{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:51:57Z","timestamp":1775199117440,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540229551","type":"print"},{"value":"9783540301196","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30119-6_10","type":"book-chapter","created":{"date-parts":[[2010,9,18]],"date-time":"2010-09-18T02:30:25Z","timestamp":1284777025000},"page":"161-178","source":"Crossref","is-referenced-by-count":38,"title":["Designing Capture Applications to Support the Education of Children with Autism"],"prefix":"10.1007","author":[{"given":"Gillian R.","family":"Hayes","sequence":"first","affiliation":[]},{"given":"Julie A.","family":"Kientz","sequence":"additional","affiliation":[]},{"given":"Khai N.","family":"Truong","sequence":"additional","affiliation":[]},{"given":"David R.","family":"White","sequence":"additional","affiliation":[]},{"given":"Gregory D.","family":"Abowd","sequence":"additional","affiliation":[]},{"given":"Trevor","family":"Pering","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Association for Applied Behavioral Analysis, Web site for International Association for Applied Behavioral Analysis"},{"key":"10_CR2","unstructured":"The Discrete Trial Trainer (DTT), Columbia, SC (2004)"},{"key":"10_CR3","unstructured":"Earobics, Inclusive TLC, Boonton, NJ (2003)"},{"key":"10_CR4","unstructured":"European Commission Article 29 Working Party: Opinion 4\/2004 on the Processing of Per-sonal Data by means of Video Surveillance (2004)"},{"key":"10_CR5","unstructured":"Individuals with Disabilities Education Act 20 U.S.C. 1401 (1997)"},{"key":"10_CR6","unstructured":"Labeling_Tutor, Millenium Software, Torrance, CA (2004)"},{"key":"10_CR7","unstructured":"mTrials, Mobile Thinking, Inc., San Diego, CA (2002)"},{"key":"10_CR8","unstructured":"No Child Left Behind Act of 2001 20 USC 6301 (2002)"},{"key":"10_CR9","volume-title":"Third European Conference on Computer Supported Cooperative Work (ECSCW 1993)","author":"V. Bellotti","year":"1993","unstructured":"Bellotti, V., Sellen, A.: Design for Privacy in Ubiquitous Computing Environments. In: Third European Conference on Computer Supported Cooperative Work (ECSCW 1993), Milan, Italy, ACM Press, New York (1993)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Chen, A., Muntz, R.R., Yuen, S., Locher, I., Park, S.I., Srivastava, M.B.: A Support Infra-structure for the Smart Kindergarten. IEEE Pervasive Computing\u00a01(2), 49\u201357","DOI":"10.1109\/MPRV.2002.1012337"},{"key":"10_CR11","unstructured":"computhera. CompuThera: Seven Steps to Reading for Children with Autism and Visual Learners, Bowie, MD (2000)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Deuel, R.: Mobile Handhelds: Handhelds Used to Treat Disease. IEEE Pervasive Computing\u00a07 (2002)","DOI":"10.1109\/MPRV.2002.1012331"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Grudin, J.: Groupware and Social Dynamics: Eight Challenges for Developers. Communications of the ACM\u00a037(1), 82\u2013105","DOI":"10.1145\/175222.175230"},{"key":"10_CR14","unstructured":"Lessig, L.: The Architecture of Privacy. In: Taiwan Net 1998, Taipei (1998)"},{"key":"10_CR15","volume-title":"ACM Human Factors in Computing Systems: CHI 2004","author":"L. Mamykina","year":"2004","unstructured":"Mamykina, L.: CareView: Analyzing Nursing Narratives for Temporal Trends. In: ACM Human Factors in Computing Systems: CHI 2004, Vienna, Austria, ACM Press, New York (2004)"},{"key":"10_CR16","unstructured":"Maurice, C., Green, G., Luce, S.C.: Behavioral Intervention for Young Children with Autism. Pro-ed, Austin, TX (1996)"},{"key":"10_CR17","unstructured":"Pierangelo, R., Giulani, G.: Special Educator\u2019s Complete Guide to 109 Diagnostic Tests. The Center for Applied Research in Education, West Nyack, NY (1998)"},{"key":"10_CR18","unstructured":"Plaisant, C., Mushlin, R., Snyder, A., Li, J., Heller, D., Shneiderman, B.: LifeLines: Using Visualization to Enhance Navigation and Analysis of Patient Records. In: 1998 American Medical Informatic Association Annual Fall Symposium, Orlando, FL. AMIA, pp. 76\u201380 (1998)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Rimland, B., Edelson, S.M.: Autism Treatment Evaluation Checklist (ATEC), Autism Research Institute, San Diego, CA (1999)","DOI":"10.1037\/t03995-000"},{"key":"10_CR20","volume-title":"Participant Observation","author":"J.P. Spradley","year":"1980","unstructured":"Spradley, J.P.: Participant Observation. Holt, Rinehart and Winston, New York (1980)"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/3-540-45427-6_17","volume-title":"Ubicomp 2001: Ubiquitous Computing","author":"K.N. Truong","year":"2001","unstructured":"Truong, K.N., Abowd, G.D., Brotherton, J.: Who, What, When, Where, How: Design Issues of Capture and Access Applications. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol.\u00a02201, pp. 209\u2013224. Springer, Heidelberg (2001)"},{"key":"10_CR22","unstructured":"Department, U.S.: of Education, O.o.S.E.P., Data Analysis System (DANS). SAS Output. Act, U.I.W.D.E. ed, Number of Children Ages 6-21 Served Under IDEA (2000)"},{"key":"10_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/3-540-45809-3_15","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"R. Want","year":"2002","unstructured":"Want, R., Pering, T., Danneels, G., Kumar, M.: The Personal Server: Changing the Way We Think About Ubiquitous Computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, p. 194. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","UbiComp 2004: Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30119-6_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:41:30Z","timestamp":1605760890000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30119-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540229551","9783540301196"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30119-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}