{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:15:59Z","timestamp":1750220159879,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":100,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,28]],"date-time":"2022-10-28T00:00:00Z","timestamp":1666915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1801663"],"award-info":[{"award-number":["CNS-1801663"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,29]]},"DOI":"10.1145\/3526113.3545704","type":"proceedings-article","created":{"date-parts":[[2022,10,28]],"date-time":"2022-10-28T16:37:41Z","timestamp":1666975061000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Summarizing Sets of Related ML-Driven Recommendations for Improving File Management in Cloud Storage"],"prefix":"10.1145","author":[{"given":"Will","family":"Brackenbury","sequence":"first","affiliation":[{"name":"University of Chicago, United States"}]},{"given":"Kyle","family":"Chard","sequence":"additional","affiliation":[{"name":"University of Chicago, United States"}]},{"given":"Aaron","family":"Elmore","sequence":"additional","affiliation":[{"name":"University of Chicago, United States"}]},{"given":"Blase","family":"Ur","sequence":"additional","affiliation":[{"name":"University of Chicago, United States"}]}],"member":"320","published-online":{"date-parts":[[2022,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Peeking inside the black-box: a survey on explainable artificial intelligence (XAI)","author":"Adadi Amina","year":"2018","unstructured":"Amina Adadi and Mohammed Berrada . 2018. Peeking inside the black-box: a survey on explainable artificial intelligence (XAI) . IEEE Access 6( 2018 ). Amina Adadi and Mohammed Berrada. 2018. Peeking inside the black-box: a survey on explainable artificial intelligence (XAI). IEEE Access 6(2018)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176349.3176398"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060831"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1889681.1889689"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111449.1111490"},{"key":"e_1_3_2_1_7_1","volume":"198","author":"Nicholas\u00a0","unstructured":"Nicholas\u00a0 J. Belkin. 198 0. Anomalous states of knowledge as a basis for information retrieval. Canadian Journal of Information Science 5, 1 (1980). Nicholas\u00a0J. Belkin. 1980. Anomalous states of knowledge as a basis for information retrieval. Canadian Journal of Information Science 5, 1 (1980).","journal-title":"J. Belkin."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/meet.14505001029"},{"key":"e_1_3_2_1_9_1","volume-title":"Let\u2019s get personal: The little nudge that improves document retrieval in the cloud. J. Doc","author":"Bergman Ofer","year":"2019","unstructured":"Ofer Bergman , Steve Whittaker , and Yaron Frishman . 2019. Let\u2019s get personal: The little nudge that improves document retrieval in the cloud. J. Doc ( 2019 ). Ofer Bergman, Steve Whittaker, and Yaron Frishman. 2019. Let\u2019s get personal: The little nudge that improves document retrieval in the cloud. J. Doc (2019)."},{"key":"e_1_3_2_1_10_1","volume-title":"IUI Beyond Personalization Workshop, Vol.\u00a05.","author":"Bilgic Mustafa","year":"2005","unstructured":"Mustafa Bilgic and Raymond\u00a0 J. Mooney . 2005 . Explaining recommendations: Satisfaction vs. promotion . In IUI Beyond Personalization Workshop, Vol.\u00a05. Mustafa Bilgic and Raymond\u00a0J. Mooney. 2005. Explaining recommendations: Satisfaction vs. promotion. In IUI Beyond Personalization Workshop, Vol.\u00a05."},{"key":"e_1_3_2_1_11_1","volume-title":"Frequent item set mining. WIREs: Data Mining and Knowledge Discovery 2, 6","author":"Borgelt Christian","year":"2012","unstructured":"Christian Borgelt . 2012. Frequent item set mining. WIREs: Data Mining and Knowledge Discovery 2, 6 ( 2012 ). Christian Borgelt. 