{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T04:26:10Z","timestamp":1760502370206,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,5]],"date-time":"2021-08-05T00:00:00Z","timestamp":1628121600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,5]]},"DOI":"10.1145\/3474124.3474194","type":"proceedings-article","created":{"date-parts":[[2021,11,4]],"date-time":"2021-11-04T22:40:25Z","timestamp":1636065625000},"page":"457-460","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["MABTriage: Multi Armed Bandit Triaging Model Approach"],"prefix":"10.1145","author":[{"given":"Neetu","family":"Singh","sequence":"first","affiliation":[{"name":"Jaypee Institute of Information Technology, India"}]},{"given":"Sandeep","family":"Kumar Singh","sequence":"additional","affiliation":[{"name":"Jaypee Institute of Information Technology, India"}]}],"member":"320","published-online":{"date-parts":[[2021,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"https:\/\/imaddabbura.github.io\/post\/ -greedy-algorithm\/  https:\/\/imaddabbura.github.io\/post\/ -greedy-algorithm\/"},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/katselis.web.engr.illinois.edu\/ECE586\/Lecture8.pdf  http:\/\/katselis.web.engr.illinois.edu\/ECE586\/Lecture8.pdf"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering (pp. 1-6)","author":"Cubranic Davor","year":"2004","unstructured":"Davor Cubranic and Gail C Murphy ( 2004 ). Automatic bug triage using text categorization . In Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering (pp. 1-6) Davor Cubranic and Gail C Murphy (2004). Automatic bug triage using text categorization. In Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering (pp. 1-6)"},{"volume-title":"Zhongxuan Luo and Xindong Wu(2014). Towards effective bug triage with software data reduction techniques","author":"Ren Zhilei","key":"e_1_3_2_1_4_1","unstructured":"Zhilei Ren , Jifeng Xuan , He Jiang , Yan Hu , Weiqin Zou , Zhongxuan Luo and Xindong Wu(2014). Towards effective bug triage with software data reduction techniques . IEEE transactions on knowledge and data engineering, 27(1), 264-280 Zhilei Ren, Jifeng Xuan, He Jiang, Yan Hu, Weiqin Zou, Zhongxuan Luo and Xindong Wu(2014). Towards effective bug triage with software data reduction techniques. IEEE transactions on knowledge and data engineering, 27(1), 264-280"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2576454"},{"volume-title":"International Conference on Fundamental Approaches to Software Engineering (pp. 231-248)","author":"Badashian Ali Sajedi","key":"e_1_3_2_1_6_1","unstructured":"Ali Sajedi Badashian , Abram Hindle and Eleni Stroulia(2016). Crowdsourced bug triaging: Leveraging platforms for bug assignment . In International Conference on Fundamental Approaches to Software Engineering (pp. 231-248) . Springer, Berlin, Heidelberg Ali Sajedi Badashian, Abram Hindle and Eleni Stroulia(2016). Crowdsourced bug triaging: Leveraging platforms for bug assignment. In International Conference on Fundamental Approaches to Software Engineering (pp. 231-248). Springer, Berlin, Heidelberg"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-0582-8"},{"volume-title":"Proceedings of the 4rd Symposium on Knowledge Discovery, Mining and Learning","author":"Fel\u00edcio Cr\u00edcia Z","key":"e_1_3_2_1_8_1","unstructured":"Cr\u00edcia Z Fel\u00edcio , Kl\u00e9risson V.R. Paix\u00e3o , Celia A.Z. Barcelos and Philippe Preux(2016). Multi-armed bandits to recommend for cold-start user . In Proceedings of the 4rd Symposium on Knowledge Discovery, Mining and Learning Cr\u00edcia Z Fel\u00edcio, Kl\u00e9risson V.R.Paix\u00e3o, Celia A.Z. Barcelos and Philippe Preux(2016). Multi-armed bandits to recommend for cold-start user. In Proceedings of the 4rd Symposium on Knowledge Discovery, Mining and Learning"},{"volume-title":"Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization (pp. 32-40)","author":"Fel\u00edcio Cr\u00edcia Z","key":"e_1_3_2_1_9_1","unstructured":"Cr\u00edcia Z Fel\u00edcio , Kl\u00e9risson V.R. Paix\u00e3o , Celia A.Z. Barcelos and Philippe Preux(2017). A multi-armed bandit model selection for cold-start user recommendation . In Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization (pp. 32-40) . Cr\u00edcia Z Fel\u00edcio, Kl\u00e9risson V.R.Paix\u00e3o, Celia A.Z. Barcelos and Philippe Preux(2017). A multi-armed bandit model selection for cold-start user recommendation. In Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization (pp. 32-40)."}],"event":{"name":"IC3 '21: 2021 Thirteenth International Conference on Contemporary Computing","acronym":"IC3 '21","location":"Noida India"},"container-title":["2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474124.3474194","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474124.3474194","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:19Z","timestamp":1750195699000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474124.3474194"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,5]]},"references-count":9,"alternative-id":["10.1145\/3474124.3474194","10.1145\/3474124"],"URL":"https:\/\/doi.org\/10.1145\/3474124.3474194","relation":{},"subject":[],"published":{"date-parts":[[2021,8,5]]},"assertion":[{"value":"2021-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}