{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T11:39:12Z","timestamp":1705923552940},"reference-count":193,"publisher":"Springer Science and Business Media LLC","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Synthesis Lectures on Human-Centered Informatics"],"published-print":{"date-parts":[[2013,3,15]]},"DOI":"10.2200\/s00479ed1v01y201302hci016","type":"journal-article","created":{"date-parts":[[2013,3,20]],"date-time":"2013-03-20T21:13:02Z","timestamp":1363813982000},"page":"1-111","source":"Crossref","is-referenced-by-count":17,"title":["Adaptive Interaction: A Utility Maximization Approach to Understanding Human Interaction with Technology"],"prefix":"10.1007","volume":"6","author":[{"given":"Stephen J.","family":"Payne","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Howes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"p_1","doi-asserted-by":"crossref","unstructured":"Adamczyk, P. D. & Bailey, B. P. (2004). If not now, when? the effects of interruption at different moments within task execution. InProceedings of the sigchi conference on human factors in computing systems (pp. 271-278). DOI: 10.1145\/985692.985727 2910.1145\/985692.985727","DOI":"10.1145\/985692.985727"},{"key":"p_3","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog2601_2"},{"key":"p_4","doi-asserted-by":"crossref","volume-title":"The Adaptive Character of Thought","author":"Anderson J. R.","DOI":"10.4324\/9780203771730"},{"key":"p_5","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.111.4.1036"},{"key":"p_6","volume-title":"Revised and Expanded Edition: The Hidden Forces that Shape our Decisions","author":"Ariely D."},{"key":"p_7","doi-asserted-by":"publisher","DOI":"10.2174\/1875934301104010023"},{"key":"p_10","doi-asserted-by":"crossref","unstructured":"Baddeley, A. D. & Hitch, G. J. (1974). Working memory. The psychology of learning and motivation, 8, 47-89. DOI: 10.1016\/S0079-7421(08)60452-1 2410.1016\/S0079-7421(08)60452-1","DOI":"10.1016\/S0079-7421(08)60452-1"},{"key":"p_11","doi-asserted-by":"publisher","DOI":"10.1126\/science.1185718"},{"key":"p_12","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X97001611"},{"key":"p_13","doi-asserted-by":"publisher","DOI":"10.1109\/TMMS.1969.299875"},{"key":"p_14","doi-asserted-by":"crossref","unstructured":"Bellotti, V., Ducheneaut, N., Howard, M. & Smith, I. (2003). Taking email to task: the design and evaluation of a task management centered email tool. InProceedings of the sigchi conference on human factors in computing systems (pp. 345-352). DOI: 10.1145\/642611.642672 6310.1145\/642611.642672","DOI":"10.1145\/642611.642672"},{"key":"p_16","doi-asserted-by":"crossref","unstructured":"Berkowitz, L. & Donnerstein, E. (1982). External validity is more than skin deep: Some answers to criticisms of laboratory experiments. American psychologist, 37(3), 245. DOI: 10.1037\/0003-066X.37.3.245 8010.1037\/0003-066X.37.3.245","DOI":"10.1037\/0003-066X.37.3.245"},{"key":"p_17","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI1523_3"},{"key":"p_18","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2011.648949"},{"key":"p_19","unstructured":"Binder, J., Howes, A. & Sutcliffe, A. (2009). The problem of conflicting social spheres: effects of network structure on experienced tension in social network sites. InProceedings of the 27th international conference on human factors in computing systems (pp. 965-974). DOI: 10.1145\/1518701.151884910.1145\/1518701.1518849"},{"key":"p_20","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1030.0199"},{"key":"p_21","doi-asserted-by":"crossref","unstructured":"Bowers, J. S. & Davis, C. J. (2012). Bayesian just-so stories in psychology and neuroscience. Psychological bulletin, 138(3), 389. DOI: 10.1037\/a0026450 11, 7610.1037\/a0026450","DOI":"10.1037\/a0026450"},{"key":"p_22","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5193(88)80219-4"},{"key":"p_23","doi-asserted-by":"crossref","unstructured":"Brumby, D. P., Salvucci, D. D. & Howes, A. (2009). Focus on driving: How cognitive constraints shape the adaptation of strategy when dialing while driving. InProceedings of the 27th international