{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:33:56Z","timestamp":1757453636396,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T00:00:00Z","timestamp":1691107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Key Research and Development Program of Hubei Province","award":["Grant No. 2022BAA050, 2020AAA001"],"award-info":[{"award-number":["Grant No. 2022BAA050, 2020AAA001"]}]},{"DOI":"10.13039\/501100005230","name":"Natural Science Foundation of Chongqing","doi-asserted-by":"publisher","award":["Grant No. cstc2021jcyj-msxmX1146, cstc2021jcyj-msxmX1115"],"award-info":[{"award-number":["Grant No. cstc2021jcyj-msxmX1146, cstc2021jcyj-msxmX1115"]}],"id":[{"id":"10.13039\/501100005230","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program","award":["Grant No. 2022YFB3104001"],"award-info":[{"award-number":["Grant No. 2022YFB3104001"]}]},{"name":"Key Research and Development Program of Hainan Province","award":["Grant No. ZDYF2021GXJS014"],"award-info":[{"award-number":["Grant No. ZDYF2021GXJS014"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["Grant No. 61806151, 62202350"],"award-info":[{"award-number":["Grant No. 61806151, 62202350"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,4]]},"DOI":"10.1145\/3609437.3609458","type":"proceedings-article","created":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T22:11:25Z","timestamp":1696543885000},"page":"67-78","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["The Impact of the bug number on Effort-Aware Defect Prediction: An Empirical Study"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6213-9026","authenticated-orcid":false,"given":"Peixin","family":"Yang","sequence":"first","affiliation":[{"name":"Wuhan University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5912-1130","authenticated-orcid":false,"given":"Lin","family":"Zhu","sequence":"additional","affiliation":[{"name":"Wuhan Qingchuan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1425-2881","authenticated-orcid":false,"given":"Wenhua","family":"Hu","sequence":"additional","affiliation":[{"name":"Wuhan University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3803-9600","authenticated-orcid":false,"given":"Jacky Wai","family":"Keung","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8710-4221","authenticated-orcid":false,"given":"Liping","family":"Lu","sequence":"additional","affiliation":[{"name":"Wuhan University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8440-4181","authenticated-orcid":false,"given":"Jianwen","family":"Xiang","sequence":"additional","affiliation":[{"name":"Wuhan University of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Bonferroni and \u0160id\u00e1k corrections for multiple comparisons. Encyclopedia of measurement and statistics 3","author":"Abdi Herv\u00e9","year":"2007","unstructured":"Herv\u00e9 Abdi . 2007. Bonferroni and \u0160id\u00e1k corrections for multiple comparisons. Encyclopedia of measurement and statistics 3 ( 2007 ), 103\u2013107. Herv\u00e9 Abdi. 2007. Bonferroni and \u0160id\u00e1k corrections for multiple comparisons. Encyclopedia of measurement and statistics 3 (2007), 103\u2013107."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1005"},{"volume-title":"Vol.\u00a01","author":"Bennin Kwabena\u00a0Ebo","key":"e_1_3_2_1_3_1","unstructured":"Kwabena\u00a0Ebo Bennin , Jacky Keung , Akito Monden , Yasutaka Kamei , and Naoyasu Ubayashi . 2016. Investigating the effects of balanced training and testing datasets on effort-aware fault prediction models. In 2016 IEEE 40th annual Computer software and applications conference (COMPSAC) , Vol.\u00a01 . IEEE , 154\u2013163. Kwabena\u00a0Ebo Bennin, Jacky Keung, Akito Monden, Yasutaka Kamei, and Naoyasu Ubayashi. 2016. Investigating the effects of balanced training and testing datasets on effort-aware fault prediction models. In 2016 IEEE 40th annual Computer software and applications conference (COMPSAC), Vol.\u00a01. IEEE, 154\u2013163."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2016.33"},{"key":"e_1_3_2_1_5_1","unstructured":"G Boetticher. 2007. The PROMISE repository of empirical software engineering data. http:\/\/promisedata. org\/repository (2007).  G Boetticher. 2007. The PROMISE repository of empirical software engineering data. http:\/\/promisedata. org\/repository (2007)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2019.00023"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3001739"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.08.004"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-021-1013-5"},{"volume-title":"An extensive comparison of bug prediction approaches. In 2010 7th IEEE working conference on mining software repositories","author":"D\u2019Ambros Marco","key":"e_1_3_2_1_10_1","unstructured":"Marco D\u2019Ambros , Michele Lanza , and Romain Robbes . 