\begin{thebibliography}{} \bibitem[\protect\citeauthoryear{Arisholm and Briand}{Arisholm and Briand}{2006}]{arisholm06} {\sc Arisholm, E.} {\sc and} {\sc Briand, L.} 2006. \newblock Predicting fault-prone components in a java legacy system. \newblock In {\em 5th ACM-IEEE International Symposium on Empirical Software Engineering (ISESE), Rio de Janeiro, Brazil, September 21-22}. \newblock Available from \url{http://simula.no/research/engineering/publications/Arisholm.2006.4}. \bibitem[\protect\citeauthoryear{Blake and Merz}{Blake and Merz}{1998}]{Blake+Merz:1998} {\sc Blake, C.} {\sc and} {\sc Merz, C.} 1998. \newblock {UCI} repository of machine learning databases. \newblock URL: \url{http://www.ics.uci.edu/~mlearn/MLRepository.html}. \bibitem[\protect\citeauthoryear{Bradley, Fayyad, and Reina}{Bradley et~al\mbox{.}}{1998}]{bradley98scaling} {\sc Bradley, P.~S.}, {\sc Fayyad, U.~M.}, {\sc and} {\sc Reina, C.} 1998. \newblock Scaling clustering algorithms to large databases. \newblock In {\em Knowledge Discovery and Data Mining}. 9--15. \newblock Available from \url{http://citeseer.ist.psu.edu/bradley98scaling.html}. \bibitem[\protect\citeauthoryear{Breiman, Friedman, Olshen, and Stone}{Breiman et~al\mbox{.}}{1984}]{breiman84} {\sc Breiman, L.}, {\sc Friedman, J.~H.}, {\sc Olshen, R.~A.}, {\sc and} {\sc Stone, C.~J.} 1984. \newblock Classification and regression trees. \newblock Tech. rep., Wadsworth International, Monterey, CA. \bibitem[\protect\citeauthoryear{Breimann}{Breimann}{2001}]{briemann01} {\sc Breimann, L.} 2001. \newblock Random forests. \newblock {\em Machine Learning\/}, 5--32. \bibitem[\protect\citeauthoryear{Brieman}{Brieman}{1996}]{brieman96} {\sc Brieman, L.} 1996. \newblock Bagging predictors. \newblock {\em Machine Learning\/}~{\em 24,\/}~2, 123--140. \bibitem[\protect\citeauthoryear{Chapman and Solomon}{Chapman and Solomon}{2002}]{chapman02} {\sc Chapman, M.} {\sc and} {\sc Solomon, D.} 2002. \newblock The relationship of cyclomatic complexity, essential complexity and error rates. \newblock Proceedings of the NASA Software Assurance Symposium, Coolfont Resort and Conference Center in Berkley Springs, West Virginia. Available from \url{http://www.ivv.nasa.gov/business/research/osmasas/conclusion2002/Mike_C% hapman_The_Relationship_of_Cyclomatic_Complexity_Essential_Complexity_and_Erro% r_Rates.ppt}. \bibitem[\protect\citeauthoryear{Cohen}{Cohen}{1995a}]{cohen95} {\sc Cohen, P.} 1995a. \newblock {\em Empirical Methods for Artificial Intelligence}. \newblock MIT Press. \bibitem[\protect\citeauthoryear{Cohen}{Cohen}{1995b}]{cohen95r} {\sc Cohen, W.} 1995b. \newblock Fast effective rule induction. \newblock In {\em ICML'95}. 115--123. \newblock Available on-line from \url{http://www.cs.cmu.edu/~wcohen/postscript/ml-95-ripper.ps}. \bibitem[\protect\citeauthoryear{Cover and Hart}{Cover and Hart}{1967}]{cover67} {\sc Cover, T.~M.} {\sc and} {\sc Hart, P.~E.} 1967. \newblock Nearest neighbour pattern classification. \newblock {\em IEEE Transactions on Information Theory\/}, 21--27. \bibitem[\protect\citeauthoryear{Demsar}{Demsar}{2006}]{demsar06} {\sc Demsar, J.