conference on human factors in computing systems (pp. 1629-1638). DOI: 10.1145\/1518701.1518950 10, 24, 2610.1145\/1518701.1518950","DOI":"10.1145\/1518701.1518950"},{"key":"p_24","doi-asserted-by":"publisher","DOI":"10.1177\/154193120705102404"},{"key":"p_26","doi-asserted-by":"publisher","DOI":"10.1037\/h0047470"},{"key":"p_27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74851-9_35"},{"key":"p_28","doi-asserted-by":"crossref","unstructured":"Buchanan, G. & Owen, T. (2008). Improving skim reading for document triage. InProceedings of the second international symposium on information interaction in context (pp. 83-88). DOI: 10.1145\/1414694.1414714 5210.1145\/1414694.1414714","DOI":"10.1145\/1414694.1414714"},{"key":"p_30","volume-title":"Paradox of the active user","author":"Carroll J. M."},{"key":"p_31","doi-asserted-by":"publisher","DOI":"10.2307\/747363"},{"key":"p_32","doi-asserted-by":"publisher","DOI":"10.1037\/1076-898X.9.4.236"},{"key":"p_33","doi-asserted-by":"crossref","unstructured":"Charnov, E. L. (1976). Optimal foraging, the marginal value theorem. Theoretical population biology, 9(2), 129-136. DOI: 10.1016\/0040-5809(76)90040-X 8, 2710.1016\/0040-5809(76)90040-X","DOI":"10.1016\/0040-5809(76)90040-X"},{"key":"p_34","doi-asserted-by":"crossref","unstructured":"Chase, V., Hertwig, R. & Gigerenzer, G. (1998). Visions of rationality? Trends in cognitive sciences, 2(6), 206-214. DOI: 10.1016\/S1364-6613(98)01179-6 11, 4610.1016\/S1364-6613(98)01179-6","DOI":"10.1016\/S1364-6613(98)01179-6"},{"key":"p_35","doi-asserted-by":"crossref","unstructured":"Chi, C. F. & Drury, C. G. (1998). Do people choose an optimal response criterion in an inspection task? IIE transactions, 30(3), 257-266. DOI: 10.1023\/A:1007482604749 1610.1023\/A:1007482604749","DOI":"10.1023\/A:1007482604749"},{"key":"p_36","doi-asserted-by":"crossref","unstructured":"Clarkson, E., Clawson, J., Lyons, K. & Starner, T. (2005). An empirical study of typing rates on mini-QWERTY keyboards. In Chi'05 extended abstracts on human factors in computing systems (pp. 1288-1291). DOI: 10.1145\/1056808.1056898 4010.1145\/1056808.1056898","DOI":"10.1145\/1056808.1056898"},{"key":"p_37","doi-asserted-by":"crossref","unstructured":"Cockburn, A., Kristensson, P. O., Alexander, J. & Zhai, S. (2007). Hard lessons: effort-inducing interfaces benefit spatial learning. InProceedings of the sigchi conference on human factors in computing systems (pp. 1571-1580). DOI: 10.1145\/1240624.1240863 7810.1145\/1240624.1240863","DOI":"10.1145\/1240624.1240863"},{"key":"p_38","doi-asserted-by":"crossref","unstructured":"Cockburn, A., Savage, J. & Wallace, A. (2005). Tuning and testing scrolling interfaces that automatically zoom. InProceedings of the sigchi conference on human factors in computing systems (pp. 71-80). DOI: 10.1145\/1054972.1054983 5210.1145\/1054972.1054983","DOI":"10.1145\/1054972.1054983"},{"key":"p_39","volume-title":"A method of teaching typewriting based on a psychological analysis of expert typing","author":"Coover J. E."},{"key":"p_40","doi-asserted-by":"crossref","unstructured":"Dellarocas, C. (2003). The digitization of word of mouth: Promise and challenges of online feedback mechanisms. Management science, 1407-1424. DOI: 10.1287\/mnsc.49.10.1407.17308 4510.1287\/mnsc.49.10.1407.17308","DOI":"10.1287\/mnsc.49.10.1407.17308"},{"key":"p_41","doi-asserted-by":"publisher","DOI":"10.1518\/001872095779049282"},{"key":"p_42","doi-asserted-by":"publisher","DOI":"10.1504\/IJWET.2003.003323"},{"key":"p_43","doi-asserted-by":"crossref","unstructured":"Dourish, P. (2004). What we talk about when we talk about context. Personal and ubiquitous computing, 8(1), 19-30. DOI: 10.1007\/s00779-003-0253-8 1, 2, 3, 410.1007\/s00779-003-0253-8","DOI":"10.1007\/s00779-003-0253-8"},{"key":"p_44","doi-asserted-by":"crossref","volume-title":"D. A.","author":"Draper S. W.","DOI":"10.4324\/9780203195116"},{"key":"p_45","doi-asserted-by":"publisher","DOI":"10.1177\/154193120404800354"},{"key":"p_46","doi-asserted-by":"publisher","DOI":"10.1037\/1076-898X.7.4.297"},{"key":"p_47","doi-asserted-by":"crossref","unstructured":"Duggan, G. B. & Payne, S. J. (2008). Knowledge