{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T23:36:15Z","timestamp":1762299375500,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T00:00:00Z","timestamp":1587772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CERES Center","award":["N\/A"],"award-info":[{"award-number":["N\/A"]}]},{"DOI":"10.13039\/100007515","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1837120,1835890"],"award-info":[{"award-number":["1837120,1835890"]}],"id":[{"id":"10.13039\/100007515","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,25]]},"DOI":"10.1145\/3334480.3382940","type":"proceedings-article","created":{"date-parts":[[2020,5,28]],"date-time":"2020-05-28T13:51:35Z","timestamp":1590673895000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Visualizing Differences to Improve End-User Understanding of Trigger-Action Programs"],"prefix":"10.1145","author":[{"given":"Valerie","family":"Zhao","sequence":"first","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Lefan","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Bo","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China &amp; University of Chicago, Hefei, China"}]},{"given":"Shan","family":"Lu","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Blase","family":"Ur","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,4,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Google Docs Has Full 'Track Changes' Word Integration. (12","author":"Araghi Koosha","year":"2014","unstructured":"Koosha Araghi. 2014. Google Docs Has Full 'Track Changes' Word Integration. (12 2014). Retrieved July 8, 2019 from https:\/\/www.upcurvecloud.com\/blog\/google-docshas-full-track-changes-word-integration\/"},{"volume-title":"Principles of Model Checking (Representation and Mind Series)","author":"Baier Christel","key":"e_1_3_2_1_2_1","unstructured":"Christel Baier and Joost-Pieter Katoen. 2008. Principles of Model Checking (Representation and Mind Series). The MIT Press."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI16234_05"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300782"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2009.147"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979249"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185501"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2017.30"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3217197.3217206"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/3157382.3157609"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300618"},{"key":"e_1_3_2_1_12_1","volume-title":"Luigi De Russis, and Alberto Monge Roffarello","author":"Corno Fulvio","year":"2019","unstructured":"Fulvio Corno, Luigi De Russis, and Alberto Monge Roffarello. 2019b. My IoT Puzzle: Debugging IF-THEN Rules Through the Jigsaw Metaphor. In End-User Development, Alessio Malizia, Stefano Valtolina, Anders Morch, Alan Serrano, and Andrew Stratton (Eds.). Springer International Publishing, Cham, 18--33."},{"key":"e_1_3_2_1_13_1","volume-title":"Software Visualization: Visualizing the Structure, Behaviour, and Evolution of Software","author":"Diehl Stephan","year":"2007","unstructured":"Stephan Diehl. 2007. Software Visualization: Visualizing the Structure, Behaviour, and Evolution of Software. Springer-Verlag, Berlin, Heidelberg."},{"key":"e_1_3_2_1_14_1","volume-title":"Introducing Mozilla WebThings. (April","author":"Francis Ben","year":"2019","unstructured":"Ben Francis. 2019. Introducing Mozilla WebThings. (April 2019). Retrieved July 8, 2019 from https:\/\/hacks.mozilla.org\/2019\/04\/introducingmozilla-webthings\/"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3057861"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00036"},{"key":"e_1_3_2_1_17_1","volume-title":"SAFECHAIN: Securing Trigger-Action Programming from Attack Chains (Extended Technical Report). CoRR abs\/1903.03760","author":"Hsu Kai-Hsiang","year":"2019","unstructured":"Kai-Hsiang Hsu, Yu-Hsi Chiang, and Hsu-Chun Hsiao. 2019. SAFECHAIN: Securing Trigger-Action Programming from Attack Chains (Extended Technical Report). CoRR abs\/1903.03760 (2019). http:\/\/arxiv.org\/abs\/1903.03760"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2805830"},{"key":"e_1_3_2_1_19_1","volume-title":"Bigham","author":"Huang Ting-Hao K.","year":"2019","unstructured":"Ting-Hao K. Huang, Amos Azaria, Oscar J. Romero, and Jeffrey P. Bigham. 2019. Instructable Crowd: Creating IF-THEN Rules for Smartphones via Conversations with the Crowd. Human Computation (2019), 101--131."},{"key":"e_1_3_2_1_20_1","volume-title":"diff. (2018). Retrieved","author":"IEEE and The Open Group","year":"2019","unstructured":"IEEE and The Open Group. 