{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T13:29:01Z","timestamp":1774963741853,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T00:00:00Z","timestamp":1744761600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T00:00:00Z","timestamp":1744761600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s10515-025-00508-6","type":"journal-article","created":{"date-parts":[[2025,4,15]],"date-time":"2025-04-15T22:19:13Z","timestamp":1744755553000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Navigating bug cold start with contextual multi-armed bandits: an enhanced approach to developer assignment in software bug repositories"],"prefix":"10.1007","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3081-1085","authenticated-orcid":false,"given":"Neetu","family":"Singh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2781-8684","authenticated-orcid":false,"given":"Sandeep Kumar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,16]]},"reference":[{"issue":"7","key":"508_CR1","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1080\/08839514.2021.1883855","volume":"35","author":"P Akshay","year":"2021","unstructured":"Akshay, P., et al.: Contextual bandit approach-based recommendation system for personalized web-based services. Appl Artif Intell 35(7), 489\u2013504 (2021)","journal-title":"Appl Artif Intell"},{"issue":"2","key":"508_CR2","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/s13198-022-01783-2","volume":"15","author":"AT Al-Taani","year":"2022","unstructured":"Al-Taani, A.T., Al-Sayadi, S.H.: Extractive text summarization of arabic multi-document using fuzzy C-means and latent dirichlet allocation. Int. J. Syst. Assur. Eng. Manage. 15(2), 713\u2013726 (2022). https:\/\/doi.org\/10.1007\/s13198-022-01783-2","journal-title":"Int. J. Syst. Assur. Eng. Manage."},{"key":"508_CR3","unstructured":"Alekh, A., et al. \"Taming the monster: a fast and simple algorithm for contextual bandits. In: International Conference on Machine Learning. PMLR, 2014."},{"key":"508_CR4","doi-asserted-by":"crossref","unstructured":"Bouneffouf, D., Rish, I., Cecchi, GA., Feraud, R., \u201cContext attentive bandits: contextual bandit with restricted context,\u201d May 2017, [Online]. Available: http:\/\/arxiv.org\/abs\/1705.03821","DOI":"10.24963\/ijcai.2017\/203"},{"key":"508_CR5","doi-asserted-by":"crossref","unstructured":"Bouneffouf, D., et al., \u201cContextual bandit for active learning: active thompson sampling,\u201d Sep. 2014. [Online]. Available: https:\/\/hal.archives-ouvertes.fr\/hal-01069802","DOI":"10.1007\/978-3-319-12637-1_51"},{"key":"508_CR6","unstructured":"Branislav, K., et al. \"Garbage in, reward out: bootstrapping exploration in multi-armed bandits. In: International Conference on Machine Learning. PMLR, 2019."},{"key":"508_CR7","unstructured":"Chicheng, Z., et al. \"Warm-starting contextual bandits: robustly combining supervised and bandit feedback.\"\u00a0arXiv preprint arXiv:1901.00301\u00a0(2019)."},{"key":"508_CR8","doi-asserted-by":"crossref","unstructured":"Fel\u00edcio, CZ., Paix\u00e3o, KV., Barcelos, CA., Preux, P., A multi-armed bandit model selection for cold-start user recommendation. In: Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization 2017 Jul 9 (pp. 32-40)..","DOI":"10.1145\/3079628.3079681"},{"key":"508_CR9","doi-asserted-by":"crossref","unstructured":"Fel\u00edcio, CZ., et al. \"A multi-armed bandit model selection for cold-start user recommendation. In: Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization. 2017.","DOI":"10.1145\/3079628.3079681"},{"issue":"2","key":"508_CR10","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1287\/ijoc.1080.0305","volume":"21","author":"A Gosavi","year":"2009","unstructured":"Gosavi, A.: Reinforcement learning: a tutorial survey and recent advances. INFORMS J. Comput.Comput. 