in the head and on the web: using topic expertise to aid search. InProceedings of the twenty-sixth annual sigchi conference on human factors in computing systems (pp. 39-48). DOI: 10.1145\/1357054.1357062 6210.1145\/1357054.1357062","DOI":"10.1145\/1357054.1357062"},{"key":"p_48","doi-asserted-by":"publisher","DOI":"10.1037\/a0016995"},{"key":"p_49","doi-asserted-by":"crossref","unstructured":"Duggan, G. B. & Payne, S. J. (2011). Skim reading by satisficing: evidence from eye tracking. InProceedings of the 2011 annual conference on human factors in computing systems (pp. 1141-1150). DOI: 10.1145\/1978942.1979114 ix, 52, 56, 58, 5910.1145\/1978942.1979114","DOI":"10.1145\/1978942.1979114"},{"key":"p_50","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9817.00115"},{"key":"p_51","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.2001.0458"},{"key":"p_52","doi-asserted-by":"crossref","unstructured":"Eng, K., Lewis, R. L., Tollinger, I., Chu, A., Howes, A. & Vera, A. (2006). Generating automated predictions of behavior strategically adapted to specific performance objectives. InProceedings of the sigchi conference on human factors in computing systems (pp. 621-630). DOI: 10.1145\/1124772.1124866 5, 10, 6510.1145\/1124772.1124866","DOI":"10.1145\/1124772.1124866"},{"key":"p_53","first-page":"343","volume-title":"D. Gopher & A","author":"Erev I."},{"key":"p_55","doi-asserted-by":"publisher","DOI":"10.1038\/nrn2258"},{"key":"p_56","unstructured":"Farmer, G., Janssen, C. P. & Brumby, D. P. (2011). How long have I got? Making optimal visit durations in a dual-task setting. InProceedings of the 33rd annual meeting of the cognitive science society. 24, 26"},{"key":"p_57","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0297.2008.02169.x"},{"key":"p_58","doi-asserted-by":"publisher","DOI":"10.1177\/0018720812443983"},{"key":"p_59","doi-asserted-by":"publisher","DOI":"10.1037\/h0055392"},{"key":"p_61","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog2806_2"},{"key":"p_62","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogpsych.2005.08.002"},{"key":"p_63","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1038\/075450a0","volume":"75","author":"Galton F.","year":"1907","journal-title":"Nature"},{"key":"p_64","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0277(94)90048-5"},{"key":"p_66","doi-asserted-by":"publisher","DOI":"10.1257\/aer.91.5.1402"},{"key":"p_67","doi-asserted-by":"crossref","unstructured":"Gonz\u00e1lez, V. M. & Mark, G. (2005). Managing currents of work: multi-tasking among multiple collaborations. In Ecscw 2005 (pp. 143-162). DOI: 10.1007\/1-4020-4023-7_8 23, 2810.1007\/1-4020-4023-7_8","DOI":"10.1007\/1-4020-4023-7_8"},{"key":"p_68","doi-asserted-by":"publisher","DOI":"10.1145\/365024.365061"},{"key":"p_69","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog2803_3"},{"key":"p_70","first-page":"78","volume":"44","author":"Gray W. D.","year":"2000","journal-title":"Human Factors."},{"key":"p_71","doi-asserted-by":"crossref","unstructured":"Gray, W. D., Sims, C. R., Fu, W.T. & Schoelles, M. J. (2006). The soft constraints hypothesis: a rational analysis approach to resource allocation for interactive behavior. Psychological review, 113(3), 461-82. DOI: 10.1037\/0033-295X.113.3.461 3, 710.1037\/0033-295X.113.3.461","DOI":"10.1037\/0033-295X.113.3.461"},{"key":"p_72","series-title":"Vol. 1974","volume-title":"Signal detection theory and psychophysics","author":"Green D. M."},{"key":"p_73","doi-asserted-by":"publisher","DOI":"10.1086\/284184"},{"key":"p_74","doi-asserted-by":"crossref","unstructured":"Guiard, Y., Olafsdottir, H. B. & Perrault, S. T. (2011). Fitt's law as an explicit time\/error trade-off. InProceedings of the 2011 annual conference on human factors in computing systems (pp. 1619-1628). DOI: 10.1145\/1978942.1979179 31, 3610.1145\/1978942.1979179","DOI":"10.1145\/1978942.1979179"},{"key":"p_75","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.3.3.227"},{"key":"p_76","doi-asserted-by":"crossref","unstructured":"Harris, C. M. & Wolpert, D. M. (2006). The main sequence of saccades optimizes speed-accuracy