瀏覽代碼

Papers overload

tags/SensorLogger/0.1
Chris Smith 14 年之前
父節點
當前提交
45f213fbff
共有 21 個檔案被更改,包括 576 行新增7 行删除
  1. 二進制
      papers/Aha1991.pdf
  2. 二進制
      papers/Bao2004.pdf
  3. 二進制
      papers/Bardram2005.pdf
  4. 二進制
      papers/Bellotti2008.pdf
  5. 二進制
      papers/Consolvo2008.pdf
  6. 二進制
      papers/Eagle2006.pdf
  7. 二進制
      papers/Hightower2005.pdf
  8. 二進制
      papers/Horvitz1998.pdf
  9. 二進制
      papers/Huynh2005.pdf
  10. 二進制
      papers/Keerthi1999.pdf
  11. 二進制
      papers/Lee2007.pdf
  12. 二進制
      papers/Lester2005.pdf
  13. 二進制
      papers/Mathie2004.pdf
  14. 二進制
      papers/Nurmi2006.pdf
  15. 二進制
      papers/Raento2005.pdf
  16. 二進制
      papers/Ravi2005.pdf
  17. 二進制
      papers/Salber1999.pdf
  18. 二進制
      papers/Siewiorek2003.pdf
  19. 二進制
      papers/Terry2002.pdf
  20. 二進制
      papers/Yang2008.pdf
  21. 576
    7
      papers/project.bib

二進制
papers/Aha1991.pdf 查看文件


二進制
papers/Bao2004.pdf 查看文件


二進制
papers/Bardram2005.pdf 查看文件


二進制
papers/Bellotti2008.pdf 查看文件


二進制
papers/Consolvo2008.pdf 查看文件


二進制
papers/Eagle2006.pdf 查看文件


二進制
papers/Hightower2005.pdf 查看文件


二進制
papers/Horvitz1998.pdf 查看文件


二進制
papers/Huynh2005.pdf 查看文件


二進制
papers/Keerthi1999.pdf 查看文件


二進制
papers/Lee2007.pdf 查看文件


二進制
papers/Lester2005.pdf 查看文件


二進制
papers/Mathie2004.pdf 查看文件


二進制
papers/Nurmi2006.pdf 查看文件


二進制
papers/Raento2005.pdf 查看文件


二進制
papers/Ravi2005.pdf 查看文件


二進制
papers/Salber1999.pdf 查看文件


二進制
papers/Siewiorek2003.pdf 查看文件


二進制
papers/Terry2002.pdf 查看文件


二進制
papers/Yang2008.pdf 查看文件


+ 576
- 7
papers/project.bib 查看文件

@@ -36,12 +36,58 @@
36 36
   year = {1997},
37 37
   citeseercitationcount = {0},
38 38
   citeseerurl = {http://citeseer.ist.psu.edu/36540.html},
39
+  comment = {Not relevant.},
39 40
   file = {Abowd1997.pdf:Abowd1997.pdf:PDF},
40 41
   owner = {chris},
41 42
   pdf = {Abowd1997.pdf},
42 43
   timestamp = {2009.12.01}
43 44
 }
44 45
 
46
+@ARTICLE{Aha1991,
47
+  author = {Aha, David W. and Kibler, Dennis and Albert, Marc K.},
48
+  title = {Instance-Based Learning Algorithms},
49
+  journal = {Machine Learning},
50
+  year = {1991},
51
+  volume = {6},
52
+  pages = {37--66},
53
+  number = {1},
54
+  month = {January},
55
+  abstract = {Storing and using specific instances improves the performance of several
56
+	supervised learning algorithms. These include algorithms that learn
57
+	decision trees, classification rules, and distributed networks. However,
58
+	no investigation has analyzed algorithms that use only specific instances
59
+	to solve incremental learning tasks. In this paper, we describe a
60
+	framework and methodology, called instance-based learning, that generates
61
+	classification predictions using only specific instances. Instance-based
62
+	learning algorithms do not maintain a set of abstractions derived
63
+	from specific instances. This approach extends the nearest neighbor
64
+	algorithm, which has large storage requirements. We describe how
65
+	storage requirements can be significantly reduced with, at most,
66
+	minor sacrifices in learning rate and classification accuracy. While
67
+	the storage-reducing algorithm performs well on several real-world
68
+	databases, its performance degrades rapidly with the level of attribute
69
+	noise in training instances. Therefore, we extended it with a significance
70
+	test to distinguish noisy instances. This extended algorithm's performance
71
+	degrades gracefully with increasing noise levels and compares favorably
72
+	with a noise-tolerant decision tree algorithm.},
73
+  address = {Hingham, MA, USA},
74
+  citeulike-article-id = {1527614},
75
+  citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=104717},
76
+  citeulike-linkout-1 = {http://dx.doi.org/10.1023/A:1022689900470},
77
+  citeulike-linkout-2 = {http://www.springerlink.com/content/kn127378pg361187},
78
+  day = {1},
79
+  doi = {10.1023/A:1022689900470},
80
+  file = {Aha1991.pdf:Aha1991.pdf:PDF},
81
+  issn = {0885-6125},
82
+  keywords = {learning},
83
+  owner = {chris},
84
+  posted-at = {2007-08-01 14:37:32},
85
+  priority = {4},
86
+  publisher = {Kluwer Academic Publishers},
87
+  timestamp = {2009.12.06},
88
+  url = {http://dx.doi.org/10.1023/A:1022689900470}
89
+}
90
+
45 91
 @ARTICLE{Bannach2008,
46 92
   author = {Bannach, D. and Lukowicz, P. and Amft, O.},
47 93
   title = {Rapid Prototyping of Activity Recognition Applications},
@@ -63,6 +109,76 @@
63 109
   timestamp = {2009.12.01}
64 110
 }
65 111
 