2018. diff. (2018). Retrieved Jan 5, 2019 from https:\/\/pubs.opengroup.org\/onlinepubs\/9699919799\/utilities\/diff.html"},{"key":"e_1_3_2_1_21_1","volume-title":"IFTTT helps your apps and devices work together. (2019). Retrieved","author":"IFTTT.","year":"2019","unstructured":"IFTTT. 2019a. IFTTT helps your apps and devices work together. (2019). Retrieved July 6, 2019 from https:\/\/ifttt.com\/"},{"key":"e_1_3_2_1_22_1","volume-title":"Retrieved","author":"Platform IFTTT.","year":"2019","unstructured":"IFTTT. 2019b. IFTTT Platform. (2019). Retrieved July 6, 2019 from https:\/\/platform.ifttt.com\/lp\/learn_more"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the PLEA Conference.","author":"Isalgue Antonio","year":"2006","unstructured":"Antonio Isalgue, Massimo Palme, Helena Roura, and Rafael Serra. 2006. The Importance of Users' Actions for the Sensation of Comfort in Buildings. In Proceedings of the PLEA Conference."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1922649.1922658"},{"key":"e_1_3_2_1_25_1","first-page":"707","article-title":"Binary Codes Capable of Correcting Deletions, Insertions and Reversals","volume":"10","author":"Levenshtein VI","year":"1966","unstructured":"VI Levenshtein. 1966. Binary Codes Capable of Correcting Deletions, Insertions and Reversals. Soviet Physics Doklady 10 (1966), 707.","journal-title":"Soviet Physics Doklady"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993422.2993426"},{"key":"e_1_3_2_1_27_1","volume-title":"Huang","author":"Mennicken Sarah","year":"2012","unstructured":"Sarah Mennicken and Elaine M. Huang. 2012. Hacking the Natural Habitat: An In-the-Wild Study of Smart Homes, Their Development, and the People Who Live in Them. In Proceedings of Pervasive Computing. Springer Berlin Heidelberg, Berlin, Heidelberg, 143--160."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858168"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131369"},{"volume-title":"Create a flow in Microsoft Flow. (May","year":"2019","key":"e_1_3_2_1_30_1","unstructured":"MSFTMan. 2019. Create a flow in Microsoft Flow. (May 2019). Retrieved July 8, 2019 from https:\/\/docs.microsoft.com\/en-us\/flow\/getstarted-logic-flow"},{"key":"e_1_3_2_1_31_1","volume-title":"A Small Matter of Programming: Perspectives on End User Computing","author":"Nardi Bonnie A.","unstructured":"Bonnie A. Nardi. 1993. A Small Matter of Programming: Perspectives on End User Computing (1st ed.). MIT Press, Cambridge, MA, USA.","edition":"1"},{"key":"e_1_3_2_1_32_1","volume-title":"Introducing Split Diffs. (Sept","author":"Otto Mark","year":"2014","unstructured":"Mark Otto. 2014. Introducing Split Diffs. (Sept 2014). https:\/\/github.blog\/2014-09-03-introducingsplit-diffs\/"},{"volume-title":"Revised Lectures on Software Visualization, International Seminar","author":"Pauw Wim De","key":"e_1_3_2_1_33_1","unstructured":"Wim De Pauw, Erik Jensen, Nick Mitchell, Gary Sevitsky, John M. Vlissides, and Jeaha Yang. 2001. Visualizing the Execution of Java Programs. In Revised Lectures on Software Visualization, International Seminar. Springer-Verlag, Berlin, Heidelberg, 151--162."},{"key":"e_1_3_2_1_34_1","unstructured":"Jamie Peabody. 2019. Diff Text Documents Online With Mergely. (2019). http:\/\/www.mergely.com\/"},{"key":"e_1_3_2_1_35_1","volume-title":"What Is Version History and How to Use It in Google Docs? (April","author":"Pot Justin","year":"2019","unstructured":"Justin Pot. 2019. What Is Version History and How to Use It in Google Docs? (April 2019). Retrieved July 8, 2019 from https:\/\/zapier.com\/apps\/google-docs\/tutorials\/google-docs-revision-history"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052709"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557420"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858556"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345662"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2806063"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025617"},{"key":"e_1_3_2_1_43_1","unstructured":"Zapier. 2019. How Zapier Works. (2019). https:\/\/zapier.com\/help\/how-zapier-works\/"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00043"}],"event":{"name":"CHI '20: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Honolulu HI USA","acronym":"CHI '20"},"container-title":["Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3334480.3382940","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3334480.3382940","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:21Z","timestamp":1750199601000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3334480.3382940"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,25]]},"references-count":44,"alternative-id":["10.1145\/3334480.3382940","10.1145\/3334480"],"URL":"https:\/\/doi.org\/10.1145\/3334480.3382940","relation":{},"subject":[],"published":{"date-parts":[[2020,4,25]]},"assertion":[{"value":"2020-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}