|
@@ -36,12 +36,58 @@
|
36
|
36
|
year = {1997},
|
37
|
37
|
citeseercitationcount = {0},
|
38
|
38
|
citeseerurl = {http://citeseer.ist.psu.edu/36540.html},
|
|
39
|
+ comment = {Not relevant.},
|
39
|
40
|
file = {Abowd1997.pdf:Abowd1997.pdf:PDF},
|
40
|
41
|
owner = {chris},
|
41
|
42
|
pdf = {Abowd1997.pdf},
|
42
|
43
|
timestamp = {2009.12.01}
|
43
|
44
|
}
|
44
|
45
|
|
|
46
|
+@ARTICLE{Aha1991,
|
|
47
|
+ author = {Aha, David W. and Kibler, Dennis and Albert, Marc K.},
|
|
48
|
+ title = {Instance-Based Learning Algorithms},
|
|
49
|
+ journal = {Machine Learning},
|
|
50
|
+ year = {1991},
|
|
51
|
+ volume = {6},
|
|
52
|
+ pages = {37--66},
|
|
53
|
+ number = {1},
|
|
54
|
+ month = {January},
|
|
55
|
+ abstract = {Storing and using specific instances improves the performance of several
|
|
56
|
+ supervised learning algorithms. These include algorithms that learn
|
|
57
|
+ decision trees, classification rules, and distributed networks. However,
|
|
58
|
+ no investigation has analyzed algorithms that use only specific instances
|
|
59
|
+ to solve incremental learning tasks. In this paper, we describe a
|
|
60
|
+ framework and methodology, called instance-based learning, that generates
|
|
61
|
+ classification predictions using only specific instances. Instance-based
|
|
62
|
+ learning algorithms do not maintain a set of abstractions derived
|
|
63
|
+ from specific instances. This approach extends the nearest neighbor
|
|
64
|
+ algorithm, which has large storage requirements. We describe how
|
|
65
|
+ storage requirements can be significantly reduced with, at most,
|
|
66
|
+ minor sacrifices in learning rate and classification accuracy. While
|
|
67
|
+ the storage-reducing algorithm performs well on several real-world
|
|
68
|
+ databases, its performance degrades rapidly with the level of attribute
|
|
69
|
+ noise in training instances. Therefore, we extended it with a significance
|
|
70
|
+ test to distinguish noisy instances. This extended algorithm's performance
|
|
71
|
+ degrades gracefully with increasing noise levels and compares favorably
|
|
72
|
+ with a noise-tolerant decision tree algorithm.},
|
|
73
|
+ address = {Hingham, MA, USA},
|
|
74
|
+ citeulike-article-id = {1527614},
|
|
75
|
+ citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=104717},
|
|
76
|
+ citeulike-linkout-1 = {http://dx.doi.org/10.1023/A:1022689900470},
|
|
77
|
+ citeulike-linkout-2 = {http://www.springerlink.com/content/kn127378pg361187},
|
|
78
|
+ day = {1},
|
|
79
|
+ doi = {10.1023/A:1022689900470},
|
|
80
|
+ file = {Aha1991.pdf:Aha1991.pdf:PDF},
|
|
81
|
+ issn = {0885-6125},
|
|
82
|
+ keywords = {learning},
|
|
83
|
+ owner = {chris},
|
|
84
|
+ posted-at = {2007-08-01 14:37:32},
|
|
85
|
+ priority = {4},
|
|
86
|
+ publisher = {Kluwer Academic Publishers},
|
|
87
|
+ timestamp = {2009.12.06},
|
|
88
|
+ url = {http://dx.doi.org/10.1023/A:1022689900470}
|
|
89
|
+}
|
|
90
|
+
|
45
|
91
|
@ARTICLE{Bannach2008,
|
46
|
92
|
author = {Bannach, D. and Lukowicz, P. and Amft, O.},
|
47
|
93
|
title = {Rapid Prototyping of Activity Recognition Applications},
|
|
@@ -63,6 +109,76 @@
|
63
|
109
|
timestamp = {2009.12.01}
|
64
|
110
|
}
|
65
|
111
|
|
|
112
|
+@ARTICLE{Bao2004,
|
|
113
|
+ author = {Bao, L. and Intille, S. S.},
|
|
114
|
+ title = {Activity Recognition from User-Annotated Acceleration Data},
|
|
115
|
+ journal = {Pervasive Computing},
|
|
116
|
+ year = {2004},
|
|
117
|
+ volume = {3001},
|
|
118
|
+ pages = {1--17},
|
|
119
|
+ abstract = {In this work, algorithms are developed and evaluated to detect physical
|
|
120
|
+ activities from data acquired using five small biaxial accelerometers
|
|
121
|
+ worn simultaneously on different parts of the body. Acceleration
|
|
122
|
+ data was collected from 20 subjects without researcher supervision
|
|
123
|
+ or observation. Subjects were asked to perform a sequence of everyday
|
|
124
|
+ tasks but not told specifically where or how to do them. Mean, energy,
|
|
125
|
+ frequency-domain entropy, and correlation of acceleration data was
|
|
126
|
+ calculated and several classifiers using these features were tested.
|
|
127
|
+ Decision tree classifiers showed the best performance recognizing
|
|
128
|
+ everyday activities with an overall accuracy rate of 84\%. The results
|
|
129
|
+ show that although some activities are recognized well with subject-independent
|
|
130
|
+ training data, others appear to require subject-specific training
|
|
131
|
+ data. The results suggest that multiple accelerometers aid in recognition
|
|
132
|
+ because conjunctions in acceleration feature values can effectively
|
|
133
|
+ discriminate many activities. With just two biaxial accelerometers
|
|
134
|
+ – thigh and wrist – the recognition performance dropped only slightly.