112
+@ARTICLE{Bao2004,
113
+  author = {Bao, L. and Intille, S. S.},
114
+  title = {Activity Recognition from User-Annotated Acceleration Data},
115
+  journal = {Pervasive Computing},
116
+  year = {2004},
117
+  volume = {3001},
118
+  pages = {1--17},
119
+  abstract = {In this work, algorithms are developed and evaluated to detect physical
120
+	activities from data acquired using five small biaxial accelerometers
121
+	worn simultaneously on different parts of the body. Acceleration
122
+	data was collected from 20 subjects without researcher supervision
123
+	or observation. Subjects were asked to perform a sequence of everyday
124
+	tasks but not told specifically where or how to do them. Mean, energy,
125
+	frequency-domain entropy, and correlation of acceleration data was
126
+	calculated and several classifiers using these features were tested.
127
+	Decision tree classifiers showed the best performance recognizing
128
+	everyday activities with an overall accuracy rate of 84\%. The results
129
+	show that although some activities are recognized well with subject-independent
130
+	training data, others appear to require subject-specific training
131
+	data. The results suggest that multiple accelerometers aid in recognition
132
+	because conjunctions in acceleration feature values can effectively
133
+	discriminate many activities. With just two biaxial accelerometers
134
+	– thigh and wrist – the recognition performance dropped only slightly.
135
+	This is the first work to investigate performance of recognition
136
+	algorithms with multiple, wire-free accelerometers on 20 activities
137
+	using datasets annotated by the subjects themselves.},
138
+  citeulike-article-id = {1188357},
139
+  citeulike-linkout-0 = {http://www.springerlink.com/content/9aqflyk4f47khyjd},
140
+  file = {Bao2004.pdf:Bao2004.pdf:PDF},
141
+  keywords = {acceleration},
142
+  owner = {chris},
143
+  posted-at = {2008-04-16 11:42:22},
144
+  priority = {4},
145
+  timestamp = {2009.12.06},
146
+  url = {http://www.springerlink.com/content/9aqflyk4f47khyjd}
147
+}
148
+
149
+@INCOLLECTION{Bardram2005,
150
+  author = {Bardram, Jakob E.},
151
+  title = {The Java Context Awareness Framework (JCAF) – A Service Infrastructure
152
+	and Programming Framework for Context-Aware Applications},
153
+  booktitle = {Pervasive Computing},
154
+  publisher = {IEEE},
155
+  year = {2005},
156
+  pages = {98--115},
157
+  abstract = {Context-awareness is a key concept in ubiquitous computing. But to
158
+	avoid developing dedicated context-awareness sub-systems for specific
159
+	application areas there is a need for more generic programming frameworks.
160
+	Such frameworks can help the programmer develop and deploy context-aware
161
+	applications faster. This paper describes the Java Context-Awareness
162
+	Framework – JCAF, which is a Java-based context-awareness infrastructure
163
+	and programming API for creating context-aware computer applications.
164
+	The paper presents the design goals of JCAF, its runtime architecture,
165
+	and its programming model. The paper presents some applications of
166
+	using JCAF in three different applications and discusses lessons
167
+	learned from using JCAF.},
168
+  citeulike-article-id = {1145979},
169
+  citeulike-linkout-0 = {http://dx.doi.org/10.1007/11428572_7},
170
+  citeulike-linkout-1 = {http://www.springerlink.com/content/yl2fen8clqqwq2tb},
171
+  doi = {10.1007/11428572_7},
172
+  file = {Bardram2005.pdf:Bardram2005.pdf:PDF},
173
+  journal = {Pervasive Computing},
174
+  keywords = {awareness, context, framework},
175
+  owner = {chris},
176
+  posted-at = {2007-06-26 09:54:05},
177
+  priority = {4},
178
+  timestamp = {2009.12.06},
179
+  url = {http://dx.doi.org/10.1007/11428572_7}
180
+}
181
+
66 182
 @ARTICLE{Bellavista2008,
67 183
   author = {Bellavista, P. and Kupper, A. and Helal, S.},
68 184
   title = {Location-Based Services: Back to the Future},
@@ -98,6 +214,7 @@
98 214
   citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=1357237},
99 215
   citeulike-linkout-1 = {http://dx.doi.org/10.1145/1357054.1357237},
100 216
   doi = {10.1145/1357054.1357237},
217
+  file = {Bellotti2008.pdf:Bellotti2008.pdf:PDF},
101 218
   isbn = {9781605580111},
102 219
   keywords = {ibm, iphone, triage},
103 220
   owner = {chris},
@@ -145,6 +262,33 @@
145 262
   timestamp = {2009.12.01}
146 263
 }
147 264
 
