{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:59:03Z","timestamp":1775199543734,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,2,8]],"date-time":"2009-02-08T00:00:00Z","timestamp":1234051200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,2,8]]},"DOI":"10.1145\/1502650.1502678","type":"proceedings-article","created":{"date-parts":[[2009,2,10]],"date-time":"2009-02-10T16:46:07Z","timestamp":1234284367000},"page":"187-196","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":56,"title":["Fixing the program my computer learned"],"prefix":"10.1145","author":[{"given":"Todd","family":"Kulesza","sequence":"first","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Weng-Keen","family":"Wong","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Simone","family":"Stumpf","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Stephen","family":"Perona","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Rachel","family":"White","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Margaret M.","family":"Burnett","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Ian","family":"Oberst","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Amy J.","family":"Ko","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,2,8]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2","article-title":"Toward a unifying theory of behavioral change","volume":"8","author":"Bandura A.","year":"1977","unstructured":"Bandura , A. Self -efficacy : Toward a unifying theory of behavioral change . Psychological Review 8 , 2 ( 1977 ), 191--215. Bandura, A. Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review 8, 2 (1977), 191--215.","journal-title":"Psychological Review"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/383784.383809"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055094"},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Software Engineering","author":"Burnett M.","year":"2003","unstructured":"Burnett , M. , Cook , C. , Pendse , O. , Rothermel , G. , Summet , J. , and Wallace , C . End-user software engineering with assertions in the spreadsheet paradigm . International Conference on Software Engineering , 2003 , 93--103. Burnett, M., Cook, C., Pendse, O., Rothermel, G., Summet, J., and Wallace, C. End-user software engineering with assertions in the spreadsheet paradigm. International Conference on Software Engineering, 2003, 93--103."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622810.1622818"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378773.1378794"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.6.2.118"},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. Wkshp. Empirical Studies of Programmers","author":"Davies S. P.","year":"1996","unstructured":"Davies , S. P. Display-based problem solving strategies in computer programming , Proc. Wkshp. Empirical Studies of Programmers , Ablex , ( 1996 ), 59--76. Davies, S. P. Display-based problem solving strategies in computer programming, Proc. Wkshp. Empirical Studies of Programmers, Ablex, (1996), 59--76."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378773.1378804"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2008.4639077"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2004.47"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/08839519308949993"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1017\/S026988890200019X"},{"key":"e_1_3_2_1_15_1","volume-title":"Your Wish is My Command: Programming By Example","author":"Lieberman H.","year":"2001","unstructured":"Lieberman , H. (ed.) Your Wish is My Command: Programming By Example , Morgan Kaufmann Publishers, Inc ( 2001 ). Lieberman, H. (ed.) Your Wish is My Command: Programming By Example, Morgan Kaufmann Publishers, Inc (2001)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240767"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/302979.303127"},{"key":"e_1_3_2_1_18_1","volume-title":"Gender differences in information processing: A selectivity interpretation. P. Cafferata &amp","author":"Meyers","year":"1989","unstructured":"Meyers --Levy, J. Gender differences in information processing: A selectivity interpretation. P. Cafferata &amp ; A. Tybout, (Eds) Cognitive and Affective Responses to Advertising, Lexington Books ( 1989 ). Meyers--Levy, J. Gender differences in information processing: A selectivity interpretation. P. Cafferata &amp; A. Tybout, (Eds) Cognitive and Affective Responses to Advertising, Lexington Books (1989)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124832"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357160"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. IAAI","author":"Poulin B.","year":"2006","unstructured":"Poulin , B. , Eisner , R. , Szafron , D. , Lu , P. , Greiner , R. , Wishart , D. S. , Fyshe , A. , Pearcy , B. , MacDonnell , C. , and Anvik , J . Visual explanation of evidence in additive classifiers . Proc. IAAI , ( 2006 ). Poulin, B., Eisner, R., Szafron, D., Lu, P., Greiner, R., Wishart, D. S., Fyshe, A., Pearcy, B., MacDonnell, C., and Anvik, J. Visual explanation of evidence in additive classifiers. Proc. IAAI, (2006)."},{"key":"e_1_3_2_1_22_1","volume-title":"Artificial Intelligence: A Modern Approach","author":"Russell S. J.","year":"2003","unstructured":"Russell , S. J. , and Norvig , P . Artificial Intelligence: A Modern Approach . Upper Saddle River, NJ : Prentice Hall . 2003 . Russell, S. J., and Norvig, P. Artificial Intelligence: A Modern Approach. Upper Saddle River, NJ: Prentice Hall. 2003."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216295.1216316"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378773.1378781"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357153"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/212430.212443"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/964442.964450"}],"event":{"name":"IUI09: 14th International Conference on Intelligent User Interfaces","location":"Sanibel Island Florida USA","acronym":"IUI09","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","ACM Association for Computing Machinery","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 14th international conference on Intelligent user interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1502650.1502678","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1502650.1502678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:52Z","timestamp":1750255072000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1502650.1502678"}},"subtitle":["barriers for end users, challenges for the machine"],"short-title":[],"issued":{"date-parts":[[2009,2,8]]},"references-count":26,"alternative-id":["10.1145\/1502650.1502678","10.1145\/1502650"],"URL":"https:\/\/doi.org\/10.1145\/1502650.1502678","relation":{},"subject":[],"published":{"date-parts":[[2009,2,8]]},"assertion":[{"value":"2009-02-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}