|
|
135
|
+ This is the first work to investigate performance of recognition
|
|
136
|
+ algorithms with multiple, wire-free accelerometers on 20 activities
|
|
137
|
+ using datasets annotated by the subjects themselves.},
|
|
138
|
+ citeulike-article-id = {1188357},
|
|
139
|
+ citeulike-linkout-0 = {http://www.springerlink.com/content/9aqflyk4f47khyjd},
|
|
140
|
+ file = {Bao2004.pdf:Bao2004.pdf:PDF},
|
|
141
|
+ keywords = {acceleration},
|
|
142
|
+ owner = {chris},
|
|
143
|
+ posted-at = {2008-04-16 11:42:22},
|
|
144
|
+ priority = {4},
|
|
145
|
+ timestamp = {2009.12.06},
|
|
146
|
+ url = {http://www.springerlink.com/content/9aqflyk4f47khyjd}
|
|
147
|
+}
|
|
148
|
+
|
|
149
|
+@INCOLLECTION{Bardram2005,
|
|
150
|
+ author = {Bardram, Jakob E.},
|
|
151
|
+ title = {The Java Context Awareness Framework (JCAF) – A Service Infrastructure
|
|
152
|
+ and Programming Framework for Context-Aware Applications},
|
|
153
|
+ booktitle = {Pervasive Computing},
|
|
154
|
+ publisher = {IEEE},
|
|
155
|
+ year = {2005},
|
|
156
|
+ pages = {98--115},
|
|
157
|
+ abstract = {Context-awareness is a key concept in ubiquitous computing. But to
|
|
158
|
+ avoid developing dedicated context-awareness sub-systems for specific
|
|
159
|
+ application areas there is a need for more generic programming frameworks.
|
|
160
|
+ Such frameworks can help the programmer develop and deploy context-aware
|
|
161
|
+ applications faster. This paper describes the Java Context-Awareness
|
|
162
|
+ Framework – JCAF, which is a Java-based context-awareness infrastructure
|
|
163
|
+ and programming API for creating context-aware computer applications.
|
|
164
|
+ The paper presents the design goals of JCAF, its runtime architecture,
|
|
165
|
+ and its programming model. The paper presents some applications of
|
|
166
|
+ using JCAF in three different applications and discusses lessons
|
|
167
|
+ learned from using JCAF.},
|
|
168
|
+ citeulike-article-id = {1145979},
|
|
169
|
+ citeulike-linkout-0 = {http://dx.doi.org/10.1007/11428572_7},
|
|
170
|
+ citeulike-linkout-1 = {http://www.springerlink.com/content/yl2fen8clqqwq2tb},
|
|
171
|
+ doi = {10.1007/11428572_7},
|
|
172
|
+ file = {Bardram2005.pdf:Bardram2005.pdf:PDF},
|
|
173
|
+ journal = {Pervasive Computing},
|
|
174
|
+ keywords = {awareness, context, framework},
|
|
175
|
+ owner = {chris},
|
|
176
|
+ posted-at = {2007-06-26 09:54:05},
|
|
177
|
+ priority = {4},
|
|
178
|
+ timestamp = {2009.12.06},
|
|
179
|
+ url = {http://dx.doi.org/10.1007/11428572_7}
|
|
180
|
+}
|
|
181
|
+
|
66
|
182
|
@ARTICLE{Bellavista2008,
|
67
|
183
|
author = {Bellavista, P. and Kupper, A. and Helal, S.},
|
68
|
184
|
title = {Location-Based Services: Back to the Future},
|
|
@@ -98,6 +214,7 @@
|
98
|
214
|
citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=1357237},
|
99
|
215
|
citeulike-linkout-1 = {http://dx.doi.org/10.1145/1357054.1357237},
|
100
|
216
|
doi = {10.1145/1357054.1357237},
|
|
217
|
+ file = {Bellotti2008.pdf:Bellotti2008.pdf:PDF},
|
101
|
218
|
isbn = {9781605580111},
|
102
|
219
|
keywords = {ibm, iphone, triage},
|
103
|
220
|
owner = {chris},
|
|
@@ -145,6 +262,33 @@
|
145
|
262
|
timestamp = {2009.12.01}
|
146
|
263
|
}
|
147
|
264
|
|
|
265
|
+@INPROCEEDINGS{Consolvo2008,
|
|
266
|
+ author = {Consolvo, Sunny and Mcdonald, David W. and Toscos, Tammy and Chen,
|
|
267
|
+ Mike Y. and Froehlich, Jon and Harrison, Beverly and Klasnja, Predrag
|
|
268
|
+ and Lamarca, Anthony and Legrand, Louis and Libby, Ryan and Smith,
|
|
269
|
+ Ian and Landay, James A.},
|
|
270
|
+ title = {Activity sensing in the wild: a field trial of ubifit garden},
|
|
271
|
+ booktitle = {CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference
|
|
272
|
+ on Human factors in computing systems},
|
|
273
|
+ year = {2008},
|
|
274
|
+ pages = {1797--1806},
|
|
275
|
+ address = {New York, NY, USA},
|
|
276
|
+ publisher = {ACM},
|
|
277
|
+ citeulike-article-id = {2977124},
|
|
278
|
+ citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=1357054.1357335},
|
|
279
|
+ citeulike-linkout-1 = {http://dx.doi.org/10.1145/1357054.1357335},
|
|
280
|
+ doi = {10.1145/1357054.1357335},
|
|
281
|
+ file = {Consolvo2008.pdf:Consolvo2008.pdf:PDF},
|
|
282
|
+ isbn = {9781605580111},
|
|
283
|
+ keywords = {sensing, ubiquitous},
|
|
284
|
+ location = {Florence, Italy},
|
|
285
|
+ owner = {chris},
|
|
286
|
+ posted-at = {2008-08-25 01:26:32},
|
|
287
|
+ priority = {2},
|
|
288
|
+ timestamp = {2009.12.06},
|
|
289
|
+ url = {http://dx.doi.org/10.1145/1357054.1357335}
|
|
290
|
+}
|
|
291
|
+
|
148
|
292
|
@ARTICLE{Davies2008,
|
149
|
293
|
author = {Davies, Nigel and Siewiorek, Daniel P. and Sukthankar, Rahul},
|
150
|
294
|
title = {Activity-Based Computing},
|
|
@@ -172,6 +316,7 @@
|
172
|
316
|
pages = {58--61},
|
173
|
317
|
number = {2},
|
174
|
318
|
month = {April--June },
|
|
319
|
+ comment = {Not relevant.},
|
175
|
320
|
doi = {10.1109/MPRV.2008.25},
|
176
|
321
|
file = {Serugendo2008.pdf:Serugendo2008.pdf:PDF},
|
177
|
322
|
owner = {chris},
|
|
@@ -186,6 +331,12 @@
|
186
|
331
|
and Systems},
|
187
|
332
|
year = {2005},
|
188
|
333
|
pages = {1--6},
|
|
334
|
+ comment = {We used classifiers from the open source Weka library[Witten and Frank,
|
|
335
|
+ 2005] and neural networks from the open source Joone library[Marrone
|
|
336
|
+ and Team, 2006]. Decision Tree (J48) [Quinlan, 1993] 41% acc. AdaBoost
|
|
337
|
+ [Freund and Schapire, 1996] 46% acc. Support Vector Machine (SVM)
|
|
338
|
+ [Platt, 1998; Keerthi et al 2001] 43%. K-Nearest Neighbours [Aha
|
|
339
|
+ and Kibler, 1991] 47% acc. Neural networks 43% acc.},
|
189
|
340
|
doi = {10.1109/MTAS.2005.207159},
|
190
|
341
|
file = {Dornbush2005.pdf:Dornbush2005.pdf:PDF},
|
191
|
342
|
keywords = {audio equipment, humanities, mobile handsets, XPod, emotion aware
