{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:49:59Z","timestamp":1761598199115},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030469016"},{"type":"electronic","value":"9783030469023"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-46902-3_7","type":"book-chapter","created":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T07:02:29Z","timestamp":1587798149000},"page":"106-124","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Probabilistic Activity Recognition for Serious Games with Applications in Medicine"],"prefix":"10.1007","author":[{"given":"Elisabetta","family":"De Maria","sequence":"first","affiliation":[]},{"given":"Thibaud","family":"L\u2019Yvonnet","sequence":"additional","affiliation":[]},{"given":"Sabine","family":"Moisan","sequence":"additional","affiliation":[]},{"given":"Jean-Paul","family":"Rigault","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,26]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1134\/S1054661815030025","volume":"25","author":"AS Ahouandjinou","year":"2015","unstructured":"Ahouandjinou, A.S., Motamed, C., Ezin, E.C.: A temporal belief-based hidden Markov model for human action recognition in medical videos. Pattern Recogn. Image Anal. 25, 389\u2013401 (2015). https:\/\/doi.org\/10.1134\/S1054661815030025","journal-title":"Pattern Recogn. Image Anal."},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1023\/A:1008739929481","volume":"15","author":"R Alur","year":"1999","unstructured":"Alur, R., Henzinger, T.: Reactive modules. Formal Methods Syst. Des. 15, 7\u201348 (1999). https:\/\/doi.org\/10.1023\/A:1008739929481","journal-title":"Formal Methods Syst. Des."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Atkinson, S.D., Narasimhan, V.L.: Design of an introductory medical gaming environment for diagnosis and management of Parkinson\u2019s disease. In: Trendz in Information Sciences Computing (TISC) (2010)","DOI":"10.1109\/TISC.2010.5714615"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-30080-9_7","volume-title":"Formal Methods for the Design of Real-Time Systems","author":"G Behrmann","year":"2004","unstructured":"Behrmann, G., David, A., Larsen, K.G.: A tutorial on Uppaal. In: Bernardo, M., Corradini, F. (eds.) SFM-RT 2004. LNCS, vol. 3185, pp. 200\u2013236. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30080-9_7"},{"issue":"9","key":"7_CR5","doi-asserted-by":"publisher","first-page":"798","DOI":"10.1016\/j.ijmedinf.2013.05.007","volume":"82","author":"F Buttussi","year":"2013","unstructured":"Buttussi, F., Pellis, T., Cabas-Vidani, A., Pausler, D., Carchietti, E., Chittaro, L.: Evaluation of a 3D serious game for advanced life support retraining. Int. J. Med. Inform. 82(9), 798\u2013809 (2013)","journal-title":"Int. J. Med. Inform."},{"key":"7_CR6","first-page":"87","volume":"5","author":"FF Chamasemani","year":"2013","unstructured":"Chamasemani, F.F., Affendey, L.S.: Systematic review and classification on video surveillance systems. Int. J. Inf. Technol. Comput. Sci. (IJITCS) 5, 87\u2013102 (2013)","journal-title":"Int. J. Inf. Technol. Comput. Sci. (IJITCS)"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-642-31037-9_4","volume-title":"Persuasive Technology. Design for Health and Safety","author":"L Chittaro","year":"2012","unstructured":"Chittaro, L., Sioni, R.: Turning the classic snake mobile game into a location\u2013based exergame that encourages walking. In: Bang, M., Ragnemalm, E.L. (eds.) PERSUASIVE 2012. LNCS, vol. 7284, pp. 43\u201354. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31037-9_4"},{"key":"7_CR8","volume-title":"Model Checking","author":"EM Clarke","year":"1999","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (1999)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Du, X., El-Khamy, M., Lee, J., Davis, L.: Fused DNN: a deep neural network fusion approach to fast and robust pedestrian detection. In: 2017 IEEE Winter Conference on Applications of Computer Vision (WACV) (2017)","DOI":"10.1109\/WACV.2017.111"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"215","DOI":"10.3389\/fpsyt.2016.00215","volume":"7","author":"TM Fleming","year":"2017","unstructured":"Fleming, T.M., et al.: Serious games and gamification for mental health: Current status and promising directions. Front. Psychiatry 7, 215 (2017)","journal-title":"Front. Psychiatry"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1007\/BF01211866","volume":"6","author":"H Hansson","year":"1994","unstructured":"Hansson, H., Jonsson, B.: A logic for reasoning about time and reliability. Formal Aspects Comput. 