} 2006. \newblock Statistical comparisons of clasifiers over multiple data sets. \newblock {\em Journal of Machine Learning Research\/}~{\em 7}, 1--30. \newblock Avaliable from \url{http://jmlr.csail.mit.edu/papers/v7/demsar06a.html}. \bibitem[\protect\citeauthoryear{Dietterich}{Dietterich}{1997}]{dietterich97} {\sc Dietterich, T.} 1997. \newblock Machine learning research: Four current directions. \newblock {\em AI Magazine\/}~{\em 18,\/}~4, 97--136. \bibitem[\protect\citeauthoryear{Domingos and Pazzani}{Domingos and Pazzani}{1997}]{domingos97optimality} {\sc Domingos, P.} {\sc and} {\sc Pazzani, M.~J.} 1997. \newblock On the optimality of the simple bayesian classifier under zero-one loss. \newblock {\em Machine Learning\/}~{\em 29,\/}~2-3, 103--130. \bibitem[\protect\citeauthoryear{Elkan}{Elkan}{2001}]{elkan01} {\sc Elkan, C.} 2001. \newblock The foundations of cost-sensitive learning. \newblock In {\em Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence (IJCAI’01)}. \newblock Available from \url{http://www-cse.ucsd.edu/users/elkan/rescale.pdf}. \bibitem[\protect\citeauthoryear{Fagan}{Fagan}{1976}]{fagan76} {\sc Fagan, M.} 1976. \newblock Design and code inspections to reduce errors in program development. \newblock {\em IBM Systems Journal\/}~{\em 15,\/}~3. \bibitem[\protect\citeauthoryear{Fagan}{Fagan}{1986}]{fagan86} {\sc Fagan, M.} 1986. \newblock Advances in software inspections. \newblock {\em IEEE Trans. on Software Engineering\/}, 744--751. \bibitem[\protect\citeauthoryear{Fawcett}{Fawcett}{2001}]{fawcett01} {\sc Fawcett, T.} 2001. \newblock Using rule sets to maximize roc performance. \newblock In {\em 2001 IEEE International Conference on Data Mining (ICDM-01)}. \newblock Available from \url{http://home.comcast.net/~tom.fawcett/public_html/papers/ICDM-final.pdf}. \bibitem[\protect\citeauthoryear{Fenton, Pfleeger, and Glass}{Fenton et~al\mbox{.}}{1994}]{fenton94} {\sc Fenton, N.}, {\sc Pfleeger, S.}, {\sc and} {\sc Glass, R.} 1994. \newblock Science and {S}ubstance: A {C}hallenge to {S}oftware {E}ngineers. \newblock {\em IEEE Software\/}, 86--95. \bibitem[\protect\citeauthoryear{Fenton and Neil}{Fenton and Neil}{1999}]{fenton99} {\sc Fenton, N.~E.} {\sc and} {\sc Neil, M.} 1999. \newblock A critique of software defect prediction models. \newblock {\em IEEE Transactions on Software Engineering\/}~{\em 25,\/}~5, 675--689. \newblock Available from \url{http://citeseer.nj.nec.com/fenton99critique.html}. \bibitem[\protect\citeauthoryear{Fenton and Pfleeger}{Fenton and Pfleeger}{1995}]{fenton96} {\sc Fenton, N.~E.} {\sc and} {\sc Pfleeger, S.} 1995. \newblock {\em Software Metrics: A Rigorous \& Practical Approach (second edition)}. \newblock International Thompson Press. \bibitem[\protect\citeauthoryear{Fenton and Pfleeger}{Fenton and Pfleeger}{1997}]{fenton97} {\sc Fenton, N.~E.} {\sc and} {\sc Pfleeger, S.} 1997. \newblock {\em Software Metrics: A Rigorous \& Practical Approach}. \newblock International Thompson Press. \bibitem[\protect\citeauthoryear{Freund and Schapire}{Freund and Schapire}{1997}]{FreSch97} {\sc Freund, Y.} {\sc and} {\sc Schapire, R.