|
|
@@ -199,17 +350,54 @@
|
199
|
350
|
author = {Eagle, N. and Pentland, A.},
|
200
|
351
|
title = {Mobile Matchmaking: Proximity Sensing and Cueing},
|
201
|
352
|
year = {2004},
|
|
353
|
+ comment = {Bluetooth battery life; relationship type based on time of day and
|
|
354
|
+ bluetooth density; Gaussian mixture model 90%, SVM better?},
|
202
|
355
|
file = {Eagle2004.pdf:Eagle2004.pdf:PDF},
|
203
|
356
|
journal = {IEEE Pervasive, Special Issue on Smart Phones},
|
204
|
357
|
owner = {chris},
|
205
|
358
|
timestamp = {2009.12.01}
|
206
|
359
|
}
|
207
|
360
|
|
|
361
|
+@ARTICLE{Eagle2006,
|
|
362
|
+ author = {Eagle, Nathan and Sandy Pentland, Alex},
|
|
363
|
+ title = {Reality mining: sensing complex social systems},
|
|
364
|
+ journal = {Personal and Ubiquitous Computing},
|
|
365
|
+ year = {2006},
|
|
366
|
+ volume = {10},
|
|
367
|
+ pages = {255--268},
|
|
368
|
+ number = {4},
|
|
369
|
+ month = {May},
|
|
370
|
+ abstract = {Abstract\ \ We introduce a system for sensing complex social
|
|
371
|
+ systems with data collected from 100 mobile phones over the course
|
|
372
|
+ of 9\ months. We demonstrate the ability to use standard Bluetooth-enabled
|
|
373
|
+ mobile telephones to measure information access and use in different
|
|
374
|
+ contexts, recognize social patterns in daily user activity, infer
|
|
375
|
+ relationships, identify socially significant locations, and model
|
|
376
|
+ organizational rhythms.},
|
|
377
|
+ address = {London, UK},
|
|
378
|
+ citeulike-article-id = {899208},
|
|
379
|
+ citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=1122739.1122745},
|
|
380
|
+ citeulike-linkout-1 = {http://dx.doi.org/10.1007/s00779-005-0046-3},
|
|
381
|
+ citeulike-linkout-2 = {http://www.springerlink.com/content/l562745318077t54},
|
|
382
|
+ day = {1},
|
|
383
|
+ doi = {10.1007/s00779-005-0046-3},
|
|
384
|
+ file = {Eagle2006.pdf:Eagle2006.pdf:PDF},
|
|
385
|
+ issn = {1617-4909},
|
|
386
|
+ keywords = {complex, mining, reality, sensing, social, systems},
|
|
387
|
+ owner = {chris},
|
|
388
|
+ posted-at = {2009-10-12 11:59:33},
|
|
389
|
+ priority = {2},
|
|
390
|
+ publisher = {Springer-Verlag},
|
|
391
|
+ timestamp = {2009.12.06},
|
|
392
|
+ url = {http://dx.doi.org/10.1007/s00779-005-0046-3}
|
|
393
|
+}
|
|
394
|
+
|
208
|
395
|
@MISC{Floreen2008,
|
209
|
396
|
author = {Patrik Floréen and Joonas Kukkonen and Eemil Lagerspetz and Petteri
|
210
|
397
|
Nurmi and Jukka Suomela},
|
211
|
398
|
title = {BeTelGeuse: Tool for Context Data Gathering via Bluetooth},
|
212
|
399
|
year = {2008},
|
|
400
|
+ comment = {Not relevant.},
|
213
|
401
|
file = {Floreen2008.pdf:Floreen2008.pdf:PDF},
|
214
|
402
|
owner = {chris},
|
215
|
403
|
timestamp = {2009.12.01}
|
|
@@ -221,6 +409,9 @@
|
221
|
409
|
Mobile},
|
222
|
410
|
school = {University of Washington},
|
223
|
411
|
year = {2009},
|
|
412
|
+ comment = {Instant/smooth classification ideas. Discrete fourier transform on
|
|
413
|
+ accelerometer data. 24 features per axis. Naive bayes model. 25Hz
|
|
414
|
+ accelerometer sampling battery life - 7 days down to 24 hours.},
|
224
|
415
|
file = {Garakani2009.pdf:Garakani2009.pdf:PDF},
|
225
|
416
|
owner = {chris},
|
226
|
417
|
timestamp = {2009.12.01}
|
|
@@ -250,6 +441,9 @@
|
250
|
441
|
of this technique using experimental data from two test runs of a
|
251
|
442
|
home care scenario showing a higher accuracy and robustness than
|
252
|
443
|
conventional discriminative methods.},
|
|
444
|
+ comment = {Unsupervised learning for basic actions, then overlying hiden markov
|
|
445
|
+ model to classify into higher-level activities. K-means clustering
|
|
446
|
+ algorithm for identification and detection of base-level motion patterns.},
|
253
|
447
|
file = {Hein2008.pdf:Hein2008.pdf:PDF},
|
254
|
448
|
institution = {CiteSeerX - Scientific Literature Digital Library and Search Engine
|
255
|
449
|
[http://citeseerx.ist.psu.edu/oai2] (United States)},
|
|
@@ -259,6 +453,144 @@
|
259
|
453
|
url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.6671}
|
260
|
454
|
}
|
261
|
455
|
|
|
456
|
+@INPROCEEDINGS{Hightower2005,
|
|
457
|
+ author = {Hightower, Jeffrey and Consolvo, Sunny and Lamarca, Anthony and Smith,
|
|
458
|
+ Ian and Hughes, Jeff},
|
|
459
|
+ title = {Learning and Recognizing the Places We Go},
|
|
460
|
+ booktitle = {UbiComp 2005: Ubiquitous Computing},
|
|
461
|
+ year = {2005},
|
|
462
|
+ pages = {159--176},
|
|
463
|
+ abstract = {Location-enhanced mobile devices are becoming common, but applications
|
|
464
|
+ built for these devices find themselves suffering a mismatch between
|
|
465
|
+ the latitude and longitude that location sensors provide and the
|
|
466
|
+ colloquial place label that applications need. Conveying my location
|
|
467
|
+ to my spouse, for example as (48.13641N, 11.57471E), is less informative
|
|
468
|
+ than saying "at home". We introduce an algorithm called BeaconPrint
|
|
469
|
+ that uses WiFi and GSM radio fingerprints collected by someone's
|
|
470
|
+ personal mobile device to automatically learn the places they go
|
|
471
|
+ and then detect when they return to those places. BeaconPrint does
|
|
472
|
+ not automatically assign names or semantics to places. Rather, it
|
|
473
|
+ provides the technological foundation to support this task. We compare
|
|
474
|
+ BeaconPrint to three existing algorithms using month-long trace logs
|
|
475
|
+ from each of three people. Algorithmic results are supplemented with
|
|
476
|
+ a survey study about the places people go. BeaconPrint is over 90\%
|
|
477
|
+ accurate in learning and recognizing places. Additionally, it improves
|
|
478
|
+ accuracy in recognizing places visited infrequently or for short
|
|
479
|
+ durations - a category where previous approaches have fared poorly.
