{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:41Z","timestamp":1750220741524,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T00:00:00Z","timestamp":1552262400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,11]]},"DOI":"10.1145\/3311823.3311875","type":"proceedings-article","created":{"date-parts":[[2019,3,6]],"date-time":"2019-03-06T20:08:54Z","timestamp":1551902934000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An Implicit Dialogue Injection System for Interruption Management"],"prefix":"10.1145","author":[{"given":"Tomoki","family":"Shibata","sequence":"first","affiliation":[{"name":"Tufts University, Medford, MA, USA"}]},{"given":"Alena","family":"Borisenko","sequence":"additional","affiliation":[{"name":"Tufts University, Medford, MA, USA"}]},{"given":"Anzu","family":"Hakone","sequence":"additional","affiliation":[{"name":"Tufts University, Medford, MA, USA"}]},{"given":"Tal","family":"August","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Leonidas","family":"Deligiannidis","sequence":"additional","affiliation":[{"name":"Wentworth Institute of Technology, Boston, MA, USA"}]},{"given":"Chen-Hsiang","family":"Yu","sequence":"additional","affiliation":[{"name":"Wentworth Institute of Technology, Boston, MA, USA"}]},{"given":"Matthew","family":"Russell","sequence":"additional","affiliation":[{"name":"Tufts University, Medford, MA, USA"}]},{"given":"Alex","family":"Olwal","sequence":"additional","affiliation":[{"name":"Google Inc., Mountain View, CA, USA"}]},{"given":"Robert J. K.","family":"Jacob","sequence":"additional","affiliation":[{"name":"Tufts University, Medford, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,3,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985727"},{"key":"e_1_3_2_1_2_1","volume-title":"Jacob","author":"Afergan Daniel","year":"2015","unstructured":"Daniel Afergan , Samuel W. Hincks , Tomoki Shibata , and Robert J. K . Jacob . 2015 . Phylter : A System for Modulating Notifications in Wearables Using Physiological Sensing. In Foundations of Augmented Cognition. Springer International Publishing , Cham, 167--177. Daniel Afergan, Samuel W. Hincks, Tomoki Shibata, and Robert J. K.Jacob. 2015. Phylter: A System for Modulating Notifications in Wearables Using Physiological Sensing. In Foundations of Augmented Cognition. Springer International Publishing, Cham, 167--177."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557230"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642918.2647414"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807447"},{"key":"e_1_3_2_1_6_1","volume-title":"2000 IEEE International Conference on","volume":"2","author":"Bailey Brian P","year":"2000","unstructured":"Brian P Bailey , Joseph A Konstan , and John V Carlis . 2000 . Measuring the effects of interruptions on task performance in the user interface. In Systems, Man, and Cybernetics , 2000 IEEE International Conference on , Vol. 2 . IEEE, 757--762. Brian P Bailey, Joseph A Konstan, and John V Carlis. 2000. Measuring the effects of interruptions on task performance in the user interface. In Systems, Man, and Cybernetics, 2000 IEEE International Conference on, Vol. 2. IEEE, 757--762."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0032696"},{"key":"e_1_3_2_1_8_1","first-page":"621","article-title":"Do interrupted users work faster or slower? The microanalysis of computerized text editing task","volume":"1","author":"Burmistrov Ivan","year":"2003","unstructured":"Ivan Burmistrov and Anna Leonova . 2003 . Do interrupted users work faster or slower? The microanalysis of computerized text editing task . Human-Computer Interaction: Theory and Practice (Part I)-Proceedings of HCI International 1 (2003), 621 -- 625 . Ivan Burmistrov and Anna Leonova. 2003. Do interrupted users work faster or slower? The microanalysis of computerized text editing task. Human-Computer Interaction: Theory and Practice (Part I)-Proceedings of HCI International 1 (2003), 621--625.","journal-title":"Human-Computer Interaction: Theory and Practice (Part I)-Proceedings of HCI International"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/985921.986103"},{"key":"e_1_3_2_1_11_1","volume-title":"Nonoxidative glucose consumption during focal physiologic neural activity. Science 241, 4864","author":"Fox Peter T","year":"1988","unstructured":"Peter T Fox , Marcus E Raichle , Mark A Mintun , and Carmen Dence . 1988. Nonoxidative glucose consumption during focal physiologic neural activity. Science 241, 4864 ( 1988 ), 462--464. Peter T Fox, Marcus E Raichle, Mark A Mintun, and Carmen Dence. 1988. Nonoxidative glucose consumption during focal physiologic neural activity. Science 241, 4864 (1988), 462--464."