} 1997. \newblock A decision-theoretic generalization of on-line learning and an application to boosting. \newblock {\em JCSS: Journal of Computer and System Sciences\/}~{\em 55}. \bibitem[\protect\citeauthoryear{Hall and Munson}{Hall and Munson}{2000}]{hall00} {\sc Hall, G.} {\sc and} {\sc Munson, J.} 2000. \newblock Software evolution: code delta and code churn. \newblock {\em Journal of Systems and Software\/}, 111 -- 118. \bibitem[\protect\citeauthoryear{Halstead}{Halstead}{1977}]{halstead77} {\sc Halstead, M.} 1977. \newblock {\em Elements of Software Science}. \newblock Elsevier. \bibitem[\protect\citeauthoryear{Huang and Ling}{Huang and Ling}{2005}]{huang05} {\sc Huang, J.} {\sc and} {\sc Ling, C.} 2005. \newblock Using auc and accuracy in evaluating learning algorithms. \newblock {\em IEEE Transactions on Knowledge and Data Engineering\/}~{\em 17,\/}~3 (March), 299--310. \bibitem[\protect\citeauthoryear{Jiang, Cukic, and Ma}{Jiang et~al\mbox{.}}{2008}]{jiang08b} {\sc Jiang, Y.}, {\sc Cukic, B.}, {\sc and} {\sc Ma, Y.} 2008. \newblock Techniques for evaluating fault prediction models. \newblock {\em Empirical Software Engineering\/}, 561--595. \bibitem[\protect\citeauthoryear{Jiang, Cukic, and Menzies}{Jiang et~al\mbox{.}}{2007}]{jiang07} {\sc Jiang, Y.}, {\sc Cukic, B.}, {\sc and} {\sc Menzies, T.} 2007. \newblock Fault prediction using early lifecycle data. \newblock In {\em ISSRE'07}. \newblock Available from \url{http://menzies.us/pdf/07issre.pdf}. \bibitem[\protect\citeauthoryear{Jiang, Cukic, and Menzies}{Jiang et~al\mbox{.}}{2008}]{jiang08a} {\sc Jiang, Y.}, {\sc Cukic, B.}, {\sc and} {\sc Menzies, T.} 2008. \newblock Does transformation help? \newblock In {\em Defects 2008}. \newblock Available from \url{http://menzies.us/pdf/08transform.pdf}. \bibitem[\protect\citeauthoryear{Khoshgoftaar}{Khoshgoftaar}{2001}]{khoshgofta% ar01} {\sc Khoshgoftaar, T.} 2001. \newblock An application of zero-inflated poisson regression for software fault prediction. \newblock In {\em Proceedings of the 12th International Symposium on Software Reliability Engineering, Hong Kong}. 66--73. \bibitem[\protect\citeauthoryear{Khoshgoftaar and Allen}{Khoshgoftaar and Allen}{2001}]{khoshgoftaar99} {\sc Khoshgoftaar, T.} {\sc and} {\sc Allen, E.} 2001. \newblock Model software quality with classification trees. \newblock In {\em Recent Advances in Reliability and Quality Engineering}, {H.~Pham}, Ed. World Scientific, 247--270. \bibitem[\protect\citeauthoryear{Khoshgoftaar and Seliya}{Khoshgoftaar and Seliya}{2003}]{journals/ese/KhoshgoftaarS03} {\sc Khoshgoftaar, T.~M.} {\sc and} {\sc Seliya, N.} 2003. \newblock Fault prediction modeling for software quality estimation: Comparing commonly used techniques. \newblock {\em Empirical Software Engineering\/}~{\em 8,\/}~3, 255--283. \bibitem[\protect\citeauthoryear{Koru, Zhang, and Liu}{Koru et~al\mbox{.}}{2007}]{koru07} {\sc Koru, A.}, {\sc Zhang, D.}, {\sc and} {\sc Liu, H.} 2007. \newblock Modeling the effect of size on defect proneness for open-source software. \newblock In {\em Proceceedings PROMISE'07 (ICSE)}. \newblock Available from \url{http://promisedata.org/pdf/mpls2007KoruZhangLiu.pdf}. \bibitem[\protect\citeauthoryear{Lessmann, Baesens, Mues, and Pietsch}{Lessmann et~al\mbox{.