2010. An extensive comparison of bug prediction approaches. In 2010 7th IEEE working conference on mining software repositories . IEEE , 31\u201341. Marco D\u2019Ambros, Michele Lanza, and Romain Robbes. 2010. An extensive comparison of bug prediction approaches. In 2010 7th IEEE working conference on mining software repositories. IEEE, 31\u201341."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3390\/axioms11050205"},{"key":"e_1_3_2_1_12_1","first-page":"1","author":"Yuanrui FAN","year":"2019","unstructured":"Yuanrui FAN , Xin XIA, Daniel\u00a0 A COSTA, David LO, Ahmed\u00a0E HASSAN, and Shanping LI. [n. d.]. The impact of changes mislabeled by SZZ on just-in-time defect prediction. ( 2019 ). IEEE Transactions on Software Engineering ([n. d.]) , 1 \u2013 26 . Yuanrui FAN, Xin XIA, Daniel\u00a0A COSTA, David LO, Ahmed\u00a0E HASSAN, and Shanping LI. [n. d.]. The impact of changes mislabeled by SZZ on just-in-time defect prediction.(2019). IEEE Transactions on Software Engineering ([n. d.]), 1\u201326.","journal-title":"IEEE Transactions on Software Engineering ([n. d.])"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.879815"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106257"},{"key":"e_1_3_2_1_15_1","volume-title":"A Comprehensive Investigation of the Impact of Class Overlap on Software Defect Prediction","author":"Gong Lina","year":"2022","unstructured":"Lina Gong , Haoxiang Zhang , Jingxuan Zhang , Mingqiang Wei , and Zhiqiu Huang . 2022. A Comprehensive Investigation of the Impact of Class Overlap on Software Defect Prediction . IEEE Transactions on Software Engineering ( 2022 ). Lina Gong, Haoxiang Zhang, Jingxuan Zhang, Mingqiang Wei, and Zhiqiu Huang. 2022. A Comprehensive Investigation of the Impact of Class Overlap on Software Defect Prediction. IEEE Transactions on Software Engineering (2022)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3194992"},{"key":"e_1_3_2_1_17_1","volume-title":"Revisiting supervised and unsupervised models for effort-aware just-in-time defect prediction. Empirical Software Engineering","author":"Huang Qiao","year":"2018","unstructured":"Qiao Huang , Xin Xia , and David Lo. 2018. Revisiting supervised and unsupervised models for effort-aware just-in-time defect prediction. Empirical Software Engineering ( 2018 ), 1\u201340. Qiao Huang, Xin Xia, and David Lo. 2018. Revisiting supervised and unsupervised models for effort-aware just-in-time defect prediction. Empirical Software Engineering (2018), 1\u201340."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9661-2"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9079-3"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609530"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.70"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931051"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1049\/sfw2.12099"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1049\/sfw2.12133"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2017.8"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.09.001"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1540438.1540448"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2010.18"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2018.8400263"},{"key":"e_1_3_2_1_30_1","volume-title":"Artificial Intelligence, Networking and Parallel\/Distributed Computing","author":"Muthukumaran K","year":"2016","unstructured":"K Muthukumaran , NL Bhanu\u00a0Murthy , G Karthik\u00a0Reddy , and Prateek Talishetti . 2016. Testing and Code Review Based Effort-Aware Bug Prediction Model. Software Engineering , Artificial Intelligence, Networking and Parallel\/Distributed Computing ( 2016 ), 17\u201330. K Muthukumaran, NL Bhanu\u00a0Murthy, G Karthik\u00a0Reddy, and Prateek Talishetti. 2016. Testing and Code Review Based Effort-Aware Bug Prediction Model. Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (2016), 17\u201330."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ATC.2014.7043405"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.49"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the Genetic and Evolutionary Computation Conference","author":"Panichella Annibale","year":"2016","unstructured":"Annibale Panichella , Carol\u00a0 V Alexandru , Sebastiano Panichella , Alberto Bacchelli , and Harald\u00a0 C Gall . 