21(2), 178\u2013192 (2009). https:\/\/doi.org\/10.1287\/ijoc.1080.0305","journal-title":"INFORMS J. Comput.Comput."},{"key":"508_CR11","unstructured":"Jagdish Rao, D., \u201cContextual Bandits for adapting to changing User preferences over time,\u201d 2020."},{"key":"508_CR12","unstructured":"Lai, W., and Srivatsva, V., \"On abruptly-changing and slowly-varying multiarmed bandit problems. In: 2018 Annual American Control Conference (ACC). IEEE, 2018."},{"key":"508_CR13","doi-asserted-by":"publisher","unstructured":"Li, L., Chu, W., Langford, J., Schapire, RE., \u201cA contextual-bandit approach to personalized news article recommendation,\u201d Feb. 2010, https:\/\/doi.org\/10.1145\/1772690.1772758.","DOI":"10.1145\/1772690.1772758"},{"key":"508_CR14","unstructured":"Lovato, P., \u201cMulti-armed bandit problem and its applications in reinforcement learning,\u201d Profs.Sci.Univr.It, pp. 1\u201325, 2013, [Online]. Available: http:\/\/profs.sci.univr.it\/~farinelli\/courses\/ddrMAS\/slides\/Bandit.pdf"},{"key":"508_CR15","unstructured":"Michal, V., et al. \"Finite-time analysis of kernelised contextual bandits.\"\u00a0arXiv preprint arXiv:1309.6869\u00a0(2013)."},{"key":"508_CR16","doi-asserted-by":"publisher","first-page":"63","DOI":"10.4018\/978-1-60960-165-2.ch004","volume-title":"Decision theory models for applications in artificial intelligence: concepts and solutions","author":"EF Morales","year":"2012","unstructured":"Morales, E.F., Zaragoza, J.H.: An introduction to reinforcement learning. In: Enrique Sucar, L., Morales, Eduardo F., Hoey, Jesse (eds.) Decision theory models for applications in artificial intelligence: concepts and solutions, pp. 63\u201380. IGI Global (2012). https:\/\/doi.org\/10.4018\/978-1-60960-165-2.ch004"},{"key":"508_CR17","unstructured":"Neha, G., Granmo, O-C., Agrawala, A., \"Thompson sampling for dynamic multi-armed bandits. In: 2011 10th International Conference on Machine Learning and Applications and Workshops. Vol. 1. IEEE, 2011."},{"key":"508_CR18","unstructured":"Omar, B., Gur, Y., Zeevi, A., \"Stochastic multi-armed-bandit problem with non-stationary rewards.\"\u00a0Advances in neural information processing systems\u00a027 (2014)."},{"key":"508_CR19","unstructured":"Praneet, D., et al. \"AutoML for contextual bandits.\"\u00a0arXiv preprint arXiv:1909.03212\u00a0(2019)."},{"key":"508_CR20","doi-asserted-by":"publisher","unstructured":"Revathy VR., Anitha, SP., Cold start problem in social recommender systems: state-of-the-art review, vol. 759. Springer Singapore, 2019. https:\/\/doi.org\/10.1007\/978-981-13-0341-8_10.","DOI":"10.1007\/978-981-13-0341-8_10"},{"key":"508_CR21","unstructured":"Robin van E., Kaptein, M., Contextual: evaluating contextual multi-armed bandit problems in R.\u00a0arXiv preprint arXiv:1811.01926\u00a0(2018)."},{"key":"508_CR22","unstructured":"Shipra, A., Devanur, N., \"Linear contextual bandits with knapsacks. Advances in Neural Information Processing Systems\u00a029 (2016)."},{"key":"508_CR23","doi-asserted-by":"crossref","unstructured":"Singh, N., Kumar Singh, S., MABTriage: multi armed bandit triaging model approach. In: Proceedings of the 2021 Thirteenth International Conference on Contemporary Computing 2021 (pp. 457-460)..","DOI":"10.1145\/3474124.3474194"},{"key":"508_CR24","doi-asserted-by":"publisher","unstructured":"Singh, N., Singh, SK., 2023 An empirical assessment of the performance of multi-armed bandits and contextual multi-armed bandits in handling cold-start bugs, vol. 1, no. 1. Association for Computing Machinery. https:\/\/doi.org\/10.1145\/3607947.3608094.","DOI":"10.1145\/3607947.3608094"},{"issue":"1-2","key":"508_CR25","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/S0004-3702(98)00002-2","volume":"100","author":"P Tadepalli","year":"1998","unstructured":"Tadepalli, P., Ok, D.: Model-based average reward reinforcement learning. Artif. Intell. Intell. 