{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:56:26Z","timestamp":1773932186550,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T00:00:00Z","timestamp":1563494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,19]]},"DOI":"10.1145\/3352411.3352412","type":"proceedings-article","created":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T12:18:43Z","timestamp":1567081123000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["Software Defect Prediction Based on Ensemble Learning"],"prefix":"10.1145","author":[{"given":"Ran","family":"Li","sequence":"first","affiliation":[{"name":"Information Engineering College, Capital Normal University, Beijing, China"}]},{"given":"Lijuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Information Engineering College, Capital Normal University, Beijing, China"}]},{"given":"Shudong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Information Engineering College, Capital Normal University, Beijing, China"}]},{"given":"Hui","family":"Liu","sequence":"additional","affiliation":[{"name":"Information Engineering College, Capital Normal University, Beijing, China"}]},{"given":"Xiangyang","family":"Huang","sequence":"additional","affiliation":[{"name":"Information Engineering College, Capital Normal University, Beijing, China"}]},{"given":"Zhong","family":"Sun","sequence":"additional","affiliation":[{"name":"Information Engineering College, Capital Normal University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2019,7,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2008.01565"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.12.056"},{"issue":"7","key":"e_1_3_2_1_3_1","first-page":"186","article-title":"Software Defect Predicition Model Based on Adaboost Algorithm {J}.","volume":"43","author":"Xiong Jing","year":"2016","unstructured":"Xiong Jing , Gao Yan, Wang Ya-Yu . Software Defect Predicition Model Based on Adaboost Algorithm {J}. Computer Science , 2016 , 43 ( 7 ): 186 -- 190 . Xiong Jing, Gao Yan, Wang Ya-Yu. Software Defect Predicition Model Based on Adaboost Algorithm {J}.Computer Science, 2016, 43(7):186--190.","journal-title":"Computer Science"},{"issue":"20","key":"e_1_3_2_1_4_1","first-page":"1951","article-title":"Neural Network Parameter Optimization Based on Genetic Algorithm for Software Defect Prediction{J}","volume":"20","author":"Wahono R S","year":"2014","unstructured":"Wahono R S , Herman N S , Ahmad S . Neural Network Parameter Optimization Based on Genetic Algorithm for Software Defect Prediction{J} . Journal of Computational & Theoretical Nanoscience , 2014 , volume 20 ( 20 ): 1951 -- 1955 (5). Wahono R S, Herman N S, Ahmad S. Neural Network Parameter Optimization Based on Genetic Algorithm for Software Defect Prediction{J}. Journal of Computational & Theoretical Nanoscience, 2014, volume 20(20):1951--1955(5).","journal-title":"Journal of Computational & Theoretical Nanoscience"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-016-9353-3"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414066"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9326-7"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018054314350"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.709601"},{"issue":"4","key":"e_1_3_2_1_11_1","first-page":"810","article-title":"A Self-Adaption Ensemble Algorithm Based on Random Subspace and AdaBoost {J}","volume":"41","author":"Yao Xu","year":"2013","unstructured":"Yao Xu , Wang Xiao-Dan, Zhang Yu-Xi . A Self-Adaption Ensemble Algorithm Based on Random Subspace and AdaBoost {J} . Acta Electronica Sinica , 2013 , 41 ( 4 ): 810 -- 814 . Yao Xu, Wang Xiao-Dan, Zhang Yu-Xi. A Self-Adaption Ensemble Algorithm Based on Random Subspace and AdaBoost {J}. Acta Electronica Sinica, 2013, 41(4):810--814.","journal-title":"Acta Electronica Sinica"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_13_1","volume-title":"Combining Pattern Classifiers: Methods and Algorithms","author":"Ludmila I.","year":"2004","unstructured":"Ludmila I. Kuncheva ( 2004 ). Combining Pattern Classifiers: Methods and Algorithms . John Wiley and Sons, Inc. . Ludmila I. Kuncheva (2004). Combining Pattern Classifiers: Methods and Algorithms. John Wiley and Sons, Inc.."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.667881"},{"key":"e_1_3_2_1_15_1","unstructured":"Zhou Zhi-Hua. Machine Learning{M}.Beijing: Tsinghua University Press.2016.  Zhou Zhi-Hua. Machine Learning{M}.Beijing: Tsinghua University Press.2016."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2006.246"}],"event":{"name":"DSIT 2019: 2019 2nd International Conference on Data Science and Information Technology","location":"Seoul Republic of Korea","acronym":"DSIT 2019","sponsor":["The Hong Kong Polytechnic The Hong Kong Polytechnic University","Natl University of Singapore National University of Singapore"]},"container-title":["Proceedings of the 2019 2nd International Conference on Data Science and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3352411.3352412","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3352411.3352412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:15Z","timestamp":1750206375000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3352411.3352412"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,19]]},"references-count":16,"alternative-id":["10.1145\/3352411.3352412","10.1145\/3352411"],"URL":"https:\/\/doi.org\/10.1145\/3352411.3352412","relation":{},"subject":[],"published":{"date-parts":[[2019,7,19]]},"assertion":[{"value":"2019-07-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}