trade-off. Biological cybernetics, 95(1), 21-29. DOI: 10.1007\/s00422-006-0064-x 3110.1007\/s00422-006-0064-x","DOI":"10.1007\/s00422-006-0064-x"},{"key":"p_77","doi-asserted-by":"publisher","DOI":"10.1080\/02724980042000110"},{"key":"p_78","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.48.4.909"},{"key":"p_79","doi-asserted-by":"publisher","DOI":"10.1007\/BF00752451"},{"key":"p_80","doi-asserted-by":"publisher","DOI":"10.1518\/001872098779480479"},{"key":"p_81","doi-asserted-by":"crossref","unstructured":"Hollan, J., Hutchins, E. & Kirsh, D. (2000). Distributed Cognition : Toward a New Foundation for Human-Computer Interaction Research. , 7(2), 174 -196. DOI: 10.1145\/353485.353487 3,10.1145\/353485.353487","DOI":"10.1145\/353485.353487"},{"key":"p_83","doi-asserted-by":"crossref","unstructured":"Howes, A. (1994). A model of the acquisition of menu knowledge by exploration. InProceedings of the sigchi conference on human factors in computing systems: celebrating interdependence (pp. 445-451). DOI: 10.1145\/191666.191820 310.1145\/191666.191820","DOI":"10.1145\/191666.191820"},{"key":"p_84","doi-asserted-by":"publisher","DOI":"10.1037\/a0017187"},{"key":"p_85","unstructured":"Howes, A., Lewis, R. L., Vera, A. & Richardson, J. (2005). Information-Requirements Grammar: A theory of the structure of competence for interaction. Proceedings of the 27th Annual Meeting of the Cognitive Science Society, 977-983. 10, 42, 44, 65"},{"key":"p_86","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(05)80067-7"},{"key":"p_87","unstructured":"Howes, A., Payne, S. J. & Richardson, J. (2002). An instance-based model of the effect of previous choices on the control of interactive search. Proceedings of the 24th annual meeting of the Cognitive Science Society, 476-481. 67"},{"key":"p_88","first-page":"595","author":"Howes A.","year":"2004","journal-title":"Proc. Cognitive Science Society"},{"key":"p_89","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog2003_1"},{"key":"p_90","doi-asserted-by":"publisher","DOI":"10.1111\/j.1756-8765.2010.01089.x"},{"key":"p_91","series-title":"Vol. 262082314","volume-title":"Cognition in the Wild","author":"Hutchins E."},{"key":"p_92","first-page":"36","volume":"31","author":"Jagacinski R. J.","year":"2003","journal-title":"CRC."},{"key":"p_93","doi-asserted-by":"publisher","DOI":"10.1111\/j.1756-8765.2010.01125.x"},{"key":"p_94","doi-asserted-by":"publisher","DOI":"10.1145\/67450.67472"},{"issue":"3","key":"p_95","doi-asserted-by":"crossref","first-page":"1533","DOI":"10.1152\/jn.2002.88.3.1533","volume":"88","author":"Jones K. E.","year":"2002","journal-title":"Journal of neurophysiology"},{"key":"p_96","doi-asserted-by":"publisher","DOI":"10.2307\/1914185"},{"key":"p_97","unstructured":"Kiwan, D., Ahmed, A. & Pollitt, A. (2000). The effects of time-induced stress on making inferences in text comprehension. InEuropean conference on educational research, edinburgh. 52"},{"key":"p_98","doi-asserted-by":"publisher","DOI":"10.1038\/275027a0"},{"issue":"4","key":"p_99","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1609\/aimag.v30i4.2269","volume":"30","author":"Kristensson P. O.","year":"2009","journal-title":"AI Magazine"},{"key":"p_100","doi-asserted-by":"publisher","DOI":"10.3758\/BF03210245"},{"key":"p_101","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511609268"},{"key":"p_102","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2007.05.004"},{"key":"p_103","first-page":"553","volume":"2008","author":"Lelis S.","year":"2008","journal-title":"Proc. CogSci"},{"key":"p_104","doi-asserted-by":"crossref","unstructured":"Lelis, S. & Howes, A. (2011). Informing decisions: how people use online rating information to make choices. InProceedings of the 2011 annual conference on human factors in computing systems (pp. 2285-2294). DOI: 10.1145\/1978942.1979278 ix, 10, 46, 47, 48, 4910.1145\/1978942.1979278","DOI":"10.1145\/1978942.1979278"},{"key":"p_105","unstructured":"Lewis, R. L., Vera, A. H. & Howes, A. H. (2004). A constraint-based approach to understanding the composition of skill. Proceedings of the Sixth International Conference on Cognitive Modeling, 148-153. 