}}{2008}]{lessmann09} {\sc Lessmann, S.}, {\sc Baesens, B.}, {\sc Mues, C.}, {\sc and} {\sc Pietsch, S.} 2008. \newblock Benchmarking classification models for software defect prediction: A proposed framework and novel findings. \newblock {\em IEEE Transactions on Software Engineering\/}. \bibitem[\protect\citeauthoryear{Leveson}{Leveson}{1995}]{leven95} {\sc Leveson, N.} 1995. \newblock {\em Safeware System Safety And Computers}. \newblock Addison-Wesley. \bibitem[\protect\citeauthoryear{Littlewood and Wright}{Littlewood and Wright}{1997}]{littlewood97} {\sc Littlewood, B.} {\sc and} {\sc Wright, D.} 1997. \newblock Some conservative stopping rules for the operational testing of safety-critical software. \newblock {\em IEEE Transactions on Software Engineering\/}~{\em 23,\/}~11 (November), 673--683. \bibitem[\protect\citeauthoryear{Lowry, Boyd, and Kulkarni}{Lowry et~al\mbox{.}}{1998}]{lowrey98} {\sc Lowry, M.}, {\sc Boyd, M.}, {\sc and} {\sc Kulkarni, D.} 1998. \newblock Towards a theory for integration of mathematical verification and empirical testing. \newblock In {\em Proceedings, ASE'98: Automated Software Engineering}. 322--331. \bibitem[\protect\citeauthoryear{Lutz and Mikulski}{Lutz and Mikulski}{2003}]{lutz03} {\sc Lutz, R.} {\sc and} {\sc Mikulski, C.} 2003. \newblock Operational anomalies as a cause of safety-critical requirements evolution. \newblock {\em Journal of Systems and Software\/}. \newblock Available from \url{http://www.cs.iastate.edu/~rlutz/publications/JSS02.ps}. \bibitem[\protect\citeauthoryear{McCabe}{McCabe}{1976}]{mccabe76} {\sc McCabe, T.} 1976. \newblock A complexity measure. \newblock {\em IEEE Transactions on Software Engineering\/}~{\em 2,\/}~4 (Dec.), 308--320. \bibitem[\protect\citeauthoryear{Menzies}{Menzies}{2001}]{me00p} {\sc Menzies, T.} 2001. \newblock Practical machine learning for software engineering and knowledge engineering. \newblock In {\em Handbook of Software Engineering and Knowledge Engineering}. World-Scientific. \newblock Available from \url{http://menzies.us/pdf/00ml.pdf}. \bibitem[\protect\citeauthoryear{Menzies, Chiang, Feather, Hu, and Kiper}{Menzies et~al\mbox{.}}{2003}]{me02c} {\sc Menzies, T.}, {\sc Chiang, E.}, {\sc Feather, M.}, {\sc Hu, Y.}, {\sc and} {\sc Kiper, J.} 2003. \newblock Condensing uncertainty via incremental treatment learning. \newblock In {\em Software Engineering with Computational Intelligence}, {T.~M. Khoshgoftaar}, Ed. Kluwer. \newblock Available from \url{http://menzies.us/pdf/02itar2.pdf}. \bibitem[\protect\citeauthoryear{Menzies and Cukic}{Menzies and Cukic}{2000}]{me99q} {\sc Menzies, T.} {\sc and} {\sc Cukic, B.} 2000. \newblock When to test less. \newblock {\em IEEE Software\/}~{\em 17,\/}~5, 107--112. \newblock Available from \url{http://menzies.us/pdf/00iesoft.pdf}. \bibitem[\protect\citeauthoryear{Menzies and Cukic}{Menzies and Cukic}{2002}]{me00y} {\sc Menzies, T.} {\sc and} {\sc Cukic, B.} 2002. \newblock How many tests are enough? \newblock In {\em Handbook of Software Engineering and Knowledge Engineering, Volume II}, {S.