{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T04:27:05Z","timestamp":1760502425419,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,3]],"date-time":"2023-08-03T00:00:00Z","timestamp":1691020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,3]]},"DOI":"10.1145\/3607947.3608094","type":"proceedings-article","created":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T00:12:21Z","timestamp":1695946341000},"page":"750-758","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An Empirical Assessment of the Performance of Multi-Armed Bandits and Contextual Multi-Armed Bandits in Handling Cold-Start Bugs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3081-1085","authenticated-orcid":false,"given":"Neetu","family":"Singh","sequence":"first","affiliation":[{"name":"Computer Science and Engineering &amp; Information Technology, Jaypee Institute of Information Technology, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2781-8684","authenticated-orcid":false,"given":"Sandeep Kumar","family":"Singh","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering &amp; Information Technology, Jaypee Institute of Information Technology, India"}]}],"member":"320","published-online":{"date-parts":[[2023,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.03.014"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474124.3474194"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2020.3605"},{"key":"e_1_3_2_1_5_1","volume-title":"Multi-Armed Bandit Strategies for Non-Stationary Reward Distributions and Delayed Feedback Processes","author":"Liu L.","year":"2019","unstructured":"L. Liu, R. Downe, and J. Reid, \u201cMulti-Armed Bandit Strategies for Non-Stationary Reward Distributions and Delayed Feedback Processes,\u201d Feb. 2019, [Online]. Available: http:\/\/arxiv.org\/abs\/1902.08593"},{"key":"e_1_3_2_1_6_1","volume-title":"Contextual Bandits with Similarity Information *","author":"Slivkins A.","year":"2011","unstructured":"A. Slivkins, \u201cContextual Bandits with Similarity Information *,\u201d 2011."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079628.3079681"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.1080.0305"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60960-165-2.ch004"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/app12073565"},{"key":"e_1_3_2_1_11_1","volume-title":"Contextual Bandits for adapting to changing User preferences over time","author":"Jagdish Rao D.","year":"2020","unstructured":"D. Jagdish Rao, \u201cContextual Bandits for adapting to changing User preferences over time,\u201d 2020"}],"event":{"name":"IC3 2023: 2023 Fifteenth International Conference on Contemporary Computing","acronym":"IC3 2023","location":"Noida India"},"container-title":["Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607947.3608094","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607947.3608094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:38:07Z","timestamp":1750178287000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607947.3608094"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,3]]},"references-count":11,"alternative-id":["10.1145\/3607947.3608094","10.1145\/3607947"],"URL":"https:\/\/doi.org\/10.1145\/3607947.3608094","relation":{},"subject":[],"published":{"date-parts":[[2023,8,3]]},"assertion":[{"value":"2023-09-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}