10"},{"key":"p_106","doi-asserted-by":"publisher","DOI":"10.1108\/00220410510632040"},{"key":"p_107","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1996.0087"},{"key":"p_108","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1008636108"},{"key":"p_109","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.19.1.83.15183"},{"key":"p_110","doi-asserted-by":"crossref","unstructured":"MacKenzie, I. S. (1992). Fitts' law as a research and design tool in human-computer interaction. Human-computer interaction, 7(1), 91-139. DOI: 10.1207\/s15327051hci0701_3 31, 3710.1207\/s15327051hci0701_3","DOI":"10.1207\/s15327051hci0701_3"},{"key":"p_111","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI172&3_2"},{"key":"p_112","unstructured":"MacLean, A., Young, R. M., Bellotti, V. M. E. & Moran, T. P. (1991). Questions, options, and criteria: Elements of design space analysis. Human-computer interaction, 6(3-4), 201-250. DOI: 10.1207\/s15327051hci0603&4_2 1210.1207\/s15327051hci0603&4_2"},{"key":"p_113","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso"},{"key":"p_114","doi-asserted-by":"publisher","DOI":"10.1145\/214762.214766"},{"key":"p_115","doi-asserted-by":"crossref","unstructured":"Maloney, L. T. & Mamassian, P. (2009). Bayesian decision theory as a model of human visual perception: testing Bayesian transfer. Visual neuroscience, 26(1), 147-55. DOI: 10.1017\/S0952523808080905 31, 3210.1017\/S0952523808080905","DOI":"10.1017\/S0952523808080905"},{"key":"p_116","doi-asserted-by":"crossref","unstructured":"Maloney, L. T., Trommersh\u00e4user, J., Landy, M. S. & Gray, W. (2007). Questions without words: A comparison between decision making under risk and movement planning under risk. Integrated models of cognitive systems, 297-313. DOI: 10.1093\/acprof:oso\/9780195189193.003.0021 3210.1093\/acprof:oso","DOI":"10.1093\/acprof:oso\/9780195189193.003.0021"},{"key":"p_117","volume-title":"Kluge: The haphazard evolution of the human mind","author":"Marcus G."},{"key":"p_118","doi-asserted-by":"crossref","unstructured":"Mark, G., Gonzalez, V. M. & Harris, J. (2005). No task left behind? examining the nature of fragmented work. InProceedings of the sigchi conference on human factors in computing systems (pp. 321-330). DOI: 10.1145\/1054972.1055017 2310.1145\/1054972.1055017","DOI":"10.1145\/1054972.1055017"},{"key":"p_119","doi-asserted-by":"crossref","unstructured":"Marshall, P., Morris, R., Rogers, Y., Kreitmayer, S. & Davies, M. (2011). Rethinking'multiuser': an in-the-wild study of how groups approach a walk-up-and-use tabletop interface. InProceedings of the 2011 annual conference on human factors in computing systems (pp. 3033-3042). DOI: 10.1145\/1978942.1979392 8010.1145\/1978942.1979392","DOI":"10.1145\/1978942.1979392"},{"key":"p_120","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.8.5.400"},{"key":"p_121","volume-title":"Topics in Learning & Learning Disabilities","author":"Masson M. E."},{"key":"p_122","unstructured":"Mayes, J., Draper, S., McGregor, A. & Oatley, K. (1988). Information flow in a user interface: The effect of experience and context on the recall of MacWrite screens. InConference of the british computer society human-computer interaction specialist group; manchester (uk). (pp. 275-289). 63"},{"key":"p_123","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI1701_1"},{"key":"p_124","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.131.3.349"},{"key":"p_125","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.95.3.340"},{"key":"p_126","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.104.1.3"},{"key":"p_127","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1999.0324"},{"key":"p_128","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.95.23.13755"},{"key":"p_129","doi-asserted-by":"publisher","DOI":"10.1177\/001872089103300602"},{"key":"p_131","doi-asserted-by":"publisher","DOI":"10.1038\/215203a0"},{"key":"p_132","doi-asserted-by":"crossref","unstructured":"Nelson, J. D. (2008). Towards a rational theory of human information acquisition. The probabilistic mind: Prospects for rational models of cognition, 143-163. DOI: 10.1093\/acprof:oso\/9780199216093.003.0007 4610.1093\/acprof:oso","DOI":"10.1093\/acprof:oso\/9780199216093.003.0007"},{"key":"p_133","volume-title":"Theory of games and economic behavior","author":"Neumann J."