{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T09:17:44Z","timestamp":1759742264344,"version":"3.41.0"},"reference-count":44,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2010,3,1]],"date-time":"2010-03-01T00:00:00Z","timestamp":1267401600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput.-Hum. Interact."],"published-print":{"date-parts":[[2010,3]]},"abstract":"<jats:p>Can we learn about users' problem-solving strategies by observing their actions? This article introduces a data mining system that extracts complex behavioral patterns from logged user actions to discover users' high-level strategies. Our application domain is an HCI study aimed at revealing users' strategies in an end-user debugging task and understanding how the strategies relate to gender and to success. We cast this problem as a sequential pattern discovery problem, where user strategies are manifested as sequential behavior patterns. Problematically, we found that the patterns discovered by standard data mining algorithms were difficult to interpret and provided limited information about high-level strategies. To help interpret the patterns as strategies, we examined multiple ways of clustering the patterns into meaningful groups. This collectively led to interesting findings about users' behavior in terms of both gender differences and debugging success. These common behavioral patterns were novel HCI findings about differences in males' and females' behavior with software, and were verified by a parallel study with an independent data set on strategies. As a research endeavor into the interpretability issues faced by data mining techniques, our work also highlights important research directions for making data mining more accessible to non-data-mining experts.<\/jats:p>","DOI":"10.1145\/1721831.1721834","type":"journal-article","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T02:56:32Z","timestamp":1270608992000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Mining problem-solving strategies from HCI data"],"prefix":"10.1145","volume":"17","author":[{"given":"Xiaoli","family":"Fern","sequence":"first","affiliation":[{"name":"Oregon State University, Corvallis, OR"}]},{"given":"Chaitanya","family":"Komireddy","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR"}]},{"given":"Valentina","family":"Grigoreanu","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR"}]},{"given":"Margaret","family":"Burnett","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR"}]}],"member":"320","published-online":{"date-parts":[[2010,4,6]]},"reference":[{"volume-title":"Proceedings of the 11th International Conference on Data Engineering. 3--14","author":"Agrawal R.","key":"e_1_2_1_1_1"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775109"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2004.28"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.382"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055094"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2007.42"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124808"},{"volume-title":"Proceedings of Gender &amp; Interaction: Real and Virtual Women in a Male World, (Workshop at AVI). 9--12","author":"Brewer J.","key":"e_1_2_1_8_1"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/968486.968487"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015864.1015889"},{"key":"e_1_2_1_11_1","unstructured":"Casella G. and Berger R. L. 1990. Statistical Inference. Duxbury Press.  Casella G. and Berger R. L. 1990. Statistical Inference. Duxbury Press."},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Cervone G. and Michalski R. 2002. Modeling user behavior by integrating aq learning with a database: Initial results. Intell. Inform. Syst. 43--56.   Cervone G. and Michalski R. 2002. Modeling user behavior by integrating aq learning with a database: Initial results. Intell. Inform. Syst. 43--56.","DOI":"10.1007\/978-3-7908-1777-5_5"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/503376.503412"},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Dettling M. and Buehlmann P. 2002. Supervised clustering of genes. Genome Biol. 3.  Dettling M. and Buehlmann P. 2002. Supervised clustering of genes. Genome Biol. 3.","DOI":"10.1186\/gb-2002-3-12-research0069"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944973"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775095"},{"volume-title":"SPIRIT: Sequential pattern mining with regular expression constraints. In VLDB J. 223--234.","year":"1999","author":"Garofalakis M. N.","key":"e_1_2_1_17_1"},{"volume-title":"Proceedings of the International Conference on Data Mining.","author":"Gouda K.","key":"e_1_2_1_18_1"},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Hastie T. Tibshirani B. and Friedman J. 2001. Elements of Statistical Learning: Data Mining Inference and Prediction. Springer-Verlag.  Hastie T. Tibshirani B. and Friedman J. 2001. Elements of Statistical Learning: Data Mining Inference and Prediction. Springer-Verlag.","DOI":"10.1007\/978-0-387-21606-5"},{"volume-title":"Proceedings of the 12th International Conference on Data Engineering. 115--122","author":"Hatonen K.","key":"e_1_2_1_20_1"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/371578.371593"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/331499.331504"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240844"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(99)00060-0"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2005.10.001"},{"volume-title":"Proceedings of the 1st International Conference on Data Mining and Knowledge Discovery, 259--289","author":"Mannila H.","key":"e_1_2_1_26_1"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150441"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/345124.345169"},{"volume-title":"Proceedings of the 7th International Conference on Database Theory.","author":"Pasquier N.","key":"e_1_2_1_29_1"},{"volume-title":"Proceedings of International Conference on Data Engineering.","author":"Pei J.","key":"e_1_2_1_30_1"},{"volume-title":"Proceedings of the 15th National Conference on Artificial Intelligence.","author":"Perkowitz M.","key":"e_1_2_1_31_1"},{"key":"e_1_2_1_32_1","unstructured":"Rode J. 2008. An ethnographic examination of the relationship of gender &amp; end-user programming. Ph.D. thesis University of California Irvine.   Rode J. 2008. An ethnographic examination of the relationship of gender &amp; end-user programming. Ph.D. thesis University of California Irvine."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0272-0"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2007.17"},{"volume-title":"Proceedings of the 2nd IEEE International Conference on Data Mining. 418--425","author":"Seno M.","key":"e_1_2_1_35_1"},{"volume-title":"Proceedings of the 23rd European Colloquium on Information Retrieval Research.","author":"Slonim N.","key":"e_1_2_1_36_1"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846188"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357153"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642649"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150495"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150452"},{"volume-title":"Proceedings of the International Conference on Very Large Data Bases.","author":"Xin D.","key":"e_1_2_1_42_1"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081907"},{"volume-title":"Proceedings of the 3rd SIAM International Conference on Data Mining.","author":"Yan X.","key":"e_1_2_1_44_1"}],"container-title":["ACM Transactions on Computer-Human Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1721831.1721834","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1721831.1721834","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:38Z","timestamp":1750249418000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1721831.1721834"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,3]]}},"alternative-id":["10.1145\/1721831.1721834"],"URL":"https:\/\/doi.org\/10.1145\/1721831.1721834","relation":{},"ISSN":["1073-0516","1557-7325"],"issn-type":[{"type":"print","value":"1073-0516"},{"type":"electronic","value":"1557-7325"}],"subject":[],"published":{"date-parts":[[2010,3]]},"assertion":[{"value":"2007-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-04-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}