2016 . A search-based training algorithm for cost-aware defect prediction . In Proceedings of the Genetic and Evolutionary Computation Conference 2016. 1077\u20131084. Annibale Panichella, Carol\u00a0V Alexandru, Sebastiano Panichella, Alberto Bacchelli, and Harald\u00a0C Gall. 2016. A search-based training algorithm for cost-aware defect prediction. In Proceedings of the Genetic and Evolutionary Computation Conference 2016. 1077\u20131084."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0211359"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2892959"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.11"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9103-7"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-09984-2"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2018.00048"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Frank Wilcoxon. [n. d.]. Individual Comparisons by Ranking Methods. Biometrics Bulletin 1 6 ([n. d.]) 80\u201383.  Frank Wilcoxon. [n. d.]. Individual Comparisons by Ranking Methods. Biometrics Bulletin 1 6 ([n. d.]) 80\u201383.","DOI":"10.2307\/3001968"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025120"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3066170"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2017.48"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2978819"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417048"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2014.2370891"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2847353"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194021500108"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970353"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950353"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2370048"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194016400155"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8668033"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107165"},{"key":"e_1_3_2_1_55_1","volume-title":"Predicting the precise number of software defects: Are we there yet?Information and Software Technology 146","author":"Yu Xiao","year":"2022","unstructured":"Xiao Yu , Jacky Keung , Yan Xiao , Shuo Feng , Fuyang Li , and Heng Dai . 2022. Predicting the precise number of software defects: Are we there yet?Information and Software Technology 146 ( 2022 ), 106847. Xiao Yu, Jacky Keung, Yan Xiao, Shuo Feng, Fuyang Li, and Heng Dai. 2022. Predicting the precise number of software defects: Are we there yet?Information and Software Technology 146 (2022), 106847."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2931559"},{"key":"e_1_3_2_1_57_1","volume-title":"Improving effort-aware defect prediction by directly learning to rank software modules. Information and Software Technology","author":"Yu Xiao","year":"2023","unstructured":"Xiao Yu , Jiqing Rao , Wenhua Hu , Jacky Keung , Junwei Zhou , and Jianwen Xiang . 2023. Improving effort-aware defect prediction by directly learning to rank software modules. Information and Software Technology ( 2023 ), 107250. Xiao Yu, Jiqing Rao, Wenhua Hu, Jacky Keung, Junwei Zhou, and Jianwen Xiang. 2023. Improving effort-aware defect prediction by directly learning to rank software modules. Information and Software Technology (2023), 107250."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3093-1"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.02.034"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16145-3_23"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1049\/sfw2.12040"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.10"}],"event":{"name":"Internetware 2023: 14th Asia-Pacific Symposium on Internetware","acronym":"Internetware 2023","location":"Hangzhou China"},"container-title":["Proceedings of the 14th Asia-Pacific Symposium on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3609437.3609458","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3609437.3609458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:24Z","timestamp":1750178784000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3609437.3609458"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,4]]},"references-count":62,"alternative-id":["10.1145\/3609437.3609458","10.1145\/3609437"],"URL":"https:\/\/doi.org\/10.1145\/3609437.3609458","relation":{},"subject":[],"published":{"date-parts":[[2023,8,4]]},"assertion":[{"value":"2023-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}