},{"key":"p_134","doi-asserted-by":"crossref","volume-title":"Unified theories of cognition","author":"Newell A.","DOI":"10.1017\/S0140525X00069478"},{"key":"p_135","first-page":"7","volume":"5","author":"Norman D. A.","year":"1983","journal-title":"ACM."},{"key":"p_136","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(79)90006-9"},{"key":"p_137","doi-asserted-by":"publisher","DOI":"10.1038\/31225"},{"key":"p_138","doi-asserted-by":"publisher","DOI":"10.1038\/nature04131"},{"key":"p_139","doi-asserted-by":"crossref","unstructured":"O'Hara, K. P. & Payne, S. J. (1998). The effects of operator implementation cost on planfulness of problem solving and learning. Cognitive psychology, 35(1), 34-70. DOI: 10.1006\/cogp.1997.0676 3, 67, 7810.1006\/cogp.1997.0676","DOI":"10.1006\/cogp.1997.0676"},{"key":"p_140","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1998.0234"},{"key":"p_141","doi-asserted-by":"crossref","unstructured":"Olson, G. M. & Olson, J. S. (2000). Distance matters. Human-computer interaction, 15(2), 139-178. DOI: 10.1207\/S15327051HCI1523_4 410.1207\/S15327051HCI1523_4","DOI":"10.1207\/S15327051HCI1523_4"},{"key":"p_142","doi-asserted-by":"crossref","unstructured":"Oviatt, S., DeAngeli, A. & Kuhn, K. (1997). Integration and synchronization of input modes during multimodal human-computer interaction. In Referring phenomena in a multimedia context and their computational treatment (pp. 1-13). DOI: 10.3115\/1621585.1621587 3910.3115\/1621585.1621587","DOI":"10.3115\/1621585.1621587"},{"key":"p_143","doi-asserted-by":"crossref","unstructured":"Parhi, P., Karlson, A. K. & Bederson, B. B. (2006). Target size study for one-handed thumb use on small touchscreen devices. InProceedings of the 8th conference on human-computer interaction with mobile devices and services (pp. 203-210). DOI: 10.1145\/1152215.1152260 3710.1145\/1152215.1152260","DOI":"10.1145\/1152215.1152260"},{"key":"p_144","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1996.0044"},{"key":"p_145","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.14.3.534"},{"key":"p_146","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(05)80129-4"},{"key":"p_147","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci0802_1"},{"key":"p_148","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.136.3.370"},{"key":"p_149","doi-asserted-by":"publisher","DOI":"10.1080\/01449290110078680"},{"key":"p_150","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.26.6.1685"},{"key":"p_151","doi-asserted-by":"publisher","DOI":"10.1007\/BF01119183"},{"key":"p_152","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21314-4_5"},{"key":"p_153","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso"},{"key":"p_154","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.106.4.643"},{"key":"p_155","doi-asserted-by":"publisher","DOI":"10.1080\/07370020701493376"},{"key":"p_156","doi-asserted-by":"publisher","DOI":"10.1038\/28160"},{"key":"p_157","doi-asserted-by":"publisher","DOI":"10.1038\/28160"},{"key":"p_158","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.124.2.207"},{"key":"p_159","doi-asserted-by":"crossref","unstructured":"Rogers, Y. (2011). Interaction design gone wild: striving for wild theory. interactions, 18(4), 58-62. DOI: 10.1145\/1978822.1978834 1, 3, 8010.1145\/1978822.1978834","DOI":"10.1145\/1978822.1978834"},{"key":"p_160","unstructured":"Rogers, Y. & Brignull, H. (2003). Computational offloading: Supporting distributed team working through visually augmenting verbal communication. InProc. 25th annual conference of the cognitive science society (COGSCI'03). 