|
|
480
|
+ BeaconPrint demonstrates 63\% accuracy for places someone returns
|
|
481
|
+ to only once or visits for less than 10 minutes, increasing to 80\%
|
|
482
|
+ accuracy for places visited twice.},
|
|
483
|
+ citeulike-article-id = {1382076},
|
|
484
|
+ citeulike-linkout-0 = {http://dx.doi.org/10.1007/11551201_10},
|
|
485
|
+ doi = {10.1007/11551201_10},
|
|
486
|
+ file = {Hightower2005.pdf:Hightower2005.pdf:PDF},
|
|
487
|
+ journal = {UbiComp 2005: Ubiquitous Computing},
|
|
488
|
+ keywords = {learning, location, places, prediction, significant},
|
|
489
|
+ owner = {chris},
|
|
490
|
+ posted-at = {2009-03-24 14:34:56},
|
|
491
|
+ priority = {0},
|
|
492
|
+ timestamp = {2009.12.06},
|
|
493
|
+ url = {http://dx.doi.org/10.1007/11551201_10}
|
|
494
|
+}
|
|
495
|
+
|
|
496
|
+@INPROCEEDINGS{Horvitz1998,
|
|
497
|
+ author = {Horvitz, E. and Breese, J. and Heckerman, D. and Hovel, D. and Rommelse,
|
|
498
|
+ K.},
|
|
499
|
+ title = {The Lumiere project: Bayesian user modeling for inferring the goals
|
|
500
|
+ and needs of software users},
|
|
501
|
+ booktitle = {In Proceedings of the Fourteenth Conference on Uncertainty in Artificial
|
|
502
|
+ Intelligence},
|
|
503
|
+ year = {1998},
|
|
504
|
+ pages = {256--265},
|
|
505
|
+ address = {Madison, WI},
|
|
506
|
+ month = {July},
|
|
507
|
+ abstract = {The Lumi`ere Project centers on harnessing probability and utility
|
|
508
|
+ to provide assistance to computer software users. We review work
|
|
509
|
+ on Bayesian user models that can be employed to infer a user's needs
|
|
510
|
+ by considering a user's background, actions, and queries. Several
|
|
511
|
+ problems were tackled in Lumi`ere research, including (1) the construction
|
|
512
|
+ of Bayesian models for reasoning about the time-varying goals of
|
|
513
|
+ computer users from their observed actions and queries, (2) gaining
|
|
514
|
+ access to a stream of...},
|
|
515
|
+ citeulike-article-id = {1269522},
|
|
516
|
+ citeulike-linkout-0 = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.39.8472},
|
|
517
|
+ file = {Horvitz1998.pdf:Horvitz1998.pdf:PDF},
|
|
518
|
+ keywords = {bayesian, computing, inference, modeling, user},
|
|
519
|
+ owner = {chris},
|
|
520
|
+ posted-at = {2007-05-14 23:50:35},
|
|
521
|
+ priority = {4},
|
|
522
|
+ timestamp = {2009.12.06},
|
|
523
|
+ url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.39.8472}
|
|
524
|
+}
|
|
525
|
+
|
|
526
|
+@INPROCEEDINGS{Huynh2005,
|
|
527
|
+ author = {Huynh, T\^{a}m and Schiele, Bernt},
|
|
528
|
+ title = {Analyzing features for activity recognition},
|
|
529
|
+ booktitle = {sOc-EUSAI '05: Proceedings of the 2005 joint conference on Smart
|
|
530
|
+ objects and ambient intelligence},
|
|
531
|
+ year = {2005},
|
|
532
|
+ pages = {159--163},
|
|
533
|
+ address = {New York, NY, USA},
|
|
534
|
+ publisher = {ACM},
|
|
535
|
+ abstract = {Human activity is one of the most important ingredients of context
|
|
536
|
+ information. In wearable computing scenarios, activities such as
|
|
537
|
+ walking, standing and sitting can be inferred from data provided
|
|
538
|
+ by body-worn acceleration sensors. In such settings, most approaches
|
|
539
|
+ use a single set of features, regardless of which activity to be
|
|
540
|
+ recognized. In this paper we show that recognition rates can be improved
|
|
541
|
+ by careful selection of individual features for each activity. We
|
|
542
|
+ present a systematic analysis of features computed from a real-world
|
|
543
|
+ data set and show how the choice of feature and the window length
|
|
544
|
+ over which the feature is computed affects the recognition rates
|
|
545
|
+ for different activities. Finally, we give a recommendation of suitable
|
|
546
|
+ features and window lengths for a set of common activities.},
|
|
547
|
+ citeulike-article-id = {1076182},
|
|
548
|
+ citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=1107591},
|
|
549
|
+ citeulike-linkout-1 = {http://dx.doi.org/10.1145/1107548.1107591},
|
|
550
|
+ doi = {10.1145/1107548.1107591},
|
|
551
|
+ file = {Huynh2005.pdf:Huynh2005.pdf:PDF},
|
|
552
|
+ isbn = {1-59593-304-2},
|
|
553
|
+ keywords = {activity, recognition},
|
|
554
|
+ location = {Grenoble, France},
|
|
555
|
+ owner = {chris},
|
|
556
|
+ posted-at = {2007-03-17 06:17:32},
|
|
557
|
+ priority = {2},
|
|
558
|
+ timestamp = {2009.12.06},
|
|
559
|
+ url = {http://dx.doi.org/10.1145/1107548.1107591}
|
|
560
|
+}
|
|
561
|
+
|
|
562
|
+@MISC{Keerthi1999,
|
|
563
|
+ author = {Keerthi, S. and Shevade, S. and Bhattacharyya, C. and Murthy, K.},
|
|
564
|
+ title = {Improvements to Platt's SMO algorithm for SVM classifier design},
|
|
565
|
+ year = {1999},
|
|
566
|
+ abstract = {This paper points out an important source of confusion and ineciency
|
|
567
|
+ in Platt's Sequential
|
|
568
|
+
|
|
569
|
+ Minimal Optimization (SMO) algorithm that is caused by the use of
|
|
570
|
+ a single threshold value.
