{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T03:47:49Z","timestamp":1772768869800,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,28]],"date-time":"2010-10-28T00:00:00Z","timestamp":1288224000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,28]]},"DOI":"10.1145\/1930464.1930472","type":"proceedings-article","created":{"date-parts":[[2011,1,25]],"date-time":"2011-01-25T13:34:48Z","timestamp":1295962488000},"page":"55-61","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Inferring problem solving strategies using eye-tracking"],"prefix":"10.1145","author":[{"given":"Shahram","family":"Eivazi","sequence":"first","affiliation":[{"name":"University of Eastern Finland"}]},{"given":"Roman","family":"Bednarik","sequence":"additional","affiliation":[{"name":"University of Eastern Finland"}]}],"member":"320","published-online":{"date-parts":[[2010,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the Twenty-first Annual Conference of the Cognitive Science Society (Cognitive Science Society (Us) Conference\/\/Proceedings). Psychology Press","author":"Ball L. J.","year":"1999","unstructured":"Ball , L. J. , and Quayle , J. D . Proceedings of the Twenty-first Annual Conference of the Cognitive Science Society (Cognitive Science Society (Us) Conference\/\/Proceedings). Psychology Press , 1999 . Ball, L. J., and Quayle, J. D. Proceedings of the Twenty-first Annual Conference of the Cognitive Science Society (Cognitive Science Society (Us) Conference\/\/Proceedings). Psychology Press, 1999."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.16910\/jemr.3.1.3"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0042-6989(00)00256-X"},{"key":"e_1_3_2_1_4_1","volume-title":"Department of Psychology at","author":"Ericsson K. A.","year":"2002","unstructured":"Ericsson , K. A. Protocol analysis and verbal reports on thinking. Tech. rep ., Department of Psychology at Florida State University , 2002 . Ericsson, K. A. Protocol analysis and verbal reports on thinking. Tech. rep., Department of Psychology at Florida State University, 2002."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5657.001.0001","volume-title":"Protocol Analysis: Verbal Reports as Data Revised Edition","author":"Ericsson K. A.","year":"1993","unstructured":"Ericsson , K. A. , and Simon , H. A . Protocol Analysis: Verbal Reports as Data Revised Edition . MIT press , 1993 . Ericsson, K. A., and Simon, H. A. Protocol Analysis: Verbal Reports as Data Revised Edition. MIT press, 1993."},{"key":"e_1_3_2_1_6_1","volume-title":"Methods in Mind","author":"Henderson J. M.","year":"2006","unstructured":"Henderson , J. M. Methods in Mind . MIT Press , 2006 . Henderson, J. M. Methods in Mind. MIT Press, 2006."},{"key":"e_1_3_2_1_7_1","volume-title":"Department of Computer Science","author":"Hsu C.-W.","year":"2003","unstructured":"Hsu , C.-W. , Chang , C.-C. , and Lin , C . -J. A practical guide to support vector classification. Tech. rep ., Department of Computer Science , National Taiwan University , 2003 . Hsu, C.-W., Chang, C.-C., and Lin, C.-J. A practical guide to support vector classification. Tech. rep., Department of Computer Science, National Taiwan University, 2003."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.87.4.329"},{"key":"e_1_3_2_1_9_1","volume-title":"Processes and Applications. North Holland","author":"Krappmann P.","year":"1995","unstructured":"Krappmann , P. Eye Movement Research, Volume 6: Mechanisms , Processes and Applications. North Holland , 1995 . Krappmann, P. Eye Movement Research, Volume 6: Mechanisms, Processes and Applications. North Holland, 1995."