{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:06:26Z","timestamp":1743098786778,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540926979"},{"type":"electronic","value":"9783540926986"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92698-6_2","type":"book-chapter","created":{"date-parts":[[2008,12,23]],"date-time":"2008-12-23T01:44:26Z","timestamp":1229996666000},"page":"18-35","source":"Crossref","is-referenced-by-count":6,"title":["Combining Human Error Verification and Timing Analysis"],"prefix":"10.1007","author":[{"given":"Rimvydas","family":"Ruk\u0161\u0117nas","sequence":"first","affiliation":[]},{"given":"Paul","family":"Curzon","sequence":"additional","affiliation":[]},{"given":"Ann","family":"Blandford","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Back","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139062367","volume-title":"Human Error","author":"J. Reason","year":"1990","unstructured":"Reason, J.: Human Error. Cambridge University Press, Cambridge (1990)"},{"issue":"2","key":"2_CR2","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1207\/s15516709cog2402_2","volume":"24","author":"W. Gray","year":"2000","unstructured":"Gray, W.: The nature and processing of errors in interactive behavior. Cognitive Science\u00a024(2), 205\u2013248 (2000)","journal-title":"Cognitive Science"},{"issue":"1","key":"2_CR3","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1207\/s15516709cog2101_2","volume":"21","author":"M.D. Byrne","year":"1997","unstructured":"Byrne, M.D., Bovair, S.: A working memory model of a common procedural error. Cognitive Science\u00a021(1), 31\u201361 (1997)","journal-title":"Cognitive Science"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/3-540-45348-2_9","volume-title":"Engineering for Human-Computer Interaction","author":"P. Curzon","year":"2001","unstructured":"Curzon, P., Blandford, A.E.: Detecting multiple classes of user errors. In: Nigay, L., Little, M.R. (eds.) EHCI 2001. LNCS, vol.\u00a02254, pp. 57\u201371. Springer, Heidelberg (2001)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-540-69554-7_10","volume-title":"Interactive Systems. Design, Specification, and Verification","author":"R. Ruk\u0161\u0117nas","year":"2007","unstructured":"Ruk\u0161\u0117nas, R., Curzon, P., Back, J., Blandford, A.: Formal modelling of cognitive interpretation. In: Doherty, G., Blandford, A. (eds.) DSVIS 2006. LNCS, vol.\u00a04323, pp. 123\u2013136. Springer, Heidelberg (2007)"},{"key":"2_CR6","unstructured":"Ruk\u0161\u0117nas, R., Curzon, P., Blandford, A.: Detecting cognitive causes of confidentiality leaks. In: Proc. 1st Int. Workshop on Formal Methods for Interactive Systems (FMIS 2006). UNU-IIST Report No. 347, pp. 19\u201337 (2006)"},{"issue":"4","key":"2_CR7","first-page":"320","volume":"3","author":"B.E. John","year":"1996","unstructured":"John, B.E., Kieras, D.E.: The GOMS family of user interface analysis techniques: Comparison and contrast. ACM Trans. CHI\u00a03(4), 320\u2013351 (1996)","journal-title":"ACM Trans. CHI"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1007\/978-3-540-27813-9_45","volume-title":"Computer Aided Verification","author":"L. Moura de","year":"2004","unstructured":"de Moura, L., Owre, S., Ruess, H., Rushby, J., Shankar, N., Sorea, M., Tiwari, A.: SAL 2. In: Alur, R., Peled, D.A. (eds.) CAV 2004. LNCS, vol.\u00a03114, pp. 496\u2013500. Springer, Heidelberg (2004)"},{"issue":"4","key":"2_CR9","first-page":"287","volume":"3","author":"B.E. John","year":"1996","unstructured":"John, B.E., Kieras, D.E.: Using GOMS for user interface design and evaluation: which technique? ACM Trans. CHI\u00a03(4), 287\u2013319 (1996)","journal-title":"ACM Trans. CHI"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/11901433_4","volume-title":"Formal Methods and Software Engineering","author":"B. Beckert","year":"2006","unstructured":"Beckert, B., Beuster, G.: A method for formalizing, analyzing, and verifying secure user interfaces. In: Liu, Z., He, J. (eds.) ICFEM 2006. LNCS, vol.