{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:05:41Z","timestamp":1743019541293,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030856120"},{"type":"electronic","value":"9783030856137"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-85613-7_6","type":"book-chapter","created":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T06:03:15Z","timestamp":1629871395000},"page":"87-96","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Graph-Based Method for the Interpretation of User Activities in Serious Games"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5799-5438","authenticated-orcid":false,"given":"Iwona","family":"Grabska-Gradzi\u0144ska","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2992-718X","authenticated-orcid":false,"given":"Jan K.","family":"Argasi\u0144ski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,26]]},"reference":[{"key":"6_CR1","unstructured":"Abt, C.C.: Serious Games. Viking Press (1970)"},{"key":"6_CR2","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-319-67633-3_12","volume-title":"Information Systems for Crisis Response and Management in Mediterranean Countries","author":"I Daoudi","year":"2017","unstructured":"Daoudi, I., Tranvouez, E., Chebil, R., Espinasse, B., Chaari, W.L.: Learners\u2019 assessment and evaluation in serious games: approaches and techniques review. In: Dokas, I.M., Bellamine-Ben Saoud, N., Dugdale, J., D\u00edaz, P. (eds.) ISCRAM-med 2017. LNBIP, vol. 301, pp. 147\u2013153. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67633-3_12"},{"key":"6_CR3","unstructured":"Sicart, M.: Defining game mechanics. Game Stud. Int. J. Comput. Game Res. 8 (2008)"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1057\/9781137429704_13","volume-title":"From Literature to Cultural Literacy","author":"E Aarseth","year":"2014","unstructured":"Aarseth, E.: I fought the law: transgressive play and the implied player. In: Segal, N., Koleva, D. (eds.) From Literature to Cultural Literacy, pp. 180\u2013188. Palgrave Macmillan, London (2014). https:\/\/doi.org\/10.1057\/9781137429704_13"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Mislevy, R.J., Almond, R.G., Lukas, J.F.: A brief introduction to evidence-centered design (CSE report 632). Center for Research on Evaluation, Standards, and Student Testing, CA (2004)","DOI":"10.1037\/e646212011-001"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Winn, B.: The Design, Play, and Experience Framework, Hershey (2009)","DOI":"10.4018\/978-1-59904-808-6.ch058"},{"key":"6_CR7","unstructured":"Compton, K., Filstrup, B., Mateas, M.: Tracery: approachable story grammar authoring for casual users. In: Papers from Seventh Intelligent Narrative Technologies Workshop (INT 07), pp. 63\u201367 (2014)"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-319-27036-4_14","volume-title":"Interactive Storytelling","author":"K Compton","year":"2015","unstructured":"Compton, K., Kybartas, B., Mateas, M.: Tracery: an author-focused generative text tool. In: Schoenau-Fog, H., Bruni, L.E., Louchart, S., Baceviciute, S. (eds.) ICIDS 2015. LNCS, vol. 9445, pp. 154\u2013161. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27036-4_14"},{"key":"6_CR9","doi-asserted-by":"publisher","unstructured":"Grinblat, J., Bucklew, C.B.: Subverting historical cause & effect: generation of mythic biographies in Caves of Qud. In: Proceedings of the 12th International Conference on the Foundations of Digital Games (FDG 2017), Article 76, pp. 1\u20137. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3102071.3110574","DOI":"10.1145\/3102071.3110574"},{"key":"6_CR10","unstructured":"Grinblat, J., Bucklew, C.B.: Warm rocks for cold lizards: generating meaningful quests in Caves of Qud. In: Experimental AI in Games Workshop (AIIDE 2020) (2020)"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Adams, T.: Secret identities in dwarf fortress. In: Proceedings Experimental AI in Games (AIIDE 2017), pp. 22\u201325 (2017)","DOI":"10.1609\/aiide.v13i2.12963"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Tarn Adams, T.: Simulation principles from Dwarf Fortress. In: Game AI Pro 2: Collected Wisdom of Game AI Professionals, pp. 519\u2013521. CRC Press (2015)","DOI":"10.1201\/b18373-49"},{"key":"6_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.013","author":"JK Argasinski","year":"2018","unstructured":"Argasinski, J.K., Wegrzyn, P.: Affective patterns in serious games. Futur. Gener. Comput. Syst. (2018). https:\/\/doi.org\/10.1016\/j.future.2018.06.013","journal-title":"Futur. Gener. Comput. Syst."