{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T08:02:00Z","timestamp":1773734520221,"version":"3.50.1"},"reference-count":63,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T00:00:00Z","timestamp":1599177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["CCF-1837120,OAC-1835890,CNS-1764039,CNS-1563956,CNS-1514256,IIS-1546543"],"award-info":[{"award-number":["CCF-1837120,OAC-1835890,CNS-1764039,CNS-1563956,CNS-1514256,IIS-1546543"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2020,9,4]]},"abstract":"<jats:p>Two common approaches for automating IoT smart spaces are having users write rules using trigger-action programming (TAP) or training machine learning models based on observed actions. In this paper, we unite these approaches. We introduce and evaluate Trace2TAP, a novel method for automatically synthesizing TAP rules from traces (time-stamped logs of sensor readings and manual actuations of devices). We present a novel algorithm that uses symbolic reasoning and SAT-solving to synthesize TAP rules from traces. Compared to prior approaches, our algorithm synthesizes generalizable rules more comprehensively and fully handles nuances like out-of-order events. Trace2TAP also iteratively proposes modified TAP rules when users manually revert automations. We implemented our approach on Samsung SmartThings. Through formative deployments in ten offices, we developed a clustering\/ranking system and visualization interface to intelligibly present the synthesized rules to users. We evaluated Trace2TAP through a field study in seven additional offices. Participants frequently selected rules ranked highly by our clustering\/ranking system. Participants varied in their automation priorities, and they sometimes chose rules that would seem less desirable by traditional metrics like precision and recall. Trace2TAP supports these differing priorities by comprehensively synthesizing TAP rules and bringing humans into the loop during automation.<\/jats:p>","DOI":"10.1145\/3411838","type":"journal-article","created":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T21:39:45Z","timestamp":1599255585000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Trace2TAP"],"prefix":"10.1145","volume":"4","author":[{"given":"Lefan","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Chicago"}]},{"given":"Weijia","family":"He","sequence":"additional","affiliation":[{"name":"University of Chicago"}]},{"given":"Olivia","family":"Morkved","sequence":"additional","affiliation":[{"name":"University of Chicago"}]},{"given":"Valerie","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Chicago"}]},{"given":"Michael L.","family":"Littman","sequence":"additional","affiliation":[{"name":"Brown University"}]},{"given":"Shan","family":"Lu","sequence":"additional","affiliation":[{"name":"University of Chicago"}]},{"given":"Blase","family":"Ur","sequence":"additional","affiliation":[{"name":"University of Chicago"}]}],"member":"320","published-online":{"date-parts":[[2020,9,4]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2012.2189204"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214262"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0471-4"},{"key":"e_1_2_1_4_1","volume-title":"Dey","author":"Barkhuus Louise","year":"2003","unstructured":"Louise Barkhuus and Anind K . Dey . 2003 . Is context-aware computing taking control away from the user? Three levels of interactivity examined. In Proceedings of Ubicomp . Louise Barkhuus and Anind K. Dey. 2003. Is context-aware computing taking control away from the user? Three levels of interactivity examined. In Proceedings of Ubicomp."},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.","author":"Brackenbury Will","year":"2019","unstructured":"Will Brackenbury , Abhimanyu Deora , Jillian Ritchey , Jason Vallee , Weijia He , Guan Wang , Michael L. Littman , and Blase Ur . 2019 . How users interpret bugs in trigger-action programming . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Will Brackenbury, Abhimanyu Deora, Jillian Ritchey, Jason Vallee, Weijia He, Guan Wang, Michael L. Littman, and Blase Ur. 2019. How users interpret bugs in trigger-action programming. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3057858"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185501"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.","author":"Chiang Yi-Shyuan","year":"2020","unstructured":"Yi-Shyuan Chiang , Ruei-Che Chang , Yi-Lin Chuang , Shih-Ya Chou , Hao-Ping Lee , I- Ju Lin , Jian-Hua Jiang Chen , and Yung-Ju Chang . 2020 . Exploring the design space of user-system communication for smart-home routine assistants . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Yi-Shyuan Chiang, Ruei-Che Chang, Yi-Lin Chuang, Shih-Ya Chou, Hao-Ping Lee, I-Ju Lin, Jian-Hua Jiang Chen, and Yung-Ju Chang. 2020. Exploring the design space of user-system communication for smart-home routine assistants. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132031"},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.","author":"Corno Fulvio","year":"2019","unstructured":"Fulvio Corno , Luigi De Russis , and Alberto Monge Roffarello . 2019 . Empowering end users in debugging trigger-action rules . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Fulvio Corno, Luigi De Russis, and Alberto Monge Roffarello. 2019. Empowering end users in debugging trigger-action rules. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1995376.1995394"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188641"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s007790170019"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.","author":"Anind","unstructured":"Anind K. Dey and Alan Newberger. 2009. Support for context-aware intelligibility and control . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Anind K. Dey and Alan Newberger. 2009. Support for context-aware intelligibility and control. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems."},{"key":"e_1_2_1_16_1","volume-title":"Grinter","author":"Keith Edwards W.","year":"2001","unstructured":"W. Keith Edwards and Rebecca E . Grinter . 2001 . At home with ubiquitous computing: Seven challenges. In Proceedings of Ubicomp . W. Keith Edwards and Rebecca E. Grinter. 2001. At home with ubiquitous computing: Seven challenges. In Proceedings of Ubicomp."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3057861"},{"key":"e_1_2_1_18_1","volume-title":"Wah","author":"Gu Jun","year":"1996","unstructured":"Jun Gu , Paul W. Purdom , John Franco , and Benjamin W . Wah . 1996 . Algorithms for the satisfiability (SAT) problem: A survey. Technical Report. Cincinnati University Department of Electrical and Computer Engineering . Jun Gu, Paul W. Purdom, John Franco, and Benjamin W. Wah. 1996. Algorithms for the satisfiability (SAT) problem: A survey. Technical Report. Cincinnati University Department of Electrical and Computer Engineering."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1836089.1836091"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277223"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00036"},{"key":"e_1_2_1_22_1","unstructured":"Home Assistant. 2020. https:\/\/www.home-assistant.io\/docs\/automation\/.  Home Assistant. 2020. https:\/\/www.home-assistant.io\/docs\/automation\/."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2805830"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009769707641"},{"key":"e_1_2_1_25_1","unstructured":"Matthew Hughes. 2018. Mozilla's new Things Gateway is an open home for your smart devices. TheNextWeb. https:\/\/thenextweb.com\/dd\/2018\/02\/07\/mozillas-things-gateway-wants-your-smart-home-devices-to-play-nice\/  Matthew Hughes. 2018. Mozilla's new Things Gateway is an open home for your smart devices. TheNextWeb. https:\/\/thenextweb.com\/dd\/2018\/02\/07\/mozillas-things-gateway-wants-your-smart-home-devices-to-play-nice\/"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39653-6_20"},{"key":"e_1_2_1_27_1","unstructured":"IFTTT. 2020. https:\/\/ifttt.com.  IFTTT. 2020. https:\/\/ifttt.com."},{"key":"e_1_2_1_28_1","volume-title":"How IoT devices & smart home automation is entering our homes","author":"Intelligence Insider","year":"2020","unstructured":"Insider Intelligence . 2020. How IoT devices & smart home automation is entering our homes in 2020 . Business Insider . https:\/\/www.businessinsider.com\/iot-smart-home-automation. Insider Intelligence. 2020. How IoT devices & smart home automation is entering our homes in 2020. Business Insider. https:\/\/www.businessinsider.com\/iot-smart-home-automation."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1932682.1869463"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287049"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806833"},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the 24th Annual Network and Distributed System Security Symposium.","author":"Jia Yunhan Jack","year":"2017","unstructured":"Yunhan Jack Jia , Qi Alfred Chen , Shiqi Wang , Amir Rahmati , Earlence Fernandes , Zhuoqing Morley Mao , and Atul Prakash . 2017 . ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms . In Proceedings of the 24th Annual Network and Distributed System Security Symposium. Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Zhuoqing Morley Mao, and Atul Prakash. 2017. ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms. In Proceedings of the 24th Annual Network and Distributed System Security Symposium."},{"key":"e_1_2_1_33_1","unstructured":"Thorin Klosowski. 2016. Automation showdown: IFTTT vs Zapier vs Microsoft Flow. LifeHacker. http:\/\/lifehacker.com\/automation-showdown-ifttt-vs-zapier-vs-microsoft-flow-1782584748  Thorin Klosowski. 2016. Automation showdown: IFTTT vs Zapier vs Microsoft Flow. LifeHacker. http:\/\/lifehacker.com\/automation-showdown-ifttt-vs-zapier-vs-microsoft-flow-1782584748"},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing.","author":"Lee Joohyun","unstructured":"Joohyun Lee , Kyunghan Lee , Euijin Jeong , Jaemin Jo , and Ness B. Shroff . 