~Chang}, Ed. \newblock Available from \url{http://menzies.us/pdf/00ntests.pdf}. \bibitem[\protect\citeauthoryear{Menzies, Dekhtyar, Distefano, and Greenwald}{Menzies et~al\mbox{.}}{2007}]{me07e} {\sc Menzies, T.}, {\sc Dekhtyar, A.}, {\sc Distefano, J.}, {\sc and} {\sc Greenwald, J.} 2007. \newblock Problems with precision. \newblock {\em IEEE Transactions on Software Engineering\/}. \newblock \url{http://menzies.us/pdf/07precision.pdf}. \bibitem[\protect\citeauthoryear{Menzies, DiStefano, Orrego, and Chapman}{Menzies et~al\mbox{.}}{2004}]{me04g} {\sc Menzies, T.}, {\sc DiStefano, J.}, {\sc Orrego, A.}, {\sc and} {\sc Chapman, R.} 2004. \newblock Assessing predictors of software defects. \newblock In {\em Proceedings, workshop on Predictive Software Models, Chicago}. \newblock Available from \url{http://menzies.us/pdf/04psm.pdf}. \bibitem[\protect\citeauthoryear{Menzies, DiStefeno, Chapman, and Mcgill}{Menzies et~al\mbox{.}}{2002}]{me02e} {\sc Menzies, T.}, {\sc DiStefeno, J.~S.}, {\sc Chapman, M.}, {\sc and} {\sc Mcgill, K.} 2002. \newblock Metrics that matter. \newblock In {\em 27th NASA SEL workshop on Software Engineering}. \newblock Available from \url{http://menzies.us/pdf/02metrics.pdf}. \bibitem[\protect\citeauthoryear{Menzies, Greenwald, and Frank}{Menzies et~al\mbox{.}}{2007}]{me07b} {\sc Menzies, T.}, {\sc Greenwald, J.}, {\sc and} {\sc Frank, A.} 2007. \newblock Data mining static code attributes to learn defect predictors. \newblock {\em IEEE Transactions on Software Engineering\/}. \newblock Available from \url{http://menzies.us/pdf/06learnPredict.pdf}. \bibitem[\protect\citeauthoryear{Menzies, Lutz, and Mikulski}{Menzies et~al\mbox{.}}{2003}]{me02g} {\sc Menzies, T.}, {\sc Lutz, R.}, {\sc and} {\sc Mikulski, C.} 2003. \newblock Better analysis of defect data at {NASA}. \newblock In {\em SEKE03}. \newblock Available from \url{ http://menzies.us/pdf/03superodc.pdf}. \bibitem[\protect\citeauthoryear{Menzies, Port, Chen, Hihn, and Stukes}{Menzies et~al\mbox{.}}{2005}]{me05d} {\sc Menzies, T.}, {\sc Port, D.}, {\sc Chen, Z.}, {\sc Hihn, J.}, {\sc and} {\sc Stukes, S.} 2005. \newblock Specialization and extrapolation of induced domain models: Case studies in software effort estimation. \newblock In {\em IEEE ASE, 2005}. \newblock Available from \url{http://menzies.us/pdf/05learncost.pdf}. \bibitem[\protect\citeauthoryear{Menzies, Raffo, on~Setamanit, Hu, and Tootoonian}{Menzies et~al\mbox{.}}{2002}]{me02f} {\sc Menzies, T.}, {\sc Raffo, D.}, {\sc on~Setamanit, S.}, {\sc Hu, Y.}, {\sc and} {\sc Tootoonian, S.} 2002. \newblock Model-based tests of truisms. \newblock In {\em Proceedings of IEEE ASE 2002}. \newblock Available from \url{http://menzies.us/pdf/02truisms.pdf}. \bibitem[\protect\citeauthoryear{Menzies and Singh}{Menzies and Singh}{2003}]{me03l} {\sc Menzies, T.} {\sc and} {\sc Singh, H.} 2003. \newblock Many maybes mean (mostly) the same thing. \newblock In {\em Soft Computing in Software Engineering}, {M.~Madravio}, Ed. Springer-Verlag. \newblock Available from \url{http://menzies.us/pdf/03maybe.pdf}. \bibitem[\protect\citeauthoryear{Menzies and Stefano}{Menzies and Stefano}{2003a}]{me02k} {\sc Menzies, T.