3"},{"key":"p_161","doi-asserted-by":"crossref","unstructured":"Roth, A. E. & Erev, I. (1995). Learning in extensive-form games: Experimental data and simple dynamic models in the intermediate term. Games and economic behavior, 8(1), 164-212. DOI: 10.1016\/S0899-8256(05)80020-X 810.1016\/S0899-8256(05)80020-X","DOI":"10.1016\/S0899-8256(05)80020-X"},{"key":"p_162","doi-asserted-by":"publisher","DOI":"10.1207\/s1532690xci1501_3"},{"key":"p_163","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1613\/jair.133","volume":"2","author":"Russell S.","year":"1995","journal-title":"Journal of Artificial Intelligence Research"},{"key":"p_164","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.99.3.303"},{"key":"p_165","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.115.1.101"},{"key":"p_166","doi-asserted-by":"publisher","DOI":"10.1518\/hfes.45.4.657.27090"},{"key":"p_167","doi-asserted-by":"crossref","unstructured":"Schmidt, R. A. & Bjork, R. A. (1992). New conceptualizations of practice: Common principles in three paradigms suggest new concepts for training. Psychological science, 3(4), 207-217. DOI: 10.1111\/j.1467-9280.1992.tb00029.x 7810.1111\/j.1467-9280.1992.tb00029.x","DOI":"10.1111\/j.1467-9280.1992.tb00029.x"},{"key":"p_168","doi-asserted-by":"crossref","unstructured":"Schmidt, R. A., Zelaznik, H., Hawkins, B., Frank, J. S. & Quinn Jr, J. T. (1979). Motoroutput variability: a theory for the accuracy of rapid motor acts. Psychological review, 86(5), 415. DOI: 10.1037\/0033-295X.86.5.415 3410.1037\/0033-295X.86.5.415","DOI":"10.1037\/0033-295X.86.5.415"},{"key":"p_169","doi-asserted-by":"publisher","DOI":"10.1037\/0096-1523.25.3.791"},{"key":"p_170","series-title":"Vol. 4","volume-title":"Administrative behavior","author":"Simon H. A."},{"key":"p_171","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.1992.tb00017.x"},{"key":"p_172","doi-asserted-by":"publisher","DOI":"10.1109\/TAMD.2010.2051031"},{"key":"p_173","unstructured":"Smith, M. R., Lewis, R. L., Howes, A., Chu, A. & Green, C. (2008). More than 8,192 Ways to Skin a Cat : Modeling Behavior in Multidimensional Strategy Spaces. In B. C. Love, K. McRae, & V. M. Sloutsky (Eds.), Proceedings of the 30th annual conference of the cognitive science society (pp. 1441-1446). Austin, Tx: Cognitive Science Society. 5, 10, 44, 65"},{"key":"p_174","doi-asserted-by":"crossref","unstructured":"Smith, S. M. & Blankenship, S. E. (1991). Incubation and the persistence of fixation in problem solving. The American journal of psychology, 61-87. DOI: 10.2307\/1422851 2510.2307\/1422851","DOI":"10.2307\/1422851"},{"key":"p_175","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1994.1072"},{"key":"p_176","doi-asserted-by":"crossref","unstructured":"Sorkin, R. D., Hays, C. J. & West, R. (2001). Signal-Detection Analysis of Group Decision Making. Psychological Review, 108(I), 183-203. DOI: 10.1037\/0033-295X.108.1.183 1810.1037\/0033-295X.108.1.183","DOI":"10.1037\/0033-295X.108.1.183"},{"key":"p_177","doi-asserted-by":"publisher","DOI":"10.1177\/001872088803000406"},{"key":"p_178","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9280.00085"},{"key":"p_179","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci0101_2"},{"key":"p_180","doi-asserted-by":"crossref","unstructured":"Sparrow, B., Liu, J. & Wegner, D. M. (2011). Google effects on memory: Cognitive consequences of having information at our fingertips. science, 333(6043), 776-778. DOI: 10.1126\/science.1207745 3, 6210.1126\/science.1207745","DOI":"10.1126\/science.1207745"},{"key":"p_181","doi-asserted-by":"crossref","volume-title":"Foraging theory","author":"Stephens D. W.","DOI":"10.1016\/B978-008045405-4.00026-4"},{"key":"p_182","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2010.00235"},{"key":"p_183","doi-asserted-by":"crossref","volume-title":"The psychology of attention","author":"Styles E.","DOI":"10.4324\/9780203690697"},{"key":"p_184","volume-title":"Plans and situated actions: the problem of human-machine communication","author":"Suchman L. A."