\u00a04260, pp. 55\u201373. Springer, Heidelberg (2006)"},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/s001650050045","volume":"11","author":"H. Bowman","year":"1999","unstructured":"Bowman, H., Faconti, G.: Analysing cognitive behaviour using LOTOS and Mexitl. Formal Aspects of Computing\u00a011, 132\u2013159 (1999)","journal-title":"Formal Aspects of Computing"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Rushby, J.: Analyzing cockpit interfaces using formal methods. Electronic Notes in Theoretical Computer Science\u00a043 (2001)","DOI":"10.1016\/S1571-0661(04)80891-0"},{"key":"2_CR13","unstructured":"Fields, R.E.: Analysis of erroneous actions in the design of critical systems. Tech. Rep. YCST 20001\/09, Univ. of York, Dept. of Comp. Science, D. Phil Thesis (2001)"},{"issue":"2","key":"2_CR14","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/226650.226671","volume":"28","author":"B. Fields","year":"1996","unstructured":"Fields, B., Wright, P., Harrison, M.: Time, tasks and errors. ACM SIGCHI Bull.\u00a028(2), 53\u201356 (1996)","journal-title":"ACM SIGCHI Bull."},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/3-540-36235-5_16","volume-title":"Interactive Systems. Design, Specification, and Verification","author":"X. Lacaze","year":"2002","unstructured":"Lacaze, X., Palanque, P., Navarre, D., Bastide, R.: Performance evaluation as a tool for quantitative assessment of complexity of interactive systems. In: Forbrig, P., Limbourg, Q., Urban, B., Vanderdonckt, J. (eds.) DSV-IS 2002. LNCS, vol.\u00a02545, pp. 208\u2013222. Springer, Heidelberg (2002)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Thimbleby, H.: Analysis and simulation of user interfaces. In: Proc. BCS HCI, vol.\u00a0XIV, pp. 221\u2013237 (2000)","DOI":"10.1007\/978-1-4471-0515-2_15"},{"key":"2_CR17","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s001650070021","volume":"12","author":"R.J. Butterworth","year":"2000","unstructured":"Butterworth, R.J., Blandford, A.E., Duke, D.J.: Demonstrating the cognitive plausibility of interactive systems. Formal Aspects of Computing\u00a012, 237\u2013259 (2000)","journal-title":"Formal Aspects of Computing"},{"key":"2_CR18","unstructured":"Newell, A.: Unified Theories of Cognition. Harvard University Press (1990)"},{"key":"2_CR19","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/320719.322590","volume-title":"Proc. 12th Ann. ACM Symp. on User Interface Software and Technology","author":"S.E. Hudson","year":"1999","unstructured":"Hudson, S.E., John, B.E., Knudsen, K., Byrne, M.D.: A tool for creating predictive performance models from user interface demonstrations. In: Proc. 12th Ann. ACM Symp. on User Interface Software and Technology, pp. 93\u2013102. ACM Press, New York (1999)"},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/S0020-7373(85)80045-6","volume":"22","author":"D.E. Kieras","year":"1985","unstructured":"Kieras, D.E., Polson, P.G.: An approach to the formal analysis of user complexity. Int. J. Man-Mach. Stud.\u00a022, 365\u2013394 (1985)","journal-title":"Int. J. Man-Mach. Stud."},{"key":"2_CR21","unstructured":"Dix, A., Brewster, S.: Causing trouble with buttons. In: Auxiliary. Proc. HCI 1994 (1994)"}],"container-title":["Lecture Notes in Computer Science","Engineering Interactive Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92698-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,28]],"date-time":"2021-09-28T17:28:59Z","timestamp":1632850139000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92698-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540926979","9783540926986"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92698-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}