{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:23:12Z","timestamp":1776093792170,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,9,12]],"date-time":"2016-09-12T00:00:00Z","timestamp":1473638400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/L018829\/2"],"award-info":[{"award-number":["EP\/L018829\/2"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,12]]},"DOI":"10.1145\/2971648.2971747","type":"proceedings-article","created":{"date-parts":[[2016,9,9]],"date-time":"2016-09-09T14:28:57Z","timestamp":1473431337000},"page":"1223-1234","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":122,"title":["PrefMiner"],"prefix":"10.1145","author":[{"given":"Abhinav","family":"Mehrotra","sequence":"first","affiliation":[{"name":"University of Birmingham, University College London, United Kingdom"}]},{"given":"Robert","family":"Hendley","sequence":"additional","affiliation":[{"name":"University of Birmingham, United Kingdom"}]},{"given":"Mirco","family":"Musolesi","sequence":"additional","affiliation":[{"name":"University College London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2016,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. Android DDMS. (2016). http:\/\/developer.android.com\/tools\/debugging\/ddms.html.  2016. Android DDMS. (2016). http:\/\/developer.android.com\/tools\/debugging\/ddms.html."},{"key":"e_1_3_2_1_2_1","unstructured":"2016. CLOC -- Count Lines of Code. (2016). http:\/\/cloc.sourceforge.net.  2016. CLOC -- Count Lines of Code. (2016). http:\/\/cloc.sourceforge.net."},{"key":"e_1_3_2_1_3_1","unstructured":"2016. Facebook http:\/\/www.facebook.com. (2016).  2016. Facebook http:\/\/www.facebook.com. (2016)."},{"key":"e_1_3_2_1_4_1","unstructured":"2016. Google Now. (2016). http:\/\/www.google.com\/landing\/now\/.  2016. Google Now. (2016). http:\/\/www.google.com\/landing\/now\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2016. qdapDictionaries for R. (2016). http:\/\/trinker.github.io\/qdapDictionaries\/  2016. qdapDictionaries for R. (2016). http:\/\/trinker.github.io\/qdapDictionaries\/"},{"key":"e_1_3_2_1_6_1","unstructured":"2016. Snowball Stemming Libraries for R. (2016). http:\/\/snowball.tartarus.org.  2016. Snowball Stemming Libraries for R. (2016). http:\/\/snowball.tartarus.org."},{"key":"e_1_3_2_1_7_1","unstructured":"2016. Weka: Data Mining Software in Java. (2016). http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/  2016. Weka: Data Mining Software in Java. (2016). http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985727"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2005.12.009"},{"key":"e_1_3_2_1_11_1","volume-title":"INTERACT'01","author":"Bailey Brian P","year":"2001","unstructured":"Brian P Bailey , Joseph A Konstan , and John V Carlis . 2001 . The effects of interruptions on task performance, annoyance, and anxiety in the user interface . In INTERACT'01 . Brian P Bailey, Joseph A Konstan, and John V Carlis. 2001. The effects of interruptions on task performance, annoyance, and anxiety in the user interface. In INTERACT'01."},{"key":"e_1_3_2_1_12_1","volume-title":"Text mining: applications and theory","author":"Berry Michael W","unstructured":"Michael W Berry and Jacob Kogan . 2010. Text mining: applications and theory . John Wiley & Sons . Michael W Berry and Jacob Kogan. 2010. Text mining: applications and theory. John Wiley & Sons."},{"key":"e_1_3_2_1_13_1","volume-title":"Using language","author":"Clark Herbert H","unstructured":"Herbert H Clark . 1996. Using language . Cambridge University Press . Herbert H Clark. 1996. Using language. Cambridge University Press."},{"key":"e_1_3_2_1_14_1","unstructured":"Edward Cutrell Mary Czerwinski and Eric Horvitz. 2001. Notification disruption and memory: Effects of messaging interruptions on memory and performance. In Interact'01.  Edward Cutrell Mary Czerwinski and Eric Horvitz. 2001. Notification disruption and memory: Effects of messaging interruptions on memory and performance. In Interact'01."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00265-009-0739-0"},{"key":"e_1_3_2_1_16_1","volume-title":"KDD'96","author":"Ester Martin","year":"1996","unstructured":"Martin Ester , Hans-Peter Kriegel , J\u00f6rg Sander , and Xiaowei Xu . 1996 . A density-based algorithm for discovering clusters in large spatial databases with noise .. In KDD'96 . Martin Ester, Hans-Peter Kriegel, J\u00f6rg Sander, and Xiaowei Xu. 1996. A density-based algorithm for discovering clusters in large spatial databases with noise.. In KDD'96."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381943"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037402"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851600.1851620"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2009.124"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055100"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031690"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718926"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2807544"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858566"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2807517"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183568.1183573"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632062"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2693843"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628363.2628364"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556973"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Stephanie Rosenthal Anind K Dey and Manuela Veloso. 2011. Using decision-theoretic experience sampling to build personalized mobile phone interruption models. In Pervasive Computing. 170--187.   Stephanie Rosenthal Anind K Dey and Manuela Veloso. 2011. Using decision-theoretic experience sampling to build personalized mobile phone interruption models. In Pervasive Computing. 170--187.","DOI":"10.1007\/978-3-642-21726-5_11"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557189"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TGE.1977.6498972"},{"key":"e_1_3_2_1_35_1","volume-title":"ICML'97","author":"Yang Yiming","year":"1997","unstructured":"Yiming Yang and Jan O Pedersen . 1997 . A comparative study on feature selection in text categorization . In ICML'97 . Yiming Yang and Jan O Pedersen. 1997. A comparative study on feature selection in text categorization. In ICML'97."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1878961.1878982"}],"event":{"name":"UbiComp '16: The 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing","location":"Heidelberg Germany","acronym":"UbiComp '16","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2971648.2971747","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2971648.2971747","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:15Z","timestamp":1750218615000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2971648.2971747"}},"subtitle":["mining user's preferences for intelligent mobile notification management"],"short-title":[],"issued":{"date-parts":[[2016,9,12]]},"references-count":36,"alternative-id":["10.1145\/2971648.2971747","10.1145\/2971648"],"URL":"https:\/\/doi.org\/10.1145\/2971648.2971747","relation":{},"subject":[],"published":{"date-parts":[[2016,9,12]]},"assertion":[{"value":"2016-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}