265
+@INPROCEEDINGS{Consolvo2008,
266
+  author = {Consolvo, Sunny and Mcdonald, David W. and Toscos, Tammy and Chen,
267
+	Mike Y. and Froehlich, Jon and Harrison, Beverly and Klasnja, Predrag
268
+	and Lamarca, Anthony and Legrand, Louis and Libby, Ryan and Smith,
269
+	Ian and Landay, James A.},
270
+  title = {Activity sensing in the wild: a field trial of ubifit garden},
271
+  booktitle = {CHI '08: Proceeding of the twenty-sixth annual SIGCHI conference
272
+	on Human factors in computing systems},
273
+  year = {2008},
274
+  pages = {1797--1806},
275
+  address = {New York, NY, USA},
276
+  publisher = {ACM},
277
+  citeulike-article-id = {2977124},
278
+  citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=1357054.1357335},
279
+  citeulike-linkout-1 = {http://dx.doi.org/10.1145/1357054.1357335},
280
+  doi = {10.1145/1357054.1357335},
281
+  file = {Consolvo2008.pdf:Consolvo2008.pdf:PDF},
282
+  isbn = {9781605580111},
283
+  keywords = {sensing, ubiquitous},
284
+  location = {Florence, Italy},
285
+  owner = {chris},
286
+  posted-at = {2008-08-25 01:26:32},
287
+  priority = {2},
288
+  timestamp = {2009.12.06},
289
+  url = {http://dx.doi.org/10.1145/1357054.1357335}
290
+}
291
+
148 292
 @ARTICLE{Davies2008,
149 293
   author = {Davies, Nigel and Siewiorek, Daniel P. and Sukthankar, Rahul},
150 294
   title = {Activity-Based Computing},
@@ -172,6 +316,7 @@
172 316
   pages = {58--61},
173 317
   number = {2},
174 318
   month = {April--June },
319
+  comment = {Not relevant.},
175 320
   doi = {10.1109/MPRV.2008.25},
176 321
   file = {Serugendo2008.pdf:Serugendo2008.pdf:PDF},
177 322
   owner = {chris},
@@ -186,6 +331,12 @@
186 331
 	and Systems},
187 332
   year = {2005},
188 333
   pages = {1--6},
334
+  comment = {We used classifiers from the open source Weka library[Witten and Frank,
335
+	2005] and neural networks from the open source Joone library[Marrone
336
+	and Team, 2006]. Decision Tree (J48) [Quinlan, 1993] 41% acc. AdaBoost
337
+	[Freund and Schapire, 1996] 46% acc. Support Vector Machine (SVM)
338
+	[Platt, 1998; Keerthi et al 2001] 43%. K-Nearest Neighbours [Aha
339
+	and Kibler, 1991] 47% acc. Neural networks 43% acc.},
189 340
   doi = {10.1109/MTAS.2005.207159},
190 341
   file = {Dornbush2005.pdf:Dornbush2005.pdf:PDF},
191 342
   keywords = {audio equipment, humanities, mobile handsets, XPod, emotion aware
@@ -199,17 +350,54 @@
199 350
   author = {Eagle, N. and Pentland, A.},
200 351
   title = {Mobile Matchmaking: Proximity Sensing and Cueing},
201 352
   year = {2004},
353
+  comment = {Bluetooth battery life; relationship type based on time of day and
354
+	bluetooth density; Gaussian mixture model 90%, SVM better?},
202 355
   file = {Eagle2004.pdf:Eagle2004.pdf:PDF},
203 356
   journal = {IEEE Pervasive, Special Issue on Smart Phones},
204 357
   owner = {chris},
205 358
   timestamp = {2009.12.01}
206 359
 }
207 360
 
361
+@ARTICLE{Eagle2006,
362
+  author = {Eagle, Nathan and Sandy Pentland, Alex},
363
+  title = {Reality mining: sensing complex social systems},
364
+  journal = {Personal and Ubiquitous Computing},
365
+  year = {2006},
366
+  volume = {10},
367
+  pages = {255--268},
368
+  number = {4},
369
+  month = {May},
370
+  abstract = {Abstract\ \ We introduce a system for sensing complex social
371
+	systems with data collected from 100 mobile phones over the course
372
+	of 9\ months. We demonstrate the ability to use standard Bluetooth-enabled
373
+	mobile telephones to measure information access and use in different
374
+	contexts, recognize social patterns in daily user activity, infer
375
+	relationships, identify socially significant locations, and model
376
+	organizational rhythms.},
377
+  address = {London, UK},
378
+  citeulike-article-id = {899208},
379
+  citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=1122739.1122745},
380
+  citeulike-linkout-1 = {http://dx.doi.org/10.1007/s00779-005-0046-3},
381
+  citeulike-linkout-2 = {http://www.springerlink.com/content/l562745318077t54},
382
+  day = {1},
383
+  doi = {10.1007/s00779-005-0046-3},
384
+  file = {Eagle2006.pdf:Eagle2006.pdf:PDF},
385
+  issn = {1617-4909},
386
+  keywords = {complex, mining, reality, sensing, social, systems},
387
+  owner = {chris},
388
+  posted-at = {2009-10-12 11:59:33},
389
+  priority = {2},
390
+  publisher = {Springer-Verlag},
391
+  timestamp = {2009.12.06},
392
+  url = {http://dx.doi.org/10.1007/s00779-005-0046-3}
393
+}
394
+
208 395
 @MISC{Floreen2008,
209 396
   author = {Patrik Floréen and Joonas Kukkonen and Eemil Lagerspetz and Petteri
210 397
 	Nurmi and Jukka Suomela},
211 398
   title = {BeTelGeuse: Tool for Context Data Gathering via Bluetooth},
212 399
   year = {2008},
400
+  comment = {Not relevant.},
213 401
   file = {Floreen2008.pdf:Floreen2008.pdf:PDF},
214 402
   owner = {chris},
215 403
   timestamp = {2009.12.01}
@@ -221,6 +409,9 @@
221 409
 	Mobile},
222 410
   school = {University of Washington},
223 411
   year = {2009},
412
+  comment = {Instant/smooth classification ideas. Discrete fourier transform on
413
+	accelerometer data. 24 features per axis. Naive bayes model. 25Hz
414
+	accelerometer sampling battery life - 7 days down to 24 hours.},
224 415
   file = {Garakani2009.pdf:Garakani2009.pdf:PDF},
225 416
   owner = {chris},
226 417
   timestamp = {2009.12.01}
@@ -250,6 +441,9 @@
250 441
 	of this technique using experimental data from two test runs of a
251 442
 	home care scenario showing a higher accuracy and robustness than
252 443
 	conventional discriminative methods.},
444
+  comment = {Unsupervised learning for basic actions, then overlying hiden markov
445
+	model to classify into higher-level activities. K-means clustering
446
+	algorithm for identification and detection of base-level motion patterns.},
253 447
   file = {Hein2008.pdf:Hein2008.pdf:PDF},
254 448
   institution = {CiteSeerX - Scientific Literature Digital Library and Search Engine
255 449
 	[http://citeseerx.ist.psu.edu/oai2] (United States)},
@@ -259,6 +453,144 @@
259 453
   url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.6671}
260 454
 }
261 455
 