|
|
571
|
+
|
|
572
|
+ Using clues from the KKT conditions for the dual problem, two threshold
|
|
573
|
+ parameters are employed
|
|
574
|
+
|
|
575
|
+ to derive modications of SMO. These modied algorithms perform signicantly
|
|
576
|
+ faster
|
|
577
|
+
|
|
578
|
+ than the original SMO on all benchmark datasets tried.
|
|
579
|
+
|
|
580
|
+ 1 Introduction
|
|
581
|
+
|
|
582
|
+ In the past few years, there has been a lot of excitement...},
|
|
583
|
+ citeulike-article-id = {1772853},
|
|
584
|
+ citeulike-linkout-0 = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.46.8538},
|
|
585
|
+ file = {Keerthi1999.pdf:Keerthi1999.pdf:PDF},
|
|
586
|
+ keywords = {smo, svm},
|
|
587
|
+ owner = {chris},
|
|
588
|
+ posted-at = {2008-04-12 20:18:51},
|
|
589
|
+ priority = {2},
|
|
590
|
+ timestamp = {2009.12.06},
|
|
591
|
+ url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.46.8538}
|
|
592
|
+}
|
|
593
|
+
|
262
|
594
|
@INPROCEEDINGS{Lee2007,
|
263
|
595
|
author = {Jae Young Lee and Hoff, W.},
|
264
|
596
|
title = {Activity Identification Utilizing Data Mining Techniques},
|
|
@@ -267,6 +599,7 @@
|
267
|
599
|
pages = {12--12},
|
268
|
600
|
month = {Feb. },
|
269
|
601
|
doi = {10.1109/WMVC.2007.4},
|
|
602
|
+ file = {Lee2007.pdf:Lee2007.pdf:PDF},
|
270
|
603
|
owner = {chris},
|
271
|
604
|
timestamp = {2009.12.03}
|
272
|
605
|
}
|
|
@@ -307,6 +640,40 @@
|
307
|
640
|
url = {http://dx.doi.org/10.1007/11748625_1}
|
308
|
641
|
}
|
309
|
642
|
|
|
643
|
+@INPROCEEDINGS{Lester2005,
|
|
644
|
+ author = {Lester, Jonathan and Choudhury, Tanzeem and Kern, Nicky and Borriello,
|
|
645
|
+ Gaetano and Hannaford, Blake},
|
|
646
|
+ title = {A hybrid discriminative/generative approach for modeling human activities},
|
|
647
|
+ booktitle = {In Proc. of the International Joint Conference on Artificial Intelligence
|
|
648
|
+ (IJCAI},
|
|
649
|
+ year = {2005},
|
|
650
|
+ pages = {766--772},
|
|
651
|
+ abstract = {Accurate recognition and tracking of human activities is an important
|
|
652
|
+ goal of ubiquitous computing. Recent advances in the development
|
|
653
|
+ of multi-modal wearable sensors enable us to gather rich datasets
|
|
654
|
+ of human activities. However, the problem of automatically identifying
|
|
655
|
+ the most useful features for modeling such activities remains largely
|
|
656
|
+ unsolved. In this paper we present a hybrid approach to recognizing
|
|
657
|
+ activities, which combines boosting to discriminatively select useful
|
|
658
|
+ features and learn an ensemble of static classifiers to recognize
|
|
659
|
+ different activities, with hidden Markov models (HMMs) to capture
|
|
660
|
+ the temporal regularities and smoothness of activities. We tested
|
|
661
|
+ the activity recognition system using over 12 hours of wearable-sensor
|
|
662
|
+ data collected by volunteers in natural unconstrained environments.
|
|
663
|
+ The models succeeded in identifying a small set of maximally informative
|
|
664
|
+ features, and were able identify ten different human activities with
|
|
665
|
+ an accuracy of 95\%. 1},
|
|
666
|
+ citeulike-article-id = {3291348},
|
|
667
|
+ citeulike-linkout-0 = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.5776},
|
|
668
|
+ file = {Lester2005.pdf:Lester2005.pdf:PDF},
|
|
669
|
+ keywords = {transitgenie},
|
|
670
|
+ owner = {chris},
|
|
671
|
+ posted-at = {2009-07-11 19:30:29},
|
|
672
|
+ priority = {4},
|
|
673
|
+ timestamp = {2009.12.06},
|
|
674
|
+ url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.5776}
|
|
675
|
+}
|
|
676
|
+
|
310
|
677
|
@ARTICLE{Liao2007,
|
311
|
678
|
author = {Liao, Lin and Fox, Dieter and Kautz, Henry},
|
312
|
679
|
title = {Extracting Places and Activities from GPS Traces Using Hierarchical
|
|
@@ -409,7 +776,10 @@
|
409
|
776
|
citeulike-linkout-1 = {http://www.springerlink.com/content/wm35501wq8352865},
|
410
|
777
|
day = {12},
|
411
|
778
|
doi = {10.1007/BF02347551},
|
|
779
|
+ file = {Mathie2004.pdf:Mathie2004.pdf:PDF},
|
|
780
|
+ owner = {chris},
|
412
|
781
|
posted-at = {2009-05-26 20:42:51},
|
|
782
|
+ timestamp = {2009.12.06},
|
413
|
783
|
url = {http://dx.doi.org/10.1007/BF02347551}
|
414
|
784
|
}
|
415
|
785
|
|
|
@@ -437,6 +807,7 @@
|
437
|
807
|
title = {Evaluating the iPhone as a Mobile Platform for People-Centric Sensing
|
438
|
808
|
Applications},
|
439
|
809
|
year = {2009},
|
|
810
|
+ comment = {No background apps on iPhone, no access to BT or Wifi stacks.},
|
440
|
811
|
file = {Miluzzo2009.pdf:Miluzzo2009.pdf:PDF},
|
441
|
812
|
owner = {chris},
|
442
|
813
|
timestamp = {2009.12.01}
|
|
@@ -447,11 +818,55 @@
|
447
|
818
|
title = {Exploring Social Context with the Wireless Rope},
|
448
|
819
|
booktitle = {In Proc. Workshop MONET: LNCS 4277},
|
449
|
820
|
year = {2006},
|
|
821
|
+ comment = {Definition of familiar strangers. DynStra/DynFam formula.},
