Table of Contents Author Guidelines Submit a Manuscript
Journal of Applied Mathematics
Volume 2014 (2014), Article ID 675368, 14 pages
http://dx.doi.org/10.1155/2014/675368
Research Article

Discrimination Analysis for Predicting Defect-Prone Software Modules

1School of Computer and Information Engineering, Xiamen University of Technology, Xiamen 361024, China
2School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China

Received 19 October 2013; Revised 23 December 2013; Accepted 14 January 2014; Published 25 February 2014

Academic Editor: Osamu Mizuno

Copyright © 2014 Ying Ma et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. T. M. Khoshgoftaar, X. Yuan, and E. B. Allen, “Balancing misclassification rates in classification-tree models of software quality,” Empirical Software Engineering, vol. 5, no. 4, pp. 313–330, 2000. View at Publisher · View at Google Scholar · View at Scopus
  2. T. Menzies, J. Greenwald, and A. Frank, “Data mining static code attributes to learn defect predictors,” IEEE Transactions on Software Engineering, vol. 33, no. 1, pp. 2–13, 2007. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Fan, Y. Feng, and X. Tong, “A road to classification in high dimensional space: the regularized optimal affine discriminant,” Journal of the Royal Statistical Society B, vol. 74, no. 4, pp. 745–771, 2012. View at Publisher · View at Google Scholar · View at MathSciNet
  4. K. Fukunaga, Introduction to Statistical Pattern Recognition, Computer Science and Scientific Computing, Academic Press, Boston, Mass, USA, 2nd edition, 1990. View at MathSciNet
  5. A. Samant and H. Adeli, “Feature extraction for traffic incident detection using wavelet transform and linear discriminant analysis,” Computer-Aided Civil and Infrastructure Engineering, vol. 15, no. 4, pp. 241–250, 2000. View at Google Scholar · View at Scopus
  6. P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman, “Eigenfaces vs. fisherfaces: recognition using class specific linear projection,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp. 711–720, 1997. View at Publisher · View at Google Scholar · View at Scopus
  7. K. Torkkola, “Linear discriminant analysis in document classification,” in Proceedings of the IEEE ICDM Workshop on Text Mining, pp. 800–806, 2001.
  8. M. Sakai, N. Kitaoka, and K. Takeda, “Acoustic feature transformation based on discriminant analysis preserving local structure for speech recognition,” IEICE Transactions on Information and Systems, vol. 93, no. 5, pp. 1244–1252, 2010. View at Publisher · View at Google Scholar · View at Scopus
  9. T. V. Bandos, L. Bruzzone, and G. Camps-Valls, “Classification of hyperspectral images with regularized linear discriminant analysis,” IEEE Transactions on Geoscience and Remote Sensing, vol. 47, no. 3, pp. 862–873, 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. J. B. Li, S. C. Chu, and J. S. Pan, “Kernel discriminant analysis based face recognition,” in Kernel Learning Algorithms for Face Recognition, pp. 101–133, Springer, New York, NY, USA, 2014. View at Google Scholar
  11. C. Moulin, C. Largeron, C. Ducottet, M. Géry, and C. Barat, “Fisher linear discriminant analysis for text-image combination in multimedia information retrieval,” Pattern Recognition, vol. 47, no. 1, pp. 260–269, 2014. View at Google Scholar
  12. A. Shrivastava, H. V. Nguyen, V. M. Patel, and R. Chellappa, “Design of non-linear discriminative dictionaries for image classification,” in Computer Vision–ACCV 2012, pp. 660–674, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar
  13. W. J. Lin and J. J. Chen, “Class-imbalanced classifiers for high-dimensional data,” Briefings in Bioinformatics, vol. 14, no. 1, pp. 13–26, 2013. View at Publisher · View at Google Scholar
  14. L. C. Briand, V. R. Basili, and C. J. Hetmanski, “Developing interpretable models with optimized set reduction for identifying high-risk software components,” IEEE Transactions on Software Engineering, vol. 19, no. 11, pp. 1028–1044, 1993. View at Publisher · View at Google Scholar · View at Scopus
  15. T. M. Khoshgoftaar, E. B. Allen, W. D. Jones, and J. P. Hudepohl, “Classification tree models of software quality over multiple releases,” in Proceedings of the 10th International Symposium on Software Reliability Engineering (ISSRE'99), pp. 116–125, November 1999. View at Scopus
