{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:16Z","timestamp":1750220056498,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T00:00:00Z","timestamp":1679875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,27]]},"DOI":"10.1145\/3555776.3577777","type":"proceedings-article","created":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T17:16:29Z","timestamp":1686158189000},"page":"898-901","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Call Reason Prediction using Hierarchical Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2485-0953","authenticated-orcid":false,"given":"Vijay","family":"Malladi","sequence":"first","affiliation":[{"name":"ATC, Optum Global Solutions Ltd (UHG), Bangalore, Karnataka, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5293-824X","authenticated-orcid":false,"given":"Suman","family":"Roy","sequence":"additional","affiliation":[{"name":"ATC, Optum Global Solutions Ltd (UHG), Bangalore, Karnataka, India"}]}],"member":"320","published-online":{"date-parts":[[2023,6,7]]},"reference":[{"volume-title":"3rd ICLR'15","author":"Bahdanau D.","key":"e_1_3_2_1_1_1","unstructured":"D. Bahdanau , K. Cho , and Y. Bengio . 2015. Neural Machine Translation by Jointly Learning to Align and Translate . In 3rd ICLR'15 . D. Bahdanau, K. Cho, and Y. Bengio. 2015. Neural Machine Translation by Jointly Learning to Align and Translate. In 3rd ICLR'15."},{"key":"e_1_3_2_1_2_1","unstructured":"E. B. Baruch T. Ridnik N. Zamir A. Noy I. Friedman M Protter and L. Zelnik-Manor. 2020. Asymmetric Loss For Multi-Label Classification. CoRR abs\/2009.14119 (2020). https:\/\/arxiv.org\/abs\/2009.14119 E. B. Baruch T. Ridnik N. Zamir A. Noy I. Friedman M Protter and L. Zelnik-Manor. 2020. Asymmetric Loss For Multi-Label Classification. CoRR abs\/2009.14119 (2020). https:\/\/arxiv.org\/abs\/2009.14119"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"A. Bhargava A. Celikyilmaz D. Hakkani-T\u00fcr and R. Sarikaya. 2013. Easy contextual intent prediction and slot detection. In ICASSP. IEEE 8337--8341. A. Bhargava A. Celikyilmaz D. Hakkani-T\u00fcr and R. Sarikaya. 2013. Easy contextual intent prediction and slot detection. In ICASSP. IEEE 8337--8341.","DOI":"10.1109\/ICASSP.2013.6639291"},{"key":"e_1_3_2_1_4_1","volume-title":"Azure mixed reality cloud services overview. https:\/\/docs.microsoft.com\/en-us\/windows\/mixed-reality\/develop\/mixed-reality-cloud-services\/. [Online","author":"Build Microsoft","year":"2022","unstructured":"Microsoft Build . 2022. Azure mixed reality cloud services overview. https:\/\/docs.microsoft.com\/en-us\/windows\/mixed-reality\/develop\/mixed-reality-cloud-services\/. [Online ; accessed 16- May - 2022 ]. Microsoft Build. 2022. Azure mixed reality cloud services overview. https:\/\/docs.microsoft.com\/en-us\/windows\/mixed-reality\/develop\/mixed-reality-cloud-services\/. [Online; accessed 16-May-2022]."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long Short-Term Memory","volume":"9","author":"Hochreiter S.","year":"1997","unstructured":"S. Hochreiter and J\u00fcrgen Schmidhuber . 1997 . Long Short-Term Memory . Neural Comput. 9 , 8 (1997), 1735 -- 1780 . S. Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long Short-Term Memory. Neural Comput. 9, 8 (1997), 1735--1780.","journal-title":"Neural Comput."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the EMNLP. ACL, 1746--1751","author":"Kim Yoon","year":"2014","unstructured":"Yoon Kim . 2014 . Convolutional Neural Networks for Sentence Classification . In Proceedings of the EMNLP. ACL, 1746--1751 . Yoon Kim. 2014. Convolutional Neural Networks for Sentence Classification. In Proceedings of the EMNLP. ACL, 1746--1751."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"V. Malladi and S. Roy. 2022. Call Reason Prediction using Hierarchical Models. Technical Report. Optum Global Solutions India Pvt Ltd. Available at https:\/\/github.com\/varma-ds\/call_prediction. V. Malladi and S. Roy. 2022. Call Reason Prediction using Hierarchical Models. Technical Report. Optum Global Solutions India Pvt Ltd. Available at https:\/\/github.com\/varma-ds\/call_prediction.","DOI":"10.1145\/3555776.3577777"},{"key":"e_1_3_2_1_8_1","volume-title":"CIKM'07","author":"Park Youngja","year":"2007","unstructured":"Youngja Park . 