{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T18:02:29Z","timestamp":1770660149717,"version":"3.49.0"},"reference-count":105,"publisher":"Association for Computing Machinery (ACM)","issue":"EICS","license":[{"start":{"date-parts":[[2021,5,27]],"date-time":"2021-05-27T00:00:00Z","timestamp":1622073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006012","name":"Christian Doppler Forschungsgesellschaft","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006012","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2021,5,27]]},"abstract":"<jats:p>Many monitoring tools that help developers in analyzing the run-time behavior of their applications share a common shortcoming: they require their users to have a fair amount of experience in monitoring applications to understand the used terminology and the available analysis features. Consequently, novice users who lack this knowledge often struggle to use these tools efficiently. In this paper, we introduce the guided exploration (GE) method that aims to make interactive monitoring tools easier to use and learn. In general, tools that implement GE should provide four support operations on each analysis step: they should automatically (1) detect and (2) highlight the most important information on the screen, (3) explain why it is important, and (4) suggest which next steps are appropriate. This way, tools guide users through their analysis processes, helping them to explore the root cause of a problem. At the same time, users learn the capabilities of the tool and how to use them efficiently. We show how GE can be implemented in new monitoring tools as well as how it can be integrated into existing ones. To demonstrate GE's feasibility and usefulness, we present how we extended the memory monitoring tool AntTracks to provided guided exploration support during memory leak analysis and memory churn analysis. We use these guidances in two user scenarios to inspect and improve the memory behavior of the monitored applications. We hope that our contribution will help usability researchers and developers in making monitoring tools more novice-friendly by improving their usability and learnability.<\/jats:p>","DOI":"10.1145\/3461731","type":"journal-article","created":{"date-parts":[[2021,5,30]],"date-time":"2021-05-30T01:12:52Z","timestamp":1622337172000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Guided Exploration"],"prefix":"10.1145","volume":"5","author":[{"given":"Markus","family":"Weninger","sequence":"first","affiliation":[{"name":"Johannes Kelper University, Linz, Austria"}]},{"given":"Elias","family":"Gander","sequence":"additional","affiliation":[{"name":"Johannes Kepler University, Linz, Austria"}]},{"given":"Hanspeter","family":"M\u00f6ssenb\u00f6ck","sequence":"additional","affiliation":[{"name":"Johannes Kepler University, Linz, Austria"}]}],"member":"320","published-online":{"date-parts":[[2021,5,29]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025869312943"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2901774"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2661672"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3358960.3379123"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807426.2807433"},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Alan Blackwell and Thomas Green. 2003. CHAPTER 5 - Notational Systems - The Cognitive Dimensions of Notations Framework . In HCI Models Theories and Frameworks. Morgan Kaufmann 103 -- 133. https:\/\/doi.org\/10.1016\/B978--155860808--5\/50005--8 Alan Blackwell and Thomas Green. 2003. CHAPTER 5 - Notational Systems - The Cognitive Dimensions of Notations Framework . In HCI Models Theories and Frameworks. Morgan Kaufmann 103 -- 133. https:\/\/doi.org\/10.1016\/B978--155860808--5\/50005--8","DOI":"10.1016\/B978-155860808-5\/50005-8"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1088874"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1449814.1449911"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032497.2032523"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970347"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183481"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/238218.238347"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/949343.949320"},{"key":"e_1_2_1_14_1","unstructured":"Dynatrace. 2017. Demo Applications: easyTravel. https:\/\/community.dynatrace.com\/community\/display\/DL\/Demo Dynatrace. 2017. Demo Applications: easyTravel. https:\/\/community.dynatrace.com\/community\/display\/DL\/Demo"},{"key":"e_1_2_1_15_1","unstructured":"Applications Applications"},{"key":"e_1_2_1_16_1","unstructured":"Applications -"},{"key":"e_1_2_1_17_1","unstructured":"easyTravel easyTravel"},{"key":"e_1_2_1_18_1","volume-title":"Static and Dynamic Analysis: Synergy and Duality. In Workshop on Dynamic Analysis (WODA). 24--27","author":"Ernst Michael D.","year":"2003"},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Alexander Felfernig Gerald Ninaus Harald Grabner Florian Reinfrank Leopold Weninger Dennis Pagano and Walid Maalej. 2013. An Overview of Recommender Systems in Requirements Engineering . In Managing Requirements Knowledge. 