2012. Frequent item set mining. WIREs: Data Mining and Knowledge Discovery 2, 6 (2012)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462845"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3472749.3474736"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2959100.2959153"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. VLDB.","author":"Chaudhuri Surajit","year":"1999","unstructured":"Surajit Chaudhuri and Luis Gravano . 1999 . Evaluating top-k selection queries . In Proc. VLDB. Surajit Chaudhuri and Luis Gravano. 1999. Evaluating top-k selection queries. In Proc. VLDB."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73078-1_11"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025171.3025173"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403341"},{"key":"e_1_3_2_1_19_1","volume-title":"Using decision trees to summarize associative classification rules. Expert Systems with Applications 36, 2","author":"Chen Yen-Liang","year":"2009","unstructured":"Yen-Liang Chen and Lucas Tzu-Hsuan Hung . 2009. Using decision trees to summarize associative classification rules. Expert Systems with Applications 36, 2 ( 2009 ). Yen-Liang Chen and Lucas Tzu-Hsuan Hung. 2009. Using decision trees to summarize associative classification rules. Expert Systems with Applications 36, 2 (2009)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11762256_27"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/meet.2008.1450450214"},{"key":"e_1_3_2_1_22_1","volume-title":"What do web users do? An empirical analysis of web use. IJHCS 54, 6","author":"Cockburn Andy","year":"2001","unstructured":"Andy Cockburn and Bruce McKenzie . 2001. What do web users do? An empirical analysis of web use. IJHCS 54, 6 ( 2001 ). Andy Cockburn and Bruce McKenzie. 2001. What do web users do? An empirical analysis of web use. IJHCS 54, 6 (2001)."},{"key":"e_1_3_2_1_23_1","volume-title":"The effects of transparency on trust in and acceptance of a content-based art recommender. UMUAI 18, 5","author":"Cramer Henriette","year":"2008","unstructured":"Henriette Cramer , Vanessa Evers , Satyan Ramlal , Maarten Van\u00a0Someren , Lloyd Rutledge , Natalia Stash , Lora Aroyo , and Bob Wielinga . 2008. The effects of transparency on trust in and acceptance of a content-based art recommender. UMUAI 18, 5 ( 2008 ). Henriette Cramer, Vanessa Evers, Satyan Ramlal, Maarten Van\u00a0Someren, Lloyd Rutledge, Natalia Stash, Lora Aroyo, and Bob Wielinga. 2008. The effects of transparency on trust in and acceptance of a content-based art recommender. UMUAI 18, 5 (2008)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47952-X_43"},{"key":"e_1_3_2_1_25_1","unstructured":"Marina Danilevsky Kun Qian Ranit Aharonov Yannis Katsis Ban Kawas and Prithviraj Sen. 2020. A survey of the state of explainable AI for natural language processing. arXiv:2010.00711.  Marina Danilevsky Kun Qian Ranit Aharonov Yannis Katsis Ban Kawas and Prithviraj Sen. 2020. A survey of the state of explainable AI for natural language processing. arXiv:2010.00711."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46846-3_4"},{"key":"e_1_3_2_1_27_1","unstructured":"[\n  27\n  ]  Dropbox.2022. https:\/\/help.dropbox.com\/files-folders\/sort-preview\/multi-file-organize.  [27] Dropbox.2022. https:\/\/help.dropbox.com\/files-folders\/sort-preview\/multi-file-organize."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/860435.860451"},{"key":"e_1_3_2_1_29_1","volume-title":"The role of trust in automation reliance. IJHCS 58, 6","author":"Dzindolet T.","year":"2003","unstructured":"Mary\u00a0 T. Dzindolet , Scott\u00a0 A. Peterson , Regina\u00a0 A. Pomranky , Linda\u00a0 G. Pierce , and Hall\u00a0 P. Beck . 