|
450
|
822
|
file = {Nicolai2006.pdf:Nicolai2006.pdf:PDF},
|
451
|
823
|
owner = {chris},
|
452
|
824
|
timestamp = {2009.12.01}
|
453
|
825
|
}
|
454
|
826
|
|
|
827
|
+@INPROCEEDINGS{Nurmi2006,
|
|
828
|
+ author = {Nurmi, Petteri and Koolwaaij, Johan},
|
|
829
|
+ title = {Identifying meaningful locations},
|
|
830
|
+ booktitle = {Mobile and Ubiquitous Systems: Networking \& Services, 2006 Third
|
|
831
|
+ Annual International Conference on},
|
|
832
|
+ year = {2006},
|
|
833
|
+ pages = {1--8},
|
|
834
|
+ abstract = {Existing context-aware mobile applications often rely on location
|
|
835
|
+ information. However, raw location data such as GPS coordinates or
|
|
836
|
+ GSM cell identifiers are usually meaningless to the user and, as
|
|
837
|
+ a consequence, researchers have proposed different methods for inferring
|
|
838
|
+ so-called places from raw data. The places are locations that carry
|
|
839
|
+ some meaning to user and to which the user can potentially attach
|
|
840
|
+ some (meaningful) semantics. Examples of places include home, work
|
|
841
|
+ and airport. A lack in existing work is that the labeling has been
|
|
842
|
+ done in an ad hoc fashion and no motivation has been given for why
|
|
843
|
+ places would be interesting to the user. As our first contribution
|
|
844
|
+ we use social identity theory to motivate why some locations really
|
|
845
|
+ are significant to the user. We also discuss what potential uses
|
|
846
|
+ for location information social identity theory implies. Another
|
|
847
|
+ flaw in the existing work is that most of the proposed methods are
|
|
848
|
+ not suited to realistic mobile settings as they rely on the availability
|
|
849
|
+ of GPS information. As our second contribution we consider a more
|
|
850
|
+ realistic setting where the information consists of GSM cell transitions
|
|
851
|
+ that are enriched with GPS information whenever a GPS device is available.
|
|
852
|
+ We present four different algorithms for this problem and compare
|
|
853
|
+ them using real data gathered throughout Europe. In addition, we
|
|
854
|
+ analyze the suitability of our algorithms for mobile devices},
|
|
855
|
+ citeulike-article-id = {2420217},
|
|
856
|
+ citeulike-linkout-0 = {http://dx.doi.org/10.1109/MOBIQ.2006.340429},
|
|
857
|
+ citeulike-linkout-1 = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4141782},
|
|
858
|
+ doi = {10.1109/MOBIQ.2006.340429},
|
|
859
|
+ file = {Nurmi2006.pdf:Nurmi2006.pdf:PDF},
|
|
860
|
+ journal = {Mobile and Ubiquitous Systems: Networking \& Services, 2006 Third
|
|
861
|
+ Annual International Conference on},
|
|
862
|
+ keywords = {cs-location, read},
|
|
863
|
+ owner = {chris},
|
|
864
|
+ posted-at = {2008-02-24 02:03:54},
|
|
865
|
+ priority = {2},
|
|
866
|
+ timestamp = {2009.12.06},
|
|
867
|
+ url = {http://dx.doi.org/10.1109/MOBIQ.2006.340429}
|
|
868
|
+}
|
|
869
|
+
|
455
|
870
|
@ARTICLE{Parkka2006,
|
456
|
871
|
author = {Parkka, J. and Ermes, M. and Korpipaa, P. and Mantyjarvi, J. and
|
457
|
872
|
Peltola, J. and Korhonen, I.},
|
|
@@ -487,6 +902,7 @@
|
487
|
902
|
citeulike-linkout-2 = {http://dx.doi.org/http://dx.doi.org/10.1109/TITB.2005.856863},
|
488
|
903
|
citeulike-linkout-3 = {http://dx.doi.org/10.1109/TITB.2005.856863},
|
489
|
904
|
doi = {10.1109/TITB.2005.856863},
|
|
905
|
+ file = {Parkka2006.pdf:Parkka2006.pdf:PDF},
|
490
|
906
|
keywords = {activity, coact, health, walton, wearable},
|
491
|
907
|
owner = {chris},
|
492
|
908
|
pdf = {Parkka2006.pdf},
|
|
@@ -552,6 +968,76 @@
|
552
|
968
|
timestamp = {2009.12.01}
|
553
|
969
|
}
|
554
|
970
|
|
|
971
|
+@ARTICLE{Raento2005,
|
|
972
|
+ author = {Raento, Mika and Oulasvirta, Antti and Petit, Renaud and Toivonen,
|
|
973
|
+ Hannu},
|
|
974
|
+ title = {ContextPhone: A Prototyping Platform for Context-Aware Mobile Applications},
|
|
975
|
+ journal = {IEEE Pervasive Computing},
|
|
976
|
+ year = {2005},
|
|
977
|
+ volume = {4},
|
|
978
|
+ pages = {51--59},
|
|
979
|
+ number = {2},
|
|
980
|
+ month = {April},
|
|
981
|
+ abstract = {ContextPhone is an open-source prototyping platform for context-aware
|
|
982
|
+ mobile applications. Its development was based on an iterative, human-centered
|
|
983
|
+ strategy aimed at enabling real-world applications that are easily
|
|
984
|
+ integrated into users\&\#253; everyday lives. The strategy included
|
|
985
|
+ rapid response to feedback from field evaluations. The developers
|
|
986
|
+ also studied other applications as well as general mobility issues.
|
|
987
|
+ Their work resulted in prioritized design goals, including an emphasis
|
|
988
|
+ on context, unobtrusiveness, truthfulness, seamfulness, timeliness
|
|
989
|
+ and fast interaction. These design goals have been realized in several
|
|
990
|
+ robust components running on top of the Series 60 Smartphone platform.