315--332. https:\/\/doi.org\/10.1007\/978--3--642--34419-0_14 Alexander Felfernig Gerald Ninaus Harald Grabner Florian Reinfrank Leopold Weninger Dennis Pagano and Walid Maalej. 2013. An Overview of Recommender Systems in Requirements Engineering . In Managing Requirements Knowledge. 315--332. https:\/\/doi.org\/10.1007\/978--3--642--34419-0_14","DOI":"10.1007\/978-3-642-34419-0_14"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642803.2642831"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the 10th International Conference on Human-Computer Interaction (HCII). 93--97","author":"Folmer Eelke","year":"2003"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2010.09.007"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/646151.679366"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the 1st TC 13 IFIP Human-Computer Interaction Symposium (HCIS)","volume":"272","author":"Josefina Guerrero","year":"2008"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3151759.3151795"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.377"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/169891.169892"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133651.1133654"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851553.2851559"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1039539.1039541"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314183.3324978"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170472.3133844"},{"key":"e_1_2_1_33_1","unstructured":"V. L\u00f3pez Jaquero F. Montero J.P. Molina and P. Gonz\u00e1lez. 2009. Intelligent User Interfaces: Past Present and Future. Springer London 1--12. https:\/\/doi.org\/10.1007\/978--1--84800--136--7_18 V. L\u00f3pez Jaquero F. Montero J.P. Molina and P. Gonz\u00e1lez. 2009. Intelligent User Interfaces: Past Present and Future. Springer London 1--12. https:\/\/doi.org\/10.1007\/978--1--84800--136--7_18"},{"key":"e_1_2_1_34_1","first-page":"11","article-title":"The Think Aloud Method: A Guide to User Interface Design","volume":"73","author":"Jaspers Monique W. M.","year":"2004","journal-title":"I. J. Medical Informatics"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306331"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486877"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3335082.3335125"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the 9th Symposium on Software Performance (SSP). http:\/\/eprints.uni-kiel.de\/48775\/","author":"Jung Reiner","year":"2018"},{"key":"e_1_2_1_39_1","volume-title":"Softwaretechnik-Trends","volume":"37","author":"Jung Reiner","year":"2017"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39510-4_45"},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the 3rd International Conference on Software and Data Technologies (ICSOFT)","volume":"268","author":"Kristoffersen Steinar","year":"2008"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2972206.2972220"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668930.2688037"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851553.2851555"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3030207.3030211"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106919"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/IV.2010.21"},{"key":"e_1_2_1_48_1","volume-title":"The Handbook of Task Analysis for Human-Computer Interaction","author":"Limbourg Quentin"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/1772490.1772619"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/949343.949333"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835822"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/291080.291081"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1120212.1120318"},{"key":"e_1_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Gerrit Meixner Marc Seissler and Kai Breiner. 2011. Model-Driven Useware Engineering . In Model-Driven Development of Advanced User Interfaces. 1--26. https:\/\/doi.org\/10.1007\/978--3--642--14562--9_1 Gerrit Meixner Marc Seissler and Kai Breiner. 2011. Model-Driven Useware Engineering . In Model-Driven Development of Advanced User Interfaces. 1--26. https:\/\/doi.org\/10.1007\/978--3--642--14562--9_1","DOI":"10.1007\/978-3-642-14562-9_1"},{"key":"e_1_2_1_55_1","unstructured":"MyBatis. 2016. JPetStore. http:\/\/mybatis.org\/jpetstore-6\/ MyBatis. 2016. JPetStore. http:\/\/mybatis.org\/jpetstore-6\/"},{"key":"e_1_2_1_56_1","volume-title":"Classical and modern regression with applications","author":"Myers Raymond H"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/529793"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142405.1142439"},{"key":"e_1_2_1_59_1","unstructured":"Oracle. 2020. VisualVM: All-in-One Java Troubleshooting Tool. https:\/\/visualvm.github.io\/ Oracle. 2020. VisualVM: All-in-One Java Troubleshooting Tool. https:\/\/visualvm.github.io\/"},{"key":"e_1_2_1_60_1","volume-title":"Proceedings of the 11th Iberian Conference on Information Systems and Technologies (CISTI). 