456
+@INPROCEEDINGS{Hightower2005,
457
+  author = {Hightower, Jeffrey and Consolvo, Sunny and Lamarca, Anthony and Smith,
458
+	Ian and Hughes, Jeff},
459
+  title = {Learning and Recognizing the Places We Go},
460
+  booktitle = {UbiComp 2005: Ubiquitous Computing},
461
+  year = {2005},
462
+  pages = {159--176},
463
+  abstract = {Location-enhanced mobile devices are becoming common, but applications
464
+	built for these devices find themselves suffering a mismatch between
465
+	the latitude and longitude that location sensors provide and the
466
+	colloquial place label that applications need. Conveying my location
467
+	to my spouse, for example as (48.13641N, 11.57471E), is less informative
468
+	than saying "at home". We introduce an algorithm called BeaconPrint
469
+	that uses WiFi and GSM radio fingerprints collected by someone's
470
+	personal mobile device to automatically learn the places they go
471
+	and then detect when they return to those places. BeaconPrint does
472
+	not automatically assign names or semantics to places. Rather, it
473
+	provides the technological foundation to support this task. We compare
474
+	BeaconPrint to three existing algorithms using month-long trace logs
475
+	from each of three people. Algorithmic results are supplemented with
476
+	a survey study about the places people go. BeaconPrint is over 90\%
477
+	accurate in learning and recognizing places. Additionally, it improves
478
+	accuracy in recognizing places visited infrequently or for short
479
+	durations - a category where previous approaches have fared poorly.
480
+	BeaconPrint demonstrates 63\% accuracy for places someone returns
481
+	to only once or visits for less than 10 minutes, increasing to 80\%
482
+	accuracy for places visited twice.},
483
+  citeulike-article-id = {1382076},
484
+  citeulike-linkout-0 = {http://dx.doi.org/10.1007/11551201_10},
485
+  doi = {10.1007/11551201_10},
486
+  file = {Hightower2005.pdf:Hightower2005.pdf:PDF},
487
+  journal = {UbiComp 2005: Ubiquitous Computing},
488
+  keywords = {learning, location, places, prediction, significant},
489
+  owner = {chris},
490
+  posted-at = {2009-03-24 14:34:56},
491
+  priority = {0},
492
+  timestamp = {2009.12.06},
493
+  url = {http://dx.doi.org/10.1007/11551201_10}
494
+}
495
+
496
+@INPROCEEDINGS{Horvitz1998,
497
+  author = {Horvitz, E. and Breese, J. and Heckerman, D. and Hovel, D. and Rommelse,
498
+	K.},
499
+  title = {The Lumiere project: Bayesian user modeling for inferring the goals
500
+	and needs of software users},
501
+  booktitle = {In Proceedings of the Fourteenth Conference on Uncertainty in Artificial
502
+	Intelligence},
503
+  year = {1998},
504
+  pages = {256--265},
505
+  address = {Madison, WI},
506
+  month = {July},
507
+  abstract = {The Lumi`ere Project centers on harnessing probability and utility
508
+	to provide assistance to computer software users. We review work
509
+	on Bayesian user models that can be employed to infer a user's needs
510
+	by considering a user's background, actions, and queries. Several
511
+	problems were tackled in Lumi`ere research, including (1) the construction
512
+	of Bayesian models for reasoning about the time-varying goals of
513
+	computer users from their observed actions and queries, (2) gaining
514
+	access to a stream of...},
515
+  citeulike-article-id = {1269522},
516
+  citeulike-linkout-0 = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.39.8472},
517
+  file = {Horvitz1998.pdf:Horvitz1998.pdf:PDF},
518
+  keywords = {bayesian, computing, inference, modeling, user},
519
+  owner = {chris},
520
+  posted-at = {2007-05-14 23:50:35},
521
+  priority = {4},
522
+  timestamp = {2009.12.06},
523
+  url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.39.8472}
524
+}
525
+
526
+@INPROCEEDINGS{Huynh2005,
527
+  author = {Huynh, T\^{a}m and Schiele, Bernt},
528
+  title = {Analyzing features for activity recognition},
529
+  booktitle = {sOc-EUSAI '05: Proceedings of the 2005 joint conference on Smart
530
+	objects and ambient intelligence},
531
+  year = {2005},
532
+  pages = {159--163},
533
+  address = {New York, NY, USA},
534
+  publisher = {ACM},
535
+  abstract = {Human activity is one of the most important ingredients of context
536
+	information. In wearable computing scenarios, activities such as
537
+	walking, standing and sitting can be inferred from data provided
538
+	by body-worn acceleration sensors. In such settings, most approaches
539
+	use a single set of features, regardless of which activity to be
540
+	recognized. In this paper we show that recognition rates can be improved
541
+	by careful selection of individual features for each activity. We
542
+	present a systematic analysis of features computed from a real-world
543
+	data set and show how the choice of feature and the window length
544
+	over which the feature is computed affects the recognition rates
545
+	for different activities. Finally, we give a recommendation of suitable
546
+	features and window lengths for a set of common activities.},
547
+  citeulike-article-id = {1076182},
548
+  citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=1107591},
549
+  citeulike-linkout-1 = {http://dx.doi.org/10.1145/1107548.1107591},
550
+  doi = {10.1145/1107548.1107591},
551
+  file = {Huynh2005.pdf:Huynh2005.pdf:PDF},
552
+  isbn = {1-59593-304-2},
553
+  keywords = {activity, recognition},
554
+  location = {Grenoble, France},
555
+  owner = {chris},
556
+  posted-at = {2007-03-17 06:17:32},
557
+  priority = {2},
558
+  timestamp = {2009.12.06},
559
+  url = {http://dx.doi.org/10.1145/1107548.1107591}
560
+}
561
+
562
+@MISC{Keerthi1999,
563
+  author = {Keerthi, S. and Shevade, S. and Bhattacharyya, C. and Murthy, K.},
564
+  title = {Improvements to Platt's SMO algorithm for SVM classifier design},
565
+  year = {1999},
566
+  abstract = {This paper points out an important source of confusion and ineciency
567
+	in Platt's Sequential
568
+	
569
+	Minimal Optimization (SMO) algorithm that is caused by the use of
570
+	a single threshold value.
571
+	
572
+	Using clues from the KKT conditions for the dual problem, two threshold
573
+	parameters are employed
574
+	
575
+	to derive modications of SMO. These modied algorithms perform signicantly
576
+	faster
577
+	
578
+	than the original SMO on all benchmark datasets tried.
579
+	
580
+	1 Introduction
581
+	
582
+	In the past few years, there has been a lot of excitement...},
583
+  citeulike-article-id = {1772853},
584
+  citeulike-linkout-0 = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.46.8538},
585
+  file = {Keerthi1999.pdf:Keerthi1999.pdf:PDF},
586
+  keywords = {smo, svm},
587
+  owner = {chris},
588
+  posted-at = {2008-04-12 20:18:51},
589
+  priority = {2},
590
+  timestamp = {2009.12.06},
591
+  url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.46.8538}
592
+}
593
+
262 594
 @INPROCEEDINGS{Lee2007,
263 595
   author = {Jae Young Lee and Hoff, W.},
264 596
   title = {Activity Identification Utilizing Data Mining Techniques},
@@ -267,6 +599,7 @@
267 599
   pages = {12--12},
268 600
   month = {Feb. },
269 601
   doi = {10.1109/WMVC.2007.4},
602
+  file = {Lee2007.pdf:Lee2007.pdf:PDF},
270 603
   owner = {chris},
271 604
   timestamp = {2009.12.03}
272 605
 }
@@ -307,6 +640,40 @@
307 640
   url = {http://dx.doi.org/10.1007/11748625_1}
308 641
 }
309 642
 