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1037\/e577632012-009"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11527886_59"},{"key":"e_1_3_2_1_14_1","volume-title":"Attention-sensitive Alerting. In Proceedings of the Fifteenth Conference on Uncertainty in Artificial Intelligence (UAI'99)","author":"Horvitz Eric","year":"1999","unstructured":"Eric Horvitz , Andy Jacobs , and David Hovel . 1999 . Attention-sensitive Alerting. In Proceedings of the Fifteenth Conference on Uncertainty in Artificial Intelligence (UAI'99) . Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 305--313. http:\/\/dl.acm.org\/citation.cfm?id= 2073796.2073831 Eric Horvitz, Andy Jacobs, and David Hovel. 1999. Attention-sensitive Alerting. In Proceedings of the Fifteenth Conference on Uncertainty in Artificial Intelligence (UAI'99). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 305--313. http:\/\/dl.acm.org\/citation.cfm?id=2073796.2073831"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031690"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3940(93)90094-2"},{"key":"e_1_3_2_1_17_1","unstructured":"Chih-Wei Hsu Chih-Chung Chang Chih-Jen Lin etal 2003. A practical guide to support vector classification. (2003).  Chih-Wei Hsu Chih-Chung Chang Chih-Jen Lin et al. 2003. A practical guide to support vector classification. (2003)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357070"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718926"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/3019350"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732825"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858359"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858236"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/966930.966933"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI1701_1"},{"volume-title":"Object-oriented software construction","author":"Meyer Bertrand","key":"e_1_3_2_1_26_1","unstructured":"Bertrand Meyer . 1988. Object-oriented software construction . Vol. 2 . Prentice hall New York . Bertrand Meyer. 1988. Object-oriented software construction. Vol. 2. Prentice hall New York."},{"key":"e_1_3_2_1_27_1","volume-title":"Bullmore","author":"Owen Adrian M","year":"2005","unstructured":"Adrian M Owen , Kathryn M McMillan , Angela R Laird , and Ed Bullmore . 2005 . N-back working memory paradigm: A meta-analysis of normative functional neuroimaging studies. Human brain mapping 25, 1 (2005), 46--59. Adrian M Owen, Kathryn M McMillan, Angela R Laird, and Ed Bullmore. 2005. N-back working memory paradigm: A meta-analysis of normative functional neuroimaging studies. Human brain mapping 25, 1 (2005), 46--59."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.315"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470723"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632062"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732704"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2658779.2658790"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1978997"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858174"},{"key":"e_1_3_2_1_35_1","volume-title":"CAPTCHA: Using Hard AI Problems for Security. In Advances in Cryptology --- EUROCRYPT","author":"von Ahn Luis","year":"2003","unstructured":"Luis von Ahn , Manuel Blum , Nicholas J. Hopper , and John Langford . 2003 . CAPTCHA: Using Hard AI Problems for Security. In Advances in Cryptology --- EUROCRYPT 2003, Eli Biham (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg, 294--311. Luis von Ahn, Manuel Blum, Nicholas J. Hopper, and John Langford. 2003. CAPTCHA: Using Hard AI Problems for Security. In Advances in Cryptology --- EUROCRYPT 2003, Eli Biham (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 294--311."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1978963"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025946"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858388"}],"event":{"name":"AH2019: Augmented Human International Conference 2019","acronym":"AH2019","location":"Reims France"},"container-title":["Proceedings of the 10th Augmented Human International Conference 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3311823.3311875","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3311823.3311875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:39Z","timestamp":1750199919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3311823.3311875"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,11]]},"references-count":38,"alternative-id":["10.1145\/3311823.3311875","10.1145\/3311823"],"URL":"https:\/\/doi.org\/10.1145\/3311823.3311875","relation":{},"subject":[],"published":{"date-parts":[[2019,3,11]]},"assertion":[{"value":"2019-03-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}