2003. The role of trust in automation reliance. IJHCS 58, 6 ( 2003 ). Mary\u00a0T. Dzindolet, Scott\u00a0A. Peterson, Regina\u00a0A. Pomranky, Linda\u00a0G. Pierce, and Hall\u00a0P. Beck. 2003. The role of trust in automation reliance. IJHCS 58, 6 (2003)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14778\/2735461.2735467"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2009916.2009925"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC-EEE.2006.14"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557014"},{"key":"e_1_3_2_1_34_1","volume-title":"How should I explain? A comparison of different explanation types for recommender systems. IJHCS 72, 4","author":"Gedikli Fatih","year":"2014","unstructured":"Fatih Gedikli , Dietmar Jannach , and Mouzhi Ge. 2014. How should I explain? A comparison of different explanation types for recommender systems. IJHCS 72, 4 ( 2014 ). Fatih Gedikli, Dietmar Jannach, and Mouzhi Ge. 2014. How should I explain? A comparison of different explanation types for recommender systems. IJHCS 72, 4 (2014)."},{"key":"e_1_3_2_1_35_1","unstructured":"Riccardo Guidotti Anna Monreale Salvatore Ruggieri Dino Pedreschi Franco Turini and Fosca Giannotti. 2018. Local rule-based explanations of black box decision systems. arXiv:1805.10820.  Riccardo Guidotti Anna Monreale Salvatore Ruggieri Dino Pedreschi Franco Turini and Fosca Giannotti. 2018. Local rule-based explanations of black box decision systems. arXiv:1805.10820."},{"key":"e_1_3_2_1_36_1","volume-title":"A survey of methods for explaining black box models. ACM CSUR 51, 5","author":"Guidotti Riccardo","year":"2018","unstructured":"Riccardo Guidotti , Anna Monreale , Salvatore Ruggieri , Franco Turini , Fosca Giannotti , and Dino Pedreschi . 2018. A survey of methods for explaining black box models. ACM CSUR 51, 5 ( 2018 ). Riccardo Guidotti, Anna Monreale, Salvatore Ruggieri, Franco Turini, Fosca Giannotti, and Dino Pedreschi. 2018. A survey of methods for explaining black box models. ACM CSUR 51, 5 (2018)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409732"},{"volume-title":"Understanding and improving automated collaborative filtering systems","author":"Herlocker Jonathan\u00a0Lee","key":"e_1_3_2_1_38_1","unstructured":"Jonathan\u00a0Lee Herlocker . 2000. Understanding and improving automated collaborative filtering systems . University of Minnesota . Jonathan\u00a0Lee Herlocker. 2000. Understanding and improving automated collaborative filtering systems. University of Minnesota."},{"key":"e_1_3_2_1_39_1","volume-title":"A comprehensive survey of deep learning for image captioning. ACM CSUR 51, 6","author":"Hossain D\u00a0Zakir","year":"2019","unstructured":"M D\u00a0Zakir Hossain , Ferdous Sohel , Mohd\u00a0Fairuz Shiratuddin , and Hamid Laga . 2019. A comprehensive survey of deep learning for image captioning. ACM CSUR 51, 6 ( 2019 ). MD\u00a0Zakir Hossain, Ferdous Sohel, Mohd\u00a0Fairuz Shiratuddin, and Hamid Laga. 2019. A comprehensive survey of deep learning for image captioning. ACM CSUR 51, 6 (2019)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441780"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3343413.3377977"},{"key":"e_1_3_2_1_42_1","volume-title":"Interactive data exploration with smart drill-down","author":"Joglekar Manas","year":"2017","unstructured":"Manas Joglekar , Hector Garcia-Molina , and Aditya Parameswaran . 2017. Interactive data exploration with smart drill-down . IEEE TKDE 31, 1 ( 2017 ). Manas Joglekar, Hector Garcia-Molina, and Aditya Parameswaran. 2017. Interactive data exploration with smart drill-down. IEEE TKDE 31, 1 (2017)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1002\/meet.1450390143"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979444"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.14778\/2831360.2831364"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174117"},{"key":"e_1_3_2_1_47_1","volume-title":"Proc. USENIX Security.","author":"Khan Mohammad\u00a0Taha","year":"2021","unstructured":"Mohammad\u00a0Taha Khan , Christopher Tran , Shubham Singh , Dimitri Vasilkov , Chris Kanich , Blase Ur , and Elena Zheleva . 