  16. N. Fenton, M. Neil, W. Marsh et al., “Predicting software defects in varying development lifecycles using Bayesian nets,” Information and Software Technology, vol. 49, no. 1, pp. 32–43, 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. C. Seiffert, T. M. Khoshgoftaar, and J. Van Hulse, “Improving software-quality predictions with data sampling and boosting,” IEEE Transactions on Systems, Man, and Cybernetics A, vol. 39, no. 6, pp. 1283–1294, 2009. View at Publisher · View at Google Scholar · View at Scopus
  18. Y. Ma, G. Luo, X. Zeng, and A. Chen, “Transfer learning for cross-company software defect prediction,” Information and Software Technology, vol. 54, no. 3, pp. 248–256, 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. Y. Ma, G. Luo, and H. Chen, “Kernel based asymmetric learning for software defect prediction,” IEICE Transactions on Information and Systems, vol. 95, no. 1, pp. 267–270, 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. G. Luo, Y. Ma, and Q. Ke, “Asymmetric learning based on kernel partial least squares for software defect prediction,” IEICE Transactions on Information and Systems, vol. 95, no. 7, pp. 2006–2008, 2012. View at Google Scholar
  21. G. Luo, Y. Ma, and Q. Ke, “Active learning for software defect prediction,” IEICE Transactions on Information and Systems, vol. 95, no. 6, pp. 1680–1683, 2012. View at Google Scholar
  22. T. Menzies, B. Turhan, A. Bener, G. Gay, B. Cukic, and Y. Jiang, “Implications of ceiling effects in defect predictors,” in Proceedings of the 4th International Workshop on Predictor Models in Software Engineering (PROMISE'08), pp. 47–54, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  23. N. Ohlsson, M. Zhao, and M. Helander, “Application of multivariate analysis for software fault prediction,” Software Quality Journal, vol. 7, no. 1, pp. 51–66, 1998. View at Google Scholar · View at Scopus
  24. J. C. Munson and T. M. Khoshgoftaar, “The detection of fault-prone programs,” IEEE Transactions on Software Engineering, vol. 18, no. 5, pp. 423–433, 1992. View at Publisher · View at Google Scholar · View at Scopus
  25. E. Kocaguneli, T. Menzies, and J. W. Keung, “Kernel methods for software effort estimation,” Empirical Software Engineering, vol. 18, no. 1, pp. 1–24, 2011. View at Publisher · View at Google Scholar · View at Scopus
  26. G. J. McLachlan, Discriminant Analysis and Statistical Pattern Recognition, Wiley Series in Probability and Mathematical Statistics: Applied Probability and Statistics, John Wiley & Sons, New York, NY, USA, 1992. View at Publisher · View at Google Scholar · View at MathSciNet
  27. J. Shawe-Taylor and N. Cristianini, Kernel Methods for Pattern Analysis, Cambridge University Press, New York, NY, USA, 2004.
  28. S. Mika, G. Ratsch, J. Weston, B. Scholkopf, and K.-R. Muller, “Fisher discriminant analysis with kernels,” in Proceedings of the 9th IEEE Workshop on Neural Networks for Signal Processing (NNSP'99), pp. 41–48, August 1999. View at Scopus
  29. A. T. Misirli, A. B. Bener, and B. Turhan, “An industrial case study of classifier ensembles for locating software defects,” Software Quality Journal, vol. 19, no. 3, pp. 515–536, 2011. View at Publisher · View at Google Scholar · View at Scopus
  30. I. H. Witten and E. Frank, Data Mining: Practical Machine Learning Tools and Techniques, Morgan Kaufmann, San Francisco, Calif, USA, 2nd edition, 2005.
  31. C. J. van Rijsbergen, Information Retireval, Butterworths, London, UK, 2nd edition, 1979.
  32. H. Zhang and X. Zhang, “Comments on ‘Data mining static code attributes to learn defect predictors’,” IEEE Transactions on Software Engineering, vol. 33, no. 9, pp. 635–636, 2007. View at Publisher · View at Google Scholar · View at Scopus
  33. T. Menzies and A. Marcus, “Automated severity assessment of software defect reports,” in Proceedings of the 24th IEEE International Conference on Software Maintenance (ICSM'08), pp. 346–355, Beijing, China, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  34. A. G. Koru and H. Liu, “Building effective defect-prediction models in practice,” IEEE Software, vol. 22, no. 6, pp. 23–29, 2005. View at Publisher · View at Google Scholar · View at Scopus
  35. A. Kaur and R. Malhotra, “Application of random forest in predicting fault-prone classes,” in Proceedings of the International Conference on Advanced Computer Theory and Engineering (ICACTE'08), pp. 37–43, Phuket, Thailand, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  36. N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer, “SMOTE: synthetic minority over-sampling technique,” Journal of Artificial Intelligence Research, vol. 16, pp. 321–357, 2002. View at Google Scholar · View at Scopus
  37. F. Wilcoxon, “Individual comparisons by ranking methods,” Biometrics Bulletin, vol. 1, no. 6, pp. 80–83, 1945. View at Google Scholar