{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:13:12Z","timestamp":1766733192465,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["DUE 1915515"],"award-info":[{"award-number":["DUE 1915515"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544548.3581525","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T04:27:20Z","timestamp":1681964840000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Colaroid: A Literate Programming Approach for Authoring Explorable Multi-Stage Tutorials"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8724-4662","authenticated-orcid":false,"given":"April Yi","family":"Wang","sequence":"first","affiliation":[{"name":"School of Information, University of Michigan, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1523-3347","authenticated-orcid":false,"given":"Andrew","family":"Head","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, University of Pennsylvania, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5978-3714","authenticated-orcid":false,"given":"Ashley Ge","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5823-1499","authenticated-orcid":false,"given":"Steve","family":"Oney","sequence":"additional","affiliation":[{"name":"School of Information, University of Michigan, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0875-0204","authenticated-orcid":false,"given":"Christopher","family":"Brooks","sequence":"additional","affiliation":[{"name":"School of Information, University of Michigan, United States"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_3_1_1","unstructured":"2022. CodeTour. https:\/\/marketplace.visualstudio.com\/items?itemName=vsls-contrib.codetour"},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095034.1095067"},{"key":"e_1_3_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859005"},{"key":"e_1_3_3_3_4_1","volume-title":"International Conference on Mathematical Knowledge Management. Springer, 159\u2013173","author":"Cairns Paul","year":"2005","unstructured":"Paul Cairns and Jeremy Gow. 2005. Literate proving: presenting and documenting formal proofs. In International Conference on Mathematical Knowledge Management. Springer, 159\u2013173."},{"key":"e_1_3_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376729"},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330430.3333627"},{"key":"e_1_3_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380116.2380130"},{"key":"e_1_3_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312963"},{"key":"e_1_3_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882312"},{"key":"e_1_3_3_3_10_1","volume-title":"Using interactive digital notebooks for bioscience and informatics education. PLoS computational biology 16, 11","author":"Davies Alan","year":"2020","unstructured":"Alan Davies, Frances Hooley, Peter Causey-Freeman, Iliada Eleftheriou, and Georgina Moulton. 2020. Using interactive digital notebooks for bioscience and informatics education. PLoS computational biology 16, 11 (2020), e1008326."},{"key":"e_1_3_3_3_11_1","unstructured":"Eve 2020. Eve: Programming designed for humans. http:\/\/witheve.com\/"},{"key":"e_1_3_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274319"},{"key":"e_1_3_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501988.2502053"},{"key":"e_1_3_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2015.7357193"},{"key":"e_1_3_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1576246.1531372"},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866029.1866054"},{"key":"e_1_3_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173659"},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300500"},{"key":"e_1_3_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376798"},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376177"},{"key":"e_1_3_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502021"},{"key":"e_1_3_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300322"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173748"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017680.3017728"},{"key":"e_1_3_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2020.3030414"},{"key":"e_1_3_3_3_26_1","volume-title":"Literate programming. The computer journal 27, 2","author":"Knuth Donald\u00a0Ervin","year":"1984","unstructured":"Donald\u00a0Ervin Knuth. 1984. Literate programming. The computer journal 27, 2 (1984), 97\u2013111."},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2883851.2883957"},{"key":"e_1_3_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445066"},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300493"},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.229"},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/3280489.3280511"},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/120782.120805"},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126594.3126628"},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405249"},{"key":"e_1_3_3_3_35_1","unstructured":"Observable 2020. Observable: the magic notebook for exploring data and thinking with code.https:\/\/observablehq.com\/"},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274400"},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613850"},{"key":"e_1_3_3_3_38_1","volume-title":"Why Jupyter is data scientists","author":"Perkel M","year":"2018","unstructured":"Jeffrey\u00a0M Perkel. 2018. Why Jupyter is data scientists\u2019 computational notebook of choice. Nature 563, 7732 (2018), 145\u2013147."},{"key":"e_1_3_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3426425.3426940"},{"key":"e_1_3_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2047196.2047213"},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126594.3126642"},{"key":"e_1_3_3_3_42_1","volume-title":"Goal-guided learning from text: inferring a descriptive processing model from inspection times and eye movements.Journal of educational psychology 71, 3","author":"Rothkopf Z","year":"1979","unstructured":"Ernst\u00a0Z Rothkopf and MJ Billington. 1979. Goal-guided learning from text: inferring a descriptive processing model from inspection times and eye movements.Journal of educational psychology 71, 3 (1979), 310."},{"volume-title":"Design and use of computational notebooks","author":"Rule Adam\u00a0Carl","key":"e_1_3_3_3_43_1","unstructured":"Adam\u00a0Carl Rule. 2018. Design and use of computational notebooks. University of California, San Diego."},{"key":"e_1_3_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503708"},{"key":"e_1_3_3_3_45_1","unstructured":"Anselm Strauss and Juliet Corbin. 1994. Grounded theory methodology: An overview.(1994)."},{"key":"e_1_3_3_3_46_1","unstructured":"Brad Victor. 2011. Explorable Explanations. (2011). http:\/\/worrydream.com\/ExplorableExplanations\/"},{"key":"e_1_3_3_3_47_1","volume-title":"Diff in the Loop: Supporting Data Comparison in Exploratory Data Analysis. In CHI Conference on Human Factors in Computing Systems. 1\u201310","author":"Wang April\u00a0Yi","year":"2022","unstructured":"April\u00a0Yi Wang, Will Epperson, Robert\u00a0A DeLine, and Steven\u00a0M Drucker. 2022. Diff in the Loop: Supporting Data Comparison in Exploratory Data Analysis. In CHI Conference on Human Factors in Computing Systems. 1\u201310."},{"key":"e_1_3_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359141"},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376740"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445527"},{"key":"e_1_3_3_3_51_1","volume-title":"The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Instant_camera&oldid=1109305997 [Online","author":"Wikipedia","year":"2022","unstructured":"Wikipedia contributors. 2022. Instant camera \u2014 Wikipedia, The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Instant_camera&oldid=1109305997 [Online; accessed 15-September-2022]."},{"volume-title":"The mathematica book. Vol.\u00a01. Wolfram Research","author":"Wolfram Stephen","key":"e_1_3_3_3_52_1","unstructured":"Stephen Wolfram. 2003. The mathematica book. Vol.\u00a01. Wolfram Research, Inc."},{"volume-title":"Implementing reproducible research","author":"Xie Yihui","key":"e_1_3_3_3_53_1","unstructured":"Yihui Xie. 2018. knitr: a comprehensive tool for reproducible research in R. In Implementing reproducible research. Chapman and Hall\/CRC, 3\u201331."},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1622176.1622213"}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Hamburg Germany","acronym":"CHI '23"},"container-title":["Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3581525","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3581525","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3581525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:55Z","timestamp":1750178815000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3581525"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":54,"alternative-id":["10.1145\/3544548.3581525","10.1145\/3544548"],"URL":"https:\/\/doi.org\/10.1145\/3544548.3581525","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}