1--6. https:\/\/doi.org\/10","author":"Ornelas J. D.","year":"2016"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.5555\/647403.723688"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/646156.679713"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851553.2851563"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314637"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.12.034"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.03.013"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3296979.3192417"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.01.001"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/VISSOF.2009.5336418"},{"key":"e_1_2_1_70_1","volume-title":"Proceedings of the 6th International Conference on Education and New Learning Technologies (EDULEARN)","author":"Renz J."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2093157.2093178"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2555670.2466484"},{"key":"e_1_2_1_73_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/08874417.2001.11647015","article-title":"Explaining Software Development Tool Use with the Technology Acceptance Model","volume":"41","author":"Riemenschneider Cynthia K.","year":"2001","journal-title":"Journal of Computer Information Systems (JCIS)"},{"key":"e_1_2_1_74_1","volume-title":"Learning by Doing . Instructional-design theories and models: A new paradigm of instructional theory","author":"Schank Roger C","year":"1999"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3030207.3030234"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302541.3313101"},{"key":"e_1_2_1_77_1","volume-title":"Efficient Sampling-based Lock Contention Profiling in Java. Master's thesis","author":"Sch\u00f6rgenhumer Andreas","year":"1825"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/350391.350420"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2018.00057"},{"key":"e_1_2_1_80_1","volume-title":"Christoffer H\u00f6 glund, Kent Niesel, and Vilhelm Bergmann.","author":"Staron Miroslaw","year":"2014"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/97924.97942"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.5555\/2819009.2819052"},{"key":"e_1_2_1_83_1","unstructured":"textEclipse Foundation. 2020. Eclipse Memory Analyzer (MAT). https:\/\/www.eclipse.org\/mat\/ textEclipse Foundation. 2020. Eclipse Memory Analyzer (MAT). https:\/\/www.eclipse.org\/mat\/"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/263367.263401"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660339"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080788"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33015409"},{"key":"e_1_2_1_88_1","unstructured":"Markus Weninger et almbox. 2020 a. AntTracks. http:\/\/mevss.jku.at\/AntTracks Markus Weninger et almbox. 2020 a. AntTracks. http:\/\/mevss.jku.at\/AntTracks"},{"key":"e_1_2_1_89_1","volume-title":"Proceedings of the 9th Symp. on Software Performance (SSP). 64--66","author":"Weninger Markus"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3237009.3237023"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297663.3310297"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357390.3361025"},{"key":"e_1_2_1_93_1","volume-title":"Proceedings of the 11th Symp. on Software Performance (SSP). http:\/\/pi.informatik.uni-siegen.de\/stt\/39_4\/01_Fachgruppenberichte\/SSP2019\/SSP2019_Weninger.pdf","author":"Weninger Markus","year":"2020"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394977"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2018.00016"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3030207.3030236"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302541.3313100"},{"key":"e_1_2_1_98_1","volume-title":"Proceedings of the 10th Symp. on Software Performance (SSP). 44--46","author":"Weninger Markus","year":"2019"},{"key":"e_1_2_1_99_1","volume-title":"Proceedings of the Working Conference on Software Visualization, (VISSOFT). 110--121","author":"Weninger Markus","year":"2020"},{"key":"e_1_2_1_100_1","volume-title":"Proceedings of the 11th Symp. on Software Performance (SSP). http:\/\/pi.informatik.uni-siegen.de\/stt\/39_4\/01_Fachgruppenberichte\/SSP2019\/SSP2019_Weninger.pdf","author":"Weninger Markus","year":"2020"},{"key":"e_1_2_1_101_1","volume-title":"Proceedings of the Conference on Smart Tools and Apps for Graphics - Eurographics Italian Chapter Conference. https:\/\/doi.org\/10","author":"Weninger Markus","year":"2020"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184407.3184412"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(02)00091-5"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/2544173.2509512"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2010.95"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3461731","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3461731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:06Z","timestamp":1750191426000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3461731"}},"subtitle":["A Method for Guiding Novice Users in Interactive Memory Monitoring Tools"],"short-title":[],"issued":{"date-parts":[[2021,5,27]]},"references-count":105,"journal-issue":{"issue":"EICS","published-print":{"date-parts":[[2021,5,27]]}},"alternative-id":["10.1145\/3461731"],"URL":"https:\/\/doi.org\/10.1145\/3461731","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,27]]},"assertion":[{"value":"2021-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}