|
|
991
|
+ These components include basic services like error recovery and service
|
|
992
|
+ starting, sensors for gathering context data, communication channels
|
|
993
|
+ for interacting with the outside world, and customizable versions
|
|
994
|
+ of the Smartphone applications. Several real-world applications have
|
|
995
|
+ been built on top of ContextPhone and the platform is released under
|
|
996
|
+ an open-source license for use in further research.},
|
|
997
|
+ address = {Piscataway, NJ, USA},
|
|
998
|
+ booktitle = {Pervasive Computing, IEEE},
|
|
999
|
+ citeulike-article-id = {2926228},
|
|
1000
|
+ citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=1070601.1070628},
|
|
1001
|
+ citeulike-linkout-1 = {http://dx.doi.org/10.1109/MPRV.2005.29},
|
|
1002
|
+ citeulike-linkout-2 = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1427649},
|
|
1003
|
+ doi = {10.1109/MPRV.2005.29},
|
|
1004
|
+ file = {Raento2005.pdf:Raento2005.pdf:PDF},
|
|
1005
|
+ issn = {1536-1268},
|
|
1006
|
+ keywords = {adaptive\_interfaces, location\_aware\_computing},
|
|
1007
|
+ owner = {chris},
|
|
1008
|
+ posted-at = {2008-06-25 17:18:22},
|
|
1009
|
+ priority = {2},
|
|
1010
|
+ publisher = {IEEE Educational Activities Department},
|
|
1011
|
+ timestamp = {2009.12.06},
|
|
1012
|
+ url = {http://dx.doi.org/10.1109/MPRV.2005.29}
|
|
1013
|
+}
|
|
1014
|
+
|
|
1015
|
+@INPROCEEDINGS{Ravi2005,
|
|
1016
|
+ author = {Ravi, Nishkam and Nikhil, D. and Mysore, Preetham and Littman, Michael
|
|
1017
|
+ L.},
|
|
1018
|
+ title = {Activity recognition from accelerometer data},
|
|
1019
|
+ booktitle = {Proceedings of the Seventeenth Conference on Innovative Applications
|
|
1020
|
+ of Artificial Intelligence(IAAI},
|
|
1021
|
+ year = {2005},
|
|
1022
|
+ pages = {1541--1546},
|
|
1023
|
+ abstract = {Activity recognition fits within the bigger framework of context awareness.
|
|
1024
|
+ In this paper, we report on our efforts to recognize user activity
|
|
1025
|
+ from accelerometer data. Activity recognition is formulated as a
|
|
1026
|
+ classification problem. Performance of base-level classifiers and
|
|
1027
|
+ meta-level classifiers is compared. Plurality Voting is found to
|
|
1028
|
+ perform consistently well across different settings.},
|
|
1029
|
+ citeulike-article-id = {5157220},
|
|
1030
|
+ citeulike-linkout-0 = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.92.1333},
|
|
1031
|
+ citeulike-linkout-1 = {https://www.aaai.org/Papers/IAAI/2005/IAAI05-013.pdf},
|
|
1032
|
+ file = {Ravi2005.pdf:Ravi2005.pdf:PDF},
|
|
1033
|
+ keywords = {accelerometer, activity-inferencing},
|
|
1034
|
+ owner = {chris},
|
|
1035
|
+ posted-at = {2009-07-15 10:33:20},
|
|
1036
|
+ priority = {2},
|
|
1037
|
+ timestamp = {2009.12.06},
|
|
1038
|
+ url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.92.1333}
|
|
1039
|
+}
|
|
1040
|
+
|
555
|
1041
|
@ARTICLE{Reynolds2008,
|
556
|
1042
|
author = {Reynolds, F.},
|
557
|
1043
|
title = {Camera Phones: A Snapshot of Research and Applications},
|
|
@@ -580,6 +1066,38 @@
|
580
|
1066
|
timestamp = {2009.12.01}
|
581
|
1067
|
}
|
582
|
1068
|
|
|
1069
|
+@MISC{Salber1999,
|
|
1070
|
+ author = {Salber, Daniel and Dey, Anind K. and Abowd, Gregory D.},
|
|
1071
|
+ title = {The Context Toolkit: Aiding the Development of Context-Enabled Applications},
|
|
1072
|
+ year = {1999},
|
|
1073
|
+ abstract = {Context-enabled applications are just emerging and promise richer
|
|
1074
|
+ interaction by taking environmental context into account. However,
|
|
1075
|
+ they are difficult to build due to their distributed nature and the
|
|
1076
|
+ use of unconventional sensors. The concepts of toolkits and widget
|
|
1077
|
+ libraries in graphical user interfaces has been tremendously successful,
|
|
1078
|
+ allowing programmers to leverage off existing building blocks to
|
|
1079
|
+ build interactive systems more easily. We introduce the concept of
|
|
1080
|
+ context widgets that mediate between the environment and the application
|
|
1081
|
+ in the same way graphical widgets mediate between the user and the
|
|
1082
|
+ application. We illustrate the concept of context widgets with the
|
|
1083
|
+ beginnings of a widget library we have developed for sensing presence,
|
|
1084
|
+ identity and activity of people and things. We assess the success
|
|
1085
|
+ of our approach with two example context-enabled applications we
|
|
1086
|
+ have built and an existing application to which we have added contextsensing
|
|
1087
|
+ capabilities.},
|
|
1088
|
+ citeulike-article-id = {3753280},
|
|
1089
|
+ citeulike-linkout-0 = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.32.2110},
|
|
1090
|
+ citeulike-linkout-1 = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.32.2110},
|
|
1091
|
+ file = {Salber1999.pdf:Salber1999.pdf:PDF},
|
|
1092
|
+ keywords = {applications, context, context\_awareness, toolkit},
|
|
1093
|
+ owner = {chris},
|
|
1094
|
+ pages = {434--441},
