetic minority over-sampling technique. Journal of artificial intelligence research, 16:321\u2013357","author":"Chawla N. V.","year":"2002","unstructured":"N. V. Chawla , K. W. Bowyer , L. O. Hall , and W. P. Kegelmeyer . Smote: synthetic minority over-sampling technique. Journal of artificial intelligence research, 16:321\u2013357 , 2002 . N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer. Smote: synthetic minority over-sampling technique. Journal of artificial intelligence research, 16:321\u2013357, 2002."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/157710.157715"},{"key":"e_1_3_2_1_9_1","article-title":"de Paulo Sobrinho, A. De Lucia, and M. de Almeida Maia. A systematic literature review on bad smells\u20145 w\u2019s: which, when, what, who, where","author":"E.","year":"2018","unstructured":"E. V . de Paulo Sobrinho, A. De Lucia, and M. de Almeida Maia. A systematic literature review on bad smells\u20145 w\u2019s: which, when, what, who, where . IEEE Transactions on Software Engineering , 2018 . E. V. de Paulo Sobrinho, A. De Lucia, and M. de Almeida Maia. A systematic literature review on bad smells\u20145 w\u2019s: which, when, what, who, where. IEEE Transactions on Software Engineering, 2018.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330266"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2915970.2915984"},{"issue":"2","key":"e_1_3_2_1_12_1","first-page":"5","article-title":"Automatic detection of bad smells in code: An experimental assessment","volume":"11","author":"Fontana F. A.","year":"2012","unstructured":"F. A. Fontana , P. Braione , and M. Zanoni . Automatic detection of bad smells in code: An experimental assessment . Journal of Object Technology , 11 ( 2 ): 5 \u2013 1 , 2012 . F. A. Fontana, P. Braione, and M. Zanoni. Automatic detection of bad smells in code: An experimental assessment. Journal of Object Technology, 11(2):5\u20131, 2012.","journal-title":"Journal of Object Technology"},{"key":"e_1_3_2_1_13_1","first-page":"613","volume-title":"2016 IEEE 23rd International Conference on","volume":"1","author":"Fontana F. A.","unstructured":"F. A. Fontana , J. Dietrich , B. Walter , A. Yamashita , and M. Zanoni . Antipattern and code smell false positives: Preliminary conceptualization and classification. In Software Analysis, Evolution, and Reengineering (SANER) , 2016 IEEE 23rd International Conference on , volume 1 , pages 609\u2013 613 . IEEE, 2016. F. A. Fontana, J. Dietrich, B. Walter, A. Yamashita, and M. Zanoni. Antipattern and code smell false positives: Preliminary conceptualization and classification. In Software Analysis, Evolution, and Reengineering (SANER), 2016 IEEE 23rd International Conference on, volume 1, pages 609\u2013613. IEEE, 2016."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9378-4"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.04.014"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.56"},{"key":"e_1_3_2_1_17_1","volume-title":"Refactoring: improving the design of existing code","author":"Fowler M.","year":"2018","unstructured":"M. Fowler . Refactoring: improving the design of existing code . Addison-Wesley Professional , 2018 . M. Fowler. Refactoring: improving the design of existing code. Addison-Wesley Professional, 2018."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_19_1","volume-title":"Correlation-based feature selection for machine learning. Technical report","author":"Hall M. A.","year":"1998","unstructured":"M. A. Hall . Correlation-based feature selection for machine learning. Technical report , 1998 . M. A. Hall. Correlation-based feature selection for machine learning. Technical report, 1998."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/QUATIC.2010.61"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87479-9_51"},{"key":"e_1_3_2_1_22_1","unstructured":"Springer.  Springer."},{"key":"e_1_3_2_1_23_1","first-page":"345","volume-title":"Proceedings of the Eleventh conference on Uncertainty in artificial intelligence","author":"John G. H.","unstructured":"G. H. John and P. Langley . Estimating continuous distributions in bayesian classifiers . In Proceedings of the Eleventh conference on Uncertainty in artificial intelligence , pages 338\u2013 345 . Morgan Kaufmann Publishers Inc., 1995. G. H. John and P. Langley. Estimating continuous distributions in bayesian classifiers. In Proceedings of the Eleventh conference on Uncertainty in artificial intelligence, pages 338\u2013345. Morgan Kaufmann Publishers Inc., 1995."