2021 . Helping users automatically find and manage sensitive, expendable files in cloud storage . In Proc. USENIX Security. Mohammad\u00a0Taha Khan, Christopher Tran, Shubham Singh, Dimitri Vasilkov, Chris Kanich, Blase Ur, and Elena Zheleva. 2021. Helping users automatically find and manage sensitive, expendable files in cloud storage. In Proc. USENIX Security."},{"key":"e_1_3_2_1_48_1","volume-title":"Proc. NeurIPS.","author":"Kim Been","year":"2016","unstructured":"Been Kim , Rajiv Khanna , and Oluwasanmi\u00a0 O. Koyejo . 2016 . Examples are not enough, learn to criticize! Criticism for interpretability . In Proc. NeurIPS. Been Kim, Rajiv Khanna, and Oluwasanmi\u00a0O. Koyejo. 2016. Examples are not enough, learn to criticize! Criticism for interpretability. In Proc. NeurIPS."},{"key":"e_1_3_2_1_49_1","volume-title":"Inside the search process: Information seeking from the user\u2019s perspective. JASIST 42, 5","author":"Kuhlthau C.","year":"1991","unstructured":"Carol\u00a0 C. Kuhlthau . 1991. Inside the search process: Information seeking from the user\u2019s perspective. JASIST 42, 5 ( 1991 ). Carol\u00a0C. Kuhlthau. 1991. Inside the search process: Information seeking from the user\u2019s perspective. JASIST 42, 5 (1991)."},{"volume-title":"Watch what I do: Programming by demonstration","author":"Kurlander David","key":"e_1_3_2_1_50_1","unstructured":"David Kurlander , Allen Cypher , and Daniel\u00a0Conrad Halbert . 1993. Watch what I do: Programming by demonstration . MIT press . David Kurlander, Allen Cypher, and Daniel\u00a0Conrad Halbert. 1993. Watch what I do: Programming by demonstration. MIT press."},{"key":"e_1_3_2_1_51_1","volume-title":"Unmasking Clever Hans predictors and assessing what machines really learn. Nature Communications 10, 1","author":"Lapuschkin Sebastian","year":"2019","unstructured":"Sebastian Lapuschkin , Stephan W\u00e4ldchen , Alexander Binder , Gr\u00e9goire Montavon , Wojciech Samek , and Klaus-Robert M\u00fcller . 2019. Unmasking Clever Hans predictors and assessing what machines really learn. Nature Communications 10, 1 ( 2019 ). Sebastian Lapuschkin, Stephan W\u00e4ldchen, Alexander Binder, Gr\u00e9goire Montavon, Wojciech Samek, and Klaus-Robert M\u00fcller. 2019. Unmasking Clever Hans predictors and assessing what machines really learn. Nature Communications 10, 1 (2019)."},{"key":"e_1_3_2_1_53_1","volume-title":"Proc. ICDM.","author":"Li Wenmin","year":"2001","unstructured":"Wenmin Li , Jiawei Han , and Jian Pei . 2001 . CMAR: Accurate and efficient classification based on multiple class-association rules . In Proc. ICDM. Wenmin Li, Jiawei Han, and Jian Pei. 2001. CMAR: Accurate and efficient classification based on multiple class-association rules. In Proc. ICDM."},{"key":"e_1_3_2_1_54_1","volume":"200","author":"Likas Aristidis","unstructured":"Aristidis Likas , Nikos Vlassis , and Jakob\u00a0 J. Verbeek. 200 3. The global k-means clustering algorithm. Pattern Recognition 36, 2 (2003). Aristidis Likas, Nikos Vlassis, and Jakob\u00a0J. Verbeek. 2003. The global k-means clustering algorithm. Pattern Recognition 36, 2 (2003).","journal-title":"J. Verbeek."},{"key":"e_1_3_2_1_55_1","volume-title":"The mythos of model interpretability: In machine learning, the concept of interpretability is both important and slippery. Queue 16, 3","author":"Lipton C.","year":"2018","unstructured":"Zachary\u00a0 C. Lipton . 2018. The mythos of model interpretability: In machine learning, the concept of interpretability is both important and slippery. Queue 16, 3 ( 2018 ). Zachary\u00a0C. Lipton. 2018. The mythos of model interpretability: In machine learning, the concept of interpretability is both important and slippery. Queue 16, 3 (2018)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173959"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339556"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020499"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/263407.263531"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557042"},{"key":"e_1_3_2_1_61_1","volume-title":"Proc. ECCBR Explanation Workshop.","author":"McCarthy Kevin","year":"2004","unstructured":"Kevin McCarthy , James Reilly , Lorraine McGinty , and Barry Smyth . 