643
+@INPROCEEDINGS{Lester2005,
644
+  author = {Lester, Jonathan and Choudhury, Tanzeem and Kern, Nicky and Borriello,
645
+	Gaetano and Hannaford, Blake},
646
+  title = {A hybrid discriminative/generative approach for modeling human activities},
647
+  booktitle = {In Proc. of the International Joint Conference on Artificial Intelligence
648
+	(IJCAI},
649
+  year = {2005},
650
+  pages = {766--772},
651
+  abstract = {Accurate recognition and tracking of human activities is an important
652
+	goal of ubiquitous computing. Recent advances in the development
653
+	of multi-modal wearable sensors enable us to gather rich datasets
654
+	of human activities. However, the problem of automatically identifying
655
+	the most useful features for modeling such activities remains largely
656
+	unsolved. In this paper we present a hybrid approach to recognizing
657
+	activities, which combines boosting to discriminatively select useful
658
+	features and learn an ensemble of static classifiers to recognize
659
+	different activities, with hidden Markov models (HMMs) to capture
660
+	the temporal regularities and smoothness of activities. We tested
661
+	the activity recognition system using over 12 hours of wearable-sensor
662
+	data collected by volunteers in natural unconstrained environments.
663
+	The models succeeded in identifying a small set of maximally informative
664
+	features, and were able identify ten different human activities with
665
+	an accuracy of 95\%. 1},
666
+  citeulike-article-id = {3291348},
667
+  citeulike-linkout-0 = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.5776},
668
+  file = {Lester2005.pdf:Lester2005.pdf:PDF},
669
+  keywords = {transitgenie},
670
+  owner = {chris},
671
+  posted-at = {2009-07-11 19:30:29},
672
+  priority = {4},
673
+  timestamp = {2009.12.06},
674
+  url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.5776}
675
+}
676
+
310 677
 @ARTICLE{Liao2007,
311 678
   author = {Liao, Lin and Fox, Dieter and Kautz, Henry},
312 679
   title = {Extracting Places and Activities from GPS Traces Using Hierarchical
@@ -409,7 +776,10 @@
409 776
   citeulike-linkout-1 = {http://www.springerlink.com/content/wm35501wq8352865},
410 777
   day = {12},
411 778
   doi = {10.1007/BF02347551},
779
+  file = {Mathie2004.pdf:Mathie2004.pdf:PDF},
780
+  owner = {chris},
412 781
   posted-at = {2009-05-26 20:42:51},
782
+  timestamp = {2009.12.06},
413 783
   url = {http://dx.doi.org/10.1007/BF02347551}
414 784
 }
415 785
 
