Cost-sensitive transfer kernel canonical correlation analysis for heterogeneous defect prediction

Z Li, XY Jing, F Wu, X Zhu, B Xu, S Ying - Automated Software Engineering, 2018 - Springer
Cross-project defect prediction (CPDP) refers to predicting defects in a target project using
prediction models trained from historical data of other source projects. And CPDP in the …

Characterizing and predicting blocking bugs in open source projects

H Valdivia Garcia, E Shihab - … of the 11th working conference on mining …, 2014 - dl.acm.org
As software becomes increasingly important, its quality becomes an increasingly important
issue. Therefore, prior work focused on software quality and proposed many prediction …

Towards building a universal defect prediction model

F Zhang, A Mockus, I Keivanloo, Y Zou - Proceedings of the 11th working …, 2014 - dl.acm.org
To predict files with defects, a suitable prediction model must be built for a software project
from either itself (within-project) or other projects (cross-project). A universal defect …

A benchmark study on the effectiveness of search-based data selection and feature selection for cross project defect prediction

S Hosseini, B Turhan, M Mäntylä - Information and Software Technology, 2018 - Elsevier
Context Previous studies have shown that steered training data or dataset selection can
lead to better performance for cross project defect prediction (CPDP). On the other hand …

The impact of automated feature selection techniques on the interpretation of defect models

J Jiarpakdee, C Tantithamthavorn, C Treude - Empirical Software …, 2020 - Springer
The interpretation of defect models heavily relies on software metrics that are used to
construct them. Prior work often uses feature selection techniques to remove metrics that are …

Cross project defect prediction via balanced distribution adaptation based transfer learning

Z Xu, S Pang, T Zhang, XP Luo, J Liu, YT Tang… - Journal of Computer …, 2019 - Springer
Defect prediction assists the rational allocation of testing resources by detecting the
potentially defective software modules before releasing products. When a project has no …

Which log level should developers choose for a new logging statement?

H Li, W Shang, AE Hassan - Empirical Software Engineering, 2017 - Springer
Logging statements are used to record valuable runtime information about applications.
Each logging statement is assigned a log level such that users can disable some verbose …

[HTML][HTML] Toward a catalog of software quality metrics for infrastructure code

S Dalla Palma, D Di Nucci, F Palomba… - Journal of Systems and …, 2020 - Elsevier
Abstract Infrastructure-as-code (IaC) is a practice to implement continuous deployment by
allowing management and provisioning of infrastructure through the definition of machine …

Comparing static bug finders and statistical prediction

F Rahman, S Khatri, ET Barr, P Devanbu - Proceedings of the 36th …, 2014 - dl.acm.org
The all-important goal of delivering better software at lower cost has led to a vital, enduring
quest for ways to find and remove defects efficiently and accurately. To this end, two parallel …

Signature verification competition for online and offline skilled forgeries (sigcomp2011)

M Liwicki, MI Malik, CE Van Den Heuvel… - 2011 International …, 2011 - ieeexplore.ieee.org
The Netherlands Forensic Institute and the Institute for Forensic Science in Shanghai are in
search of a signature verification system that can be implemented in forensic casework and …