} {\sc and} {\sc Stefano, J.~D.} 2003a. \newblock More success and failure factors in software reuse. \newblock {\em IEEE Transactions on Software Engineering\/}. \newblock Available from \url{http://menzies.us/pdf/02sereuse.pdf}. \bibitem[\protect\citeauthoryear{Menzies, Stefano, Ammar, McGill, Callis, Chapman, and J}{Menzies et~al\mbox{.}}{2003}]{me03a} {\sc Menzies, T.}, {\sc Stefano, J.~D.}, {\sc Ammar, K.}, {\sc McGill, K.}, {\sc Callis, P.}, {\sc Chapman, R.}, {\sc and} {\sc J, D.} 2003. \newblock When can we test less? \newblock In {\em IEEE Metrics'03}. \newblock Available from \url{http://menzies.us/pdf/03metrics.pdf}. \bibitem[\protect\citeauthoryear{Menzies, Stefano, and Chapman}{Menzies et~al\mbox{.}}{2003}]{me03k} {\sc Menzies, T.}, {\sc Stefano, J.~D.}, {\sc and} {\sc Chapman, M.} 2003. \newblock Learning early lifecycle {IVV} quality indicators. \newblock In {\em IEEE Metrics '03}. \newblock Available from \url{http://menzies.us/pdf/03early.pdf}. \bibitem[\protect\citeauthoryear{Menzies and Stefano}{Menzies and Stefano}{2003b}]{me03q} {\sc Menzies, T.} {\sc and} {\sc Stefano, J. S.~D.} 2003b. \newblock How good is your blind spot sampling policy? \newblock In {\em 2004 IEEE Conference on High Assurance Software Engineering}. \newblock Available from \url{http://menzies.us/pdf/03blind.pdf}. \bibitem[\protect\citeauthoryear{Menzies, Stefano, Cunanan, and Chapman}{Menzies et~al\mbox{.}}{2004}]{me04c} {\sc Menzies, T.}, {\sc Stefano, J. S.~D.}, {\sc Cunanan, C.}, {\sc and} {\sc Chapman, R.~M.} 2004. \newblock Mining repositories to assist in project planning and resource allocation. \newblock In {\em International Workshop on Mining Software Repositories}. \newblock Available from \url{http://menzies.us/pdf/04msrdefects.pdf}. \bibitem[\protect\citeauthoryear{Menzies, Turhan, Bener, Gay, Cukic, and Jiang}{Menzies et~al\mbox{.}}{2008}]{me08d} {\sc Menzies, T.}, {\sc Turhan, B.}, {\sc Bener, A.}, {\sc Gay, G.}, {\sc Cukic, B.}, {\sc and} {\sc Jiang, Y.} 2008. \newblock Implications of ceiling effects in defect predictors. \newblock In {\em Proceedings of PROMISE 2008 Workshop (ICSE)}. \newblock Available from \url{http://menzies.us/pdf/08ceiling.pdf}. \bibitem[\protect\citeauthoryear{Milton}{Milton}{2008}]{milton08} {\sc Milton, Z.} 2008. \newblock Which rules. \newblock M.S.\ thesis. \bibitem[\protect\citeauthoryear{Musa, Iannino, and Okumoto}{Musa et~al\mbox{.}}{1987}]{musa87} {\sc Musa, J.}, {\sc Iannino, A.}, {\sc and} {\sc Okumoto, K.} 1987. \newblock {\em Software Reliability: Measurement, Prediction, Application}. \newblock McGraw Hill. \bibitem[\protect\citeauthoryear{Nagappan and Ball}{Nagappan and Ball}{2005a}]{nagappan05} {\sc Nagappan, N.} {\sc and} {\sc Ball, T.} 2005a. \newblock Static analysis tools as early indicators of pre-release defect density. \newblock In {\em ICSE 2005, St. Louis}. \bibitem[\protect\citeauthoryear{Nagappan and Ball}{Nagappan and Ball}{2005b}]{conf/icse/NagappanB05a} {\sc Nagappan, N.} {\sc and} {\sc Ball, T.} 2005b. \newblock Static analysis tools as early indicators of pre-release defect density. \newblock In {\em ICSE}. 