@@ -437,6 +807,7 @@
437 807
   title = {Evaluating the iPhone as a Mobile Platform for People-Centric Sensing
438 808
 	Applications},
439 809
   year = {2009},
810
+  comment = {No background apps on iPhone, no access to BT or Wifi stacks.},
440 811
   file = {Miluzzo2009.pdf:Miluzzo2009.pdf:PDF},
441 812
   owner = {chris},
442 813
   timestamp = {2009.12.01}
@@ -447,11 +818,55 @@
447 818
   title = {Exploring Social Context with the Wireless Rope},
448 819
   booktitle = {In Proc. Workshop MONET: LNCS 4277},
449 820
   year = {2006},
821
+  comment = {Definition of familiar strangers. DynStra/DynFam formula.},
450 822
   file = {Nicolai2006.pdf:Nicolai2006.pdf:PDF},
451 823
   owner = {chris},
452 824
   timestamp = {2009.12.01}
453 825
 }
454 826
 
827
+@INPROCEEDINGS{Nurmi2006,
828
+  author = {Nurmi, Petteri and Koolwaaij, Johan},
829
+  title = {Identifying meaningful locations},
830
+  booktitle = {Mobile and Ubiquitous Systems: Networking \& Services, 2006 Third
831
+	Annual International Conference on},
832
+  year = {2006},
833
+  pages = {1--8},
834
+  abstract = {Existing context-aware mobile applications often rely on location
835
+	information. However, raw location data such as GPS coordinates or
836
+	GSM cell identifiers are usually meaningless to the user and, as
837
+	a consequence, researchers have proposed different methods for inferring
838
+	so-called places from raw data. The places are locations that carry
839
+	some meaning to user and to which the user can potentially attach
840
+	some (meaningful) semantics. Examples of places include home, work
841
+	and airport. A lack in existing work is that the labeling has been
842
+	done in an ad hoc fashion and no motivation has been given for why
843
+	places would be interesting to the user. As our first contribution
844
+	we use social identity theory to motivate why some locations really
845
+	are significant to the user. We also discuss what potential uses
846
+	for location information social identity theory implies. Another
847
+	flaw in the existing work is that most of the proposed methods are
848
+	not suited to realistic mobile settings as they rely on the availability
849
+	of GPS information. As our second contribution we consider a more
850
+	realistic setting where the information consists of GSM cell transitions
851
+	that are enriched with GPS information whenever a GPS device is available.
852
+	We present four different algorithms for this problem and compare
853
+	them using real data gathered throughout Europe. In addition, we
854
+	analyze the suitability of our algorithms for mobile devices},
855
+  citeulike-article-id = {2420217},
856
+  citeulike-linkout-0 = {http://dx.doi.org/10.1109/MOBIQ.2006.340429},
857
+  citeulike-linkout-1 = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4141782},
858
+  doi = {10.1109/MOBIQ.2006.340429},
859
+  file = {Nurmi2006.pdf:Nurmi2006.pdf:PDF},
860
+  journal = {Mobile and Ubiquitous Systems: Networking \& Services, 2006 Third
861
+	Annual International Conference on},
862
+  keywords = {cs-location, read},
863
+  owner = {chris},
864
+  posted-at = {2008-02-24 02:03:54},
865
+  priority = {2},
866
+  timestamp = {2009.12.06},
867
+  url = {http://dx.doi.org/10.1109/MOBIQ.2006.340429}
868
+}
869
+
455 870
 @ARTICLE{Parkka2006,
456 871
   author = {Parkka, J. and Ermes, M. and Korpipaa, P. and Mantyjarvi, J. and
457 872
 	Peltola, J. and Korhonen, I.},
@@ -487,6 +902,7 @@
487 902
   citeulike-linkout-2 = {http://dx.doi.org/http://dx.doi.org/10.1109/TITB.2005.856863},
488 903
   citeulike-linkout-3 = {http://dx.doi.org/10.1109/TITB.2005.856863},
489 904
   doi = {10.1109/TITB.2005.856863},
905
+  file = {Parkka2006.pdf:Parkka2006.pdf:PDF},
490 906
   keywords = {activity, coact, health, walton, wearable},
491 907
   owner = {chris},
492 908
   pdf = {Parkka2006.pdf},
@@ -552,6 +968,76 @@
552 968
   timestamp = {2009.12.01}
553 969
 }
554 970
 
