{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:54:36Z","timestamp":1725566076612},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642160196"},{"type":"electronic","value":"9783642160202"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16020-2_20","type":"book-chapter","created":{"date-parts":[[2010,9,15]],"date-time":"2010-09-15T08:31:13Z","timestamp":1284539473000},"page":"292-307","source":"Crossref","is-referenced-by-count":4,"title":["Studying the Factors Influencing Automatic User Task Detection on the Computer Desktop"],"prefix":"10.1007","author":[{"given":"Andreas S.","family":"Rath","sequence":"first","affiliation":[]},{"given":"Didier","family":"Devaurs","sequence":"additional","affiliation":[]},{"given":"Stefanie N.","family":"Lindstaedt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"20_CR1","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1504\/IJAHUC.2007.014070","volume":"2","author":"M. Baldauf","year":"2007","unstructured":"Baldauf, M., Dustdar, S., Rosenberg, F.: A survey on context-aware systems. International Journal of Ad Hoc and Ubiquitous Computing\u00a02(4), 263\u2013277 (2007)","journal-title":"International Journal of Ad Hoc and Ubiquitous Computing"},{"issue":"2","key":"20_CR2","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1207\/S15327051HCI16234_02","volume":"16","author":"A.K. Dey","year":"2001","unstructured":"Dey, A.K., Abowd, G.D., Salber, D.: A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Human Computer Interaction\u00a016(2), 97\u2013166 (2001)","journal-title":"Human Computer Interaction"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Dredze, M., Lau, T., Kushmerick, N.: Automatically classifying emails into activities. In: Proc. IUI 2006, pp. 70\u201377 (2006)","DOI":"10.1145\/1111449.1111471"},{"key":"20_CR4","unstructured":"Duval, E., Hodgins, W.: A LOM research agenda. In: Proc. WWW 2003, pp. 1\u20139 (2003)"},{"issue":"2","key":"20_CR5","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1080\/158037042000225245","volume":"26","author":"M. Eraut","year":"2004","unstructured":"Eraut, M.: Informal learning in the workplace. Studies in Continuing Education\u00a026(2), 247\u2013273 (2004)","journal-title":"Studies in Continuing Education"},{"issue":"1-2","key":"20_CR6","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1023\/A:1011145532042","volume":"11","author":"G. Fischer","year":"2001","unstructured":"Fischer, G.: User modeling in human-computer interaction. User Modeling and User-Adapted Interaction\u00a011(1-2), 65\u201386 (2001)","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Goecks, J., Shavlik, J.: Learning users\u2019 interests by unobtrusively observing their normal behavior. In: Proc. IUI 2000, pp. 129\u2013132 (2000)","DOI":"10.1145\/325737.325806"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Granitzer, M., Kr\u00f6ll, M., Seifert, C., Rath, A.S., Weber, N., Dietzel, O., Lindstaedt, S.N.: Analysis of machine learning techniques for context extraction. In: Proc. ICDIM 2008, pp. 233\u2013240 (2008)","DOI":"10.1109\/ICDIM.2008.4746809"},{"key":"20_CR9","unstructured":"Gutschmidt, A., Cap, C.H., Nerdinger, F.W.: Paving the path to automatic user task identification. In: Workshop on Common Sense Knowledge and Goal-Oriented Interfaces, IUI 2008 (2008)"},{"key":"20_CR10","unstructured":"Klieber, W., Sabol, V., Muhr, M., Kern, R., \u00d6ttl, G., Granitzer, M.: Knowledge discovery using the KnowMiner framework. In: Proc. IADIS 2009 (2009)"},{"issue":"6","key":"20_CR11","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1108\/13673270810913603","volume":"12","author":"T. Ley","year":"2008","unstructured":"Ley, T., Ulbrich, A., Scheir, P., Lindstaedt, S.N., Kump, B., Albert, D.: Modelling competencies for supporting work-integrated learning in knowledge work. Journal of Knowledge Management\u00a012(6), 31\u201347 (2008)","journal-title":"Journal of Knowledge Management"},{"issue":"3","key":"20_CR12","first-page":"44","volume":"9","author":"S.N. Lindstaedt","year":"2008","unstructured":"Lindstaedt, S.N., Ley, T., Scheir, P., Ulbrich, A.: Applying scruffy methods to enable work-integrated learning. European Journal of the Informatics Professional\u00a09(3), 44\u201350 (2008)","journal-title":"European Journal of the Informatics Professional"},{"key":"20_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-642-04636-0_9","volume-title":"Learning in the Synergy of Multiple Disciplines","author":"S.N. Lindstaedt","year":"2009","unstructured":"Lindstaedt, S.N., Beham, G., Kump, B., Ley, T.: Getting to know your user - unobtrusive user model maintenance within work-integrated learning environments. In: Cress, U., Dimitrova, V., Specht, M. (eds.) EC-TEL 2009. LNCS, vol.\u00a05794, pp. 73\u201387. Springer, Heidelberg (2009)"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-540-87605-2_26","volume-title":"Times of Convergence. Technologies Across Learning Contexts","author":"S.N. Lindstaedt","year":"2008","unstructured":"Lindstaedt, S.N., Scheir, P., Lokaiczyk, R., Kump, B., Beham, G., Pammer, V.: Knowledge services for work-integrated learning. In: Dillenbourg, P., Specht, M. (eds.) EC-TEL 2008. LNCS, vol.