580--586. \bibitem[\protect\citeauthoryear{Nagappan, Murphy, and V}{Nagappan et~al\mbox{.}}{2008}]{nach08} {\sc Nagappan, N.}, {\sc Murphy, B.}, {\sc and} {\sc V, B.} 2008. \newblock The influence of organizational structure on software quality: An empirical case study. \newblock In {\em ICSE'08}. \bibitem[\protect\citeauthoryear{Nikora}{Nikora}{2004}]{nikora04} {\sc Nikora, A.} 2004. \newblock Personnel communication on the accuracy of severity determinations in nasa databases. \bibitem[\protect\citeauthoryear{Nikora and Munson}{Nikora and Munson}{2003}]{nikora03} {\sc Nikora, A.} {\sc and} {\sc Munson, J.} 2003. \newblock Developing fault predictors for evolving software systems. \newblock In {\em Ninth International Software Metrics Symposium (METRICS'03)}. \bibitem[\protect\citeauthoryear{Porter and Selby}{Porter and Selby}{1990}]{porter90} {\sc Porter, A.} {\sc and} {\sc Selby, R.} 1990. \newblock Empirically guided software development using metric-based classification trees. \newblock {\em IEEE Software\/}, 46--54. \bibitem[\protect\citeauthoryear{Pugh}{Pugh}{1990}]{pugh90} {\sc Pugh, W.} 1990. \newblock Skip lists: a probabilistic alternative to balanced trees. \newblock {\em Communications of the ACM\/}~{\em 33,\/}~6, 668--676. \newblock Available from \url{ftp://ftp.cs.umd.edu/pub/skipLists/skiplists.pdf}. \bibitem[\protect\citeauthoryear{Quinlan}{Quinlan}{1992}]{quinlan92} {\sc Quinlan, R.} 1992. \newblock {\em C4.5: Programs for Machine Learning}. \newblock Morgan Kaufman. \newblock ISBN: 1558602380. \bibitem[\protect\citeauthoryear{Raffo}{Raffo}{2005}]{raffo05} {\sc Raffo, D.} 2005. \newblock Personnel communication. \bibitem[\protect\citeauthoryear{Rakitin}{Rakitin}{2001}]{rakitin01} {\sc Rakitin, S.} 2001. \newblock {\em Software Verification and Validation for Practitioners and Managers, Second Edition}. \newblock Artech House. \bibitem[\protect\citeauthoryear{Shepperd and Ince}{Shepperd and Ince}{1994}]{shepperd94} {\sc Shepperd, M.} {\sc and} {\sc Ince, D.} 1994. \newblock A critique of three metrics. \newblock {\em The Journal of Systems and Software\/}~{\em 26,\/}~3 (September), 197--210. \bibitem[\protect\citeauthoryear{Shull, ad~B.~Boehm, Brown, Costa, Lindvall, Port, Rus, Tesoriero, and Zelkowitz}{Shull et~al\mbox{.}}{2002}]{shu02} {\sc Shull, F.}, {\sc ad~B.~Boehm, V.~B.}, {\sc Brown, A.}, {\sc Costa, P.}, {\sc Lindvall, M.}, {\sc Port, D.}, {\sc Rus, I.}, {\sc Tesoriero, R.}, {\sc and} {\sc Zelkowitz, M.} 2002. \newblock What we have learned about fighting defects. \newblock In {\em Proceedings of 8th International Software Metrics Symposium, Ottawa, Canada}. 249--258. \newblock Available from \url{http://fc-md.umd.edu/fcmd/Papers/shull_defects.ps}. \bibitem[\protect\citeauthoryear{Shull, Rus, and Basili}{Shull et~al\mbox{.}}{2000}]{shull00a} {\sc Shull, F.}, {\sc Rus, I.}, {\sc and} {\sc Basili, V.} 2000. \newblock How perspective-based reading can improve requirements inspections. \newblock {\em IEEE Computer\/}~{\em 33,\/}~7, 73--79. \newblock Available from \url{http://www.cs.umd.edu/projects/SoftEng/ESEG/papers/82.77.pdf}. \bibitem[\protect\citeauthoryear{Srinivasan and Fisher}{Srinivasan and Fisher}{1995}]{srinivasan95} {\sc Srinivasan, K.