971
+@ARTICLE{Raento2005,
972
+  author = {Raento, Mika and Oulasvirta, Antti and Petit, Renaud and Toivonen,
973
+	Hannu},
974
+  title = {ContextPhone: A Prototyping Platform for Context-Aware Mobile Applications},
975
+  journal = {IEEE Pervasive Computing},
976
+  year = {2005},
977
+  volume = {4},
978
+  pages = {51--59},
979
+  number = {2},
980
+  month = {April},
981
+  abstract = {ContextPhone is an open-source prototyping platform for context-aware
982
+	mobile applications. Its development was based on an iterative, human-centered
983
+	strategy aimed at enabling real-world applications that are easily
984
+	integrated into users\&\#253; everyday lives. The strategy included
985
+	rapid response to feedback from field evaluations. The developers
986
+	also studied other applications as well as general mobility issues.
987
+	Their work resulted in prioritized design goals, including an emphasis
988
+	on context, unobtrusiveness, truthfulness, seamfulness, timeliness
989
+	and fast interaction. These design goals have been realized in several
990
+	robust components running on top of the Series 60 Smartphone platform.
991
+	These components include basic services like error recovery and service
992
+	starting, sensors for gathering context data, communication channels
993
+	for interacting with the outside world, and customizable versions
994
+	of the Smartphone applications. Several real-world applications have
995
+	been built on top of ContextPhone and the platform is released under
996
+	an open-source license for use in further research.},
997
+  address = {Piscataway, NJ, USA},
998
+  booktitle = {Pervasive Computing, IEEE},
999
+  citeulike-article-id = {2926228},
1000
+  citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=1070601.1070628},
1001
+  citeulike-linkout-1 = {http://dx.doi.org/10.1109/MPRV.2005.29},
1002
+  citeulike-linkout-2 = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1427649},
1003
+  doi = {10.1109/MPRV.2005.29},
1004
+  file = {Raento2005.pdf:Raento2005.pdf:PDF},
1005
+  issn = {1536-1268},
1006
+  keywords = {adaptive\_interfaces, location\_aware\_computing},
1007
+  owner = {chris},
1008
+  posted-at = {2008-06-25 17:18:22},
1009
+  priority = {2},
1010
+  publisher = {IEEE Educational Activities Department},
1011
+  timestamp = {2009.12.06},
1012
+  url = {http://dx.doi.org/10.1109/MPRV.2005.29}
1013
+}
1014
+
1015
+@INPROCEEDINGS{Ravi2005,
1016
+  author = {Ravi, Nishkam and Nikhil, D. and Mysore, Preetham and Littman, Michael
1017
+	L.},
1018
+  title = {Activity recognition from accelerometer data},
1019
+  booktitle = {Proceedings of the Seventeenth Conference on Innovative Applications
1020
+	of Artificial Intelligence(IAAI},
1021
+  year = {2005},
1022
+  pages = {1541--1546},
1023
+  abstract = {Activity recognition fits within the bigger framework of context awareness.
1024
+	In this paper, we report on our efforts to recognize user activity
1025
+	from accelerometer data. Activity recognition is formulated as a
1026
+	classification problem. Performance of base-level classifiers and
1027
+	meta-level classifiers is compared. Plurality Voting is found to
1028
+	perform consistently well across different settings.},
1029
+  citeulike-article-id = {5157220},
1030
+  citeulike-linkout-0 = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.92.1333},
1031
+  citeulike-linkout-1 = {https://www.aaai.org/Papers/IAAI/2005/IAAI05-013.pdf},
1032
+  file = {Ravi2005.pdf:Ravi2005.pdf:PDF},
1033
+  keywords = {accelerometer, activity-inferencing},
1034
+  owner = {chris},
1035
+  posted-at = {2009-07-15 10:33:20},
1036
+  priority = {2},
1037
+  timestamp = {2009.12.06},
1038
+  url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.92.1333}
1039
+}
1040
+
555 1041
 @ARTICLE{Reynolds2008,
556 1042
   author = {Reynolds, F.},
557 1043
   title = {Camera Phones: A Snapshot of Research and Applications},
@@ -580,6 +1066,38 @@
580 1066
   timestamp = {2009.12.01}
581 1067
 }
582 1068
 
1069
+@MISC{Salber1999,
1070
+  author = {Salber, Daniel and Dey, Anind K. and Abowd, Gregory D.},
1071
+  title = {The Context Toolkit: Aiding the Development of Context-Enabled Applications},
1072
+  year = {1999},
1073
+  abstract = {Context-enabled applications are just emerging and promise richer
1074
+	interaction by taking environmental context into account. However,
1075
+	they are difficult to build due to their distributed nature and the
1076
+	use of unconventional sensors. The concepts of toolkits and widget
1077
+	libraries in graphical user interfaces has been tremendously successful,
1078
+	allowing programmers to leverage off existing building blocks to
1079
+	build interactive systems more easily. We introduce the concept of
1080
+	context widgets that mediate between the environment and the application
1081
+	in the same way graphical widgets mediate between the user and the
1082
+	application. We illustrate the concept of context widgets with the
1083
+	beginnings of a widget library we have developed for sensing presence,
1084
+	identity and activity of people and things. We assess the success
1085
+	of our approach with two example context-enabled applications we
1086
+	have built and an existing application to which we have added contextsensing
1087
+	capabilities.},
1088
+  citeulike-article-id = {3753280},
1089
+  citeulike-linkout-0 = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.32.2110},
1090
+  citeulike-linkout-1 = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.32.2110},
1091
+  file = {Salber1999.pdf:Salber1999.pdf:PDF},
1092
+  keywords = {applications, context, context\_awareness, toolkit},
1093
+  owner = {chris},
1094
+  pages = {434--441},
1095
+  posted-at = {2008-12-07 12:33:46},
1096
+  priority = {4},
1097
+  timestamp = {2009.12.06},
1098
+  url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.32.2110}
1099
+}
1100
+
583 1101
 @MISC{Schapire1999,
584 1102
   author = {Schapire, Robert E.},
585 1103
   title = {A Brief Introduction to Boosting},
@@ -678,6 +1196,29 @@
678 1196
   timestamp = {2009.12.01}
679 1197
 }
680 1198
 