2004 . Thinking positively-explanatory feedback for conversational recommender systems . In Proc. ECCBR Explanation Workshop. Kevin McCarthy, James Reilly, Lorraine McGinty, and Barry Smyth. 2004. Thinking positively-explanatory feedback for conversational recommender systems. In Proc. ECCBR Explanation Workshop."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240323.3240354"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313613"},{"key":"e_1_3_2_1_64_1","volume-title":"Inductive logic programming: Theory and methods. The Journal of Logic Programming 19","author":"Muggleton Stephen","year":"1994","unstructured":"Stephen Muggleton and Luc De\u00a0Raedt . 1994. Inductive logic programming: Theory and methods. The Journal of Logic Programming 19 ( 1994 ). Stephen Muggleton and Luc De\u00a0Raedt. 1994. Inductive logic programming: Theory and methods. The Journal of Logic Programming 19 (1994)."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213850"},{"key":"e_1_3_2_1_66_1","unstructured":"Menaka Narayanan Emily Chen Jeffrey He Been Kim Sam Gershman and Finale Doshi-Velez. 2018. How do humans understand explanations from machine learning systems? An evaluation of the human-interpretability of explanation. arXiv:1802.00682.  Menaka Narayanan Emily Chen Jeffrey He Been Kim Sam Gershman and Finale Doshi-Velez. 2018. How do humans understand explanations from machine learning systems? An evaluation of the human-interpretability of explanation. arXiv:1802.00682."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1002\/meet.14504901253"},{"key":"e_1_3_2_1_68_1","volume-title":"Running experiments on Amazon Mechanical Turk. Judgment and Decision Making 5, 5","author":"Paolacci Gabriele","year":"2010","unstructured":"Gabriele Paolacci , Jesse Chandler , and Panagiotis\u00a0 G. Ipeirotis . 2010. Running experiments on Amazon Mechanical Turk. Judgment and Decision Making 5, 5 ( 2010 ). Gabriele Paolacci, Jesse Chandler, and Panagiotis\u00a0G. Ipeirotis. 2010. Running experiments on Amazon Mechanical Turk. Judgment and Decision Making 5, 5 (2010)."},{"key":"e_1_3_2_1_69_1","volume-title":"Proc. ECOOP.","author":"Peleg Hila","year":"2020","unstructured":"Hila Peleg and Nadia Polikarpova . 2020 . Perfect is the enemy of good: Best-effort program synthesis . In Proc. ECOOP. Hila Peleg and Nadia Polikarpova. 2020. Perfect is the enemy of good: Best-effort program synthesis. In Proc. ECOOP."},{"volume-title":"Information foraging theory: Adaptive interaction with information","author":"Pirolli Peter","key":"e_1_3_2_1_70_1","unstructured":"Peter Pirolli . 2007. Information foraging theory: Adaptive interaction with information . Oxford University Press . Peter Pirolli. 2007. Information foraging theory: Adaptive interaction with information. Oxford University Press."},{"key":"e_1_3_2_1_71_1","unstructured":"[\n  71\n  ]  Prolific.2019. https:\/\/www.prolific.co\/.  [71] Prolific.2019. https:\/\/www.prolific.co\/."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39718-2_47"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_2_1_74_1","unstructured":"Andrew\u00a0Slavin Ross Michael\u00a0C. Hughes and Finale Doshi-Velez. 2017. Right for the right reasons: Training differentiable models by constraining their explanations. arXiv:1703.03717.  Andrew\u00a0Slavin Ross Michael\u00a0C. Hughes and Finale Doshi-Velez. 2017. Right for the right reasons: Training differentiable models by constraining their explanations. arXiv:1703.03717."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/11926078_64"},{"key":"e_1_3_2_1_76_1","unstructured":"Markus Schr\u00f6der Christian Jilek and Andreas Dengel. 