},{"key":"p_185","doi-asserted-by":"crossref","volume-title":"Reinforcement learning: an introduction","author":"Sutton R. S.","DOI":"10.1109\/TNN.1998.712192"},{"key":"p_186","doi-asserted-by":"publisher","DOI":"10.1037\/h0040547"},{"key":"p_187","doi-asserted-by":"crossref","unstructured":"Tollinger, I., Lewis, R., McCurdy, M., Tollinger, P., Vera, A., Howes, A., Supporting Efficient Development of Cognitive Models at Multiple Skill Levels : Exploring Recent Advances in Constraint-based modeling. InProceedings of the sigchi conference on human factors in computing systems (pp. 411-420). ACM. DOI: 10.1145\/1054972.1055029 10, 6510.1145\/1054972.1055029","DOI":"10.1145\/1054972.1055029"},{"key":"p_188","doi-asserted-by":"crossref","unstructured":"Toomim, M., Kriplean,T., P\u00f6rtner, C. & Landay, J. (2011). Utility of human-computer interactions: Toward a science of preference measurement. InProceedings of the 2011 annual conference on human factors in computing systems (pp. 2275-2284). DOI: 10.1145\/1978942.1979277 510.1145\/1978942.1979277","DOI":"10.1145\/1978942.1979277"},{"key":"p_189","doi-asserted-by":"crossref","unstructured":"Trommersh\u00e4user, J., Maloney, L.T. & Landy, M. S. (2003). Statistical decision theory and trade-offs in the control of motor response. Spatial vision, 16(3-4), 255-75. DOI: 10.1163\/156856803322467527 32, 36, 7510.1163\/156856803322467527","DOI":"10.1163\/156856803322467527"},{"key":"p_190","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2008.04.010"},{"key":"p_191","first-page":"95","author":"Trommersh\u00e4user J.","year":"2009","journal-title":"Brain"},{"key":"p_192","doi-asserted-by":"crossref","unstructured":"Vera, A., Howes, A., McCurdy, M. & Lewis, R. L. (2004). A constraint satisfaction approach to predicting skilled interactive cognition. InProceedings of the sigchi conference on human factors in computing systems (pp. 121-128). DOI: 10.1145\/985692.985708 10, 42, 6510.1145\/985692.985708","DOI":"10.1145\/985692.985708"},{"key":"p_193","doi-asserted-by":"publisher","DOI":"10.1080\/00140130701811933"},{"key":"p_194","doi-asserted-by":"crossref","unstructured":"Welford, A. T., Norris, A. H. & Shock, N. W. (1969). Speed and accuracy of movement and their changes with age. Acta psychologica, 30, 3-15. DOI: 10.1016\/0001-6918(69)90034-1 31, 34, 3510.1016\/0001-6918(69)90034-1","DOI":"10.1016\/0001-6918(69)90034-1"},{"key":"p_195","first-page":"63","volume":"167","author":"Whittaker S.","year":"2007","journal-title":"Personal Information Management"},{"key":"p_196","doi-asserted-by":"publisher","DOI":"10.1145\/1107458.1107494"},{"key":"p_197","doi-asserted-by":"publisher","DOI":"10.1111\/j.1551-6709.2009.01020.x"},{"key":"p_198","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2011.08.003"},{"key":"p_199","doi-asserted-by":"publisher","DOI":"10.1177\/0022002707312606"},{"key":"p_200","doi-asserted-by":"publisher","DOI":"10.1080\/01638539809545030"},{"key":"p_201","doi-asserted-by":"crossref","unstructured":"Wu, C. & Liu, Y. (2004). Modeling Human Transcription Typing with Queuing Network-Model Human Processor (QN-MHP). InProceedings of the human factors and ergonomics society annual meeting (Vol. 48, pp.381-385). DOI: 10.1177\/154193120404800323 3910.1177\/154193120404800323","DOI":"10.1177\/154193120404800323"},{"key":"p_202","doi-asserted-by":"publisher","DOI":"10.1145\/1352782.1352788"},{"key":"p_203","doi-asserted-by":"crossref","unstructured":"Young, R. M. & MacLean, A. (1988). Choosing between methods: analysing the user's decision space in terms of schemas and linear models. InProceedings of the sigchi conference on human factors in computing systems (pp. 139-143). DOI: 10.1145\/57167.57190 710.1145\/57167.57190","DOI":"10.1145\/57167.57190"},{"key":"p_204","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog1801_3"}],"container-title":["Synthesis Lectures on Human-Centered Informatics"],"original-title":[],"language":"en","deposited":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T15:44:01Z","timestamp":1658504641000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.morganclaypool.com\/doi\/abs\/10.2200\/S00479ED1V01Y201302HCI016"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,15]]},"references-count":193,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,3,15]]}},"alternative-id":["10.2200\/S00479ED1V01Y201302HCI016"],"URL":"https:\/\/doi.org\/10.2200\/s00479ed1v01y201302hci016","relation":{},"ISSN":["1946-7680","1946-7699"],"issn-type":[{"value":"1946-7680","type":"print"},{"value":"1946-7699","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3,15]]}}}