{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:42:36Z","timestamp":1776105756063,"version":"3.50.1"},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T00:00:00Z","timestamp":1695772800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T00:00:00Z","timestamp":1695772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s11432-023-3779-5","type":"journal-article","created":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T19:01:37Z","timestamp":1696014097000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A unified user behavior model for trajectory-based tasks with different types of path constraints"],"prefix":"10.1007","volume":"66","author":[{"given":"Hao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jin","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Huawei","family":"Tu","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Guozhong","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Hongan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,27]]},"reference":[{"key":"3779_CR1","doi-asserted-by":"publisher","first-page":"044101","DOI":"10.1007\/s11432-017-9326-8","volume":"61","author":"J Huang","year":"2018","unstructured":"Huang J, Peng X L, Tian F, et al. Modeling a target-selection motion by leveraging an optimal feedback control mechanism. Sci China Inf Sci, 2018, 61: 044101","journal-title":"Sci China Inf Sci"},{"key":"3779_CR2","doi-asserted-by":"publisher","first-page":"204101","DOI":"10.1007\/s11432-020-2999-y","volume":"64","author":"F Lyu","year":"2021","unstructured":"Lyu F, Liu Y J, Huang J, et al. LotusMenu: a 3D menu using wrist and elbow rotation inspired by Chinese traditional symbol. Sci China Inf Sci, 2021, 64: 204101","journal-title":"Sci China Inf Sci"},{"key":"3779_CR3","doi-asserted-by":"crossref","unstructured":"Henke K, Teti M, Kenyon G, et al. Apples-to-spikes: the first detailed comparison of LASSO solutions generated by a spiking neuromorphic processor. In: Proceedings of the International Conference on Neuromorphic Systems, 2022. 1\u20138","DOI":"10.1145\/3546790.3546811"},{"key":"3779_CR4","doi-asserted-by":"crossref","unstructured":"Accot J, Zhai S. Beyond Fitts\u2019 law: models for trajectory-based HCI tasks. In: Proceedings of Extended Abstracts on Human Factors in Computing Systems, 1997. 295\u2013302","DOI":"10.1145\/258549.258760"},{"key":"3779_CR5","doi-asserted-by":"crossref","unstructured":"Yamanaka S, Stuerzlinger W, Miyashita H. Steering through successive ob jects. In: Proceedings of the CHI Conference on Human Factors in Computing Systems, 2018. 1\u201313","DOI":"10.1145\/3173574.3174177"},{"key":"3779_CR6","doi-asserted-by":"publisher","first-page":"101675","DOI":"10.1016\/j.asej.2021.101675","volume":"13","author":"M S Das","year":"2022","unstructured":"Das M S, Sanyal S, Mandal S. Navigation of multiple robots in formative manner in an unknown environment using artificial potential field based path planning algorithm. Ain Shams Eng J, 2022, 13: 101675","journal-title":"Ain Shams Eng J"},{"key":"3779_CR7","unstructured":"Liu J, Li C S. A new method to solve the local minimum problem of an artificial potential field (in Chinese). In: Proceedings of the 15th China Mechanical Design Convention, 2009. 76\u201378, 85"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-023-3779-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-023-3779-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-023-3779-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T21:27:45Z","timestamp":1731965265000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-023-3779-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,27]]},"references-count":7,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["3779"],"URL":"https:\/\/doi.org\/10.1007\/s11432-023-3779-5","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,27]]},"assertion":[{"value":"10 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"204101"}}