2007 . Automatic call section segmentation for contact-center calls . In CIKM'07 . ACM, 117--126. Youngja Park. 2007. Automatic call section segmentation for contact-center calls. In CIKM'07. ACM, 117--126."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1136\/amiajnl-2013-002159","article-title":"Diagnosis code assignment: models and evaluation metrics","volume":"21","author":"Perotte A. J.","year":"2014","unstructured":"A. J. Perotte , R. Pivovarov , Ka. Natarajan , N. G. Weiskopf , F. D. Wood , and N. Elhadad . 2014 . Diagnosis code assignment: models and evaluation metrics . J. Am. Medical Informatics Assoc. 21 , 2 (2014), 231 -- 237 . A. J. Perotte, R. Pivovarov, Ka. Natarajan, N. G. Weiskopf, F. D. Wood, and N. Elhadad. 2014. Diagnosis code assignment: models and evaluation metrics. J. Am. Medical Informatics Assoc. 21, 2 (2014), 231--237.","journal-title":"J. Am. Medical Informatics Assoc."},{"volume-title":"The Text Classification of Theft Crime Based on TF-IDF and XGBoost Model","author":"Zhang Qi.","key":"e_1_3_2_1_10_1","unstructured":"Zhang Qi. 2020. The Text Classification of Theft Crime Based on TF-IDF and XGBoost Model . In IEEE ICAICA. 1241--1246. Zhang Qi. 2020. The Text Classification of Theft Crime Based on TF-IDF and XGBoost Model. In IEEE ICAICA. 1241--1246."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"W. Reichl B. Carpenter J. Chu-Carroll and Wu Chou. 1998. Language modeling for content extraction in human-computer dialogues. In ICSLP. ISCA. W. Reichl B. Carpenter J. Chu-Carroll and Wu Chou. 1998. Language modeling for content extraction in human-computer dialogues. In ICSLP. ISCA.","DOI":"10.21437\/ICSLP.1998-487"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"B. Santra P. Anusha and P. Goyal. 2021. Hierarchical Transformer for Task Oriented Dialog Systems. In AACL-HLT'21 Online. ACL 5649--5658. B. Santra P. Anusha and P. Goyal. 2021. Hierarchical Transformer for Task Oriented Dialog Systems. In AACL-HLT'21 Online. ACL 5649--5658.","DOI":"10.18653\/v1\/2021.naacl-main.449"},{"key":"e_1_3_2_1_13_1","volume-title":"HIBERT: Document Level Pre-training of Hierarchical Bidirectional Transformers for Document Summarization. In 57th ACL'19","volume":"5069","author":"Zhang X.","unstructured":"X. Zhang , F. Wei , and M. Zhou . 2019 . HIBERT: Document Level Pre-training of Hierarchical Bidirectional Transformers for Document Summarization. In 57th ACL'19 , Volume 1: Long Papers. ACL, 5059-- 5069 . X. Zhang, F. Wei, and M. Zhou. 2019. HIBERT: Document Level Pre-training of Hierarchical Bidirectional Transformers for Document Summarization. In 57th ACL'19, Volume 1: Long Papers. ACL, 5059--5069."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1111\/j.1467-9868.2005.00503.x","article-title":"Regularization and Variable Selection via the Elastic Net","volume":"67","author":"Zou Hui","year":"2005","unstructured":"Hui Zou and Trevor Hastie . 2005 . Regularization and Variable Selection via the Elastic Net . Journal of the Royal Statistical Society 67 , 2 (2005), 301 -- 320 . Hui Zou and Trevor Hastie. 2005. Regularization and Variable Selection via the Elastic Net. Journal of the Royal Statistical Society 67, 2 (2005), 301--320.","journal-title":"Journal of the Royal Statistical Society"}],"event":{"name":"SAC '23: 38th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Tallinn Estonia","acronym":"SAC '23"},"container-title":["Proceedings of the 38th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555776.3577777","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3555776.3577777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:30Z","timestamp":1750183710000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555776.3577777"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,27]]},"references-count":14,"alternative-id":["10.1145\/3555776.3577777","10.1145\/3555776"],"URL":"https:\/\/doi.org\/10.1145\/3555776.3577777","relation":{},"subject":[],"published":{"date-parts":[[2023,3,27]]},"assertion":[{"value":"2023-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}