{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:36:04Z","timestamp":1750221364866,"version":"3.41.0"},"reference-count":30,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2018,3,28]],"date-time":"2018-03-28T00:00:00Z","timestamp":1522195200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2018,3,28]]},"abstract":"<jats:p>As the software projects become more complex, the release deci-sion is made without resolving all the bugs in the issue tracking system. Accumulation of the bugs in the bug repository is similar to nancial obligation as we borrow time and resources to engage in another activity rather than resolving the bugs. Deferring the bug in the next release may have some consequences. Therefore, the decision whether to resolve the bug in the current release or postponing it to the next release is a crucial decision. In this proposal, we study the deferred bugs (lingering bugs) against the non-deferred bugs (regular bugs). Our aim is to develop the pre-dictive model which can predict whether the bug would linger or not. Additionally, we are interested in measuring of the linger-ing bug in terms of principal (standard time it takes to x them) and risk of liability (impact). We propose to use reinforcement learning for prioritization of lingering bugs with respect to their impact.<\/jats:p>","DOI":"10.1145\/3178315.3178326","type":"journal-article","created":{"date-parts":[[2018,3,30]],"date-time":"2018-03-30T12:19:12Z","timestamp":1522412352000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Prioritizing lingering bugs"],"prefix":"10.1145","volume":"43","author":[{"given":"Shirin","family":"Akbarinasaji","sequence":"first","affiliation":[{"name":"Ryerson University, Toronto, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2018,3,28]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/3106039.3106048"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896995.2896999"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.02.021"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306337"},{"key":"e_1_2_1_5_1","first-page":"37","article-title":"Software defect reduction top 10 list. Foundations of empirical software engineering: the legacy of Victor R","volume":"426","author":"Boehm B.","year":"2005","journal-title":"Basili"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337274"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1808920.1808933"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806871"},{"volume-title":"Ryerson University","year":"2015","author":"Habayeb M.","key":"e_1_2_1_9_1"},{"issue":"15","key":"e_1_2_1_10_1","first-page":"2015","article-title":"Standish group 2015 chaos report-q&a with jennifer lynch","volume":"1","author":"Hastie S.","year":"2016","journal-title":"Retrieved"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321639"},{"volume-title":"Proceedings of the International Conference on Open-Source Systems and Technologies","year":"2010","author":"Kanwal J.","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-012-1230-3"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287633"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.47"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463284"},{"key":"e_1_2_1_17_1","unstructured":"J. Leon. The true cost of a software bug part one 2015. {Online; accessed 28-December-2015}.  J. Leon. The true cost of a software bug part one 2015. {Online; accessed 28-December-2015}."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1475"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020390.2020401"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9370-z"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.25"},{"key":"e_1_2_1_22_1","doi-asserted-by":"crossref","unstructured":"C. Seaman and Y. Guo. Measuring and monitoring technical debt. Advances in Computers 82(25--46):44 2011.  C. Seaman and Y. Guo. Measuring and monitoring technical debt. Advances in Computers 82(25--46):44 2011.","DOI":"10.1016\/B978-0-12-385512-1.00002-5"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2012.6416595"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/280324.280335"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2666036.2666046"},{"key":"e_1_2_1_26_1","unstructured":"R. S. Sutton and A. G. Barto. Reinforcement learning: An introduction volume 1. MIT press Cambridge 1998.   R. S. Sutton and A. G. Barto. Reinforcement learning: An introduction volume 1. MIT press Cambridge 1998."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-016-9478-6"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.13"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1948448.1948485"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486931"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3178315.3178326","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3178315.3178326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:23Z","timestamp":1750213583000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3178315.3178326"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,28]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,3,28]]}},"alternative-id":["10.1145\/3178315.3178326"],"URL":"https:\/\/doi.org\/10.1145\/3178315.3178326","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2018,3,28]]},"assertion":[{"value":"2018-03-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}