100(1\u20132), 177\u2013224 (1998)","journal-title":"Artif. Intell. Intell."},{"issue":"4","key":"508_CR26","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/s10664-022-10133-6","volume":"27","author":"A Tagra","year":"2022","unstructured":"Tagra, A., et al.: Revisiting reopened bugs in open source software systems. Empir Softw Eng 27(4), 92 (2022)","journal-title":"Empir Softw Eng"},{"key":"508_CR27","unstructured":"Thanh Nguyen, Hai, J\u00e9r\u00e9mie Mary, and Philippe Preux. \"Cold-start problems in recommendation systems via contextual-bandit algorithms.\"\u00a0arXiv e-prints\u00a0(2014): arXiv-1405."},{"issue":"4","key":"508_CR28","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/TLT.2012.11","volume":"5","author":"K Verbert","year":"2012","unstructured":"Verbert, K., et al.: Context-aware recommender systems for learning: a survey and future challenges. IEEE Trans. Learn. Technol. 5(4), 318\u2013335 (2012). https:\/\/doi.org\/10.1109\/TLT.2012.11","journal-title":"IEEE Trans. Learn. Technol."},{"key":"508_CR29","doi-asserted-by":"publisher","unstructured":"Wang, L., Wang, C., Wang, K., He, X., \u201cBiUCB: a contextual bandit algorithm for cold-start and diversified recommendation,\u201d In: Proceedings\u20132017 IEEE International Conference on Big Knowledge, ICBK 2017, Aug. 2017, pp. 248\u2013253. https:\/\/doi.org\/10.1109\/ICBK.2017.49.","DOI":"10.1109\/ICBK.2017.49"},{"key":"508_CR30","unstructured":"Wu, Q., Liu, Y., Miao, C., Zhao, Y., Guan, L., Tang, H., \u201cRecent advances in diversified recommendation,\u201d May 2019, [Online]. Available: http:\/\/arxiv.org\/abs\/1905.06589"},{"key":"508_CR31","unstructured":"Xu, H., et al. \"Contextual user browsing bandits for large-scale online mobile recommendation. In: Proceedings of the 14th ACM Conference on Recommender Systems. 2020."},{"key":"508_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/4347004","volume":"2022","author":"SFA Zaidi","year":"2022","unstructured":"Zaidi, S.F.A., Woo, H., Lee, C.-G.: Toward an effective bug triage system using transformers to add new developers. J. Sens 2022, 1\u201319 (2022). https:\/\/doi.org\/10.1155\/2022\/4347004","journal-title":"J. Sens"},{"key":"508_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/4347004","volume":"2022","author":"SFA Zaidi","year":"2022","unstructured":"Zaidi, S.F.A., Woo, H., Lee, C.-G.: Toward an effective bug triage system using transformers to add new developers. J. Sens 2022, 1\u201319 (2022). https:\/\/doi.org\/10.1155\/2022\/4347004","journal-title":"J. Sens"},{"key":"508_CR34","unstructured":"Zhou, L., \u201cA survey on contextual multi-armed bandits,\u201d Aug. 2015, [Online]. Available: http:\/\/arxiv.org\/abs\/1508.03326"}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00508-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10515-025-00508-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00508-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T13:57:21Z","timestamp":1757512641000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10515-025-00508-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,16]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["508"],"URL":"https:\/\/doi.org\/10.1007\/s10515-025-00508-6","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"value":"0928-8910","type":"print"},{"value":"1573-7535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,16]]},"assertion":[{"value":"25 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author(s) declared no potential conflicts of interest concerning the research, authorship, and\/or publication of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"39"}}