1199
+@INPROCEEDINGS{Siewiorek2003,
1200
+  author = {Siewiorek, D. and Smailagic, A. and Furukawa, J. and Krause, A. and
1201
+	Moraveji, N. and Reiger, K. and Shaffer, J. and Wong, Fei L.},
1202
+  title = {SenSay: a context-aware mobile phone},
1203
+  booktitle = {Wearable Computers, 2003. Proceedings. Seventh IEEE International
1204
+	Symposium on},
1205
+  year = {2003},
1206
+  pages = {248--249},
1207
+  citeulike-article-id = {898575},
1208
+  citeulike-linkout-0 = {http://dx.doi.org/10.1109/ISWC.2003.1241422},
1209
+  citeulike-linkout-1 = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1241422},
1210
+  doi = {10.1109/ISWC.2003.1241422},
1211
+  file = {Siewiorek2003.pdf:Siewiorek2003.pdf:PDF},
1212
+  journal = {Wearable Computers, 2003. Proceedings. Seventh IEEE International
1213
+	Symposium on},
1214
+  keywords = {aware, context, mobile, phone},
1215
+  owner = {chris},
1216
+  posted-at = {2008-09-16 14:38:06},
1217
+  priority = {2},
1218
+  timestamp = {2009.12.06},
1219
+  url = {http://dx.doi.org/10.1109/ISWC.2003.1241422}
1220
+}
1221
+
681 1222
 @INPROCEEDINGS{Song2005,
682 1223
   author = {Song, K. and Wang, Y.},
683 1224
   title = {Remote Activity Monitoring of the Elderly Using a Two-Axis Accelerometer},
@@ -719,6 +1260,31 @@
719 1260
   timestamp = {2009.12.01}
720 1261
 }
721 1262
 
1263
+@INPROCEEDINGS{Terry2002,
1264
+  author = {Terry, Michael and Mynatt, Elizabeth D. and Ryall, Kathy and Leigh,
1265
+	Darren},
1266
+  title = {Social net: using patterns of physical proximity over time to infer
1267
+	shared interests},
1268
+  booktitle = {CHI '02: CHI '02 extended abstracts on Human factors in computing
1269
+	systems},
1270
+  year = {2002},
1271
+  pages = {816--817},
1272
+  address = {New York, NY, USA},
1273
+  publisher = {ACM Press},
1274
+  citeulike-article-id = {934249},
1275
+  citeulike-linkout-0 = {http://portal.acm.org/citation.cfm?id=506443.506612},
1276
+  citeulike-linkout-1 = {http://dx.doi.org/10.1145/506443.506612},
1277
+  doi = {10.1145/506443.506612},
1278
+  file = {Terry2002.pdf:Terry2002.pdf:PDF},
1279
+  isbn = {1581134541},
1280
+  keywords = {networking, social},
1281
+  owner = {chris},
1282
+  posted-at = {2008-08-21 15:56:49},
1283
+  priority = {2},
1284
+  timestamp = {2009.12.06},
1285
+  url = {http://dx.doi.org/10.1145/506443.506612}
1286
+}
1287
+
722 1288
 @ARTICLE{Voida2002,
723 1289
   author = {Voida, S. and Mynatt, E.D. and MacIntyre, B. and Corso, G.M.},
724 1290
   title = {Integrating virtual and physical context to support knowledge workers},
@@ -788,6 +1354,7 @@
788 1354
   pages = {100--105},
789 1355
   month = {20--22 Aug. },
790 1356
   doi = {10.1109/MFI.2008.4648116},
1357
+  file = {Yang2008.pdf:Yang2008.pdf:PDF},
791 1358
   owner = {chris},
792 1359
   timestamp = {2009.12.03}
793 1360
 }
@@ -804,12 +1371,14 @@
804 1371
 
805 1372
 @comment{jabref-meta: groupstree:
806 1373
 0 AllEntriesGroup:;
807
-1 ExplicitGroup:Unread\;0\;Abowd1997\;Bellotti2008\;Dornbush2005\;Eagl
808
-e2004\;Floreen2008\;Garakani2009\;Hein2008\;Lee2007\;Lester2006\;Liao2
809
-007\;Liao2007a\;Lukowicz2002\;Mahdaviani2007\;Mathie2004\;Maurer2006\;
810
-Miluzzo2009\;Nicolai2006\;Parkka2006\;Patterson2004\;Philipose2003\;Ph
811
-ilipose2003a\;Philipose2004\;Rudstroem2004\;Schapire1999\;Schilit1994\
812
-;Schmidt1999\;Schmidt2008\;Shen2004\;Song2005\;Stiefmeier2008\;Tentori
813
-2008\;Voida2002\;Wang2009\;Wyatt2007\;Yang2008\;;
1374
+1 ExplicitGroup:Unread\;0\;Aha1991\;Bao2004\;Bardram2005\;Bellotti2008
1375
+\;Consolvo2008\;Eagle2006\;Hightower2005\;Horvitz1998\;Huynh2005\;Keer
1376
+thi1999\;Lee2007\;Lester2005\;Lester2006\;Liao2007\;Liao2007a\;Lukowic
1377
+z2002\;Mahdaviani2007\;Mathie2004\;Maurer2006\;Nurmi2006\;Parkka2006\;
1378
+Patterson2004\;Philipose2003\;Philipose2003a\;Philipose2004\;Raento200
1379
+5\;Ravi2005\;Rudstroem2004\;Salber1999\;Schapire1999\;Schilit1994\;Sch
1380
+midt1999\;Schmidt2008\;Shen2004\;Siewiorek2003\;Song2005\;Stiefmeier20
1381
+08\;Tentori2008\;Terry2002\;Voida2002\;Wang2009\;Wyatt2007\;Yang2008\;
1382
+;
814 1383
 }
815 1384
 

Loading…
取消
儲存