|
|
1095
|
+ posted-at = {2008-12-07 12:33:46},
|
|
1096
|
+ priority = {4},
|
|
1097
|
+ timestamp = {2009.12.06},
|
|
1098
|
+ url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.32.2110}
|
|
1099
|
+}
|
|
1100
|
+
|
583
|
1101
|
@MISC{Schapire1999,
|
584
|
1102
|
author = {Schapire, Robert E.},
|
585
|
1103
|
title = {A Brief Introduction to Boosting},
|
|
@@ -678,6 +1196,29 @@
|
678
|
1196
|
timestamp = {2009.12.01}
|
679
|
1197
|
}
|
680
|
1198
|
|
|
1199
|
+@INPROCEEDINGS{Siewiorek2003,
|
|
1200
|
+ author = {Siewiorek, D. and Smailagic, A. and Furukawa, J. and Krause, A. and
|
|
1201
|
+ Moraveji, N. and Reiger, K. and Shaffer, J. and Wong, Fei L.},
|
|
1202
|
+ title = {SenSay: a context-aware mobile phone},
|
|
1203
|
+ booktitle = {Wearable Computers, 2003. Proceedings. Seventh IEEE International
|
|
1204
|
+ Symposium on},
|
|
1205
|
+ year = {2003},
|
|
1206
|
+ pages = {248--249},
|
|
1207
|
+ citeulike-article-id = {898575},
|
|
1208
|
+ citeulike-linkout-0 = {http://dx.doi.org/10.1109/ISWC.2003.1241422},
|
|
1209
|
+ citeulike-linkout-1 = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1241422},
|
|
1210
|
+ doi = {10.1109/ISWC.2003.1241422},
|
|
1211
|
+ file = {Siewiorek2003.pdf:Siewiorek2003.pdf:PDF},
|
|
1212
|
+ journal = {Wearable Computers, 2003. Proceedings. Seventh IEEE International
|
|
1213
|
+ Symposium on},
|
|
1214
|
+ keywords = {aware, context, mobile, phone},
|
|
1215
|
+ owner = {chris},
|
|
1216
|
+ posted-at = {2008-09-16 14:38:06},
|
|
1217
|
+ priority = {2},
|
|
1218
|
+ timestamp = {2009.12.06},
|
|
1219
|
+ url = {http://dx.doi.org/10.1109/ISWC.2003.1241422}
|
|
1220
|
+}
|
|
1221
|
+
|
681
|
1222
|
@INPROCEEDINGS{Song2005,
|
682
|
1223
|
author = {Song, K. and Wang, Y.},
|
683
|
1224
|
title = {Remote Activity Monitoring of the Elderly Using a Two-Axis Accelerometer},
|
|
@@ -719,6 +1260,31 @@
|
719
|
1260
|
timestamp = {2009.12.01}
|
720
|
1261
|
}
|
721
|
1262
|
|
|
1263
|
+@INPROCEEDINGS{Terry2002,
|
|
1264
|
+ author = {Terry, Michael and Mynatt, Elizabeth D. and Ryall, Kathy and Leigh,
|
|
1265
|
+ Darren},
|
|
1266
|
+ title = {Social net: using patterns of physical proximity over time to infer
|
|
1267
|
+ shared interests},
|
|
1268
|
+ booktitle = {CHI '02: CHI '02 extended abstracts on Human factors in computing
|
|
1269
|
+ systems},
|
|
1270
|
+ year = {2002},
|
|
1271
|
+ pages = {816--817},
|
|
1272
|
+ address = {New York, NY, USA},
|
|
1273
|
+ publisher = {ACM Press},
|
|
1274
|
+ citeulike-article-id = {934249},
|
|
1275
|
+ citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=506443.506612},
|
|
1276
|
+ citeulike-linkout-1 = {http://dx.doi.org/10.1145/506443.506612},
|
|
1277
|
+ doi = {10.1145/506443.506612},
|
|
1278
|
+ file = {Terry2002.pdf:Terry2002.pdf:PDF},
|
|
1279
|
+ isbn = {1581134541},
|
|
1280
|
+ keywords = {networking, social},
|
|
1281
|
+ owner = {chris},
|
|
1282
|
+ posted-at = {2008-08-21 15:56:49},
|
|
1283
|
+ priority = {2},
|
|
1284
|
+ timestamp = {2009.12.06},
|
|
1285
|
+ url = {http://dx.doi.org/10.1145/506443.506612}
|
|
1286
|
+}
|
|
1287
|
+
|
722
|
1288
|
@ARTICLE{Voida2002,
|
723
|
1289
|
author = {Voida, S. and Mynatt, E.D. and MacIntyre, B. and Corso, G.M.},
|
724
|
1290
|
title = {Integrating virtual and physical context to support knowledge workers},
|
|
@@ -788,6 +1354,7 @@
|
788
|
1354
|
pages = {100--105},
|
789
|
1355
|
month = {20--22 Aug. },
|
790
|
1356
|
doi = {10.1109/MFI.2008.4648116},
|
|
1357
|
+ file = {Yang2008.pdf:Yang2008.pdf:PDF},
|
791
|
1358
|
owner = {chris},
|
792
|
1359
|
timestamp = {2009.12.03}
|
793
|
1360
|
}
|
|
@@ -804,12 +1371,14 @@
|
804
|
1371
|
|
805
|
1372
|
@comment{jabref-meta: groupstree:
|
806
|
1373
|
0 AllEntriesGroup:;
|
807
|
|
-1 ExplicitGroup:Unread\;0\;Abowd1997\;Bellotti2008\;Dornbush2005\;Eagl
|
808
|
|
-e2004\;Floreen2008\;Garakani2009\;Hein2008\;Lee2007\;Lester2006\;Liao2
|
809
|
|
-007\;Liao2007a\;Lukowicz2002\;Mahdaviani2007\;Mathie2004\;Maurer2006\;
|
810
|
|
-Miluzzo2009\;Nicolai2006\;Parkka2006\;Patterson2004\;Philipose2003\;Ph
|
811
|
|
-ilipose2003a\;Philipose2004\;Rudstroem2004\;Schapire1999\;Schilit1994\
|
812
|
|
-;Schmidt1999\;Schmidt2008\;Shen2004\;Song2005\;Stiefmeier2008\;Tentori
|
813
|
|
-2008\;Voida2002\;Wang2009\;Wyatt2007\;Yang2008\;;
|
|
1374
|
+1 ExplicitGroup:Unread\;0\;Aha1991\;Bao2004\;Bardram2005\;Bellotti2008
|
|
1375
|
+\;Consolvo2008\;Eagle2006\;Hightower2005\;Horvitz1998\;Huynh2005\;Keer
|
|
1376
|
+thi1999\;Lee2007\;Lester2005\;Lester2006\;Liao2007\;Liao2007a\;Lukowic
|
|
1377
|
+z2002\;Mahdaviani2007\;Mathie2004\;Maurer2006\;Nurmi2006\;Parkka2006\;
|
|
1378
|
+Patterson2004\;Philipose2003\;Philipose2003a\;Philipose2004\;Raento200
|
|
1379
|
+5\;Ravi2005\;Rudstroem2004\;Salber1999\;Schapire1999\;Schilit1994\;Sch
|
|
1380
|
+midt1999\;Schmidt2008\;Shen2004\;Siewiorek2003\;Song2005\;Stiefmeier20
|
|
1381
|
+08\;Tentori2008\;Terry2002\;Voida2002\;Wang2009\;Wyatt2007\;Yang2008\;
|
|
1382
|
+;
|
814
|
1383
|
}
|
815
|
1384
|
|