2019. Interactive concept mining on personal data. arXiv:1903.05872.  Markus Schr\u00f6der Christian Jilek and Andreas Dengel. 2019. Interactive concept mining on personal data. arXiv:1903.05872."},{"volume-title":"Proc. AGENTS.","author":"B.","key":"e_1_3_2_1_77_1","unstructured":"Richard\u00a0 B. Segal and Jeffrey\u00a0O. Kephart. 1999. MailCat: An intelligent assistant for organizing e-mail . In Proc. AGENTS. Richard\u00a0B. Segal and Jeffrey\u00a0O. Kephart. 1999. MailCat: An intelligent assistant for organizing e-mail. In Proc. AGENTS."},{"key":"e_1_3_2_1_78_1","volume-title":"I know what you need: Investigating document retrieval effectiveness with partial session contexts. ACM TOIS 40, 3","author":"Sen Procheta","year":"2021","unstructured":"Procheta Sen , Debasis Ganguly , and Gareth\u00a0 J.F. Jones . 2021. I know what you need: Investigating document retrieval effectiveness with partial session contexts. ACM TOIS 40, 3 ( 2021 ). Procheta Sen, Debasis Ganguly, and Gareth\u00a0J.F. Jones. 2021. I know what you need: Investigating document retrieval effectiveness with partial session contexts. ACM TOIS 40, 3 (2021)."},{"key":"e_1_3_2_1_79_1","volume-title":"Proc. WWW.","author":"Sharma Amit","year":"2013","unstructured":"Amit Sharma and Dan Cosley . 2013 . Do social explanations work? Studying and modeling the effects of social explanations in recommender systems . In Proc. WWW. Amit Sharma and Dan Cosley. 2013. Do social explanations work? Studying and modeling the effects of social explanations in recommender systems. In Proc. WWW."},{"key":"e_1_3_2_1_80_1","unstructured":"Sameer Singh Marco\u00a0Tulio Ribeiro and Carlos Guestrin. 2016. Programs as black-box explanations. arXiv:1611.07579.  Sameer Singh Marco\u00a0Tulio Ribeiro and Carlos Guestrin. 2016. Programs as black-box explanations. arXiv:1611.07579."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/506443.506619"},{"key":"e_1_3_2_1_82_1","volume-title":"Proc. NeurIPS.","author":"Swaminathan Adith","year":"2017","unstructured":"Adith Swaminathan , Akshay Krishnamurthy , Alekh Agarwal , Miro Dudik , John Langford , Damien Jose , and Imed Zitouni . 2017 . Off-policy evaluation for slate recommendation . In Proc. NeurIPS. Adith Swaminathan, Akshay Krishnamurthy, Alekh Agarwal, Miro Dudik, John Langford, Damien Jose, and Imed Zitouni. 2017. Off-policy evaluation for slate recommendation. In Proc. NeurIPS."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.3115\/1075218.1075239"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098048"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277770"},{"key":"e_1_3_2_1_86_1","volume-title":"Evaluating the effectiveness of explanations for recommender systems. UMUAI 22, 4","author":"Tintarev Nava","year":"2012","unstructured":"Nava Tintarev and Judith Masthoff . 2012. Evaluating the effectiveness of explanations for recommender systems. UMUAI 22, 4 ( 2012 ). Nava Tintarev and Judith Masthoff. 2012. Evaluating the effectiveness of explanations for recommender systems. UMUAI 22, 4 (2012)."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"crossref","unstructured":"Nava Tintarev and Judith Masthoff. 2015. Explaining recommendations: Design and evaluation. In Recommender Systems Handbook.  Nava Tintarev and Judith Masthoff. 2015. Explaining recommendations: Design and evaluation. In Recommender Systems Handbook.","DOI":"10.1007\/978-1-4899-7637-6_10"},{"key":"e_1_3_2_1_88_1","volume-title":"A survey on explainable artificial intelligence (XAI): Toward medical XAI","author":"Tjoa Erico","year":"2020","unstructured":"Erico Tjoa and Cuntai Guan . 2020. A survey on explainable artificial intelligence (XAI): Toward medical XAI . IEEE TNNLS 32, 11 ( 2020 ). Erico Tjoa and Cuntai Guan. 2020. A survey on explainable artificial intelligence (XAI): Toward medical XAI. IEEE TNNLS 32, 11 (2020)."