2016. Context-aware application scheduling in mobile systems: What will users do and not do next? . In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing. Joohyun Lee, Kyunghan Lee, Euijin Jeong, Jaemin Jo, and Ness B. Shroff. 2016. Context-aware application scheduling in mobile systems: What will users do and not do next?. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing."},{"key":"e_1_2_1_35_1","unstructured":"Nat Levy. 2017. Microsoft updates IFTTT competitor Flow and custom app building tool PowerApps. GeekWire. https:\/\/www.geekwire.com\/2017\/microsoft-updates-ifttt-competitor-flow-custom-app-building-tool-powerapps\/  Nat Levy. 2017. Microsoft updates IFTTT competitor Flow and custom app building tool PowerApps. GeekWire. https:\/\/www.geekwire.com\/2017\/microsoft-updates-ifttt-competitor-flow-custom-app-building-tool-powerapps\/"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993422.2993426"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the 11th International Conference on Ubiquitous Computing.","author":"Brian","unstructured":"Brian Y. Lim and Anind K. Dey. 2009. Assessing demand for intelligibility in context-aware applications . In Proceedings of the 11th International Conference on Ubiquitous Computing. Brian Y. Lim and Anind K. Dey. 2009. Assessing demand for intelligibility in context-aware applications. In Proceedings of the 11th International Conference on Ubiquitous Computing."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.11.005"},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.","author":"Mennicken Sarah","year":"2016","unstructured":"Sarah Mennicken , David Kim , and Elaine May Huang . 2016 . Integrating the smart home into the digital calendar . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Sarah Mennicken, David Kim, and Elaine May Huang. 2016. Integrating the smart home into the digital calendar. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems."},{"key":"e_1_2_1_40_1","volume-title":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing.","author":"Mennicken Sarah","unstructured":"Sarah Mennicken , Jo Vermeulen , and Elaine M. Huang . 2014. From today's augmented houses to tomorrow's smart homes: New directions for home automation research . In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. Sarah Mennicken, Jo Vermeulen, and Elaine M. Huang. 2014. From today's augmented houses to tomorrow's smart homes: New directions for home automation research. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131369"},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 805--814","author":"Minor Bryan","unstructured":"Bryan Minor , Janardhan Rao Doppa , and Diane J. Cook . 2015. Data-driven activity prediction: Algorithms, evaluation methodology, and applications . In Proceedings of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 805--814 . Bryan Minor, Janardhan Rao Doppa, and Diane J. Cook. 2015. Data-driven activity prediction: Algorithms, evaluation methodology, and applications. In Proceedings of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 805--814."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2750669"},{"key":"e_1_2_1_44_1","unstructured":"Walt Mossberg. 2014. SmartThings automates your house via sensors app. Recode. https:\/\/www.vox.com\/2014\/1\/28\/11622774\/smartthings-automates-your-house-via-sensors-app  Walt Mossberg. 2014. SmartThings automates your house via sensors app. Recode. https:\/\/www.vox.com\/2014\/1\/28\/11622774\/smartthings-automates-your-house-via-sensors-app"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2800835.2800916"},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security.","author":"Nandi Chandrakana","unstructured":"Chandrakana Nandi and Michael D. Ernst . 2016. Automatic trigger generation for rule-based smart homes . In Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security. Chandrakana Nandi and Michael D. Ernst. 2016. Automatic trigger generation for rule-based smart homes. In Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/4472.4476"},{"key":"e_1_2_1_48_1","unstructured":"openHAB. 2020. https:\/\/www.openhab.org\/.  openHAB. 2020. https:\/\/www.openhab.org\/."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00034"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494091.2494122"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2025137"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/0377-0427(87)90125-7"},{"key":"e_1_2_1_53_1","volume-title":"Automated clinical assessment from Smart home-based behavior data","author":"Schmitter-Edgecombe Maureen","year":"2015","unstructured":"Maureen Schmitter-Edgecombe . 2015. Automated clinical assessment from Smart home-based behavior data . IEEE Journal of Biomedical and Health Informatics ( 2015 ). Maureen Schmitter-Edgecombe. 2015. Automated clinical assessment from Smart home-based behavior data. IEEE Journal of Biomedical and Health Informatics (2015)."