{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:58Z","timestamp":1763468098710,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,2,7]],"date-time":"2010-02-07T00:00:00Z","timestamp":1265500800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,2,7]]},"DOI":"10.1145\/1719970.1720011","type":"proceedings-article","created":{"date-parts":[[2012,10,4]],"date-time":"2012-10-04T20:18:52Z","timestamp":1349381932000},"page":"281-284","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Temporal task footprinting"],"prefix":"10.1145","author":[{"given":"Oliver","family":"Brdiczka","sequence":"first","affiliation":[{"name":"Palo Alto Research Center (PARC), Palo Alto, CA, USA"}]},{"given":"Norman Makoto","family":"Su","sequence":"additional","affiliation":[{"name":"University of California Irvine, Irvine, CA, USA"}]},{"given":"James Bo","family":"Begole","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center (PARC), Palo Alto, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,2,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/587078.587125"},{"key":"e_1_3_2_1_2_1","volume-title":"Berkeley","author":"Bilmes J.","year":"1998","unstructured":"J. Bilmes , A gentle tutorial of the EM algorithm and its application to parameter estimation for gaussian mixture and hidden Markov models, Technical report TR-97-021, U.C . Berkeley , April 1998 . J. Bilmes, A gentle tutorial of the EM algorithm and its application to parameter estimation for gaussian mixture and hidden Markov models, Technical report TR-97-021, U.C. Berkeley, April 1998."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985785"},{"key":"e_1_3_2_1_4_1","volume-title":"LIBSVM: a library for support vector machines","author":"Chang C.C.","year":"2001","unstructured":"C.C. Chang and C. J. Lin . LIBSVM: a library for support vector machines , 2001 . http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm C.C. Chang and C. J. Lin. LIBSVM: a library for support vector machines, 2001. http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040830.1040855"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.2307\/3556620"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-006-0059-1"},{"key":"e_1_3_2_1_8_1","volume-title":"Instruments, & Computers, 32(1):93--110","author":"Magnusson M. S.","year":"2000","unstructured":"M. S. Magnusson . Discovering hidden time patterns in behavior: T-patterns and their detection. Behavior Research Methods , Instruments, & Computers, 32(1):93--110 , 2000 . M. S. Magnusson. Discovering hidden time patterns in behavior: T-patterns and their detection. Behavior Research Methods, Instruments, & Computers, 32(1):93--110, 2000."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055017"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111449.1111492"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/587078.587126"},{"key":"e_1_3_2_1_13_1","volume-title":"Introduction to Modern Information Retrieval","author":"Salton G.","year":"1983","unstructured":"G. Salton , M. McGill (eds). Introduction to Modern Information Retrieval . McGraw-Hill . 1983 . G. Salton, M. McGill (eds). Introduction to Modern Information Retrieval. McGraw-Hill. 1983."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111449.1111473"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1502650.1502690"},{"key":"e_1_3_2_1_16_1","volume-title":"Morgan Kaufmann","author":"Witten H.","year":"2005","unstructured":"H. Witten , E. Frank . Data Mining : Practical machine learning tools and techniques , Morgan Kaufmann , San Francisco , 2005 . Software available at http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/ H. Witten, E. Frank. Data Mining: Practical machine learning tools and techniques, Morgan Kaufmann, San Francisco, 2005. Software available at http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"}],"event":{"name":"IUI '10: 15th International Conference on Intelligent User Interfaces","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Hong Kong China","acronym":"IUI '10"},"container-title":["Proceedings of the 15th international conference on Intelligent user interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1719970.1720011","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1719970.1720011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:19Z","timestamp":1750250479000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1719970.1720011"}},"subtitle":["identifying routine tasks by their temporal patterns"],"short-title":[],"issued":{"date-parts":[[2010,2,7]]},"references-count":16,"alternative-id":["10.1145\/1719970.1720011","10.1145\/1719970"],"URL":"https:\/\/doi.org\/10.1145\/1719970.1720011","relation":{},"subject":[],"published":{"date-parts":[[2010,2,7]]},"assertion":[{"value":"2010-02-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}