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2854946.2854971"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/1502650.1502661"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150495"},{"key":"e_1_3_2_1_92_1","volume-title":"Proc. AISTATS.","author":"Wang Fulton","year":"2015","unstructured":"Fulton Wang and Cynthia Rudin . 2015 . Falling rule lists . In Proc. AISTATS. Fulton Wang and Cynthia Rudin. 2015. Falling rule lists. In Proc. AISTATS."},{"key":"e_1_3_2_1_93_1","volume-title":"A Bayesian framework for learning rule sets for interpretable classification. JMLR 18, 1","author":"Wang Tong","year":"2017","unstructured":"Tong Wang , Cynthia Rudin , Finale Doshi-Velez , Yimin Liu , Erica Klampfl , and Perry MacNeille . 2017. A Bayesian framework for learning rule sets for interpretable classification. JMLR 18, 1 ( 2017 ). Tong Wang, Cynthia Rudin, Finale Doshi-Velez, Yimin Liu, Erica Klampfl, and Perry MacNeille. 2017. A Bayesian framework for learning rule sets for interpretable classification. JMLR 18, 1 (2017)."},{"key":"e_1_3_2_1_94_1","volume-title":"Proc. VLDB.","author":"Wen Yuhao","year":"2018","unstructured":"Yuhao Wen , Xiaodan Zhu , Sudeepa Roy , and Jun Yang . 2018 . Interactive summarization and exploration of top aggregate query answers . In Proc. VLDB. Yuhao Wen, Xiaodan Zhu, Sudeepa Roy, and Jun Yang. 2018. Interactive summarization and exploration of top aggregate query answers. In Proc. VLDB."},{"key":"e_1_3_2_1_95_1","volume-title":"Personal information management: From information consumption to curation. ARIST 45, 1","author":"Whittaker Steve","year":"2011","unstructured":"Steve Whittaker . 2011. Personal information management: From information consumption to curation. ARIST 45, 1 ( 2011 ). Steve Whittaker. 2011. Personal information management: From information consumption to curation. ARIST 45, 1 (2011)."},{"key":"e_1_3_2_1_96_1","volume-title":"Easy on that trigger dad: A study of long term family photo retrieval. Personal and Ubiquitous Computing 14, 1","author":"Whittaker Steve","year":"2010","unstructured":"Steve Whittaker , Ofer Bergman , and Paul Clough . 2010. Easy on that trigger dad: A study of long term family photo retrieval. Personal and Ubiquitous Computing 14, 1 ( 2010 ). Steve Whittaker, Ofer Bergman, and Paul Clough. 2010. Easy on that trigger dad: A study of long term family photo retrieval. Personal and Ubiquitous Computing 14, 1 (2010)."},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380071"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081907"},{"key":"e_1_3_2_1_99_1","volume-title":"Recent advances in document summarization. KAIS 53, 2","author":"Wan Xiaojun","year":"2017","unstructured":"Jin-ge Yao, Xiaojun Wan , and Jianguo Xiao . 2017. Recent advances in document summarization. KAIS 53, 2 ( 2017 ). Jin-ge Yao, Xiaojun Wan, and Jianguo Xiao. 2017. Recent advances in document summarization. KAIS 53, 2 (2017)."},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1561\/9781680836592"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609579"}],"event":{"name":"UIST '22: The 35th Annual ACM Symposium on User Interface Software and Technology","sponsor":["SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Bend OR USA","acronym":"UIST '22"},"container-title":["Proceedings of the 35th Annual ACM Symposium on User Interface Software and Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3526113.3545704","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3526113.3545704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:24Z","timestamp":1750186824000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3526113.3545704"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,28]]},"references-count":100,"alternative-id":["10.1145\/3526113.3545704","10.1145\/3526113"],"URL":"https:\/\/doi.org\/10.1145\/3526113.3545704","relation":{},"subject":[],"published":{"date-parts":[[2022,10,28]]},"assertion":[{"value":"2022-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}