},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/9834565","volume":"2018","author":"W Mestadi","year":"2018","unstructured":"Mestadi, W., Nafil, K., Touahni, R., Messoussi, R.: An assessment of serious games technology: toward an architecture for serious games design. Int. J. Comput. Games Technol. 2018, 1\u201316 (2018). https:\/\/doi.org\/10.1155\/2018\/9834565","journal-title":"Int. J. Comput. Games Technol."},{"key":"6_CR15","doi-asserted-by":"publisher","unstructured":"Alonso-Fern\u00e1ndez, C., Mart\u00ednez-Ortiz, I., Caballero, R., Freire, M., Fern\u00e1ndez-Manj\u00f3n, B.: Predicting students\u2019 knowledge after playing a serious game based on learning analytics data: a case study. J. Comput. Assisted Learn. (2019). https:\/\/doi.org\/10.1111\/jcal.12405","DOI":"10.1111\/jcal.12405"},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-1-4471-2161-9_3","volume-title":"Serious Games and Edutainment Applications","author":"D Djaouti","year":"2011","unstructured":"Djaouti, D., Alvarez, J., Jessel, J.-P., Rampnoux, O.: Origins of serious games. In: Ma, M., Oikonomou, A., Jain, L.C. (eds.) Serious Games and Edutainment Applications, pp. 25\u201343. Springer, London (2011). https:\/\/doi.org\/10.1007\/978-1-4471-2161-9_3"},{"issue":"4","key":"6_CR17","doi-asserted-by":"publisher","first-page":"1332","DOI":"10.1016\/j.chb.2012.02.017","volume":"28","author":"A Orun","year":"2012","unstructured":"Orun, A., Seker, H.: Development of a computer game-based framework for cognitive behaviour identification by using Bayesian inference methods. Comput. Hum. Behav. 28(4), 1332\u20131341 (2012). https:\/\/doi.org\/10.1016\/j.chb.2012.02.017","journal-title":"Comput. Hum. Behav."},{"issue":"3\u20135","key":"6_CR18","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s11257-017-9193-2","volume":"27","author":"R Pel\u00e1nek","year":"2017","unstructured":"Pel\u00e1nek, R.: Bayesian knowledge tracing, logistic models, and beyond: an overview of learner modeling techniques. User Model. User-Adap. Inter. 27(3\u20135), 313\u2013350 (2017). https:\/\/doi.org\/10.1007\/s11257-017-9193-2","journal-title":"User Model. User-Adap. Inter."},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-39112-5_18","volume-title":"Artificial Intelligence in Education","author":"MV Yudelson","year":"2013","unstructured":"Yudelson, M.V., Koedinger, K.R., Gordon, G.J.: Individualized Bayesian knowledge tracing models. In: Lane, H.C., Yacef, K., Mostow, J., Pavlik, P. (eds.) AIED 2013. LNCS (LNAI), vol. 7926, pp. 171\u2013180. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39112-5_18"},{"key":"6_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1007\/978-3-540-69132-7_44","volume-title":"Intelligent Tutoring Systems","author":"RSJ Baker","year":"2008","unstructured":"Baker, R.S.J., Corbett, A.T., Aleven, V.: More accurate student modeling through contextual estimation of slip and guess probabilities in Bayesian knowledge tracing. In: Woolf, B.P., A\u00efmeur, E., Nkambou, R., Lajoie, S. (eds.) ITS 2008. LNCS, vol. 5091, pp. 406\u2013415. