{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:58:15Z","timestamp":1775199495877,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,1,13]],"date-time":"2008-01-13T00:00:00Z","timestamp":1200182400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["IIS-0133994CCF-0325273ITWF-0420533"],"award-info":[{"award-number":["IIS-0133994CCF-0325273ITWF-0420533"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-0133994CCF-0325273ITWF-0420533"],"award-info":[{"award-number":["IIS-0133994CCF-0325273ITWF-0420533"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["IIS-0133994CCF-0325273ITWF-0420533"],"award-info":[{"award-number":["IIS-0133994CCF-0325273ITWF-0420533"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR0011-04-1-0005"],"award-info":[{"award-number":["HR0011-04-1-0005"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,1,13]]},"DOI":"10.1145\/1378773.1378781","type":"proceedings-article","created":{"date-parts":[[2008,6,17]],"date-time":"2008-06-17T13:49:02Z","timestamp":1213710542000},"page":"50-59","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Integrating rich user feedback into intelligent user interfaces"],"prefix":"10.1145","author":[{"given":"Simone","family":"Stumpf","sequence":"first","affiliation":[{"name":"Oregon State University, Corvallis, OR"}]},{"given":"Erin","family":"Sullivan","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR"}]},{"given":"Erin","family":"Fitzhenry","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR"}]},{"given":"Ian","family":"Oberst","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR"}]},{"given":"Weng-Keen","family":"Wong","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR"}]},{"given":"Margaret","family":"Burnett","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR"}]}],"member":"320","published-online":{"date-parts":[[2008,1,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. UAI","author":"Altendorf E.","year":"2005","unstructured":"Altendorf , E. , Restificar , E. , Dietterich , T. Learning from sparse data by exploiting monotonicity constraints . Proc. UAI ( 2005 ). Altendorf, E., Restificar, E., Dietterich, T. Learning from sparse data by exploiting monotonicity constraints. Proc. UAI (2005)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124808"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040830.1040869"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040830.1040874"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/279943.279962"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. ICML","author":"Brutlag J.","year":"2000","unstructured":"Brutlag , J. , Meek , C. Challenges of the email domain for text classification . Proc. ICML ( 2000 ), 103--110. Brutlag, J., Meek, C. Challenges of the email domain for text classification. Proc. ICML (2000), 103--110."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.125.3.367"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/9780262033589.001.0001","volume-title":"Semi-Supervised Learning","author":"Chapelle O.","year":"2006","unstructured":"Chapelle , O. , Scholkopf , B. , Zien , A. Semi-Supervised Learning . MIT Press , Cambridge, MA , 2006 . Chapelle, O., Scholkopf, B., Zien, A. Semi-Supervised Learning. MIT Press, Cambridge, MA, 2006."},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. AAAI Spring Symp. Information Access","author":"Cohen W.","year":"1996","unstructured":"Cohen , W. Learning rules that classify e-mail . Proc. AAAI Spring Symp. Information Access ( 1996 ). Cohen, W. Learning rules that classify e-mail. Proc. AAAI Spring Symp. Information Access (1996)."},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. ICML","author":"Crawford E.","year":"2002","unstructured":"Crawford , E. , Kay , J. , McCreath , E. IEMS -- The Intelligent Email Sorter . Proc. ICML ( 2002 ), 83--90. Crawford, E., Kay, J., McCreath, E. IEMS -- The Intelligent Email Sorter. Proc. ICML (2002), 83--90."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2006.08.001"},{"key":"e_1_3_2_1_12_1","volume-title":"Watch What I Do: Programming by Demonstration","author":"Cypher A.","year":"1993","unstructured":"Cypher , A. (ed.) Watch What I Do: Programming by Demonstration , MIT Press , Cambridge, MA , 1993 . Cypher, A. (ed.) Watch What I Do: Programming by Demonstration, MIT Press, Cambridge, MA, 1993."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/604045.604056"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. NIPS","author":"Fung G.","year":"2002","unstructured":"Fung , G. , Mangasarian , O. , Shavlik , J. Knowledge-based support vector machine classifiers . Proc. NIPS ( 2002 ). Fung, G., Mangasarian, O., Shavlik, J. Knowledge-based support vector machine classifiers. Proc. NIPS (2002)."},{"key":"e_1_3_2_1_16_1","volume-title":"Human Mental Workload","author":"Hart S.","year":"1988","unstructured":"Hart , S. , Staveland , L. Development of a NASA-TLX (Task load index): Results of empirical and theoretical research , Human Mental Workload ( 1988 ), Hancock, P. and Meshkati, N. ( eds.), 139--183. Hart, S., Staveland, L. Development of a NASA-TLX (Task load index): Results of empirical and theoretical research, Human Mental Workload (1988), Hancock, P. and Meshkati, N. (eds.), 139--183."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358995"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/163430.164050"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148242"},{"key":"e_1_3_2_1_20_1","volume-title":"Your Wish is My Command: Programming By Example","author":"Lieberman H.","year":"2001","unstructured":"Lieberman , H. , (ed.) Your Wish is My Command: Programming By Example . 2001 . Lieberman, H., (ed.) Your Wish is My Command: Programming By Example. 2001."},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. AAAI","author":"Liu B.","year":"2004","unstructured":"Liu , B. Li , X. Lee , W. , Yu , P. Text Classification by Labeling Words . Proc. AAAI ( 2004 ). Liu, B. Li, X. Lee, W., Yu, P. Text Classification by Labeling Words. Proc. AAAI (2004)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040830.1040871"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/302979.303127"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111449.1111494"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2005.40"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111449.1111473"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216295.1216316"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/514412.514417"}],"event":{"name":"IUI08: 13th International Conference on Intelligent User Interfaces","location":"Gran Canaria Spain","acronym":"IUI08","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","ACM Association for Computing Machinery","SIGCHI ACM Special Interest Group on Computer-Human Interaction","AAAI Association for the Advancement of Artifical Intelligence"]},"container-title":["Proceedings of the 13th international conference on Intelligent user interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1378773.1378781","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1378773.1378781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:39:25Z","timestamp":1750253965000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1378773.1378781"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1,13]]},"references-count":27,"alternative-id":["10.1145\/1378773.1378781","10.1145\/1378773"],"URL":"https:\/\/doi.org\/10.1145\/1378773.1378781","relation":{},"subject":[],"published":{"date-parts":[[2008,1,13]]},"assertion":[{"value":"2008-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}