{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T09:53:29Z","timestamp":1683280409098},"reference-count":75,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3035217","type":"journal-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T21:13:24Z","timestamp":1604351604000},"page":"198801-198821","source":"Crossref","is-referenced-by-count":2,"title":["A Bayesian Networks-Based Method to Analyze the Validity of the Data of Software Measurement Programs"],"prefix":"10.1109","volume":"8","author":[{"given":"Renata","family":"Saraiva","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6863-0613","authenticated-orcid":false,"given":"Amaury","family":"Medeiros","sequence":"additional","affiliation":[]},{"given":"Mirko","family":"Perkusich","sequence":"additional","affiliation":[]},{"given":"Dalton","family":"Valadares","sequence":"additional","affiliation":[]},{"given":"Kyller Costa","family":"Gorgonio","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7377-1258","authenticated-orcid":false,"given":"Angelo","family":"Perkusich","sequence":"additional","affiliation":[]},{"given":"Hyggo","family":"Almeida","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-015-0225-3"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2321179"},{"key":"ref71","first-page":"8","volume":"761","author":"robert","year":"2003","journal-title":"Case Study Research Design and Methods"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2017.01.011"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-015-9297-z"},{"key":"ref39","first-page":"231","article-title":"Threshold-based empirical validation of object-oriented metrics on different severity levels","volume":"7","author":"sikka","year":"2019","journal-title":"Int J Intell Eng Informat"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/52.582975"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3230467.3230477"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917403"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.02.009"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010301"},{"key":"ref30","author":"longley","year":"2005","journal-title":"Geographic Information Systems and Science"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3273934.3273940"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2915970.2916001"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.5121\/ijsea.2014.5606"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2377656.2377661"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2013.10.012"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14347-2_26"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2004.1357820"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.11.921"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1108\/14684520510607560"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.18293\/SEKE2019-217"},{"key":"ref27","article-title":"Metric selection for ecosystem restoration","author":"convertino","year":"2013"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9102-8"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5316010"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.02.061"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2009.5160922"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1158287"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0263-2241(84)90020-4"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.12.003"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSSM.2006.320566"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336588"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3383219.3383269"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSP.2019.00013"},{"key":"ref23","author":"fenton","year":"2014","journal-title":"Software Metrics A Rigorous and Practical Approach"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.scitotenv.2009.05.004"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEI.2015.7352540"},{"key":"ref50","first-page":"301","article-title":"Learning in graphical models","author":"heckerman","year":"1999","journal-title":"A tutorial on learning with Bayesian networks"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1073"},{"key":"ref59","first-page":"105","article-title":"Validity and reliability in social science research","volume":"38","author":"drost","year":"2011","journal-title":"Education Research and Perspectives"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2016.01.002"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.08.015"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54157-5"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-012-9180-0"},{"key":"ref54","first-page":"1","article-title":"Generating conditional probabilities for Bayesian networks: Easing the knowledge acquisition problem","volume":"cs ai 411034","author":"das","year":"2004","journal-title":"CoRR"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-4832-1451-1.50016-0"},{"key":"ref52","first-page":"325","article-title":"Efficient search-based inference for noisy-OR belief networks: TopEpsilon","author":"huang","year":"1996","journal-title":"Proc Int Conf Uncertainty in Artif Intell (UAI)"},{"key":"ref10","author":"pressman","year":"2005","journal-title":"Software Engineering A Practitioner’s Approach"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.01.018"},{"key":"ref40","article-title":"Software modeling and measurement: The goal\/question\/ metric paradigm","author":"basili","year":"1992"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2008.106"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03673-7_21"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2990117"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10111-018-0494-y"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917403"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSP.2019.00013"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03673-7_20"},{"key":"ref19","article-title":"A method to estimate software strategic indicators in software development: An industrial application","author":"manzano","year":"2020","journal-title":"Inf Softw Technol"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/306363.306381"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/0471792535"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/32.489070"},{"key":"ref5","author":"society","year":"2009","journal-title":"IEEE Standard Adoption of ISO\/IEC 15939 2007—Systems and Software Engineering—Measurement Process"},{"key":"ref8","first-page":"165","article-title":"A systematic review measurement in software engineering: State-of-the-art in measures","author":"g\u00f3mez","year":"2006","journal-title":"Software and Data Technologies"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1670(199612)2:4<253::AID-SPIP53>3.0.CO;2-G"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/BRICS-CCI-CBIC.2013.39"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.01.014"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.11.022"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.07.057"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888900003039"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.11.033"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1201\/b21982"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695749"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecolmodel.2006.11.033"},{"key":"ref43","article-title":"Bayesian networks","author":"pearl","year":"1995","journal-title":"The Handbook of Brain Theory and Neural Networks"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09246551.pdf?arnumber=9246551","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:57:48Z","timestamp":1642003068000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9246551\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":75,"URL":"http:\/\/dx.doi.org\/10.1109\/access.2020.3035217","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}