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-69132-7_44"},{"key":"6_CR21","doi-asserted-by":"publisher","unstructured":"Manrique, R., L\u00f3pez, C., Leon, E.: Student modeling via Bayesian knowledge tracing: a case study (2014). https:\/\/doi.org\/10.13140\/RG.2.1.3646.4167","DOI":"10.13140\/RG.2.1.3646.4167"},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-0-85729-994-9_1","volume-title":"Computer Analysis of Human Behavior","author":"G Englebienne","year":"2011","unstructured":"Englebienne, G.: Bayesian methods for the analysis of human behaviour. In: Salah, A., Gevers, T. (eds.) Computer Analysis of Human Behavior, pp. 3\u201320. Springer, London (2011). https:\/\/doi.org\/10.1007\/978-0-85729-994-9_1"},{"key":"6_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-22362-4_21","volume-title":"User Modeling, Adaption and Personalization","author":"ZA Pardos","year":"2011","unstructured":"Pardos, Z.A., Heffernan, N.T.: KT-IDEM: introducing item difficulty to the knowledge tracing model. In: Konstan, J.A., Conejo, R., Marzo, J.L., Oliver, N. (eds.) UMAP 2011. LNCS, vol. 6787, pp. 243\u2013254. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22362-4_21"},{"key":"6_CR24","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.cad.2017.09.004","volume":"95","author":"G Slusarczyk","year":"2018","unstructured":"Slusarczyk, G.: Graph-based representation of design properties in creating building floorplans. Comput. Aided Des. 95, 24\u201339 (2018). https:\/\/doi.org\/10.1016\/j.cad.2017.09.004","journal-title":"Comput. Aided Des."},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-030-60816-3_6","volume-title":"Cooperative Design, Visualization, and Engineering","author":"I Grabska-Gradzi\u0144ska","year":"2020","unstructured":"Grabska-Gradzi\u0144ska, I., Grabska, E., Nowak, L., Palacz, W.: Towards automatic generation of storyline aided by collaborative creative design. In: Luo, Y. (ed.) CDVE 2020. LNCS, vol. 12341, pp. 47\u201356. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-60816-3_6"},{"key":"6_CR26","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/978-3-030-61401-0_37","volume-title":"Artificial Intelligence and Soft Computing","author":"I Grabska-Gradzi\u0144ska","year":"2020","unstructured":"Grabska-Gradzi\u0144ska, I., Nowak, L., Grabska, E.: Automatic story generation based on graph model using Godot engine. In: Rutkowski, L., Scherer, R., Korytkowski, M., Pedrycz, W., Tadeusiewicz, R., Zurada, J.M. (eds.) ICAISC 2020. LNCS (LNAI), vol. 12415, pp. 397\u2013405. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-61401-0_37"},{"issue":"3","key":"6_CR27","doi-asserted-by":"publisher","first-page":"31","DOI":"10.5281\/zenodo.414361","volume":"12","author":"T Gervet","year":"2020","unstructured":"Gervet, T., Koedinger, K., Schneider, J., Mitchell, T.: When is deep learning the best approach to knowledge tracing? J. Educ. Data Min. 12(3), 31\u201354 (2020). https:\/\/doi.org\/10.5281\/zenodo.414361","journal-title":"J. Educ. Data Min."},{"key":"6_CR28","unstructured":"Minn, S.: BKT-LSTM: efficient student modeling for knowledge tracing and student performance prediction. arXiv preprint arXiv:2012.12218 (2020)"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Zhao, J., Bhatt, S., Thille, C., Zimmaro, D., Gattani, N.: Interpretable personalized knowledge tracing and next learning activity recommendation. In: Proceedings of the Seventh ACM Conference on Learning@ Scale, pp. 325-328 (2020)","DOI":"10.1145\/3386527.3406739"},{"issue":"4","key":"6_CR30","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/BF01099821","volume":"4","author":"AT Corbett","year":"1995","unstructured":"Corbett, A.T., Anderson, J.R.: Knowledge tracing: modeling the acquisition of procedural knowledge. User Model. User-Adap. Inter. 4(4), 253\u2013278 (1995)","journal-title":"User Model. User-Adap. Inter."}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-85613-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T00:33:53Z","timestamp":1673138033000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-85613-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030856120","9783030856137"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-85613-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"26 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.interact2021.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"680","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"105","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}