\u00a05192, pp. 234\u2013244. Springer, Heidelberg (2008)"},{"key":"20_CR15","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-540-74255-5_25","volume-title":"Modeling and Using Context","author":"R. Lokaiczyk","year":"2007","unstructured":"Lokaiczyk, R., Faatz, A., Beckhaus, A., Goertz, M.: Enhancing just-in-time e-learning through machine learning on desktop context sensors. In: Kokinov, B., Richardson, D.C., Roth-Berghofer, T.R., Vieu, L. (eds.) CONTEXT 2007. LNCS (LNAI), vol.\u00a04635, pp. 330\u2013341. Springer, Heidelberg (2007)"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Oliver, N., Smith, G., Thakkar, C., Surendran, A.C.: SWISH: semantic analysis of window titles and switching history. In: Proc. IUI 2006, pp. 194\u2013201 (2006)","DOI":"10.1145\/1111449.1111492"},{"key":"20_CR17","unstructured":"Rath, A.S.: User Interaction Context - Studying and Enhancing Automatic User Task Detection on the Computer Desktop via an Ontology-based User Interaction Context Model. Ph.D. thesis, Graz University of Technology (2010)"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Rath, A.S., Devaurs, D., Lindstaedt, S.N.: UICO: an ontology-based user interaction context model for automatic task detection on the computer desktop. In: Workshop on Context, Information and Ontologies, ESWC 2009 (2009)","DOI":"10.1145\/1552262.1552270"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Schmidt, A.: Impact of context-awareness on the architecture of e-learning solutions. In: Architecture Solutions for E-Learning Systems, ch.\u00a016, pp. 306\u2013319. Information Science Reference, IGI Publishing (2007)","DOI":"10.4018\/978-1-59904-633-4.ch016"},{"key":"20_CR20","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4073.001.0001","volume-title":"Knowledge Engineering and Management: The CommonKADS Methodology","author":"G. Schreiber","year":"1999","unstructured":"Schreiber, G., Akkermans, H., Anjewierden, A., Dehoog, R., Shadbolt, N., Vandevelde, W., Wielinga, B.: Knowledge Engineering and Management: The CommonKADS Methodology. The MIT Press, Cambridge (1999)"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Shen, J., Irvine, J., Bao, X., Goodman, M., Kolibaba, S., Tran, A., Carl, F., Kirschner, B., Stumpf, S., Dietterich, T.G.: Detecting and correcting user activity switches: algorithms and interfaces. In: Proc. IUI 2009, pp. 117\u2013126 (2009)","DOI":"10.1145\/1502650.1502670"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Shen, J., Li, L., Dietterich, T.G., Herlocker, J.L.: A hybrid learning system for recognizing user tasks from desktop activities and email messages. In: Proc. IUI 2006, pp. 86\u201392 (2006)","DOI":"10.1145\/1111449.1111473"},{"issue":"1","key":"20_CR23","doi-asserted-by":"publisher","first-page":"53","DOI":"10.3102\/00346543073001053","volume":"73","author":"P.J. Smith","year":"2003","unstructured":"Smith, P.J.: Workplace Learning and Flexible Delivery. Review of Educational Research\u00a073(1), 53\u201388 (2003)","journal-title":"Review of Educational Research"},{"key":"20_CR24","unstructured":"Strang, T., Linnhoff-Popien, C.: A context modeling survey. In: Workshop on Advanced Context Modelling, Reasoning and Management, UbiComp 2004 (2004)"},{"key":"20_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/11876663_47","volume-title":"Innovative Approaches for Learning and Knowledge Sharing","author":"A. Ulbrich","year":"2006","unstructured":"Ulbrich, A., Scheir, P., Lindstaedt, S.N., G\u00f6rtz, M.: A context-model for supporting work-integrated learning. In: Nejdl, W., Tochtermann, K. (eds.) EC-TEL 2006. LNCS, vol.\u00a04227, pp. 525\u2013530. Springer, Heidelberg (2006)"},{"key":"20_CR26","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"I.H. Witten","year":"2005","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques, 2nd edn. Morgan Kaufmann, San Francisco (2005)","edition":"2"},{"issue":"3","key":"20_CR27","first-page":"106","volume":"10","author":"M. Wolpers","year":"2007","unstructured":"Wolpers, M., Najjar, J., Verbert, K., Duval, E.: Actual usage: the attention metadata approach. Educational Technology & Society\u00a010(3), 106\u2013121 (2007)","journal-title":"Educational Technology & Society"},{"key":"20_CR28","doi-asserted-by":"crossref","unstructured":"Yang, Y., Liu, X.: A re-examination of text categorization methods. In: Proc. SIGIR 1999, pp. 42\u201349 (1999)","DOI":"10.1145\/312624.312647"},{"issue":"2","key":"20_CR29","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s10618-005-0361-3","volume":"10","author":"Y. Zhao","year":"2005","unstructured":"Zhao, Y., Karypis, G., Fayyad, U.: Hierarchical clustering algorithms for document datasets. Data Mining and Knowledge Discovery\u00a010(2), 141\u2013168 (2005)","journal-title":"Data Mining and Knowledge Discovery"}],"container-title":["Lecture Notes in Computer Science","Sustaining TEL: From Innovation to Learning and Practice"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16020-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T15:48:55Z","timestamp":1559663335000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16020-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642160196","9783642160202"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16020-2_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}