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9171-y"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.11.921"},{"issue":"1","key":"e_1_3_2_1_26_1","first-page":"25","article-title":"Handling imbalanced datasets: A review","volume":"30","author":"Kotsiantis S.","year":"2006","unstructured":"S. Kotsiantis , D. Kanellopoulos , P. Pintelas , Handling imbalanced datasets: A review . GESTS International Transactions on Computer Science and Engineering , 30 ( 1 ): 25 \u2013 36 , 2006 . S. Kotsiantis, D. Kanellopoulos, P. Pintelas, et al. Handling imbalanced datasets: A review. GESTS International Transactions on Computer Science and Engineering, 30(1):25\u201336, 2006.","journal-title":"GESTS International Transactions on Computer Science and Engineering"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.02.059"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.56"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-006-9002-8"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.50"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5314231"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2010.47"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9535-z"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.02.004"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9535-z"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.32"},{"key":"e_1_3_2_1_38_1","first-page":"238","volume-title":"Advances in Computers","author":"Palomba F.","unstructured":"F. Palomba , A. De Lucia , G. Bavota , and R. Oliveto . Anti-pattern detection: Methods, challenges, and open issues . In Advances in Computers , volume 95 , pages 201\u2013 238 . Elsevier, 2014. F. Palomba, A. De Lucia, G. Bavota, and R. Oliveto. Anti-pattern detection: Methods, challenges, and open issues. In Advances in Computers, volume 95, pages 201\u2013238. Elsevier, 2014."},{"key":"e_1_3_2_1_39_1","first-page":"12","volume-title":"Software Maintenance and Evolution (ICSME), 2017 IEEE International Conference on","author":"Palomba F.","unstructured":"F. Palomba and A. Zaidman . Does refactoring of test smells induce fixing flaky tests ? In Software Maintenance and Evolution (ICSME), 2017 IEEE International Conference on , pages 1\u2013 12 . IEEE, 2017. F. Palomba and A. Zaidman. Does refactoring of test smells induce fixing flaky tests? In Software Maintenance and Evolution (ICSME), 2017 IEEE International Conference on, pages 1\u201312. IEEE, 2017."},{"key":"e_1_3_2_1_40_1","volume-title":"The smell of fear: On the relation between test smells and flaky tests. Empirical Software Engineering Journal, page in press","author":"Palomba F.","year":"2019","unstructured":"F. Palomba and A. Zaidman . The smell of fear: On the relation between test smells and flaky tests. Empirical Software Engineering Journal, page in press ., 2019 . F. Palomba and A. Zaidman. The smell of fear: On the relation between test smells and flaky tests. Empirical Software Engineering Journal, page in press., 2019."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340482.3342744"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00023"},{"key":"e_1_3_2_1_43_1","volume-title":"Evaluation: from precision, recall and f-measure to roc, informedness, markedness and correlation","author":"Powers D. M.","year":"2011","unstructured":"D. M. Powers . Evaluation: from precision, recall and f-measure to roc, informedness, markedness and correlation . 2011 . D. M. Powers. Evaluation: from precision, recall and f-measure to roc, informedness, markedness and correlation. 2011."},{"key":"e_1_3_2_1_44_1","series-title":"Series B (Methodological)","first-page":"147","volume-title":"Journal of the royal statistical society","author":"Stone M.","year":"1974","unstructured":"M. Stone . Cross-validatory choice and assessment of statistical predictions. Journal of the royal statistical society . Series B (Methodological) , pages 111\u2013 147 , 1974 . M. Stone. Cross-validatory choice and assessment of statistical predictions. Journal of the royal statistical society. Series B (Methodological), pages 111\u2013147, 1974."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.08.008"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970340"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818805"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.23"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405287"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.521"}],"event":{"name":"ESEC\/FSE '19: 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Tallinn Estonia","acronym":"ESEC\/FSE '19","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 3rd ACM SIGSOFT International Workshop on Machine Learning Techniques for Software Quality Evaluation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340482.3342744","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3340482.3342744","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:49Z","timestamp":1750206349000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340482.3342744"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,27]]},"references-count":50,"alternative-id":["10.1145\/3340482.3342744","10.1145\/3340482"],"URL":"https:\/\/doi.org\/10.1145\/3340482.3342744","relation":{},"subject":[],"published":{"date-parts":[[2019,8,27]]},"assertion":[{"value":"2019-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}