},{"key":"e_1_2_1_54_1","volume-title":"Proceedings of the 37th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages.","author":"Srivastava Saurabh","unstructured":"Saurabh Srivastava , Sumit Gulwani , and Jeffrey S. Foster . 2010. From program verification to program synthesis . In Proceedings of the 37th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. Saurabh Srivastava, Sumit Gulwani, and Jeffrey S. Foster. 2010. From program verification to program synthesis. In Proceedings of the 37th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052709"},{"key":"e_1_2_1_56_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.","author":"Ur Blase","unstructured":"Blase Ur , Elyse McManus , Melwyn Pak Yong Ho , and Michael L. Littman . 2014. Practical trigger-action programming in the smart home . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Blase Ur, Elyse McManus, Melwyn Pak Yong Ho, and Michael L. Littman. 2014. Practical trigger-action programming in the smart home. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems."},{"key":"e_1_2_1_57_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.","author":"Ur Blase","unstructured":"Blase Ur , Melwyn Pak Yong Ho , Stephen Brawner , Jiyun Lee , Sarah Mennicken , Noah Picard , Diane Schulze , and Michael L. Littman . 2016. Trigger-action programming in the wild: An analysis of 200,000 IFTTT recipes . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Blase Ur, Melwyn Pak Yong Ho, Stephen Brawner, Jiyun Lee, Sarah Mennicken, Noah Picard, Diane Schulze, and Michael L. Littman. 2016. Trigger-action programming in the wild: An analysis of 200,000 IFTTT recipes. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems."},{"key":"e_1_2_1_58_1","volume-title":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security.","author":"Wang Qi","unstructured":"Qi Wang , Pubali Datta , Wei Yang , Si Liu , Adam Bates , and Carl A. Gunter . 2019. Charting the Attack Surface of Trigger-Action IoT Platforms . In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Qi Wang, Pubali Datta, Wei Yang, Si Liu, Adam Bates, and Carl A. Gunter. 2019. Charting the Attack Surface of Trigger-Action IoT Platforms. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security."},{"key":"e_1_2_1_59_1","volume-title":"Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing.","author":"Lim Woo","year":"2015","unstructured":"Jong-bum Woo and Youn-kyung Lim . 2015 . User experience in do-it-yourself-style smart homes . In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. Jong-bum Woo and Youn-kyung Lim. 2015. User experience in do-it-yourself-style smart homes. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing."},{"key":"e_1_2_1_60_1","volume-title":"Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing.","author":"Yang Rayoung","unstructured":"Rayoung Yang and Mark W. Newman . 2013. Learning from a learning thermostat: Lessons for intelligent systems for the home . In Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing. Rayoung Yang and Mark W. Newman. 2013. Learning from a learning thermostat: Lessons for intelligent systems for the home. In Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing."},{"key":"e_1_2_1_61_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.","author":"Yarosh Lana","year":"2017","unstructured":"Lana Yarosh and Pamela Zave . 2017 . Locked or not?: Mental models of IoT feature interaction . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Lana Yarosh and Pamela Zave. 2017. Locked or not?: Mental models of IoT feature interaction. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00043"},{"key":"e_1_2_1_63_1","volume-title":"Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing.","author":"Zhao Sha","unstructured":"Sha Zhao , Julian Ramos , Jianrong Tao , Ziwen Jiang , Shijian Li , Zhaohui Wu , Gang Pan , and Anind K. Dey . 2016. Discovering different kinds of smartphone users through their application usage behaviors . In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing. Sha Zhao, Julian Ramos, Jianrong Tao, Ziwen Jiang, Shijian Li, Zhaohui Wu, Gang Pan, and Anind K. Dey. 2016. Discovering different kinds of smartphone users through their application usage behaviors. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing."}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411838","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411838","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:48Z","timestamp":1750195488000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411838"}},"subtitle":["Synthesizing Trigger-Action Programs from Traces of Behavior"],"short-title":[],"issued":{"date-parts":[[2020,9,4]]},"references-count":63,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,9,4]]}},"alternative-id":["10.1145\/3411838"],"URL":"https:\/\/doi.org\/10.1145\/3411838","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,4]]},"assertion":[{"value":"2020-09-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}