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/968363.968370"},{"key":"e_1_3_2_1_11_1","first-page":"609","volume-title":"Proceedings of IKNOW 2004","author":"Manuel V.","year":"2004","unstructured":"Manuel , V. , Garc\u00eda-Barrios , V. M. , G\u00fctl , C. , Preis , A. , Andrews , K. , Pivec , M. , M\u00f6dritscher , F. , and Trummer , C . Adele: A framework for adaptive e-learning through eye tracking . In Proceedings of IKNOW 2004 ( Graz, Austria , 2004 ), pp. 609 -- 616 . Manuel, V., Garc\u00eda-Barrios, V. M., G\u00fctl, C., Preis, A., Andrews, K., Pivec, M., M\u00f6dritscher, F., and Trummer, C. Adele: A framework for adaptive e-learning through eye tracking. In Proceedings of IKNOW 2004 (Graz, Austria, 2004), pp. 609--616."},{"key":"e_1_3_2_1_12_1","unstructured":"Max Planck Institute for Biological cybernetics. The meaning of gamma value in rbf kernel. http:\/\/agbs.kyb.tuebingen.mpg.de\/km\/bb\/showthread.php?tid=1240 7 2009.  Max Planck Institute for Biological cybernetics. The meaning of gamma value in rbf kernel . http:\/\/agbs.kyb.tuebingen.mpg.de\/km\/bb\/showthread.php?tid=1240 7 2009."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1006\/cogp.1997.0676"},{"key":"e_1_3_2_1_14_1","volume-title":"Computing system that fo faculty and staff in Rutgers New Brunswick\/Piscataway campus, 7","author":"Schmidt C. F.","year":"2005","unstructured":"Schmidt , C. F. Human cognition as computation. Tech. rep ., Computing system that fo faculty and staff in Rutgers New Brunswick\/Piscataway campus, 7 2005 . Schmidt, C. F. Human cognition as computation. Tech. rep., Computing system that fo faculty and staff in Rutgers New Brunswick\/Piscataway campus, 7 2005."},{"key":"e_1_3_2_1_15_1","volume-title":"Cognitive Science An Introduction","author":"Stillings N. A.","year":"1995","unstructured":"Stillings , N. A. , Weisler , S. W. , Chase , C. H. , Feinstein , M. H. , Garfield , J. L. , and Rissland , E. L . Cognitive Science An Introduction : Second Edition. The MIT Press , 1995 . Stillings, N. A., Weisler, S. W., Chase, C. H., Feinstein, M. H., Garfield, J. L., and Rissland, E. L. Cognitive Science An Introduction: Second Edition. The MIT Press, 1995."},{"key":"e_1_3_2_1_16_1","volume-title":"Cognitive science. Stanford encyclopedia of philosophy, 6","author":"Thagard P.","year":"2010","unstructured":"Thagard , P. Cognitive science. Stanford encyclopedia of philosophy, 6 2010 . Thagard, P. Cognitive science. Stanford encyclopedia of philosophy, 6 2010."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1162\/0148926041790630"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.learninstruc.2009.02.009"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-05605-9"},{"key":"e_1_3_2_1_20_1","volume-title":"International Workshop on Information Security and Application (IWISA 2009)","author":"Xiang J.","year":"2009","unstructured":"Xiang , J. , Yan , H. , and Chen , J . The study of decoding mental state based eye tracks using svm . In International Workshop on Information Security and Application (IWISA 2009) ( 2009 ). Xiang, J., Yan, H., and Chen, J. The study of decoding mental state based eye tracks using svm. In International Workshop on Information Security and Application (IWISA 2009) (2009)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10488-6_17"}],"event":{"name":"Koli Calling '10: 10th Koli Calling International Conference on Computing Education Research","location":"Koli Finland","acronym":"Koli Calling '10","sponsor":["FU-BERLIN Free University Berlin","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 10th Koli Calling International Conference on Computing Education Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1930464.1930472","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1930464.1930472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:19Z","timestamp":1750248499000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1930464.1930472"}},"subtitle":["system description and evaluation"],"short-title":[],"issued":{"date-parts":[[2010,10,28]]},"references-count":21,"alternative-id":["10.1145\/1930464.1930472","10.1145\/1930464"],"URL":"https:\/\/doi.org\/10.1145\/1930464.1930472","relation":{},"subject":[],"published":{"date-parts":[[2010,10,28]]},"assertion":[{"value":"2010-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}