{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T22:56:36Z","timestamp":1773442596677,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T00:00:00Z","timestamp":1565568000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,12]]},"DOI":"10.1145\/3338906.3340449","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"937-945","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["WhoDo: automating reviewer suggestions at scale"],"prefix":"10.1145","author":[{"given":"Sumit","family":"Asthana","sequence":"first","affiliation":[{"name":"Microsoft Research, India"}]},{"given":"Rahul","family":"Kumar","sequence":"additional","affiliation":[{"name":"Microsoft Research, India"}]},{"given":"Ranjita","family":"Bhagwan","sequence":"additional","affiliation":[{"name":"Microsoft Research, India"}]},{"given":"Christian","family":"Bird","sequence":"additional","affiliation":[{"name":"Microsoft Research, USA"}]},{"given":"Chetan","family":"Bansal","sequence":"additional","affiliation":[{"name":"Microsoft Research, India"}]},{"given":"Chandra","family":"Maddila","sequence":"additional","affiliation":[{"name":"Microsoft Research, India"}]},{"given":"Sonu","family":"Mehta","sequence":"additional","affiliation":[{"name":"Microsoft Research, India"}]},{"given":"B.","family":"Ashok","sequence":"additional","affiliation":[{"name":"Microsoft Research, India"}]}],"member":"320","published-online":{"date-parts":[[2019,8,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.28121"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. Of a Symposium on Software Validation: Inspection-testing-verification-alternatives. Elsevier North-Holland, Inc.","author":"Ackerman A. Frank","unstructured":"A. Frank Ackerman , Priscilla J. Fowler , and Robert G. Ebenau . 1984. Software Inspections and the Industrial Production of Software . In Proc. Of a Symposium on Software Validation: Inspection-testing-verification-alternatives. Elsevier North-Holland, Inc. , New York, NY, USA, 13\u201340. http:\/\/dl.acm.org\/citation.cfm?id= 3541.3543 A. Frank Ackerman, Priscilla J. Fowler, and Robert G. Ebenau. 1984. Software Inspections and the Industrial Production of Software. In Proc. Of a Symposium on Software Validation: Inspection-testing-verification-alternatives. Elsevier North-Holland, Inc., New York, NY, USA, 13\u201340. http:\/\/dl.acm.org\/citation.cfm?id= 3541.3543"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486882"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486915"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.54"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671287"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2576451"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970306"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963772"},{"key":"e_1_3_2_1_10_1","volume-title":"Improving code review by predicting reviewers and acceptance of patches. Research on software analysis for error-free computing center Tech-Memo (ROSAEC MEMO 2009-006)","author":"Jeong Gaeul","year":"2009","unstructured":"Gaeul Jeong , Sunghun Kim , Thomas Zimmermann , and Kwangkeun Yi. 2009. Improving code review by predicting reviewers and acceptance of patches. Research on software analysis for error-free computing center Tech-Memo (ROSAEC MEMO 2009-006) ( 2009 ), 1\u201318. Gaeul Jeong, Sunghun Kim, Thomas Zimmermann, and Kwangkeun Yi. 2009. Improving code review by predicting reviewers and acceptance of patches. Research on software analysis for error-free computing center Tech-Memo (ROSAEC MEMO 2009-006) (2009), 1\u201318."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 10th Working Conference on Mining Software Repositories, MSR \u201913","author":"Jiang Yujuan","year":"2013","unstructured":"Yujuan Jiang , Bram Adams , and Daniel M. Germ\u00e1n . 2013. Will my patch make it? and how fast?: case study on the Linux kernel . In Proceedings of the 10th Working Conference on Mining Software Repositories, MSR \u201913 , San Francisco, CA, USA , May 18-19, 2013 , Thomas Zimmermann, Massimiliano Di Penta, and Sunghun Kim (Eds.). IEEE Computer Society, 101\u2013110. Yujuan Jiang, Bram Adams, and Daniel M. Germ\u00e1n. 2013. Will my patch make it? and how fast?: case study on the Linux kernel. In Proceedings of the 10th Working Conference on Mining Software Repositories, MSR \u201913, San Francisco, CA, USA, May 18-19, 2013, Thomas Zimmermann, Massimiliano Di Penta, and Sunghun Kim (Eds.). IEEE Computer Society, 101\u2013110."},{"key":"e_1_3_2_1_12_1","unstructured":"6624016  6624016"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332457"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597076"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.65"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889244"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970283"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491444"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.24"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368162"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985867"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593702.2593705"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081824"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370750.1370767"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332472"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015EDP7261"}],"event":{"name":"ESEC\/FSE '19: 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Tallinn Estonia","acronym":"ESEC\/FSE '19","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3340449","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338906.3340449","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:21Z","timestamp":1750206381000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3340449"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,12]]},"references-count":26,"alternative-id":["10.1145\/3338906.3340449","10.1145\/3338906"],"URL":"https:\/\/doi.org\/10.1145\/3338906.3340449","relation":{},"subject":[],"published":{"date-parts":[[2019,8,12]]},"assertion":[{"value":"2019-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}