} {\sc and} {\sc Fisher, D.} 1995. \newblock Machine learning approaches to estimating software development effort. \newblock {\em IEEE Trans. Soft. Eng.\/}, 126--137. \bibitem[\protect\citeauthoryear{Tang and Khoshgoftaar}{Tang and Khoshgoftaar}{2004}]{conf/ictai/TangK04} {\sc Tang, W.} {\sc and} {\sc Khoshgoftaar, T.~M.} 2004. \newblock Noise identification with the k-means algorithm. \newblock In {\em ICTAI}. 373--378. \bibitem[\protect\citeauthoryear{Tian and Zelkowitz}{Tian and Zelkowitz}{1995}]{tiang95} {\sc Tian, J.} {\sc and} {\sc Zelkowitz, M.} 1995. \newblock Complexity measure evaluation and selection. \newblock {\em IEEE Transaction on Software Engineering\/}~{\em 21,\/}~8 (Aug.), 641--649. \bibitem[\protect\citeauthoryear{Turhan, Menzies, Bener, and Distefano}{Turhan et~al\mbox{.}}{2009}]{me09b} {\sc Turhan, B.}, {\sc Menzies, T.}, {\sc Bener, A.}, {\sc and} {\sc Distefano, J.} 2009. \newblock On the relative value of cross-company and within-company data for defect prediction. \newblock {\em Empirical Software Engineering\/}~{\em 68,\/}~2, 278--290. \newblock Available from \url{http://menzies.us/pdf/08ccwc.pdf}. \bibitem[\protect\citeauthoryear{Voas and Miller}{Voas and Miller}{1995}]{voas95} {\sc Voas, J.} {\sc and} {\sc Miller, K.} 1995. \newblock Software testability: The new verification. \newblock {\em IEEE Software\/}, 17--28. \newblock Available from \url{http://www.cigital.com/papers/download/ieeesoftware95.ps}. \bibitem[\protect\citeauthoryear{Weyuker, Ostrand, and Bell}{Weyuker et~al\mbox{.}}{2008}]{weyeuker08} {\sc Weyuker, E.}, {\sc Ostrand, T.}, {\sc and} {\sc Bell, R.} 2008. \newblock Do too many cooks spoil the broth? using the number of developers to enhance defect prediction models. \newblock {\em Empirical Software Engineering\/}. \bibitem[\protect\citeauthoryear{Williams, Gomes, and Selman}{Williams et~al\mbox{.}}{2003}]{williams03} {\sc Williams, R.}, {\sc Gomes, C.}, {\sc and} {\sc Selman, B.} 2003. \newblock Backdoors to typical case complexity. \newblock In {\em Proceedings of IJCAI 2003}. \newblock \url{http://www.cs.cornell.edu/gomes/FILES/backdoors.pdf}. \bibitem[\protect\citeauthoryear{Witten and Frank}{Witten and Frank}{2005}]{witten05} {\sc Witten, I.~H.} {\sc and} {\sc Frank, E.} 2005. \newblock {\em Data mining. 2nd edition}. \newblock Morgan Kaufmann, Los Altos, US. \bibitem[\protect\citeauthoryear{Y.~Jiang and Menzies}{Y.~Jiang and Menzies}{2008}]{me08h} {\sc Y.~Jiang, B.~C.} {\sc and} {\sc Menzies, T.} 2008. \newblock Cost curve evaluation of fault prediction models. \newblock In {\em Proceedings, ISSRE'08}. \newblock Available from \url{http://menzies.us/pdf/08costcurves.pdf}. \bibitem[\protect\citeauthoryear{Yang, Webb, Cerquides, Korb, Boughton, and Ting}{Yang et~al\mbox{.}}{2006}]{yang06} {\sc Yang, Y.}, {\sc Webb, G.~I.}, {\sc Cerquides, J.}, {\sc Korb, K.~B.}, {\sc Boughton, J.~R.}, {\sc and} {\sc Ting, K.~M.} 2006. \newblock To select or to weigh: A comparative study of model selection and model weighing for spode ensembles. \newblock In {\em ECML}. 533--544. \end{thebibliography}