6, 512\u2013535 (1994). https:\/\/doi.org\/10.1007\/BF01211866","journal-title":"Formal Aspects Comput."},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Hassan, M.: A performance model of pedestrian dead reckoning with activity-based location updates. In: 2012 18th IEEE International Conference on Networks (ICON) (2012)","DOI":"10.1109\/ICON.2012.6506535"},{"issue":"4","key":"7_CR13","first-page":"54","volume":"4","author":"A Jalal","year":"2017","unstructured":"Jalal, A., Kamal, S., Kim, D.: A depth video-based human detection and activity recognition using multi-features and embedded hidden Markov models for health care monitoring systems. Int. J. Interact. Multimed. Artif. Intell. 4(4), 54\u201362 (2017)","journal-title":"Int. J. Interact. Multimed. Artif. Intell."},{"issue":"1","key":"7_CR14","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MPRV.2010.7","volume":"9","author":"E Kim","year":"2009","unstructured":"Kim, E., Helal, S., Cook, D.: Human activity recognition and pattern discovery. IEEE Pervasive Comput. 9(1), 48\u201353 (2009)","journal-title":"IEEE Pervasive Comput."},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/978-3-642-22110-1_47","volume-title":"Computer Aided Verification","author":"M Kwiatkowska","year":"2011","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: PRISM 4.0: verification of probabilistic real-time systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 585\u2013591. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22110-1_47"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-540-72522-0_6","volume-title":"Formal Methods for Performance Evaluation","author":"M Kwiatkowska","year":"2007","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: Stochastic model checking. In: Bernardo, M., Hillston, J. (eds.) SFM 2007. LNCS, vol. 4486, pp. 220\u2013270. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-72522-0_6"},{"issue":"6","key":"7_CR17","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1109\/TSMC.2013.2283661","volume":"43","author":"T Magherini","year":"2013","unstructured":"Magherini, T., Fantechi, A., Nugent, C.D., Vicario, E.: Using temporal logic and model checking in automated recognition of human activities for ambient-assisted living. IEEE Trans. Hum.-Mach. Syst. 43(6), 509\u2013521 (2013)","journal-title":"IEEE Trans. Hum.-Mach. Syst."},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Magherini, T., et al.: Temporal logic bounded model-checking for recognition of activities of daily living. In: Proceedings of the 10th IEEE International Conference on Information Technology and Applications in Biomedicine (2010)","DOI":"10.1109\/ITAB.2010.5687608"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Nyolt, M., Yordanova, K., Kirste, T.: Checking models for activity recognition. In: ICAART (2015)","DOI":"10.5220\/0005275204970502"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Piciarelli, C., Canazza, S., Micheloni, C., Foresti, G.L.: A network of audio and video sensors for monitoring large environments. In: Handbook on Soft Computing for Video Surveillance. Chapman & Hall\/CRC (2012)","DOI":"10.1201\/b11631-12"},{"key":"7_CR21","unstructured":"Sadigh, D., et al.: Data-driven probabilistic modeling and verification of human driver behavior. In: AAAI Spring Symposium on Formal Verification and Modeling in Human-Machine Systems (FVHMS) (2014)"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1007\/978-3-642-02658-4_59","volume-title":"Computer Aided Verification","author":"J Sun","year":"2009","unstructured":"Sun, J., Liu, Y., Dong, J.S., Pang, J.: PAT: towards flexible verification under fairness. In: Bouajjani, A., Maler, O. (eds.) CAV 2009. LNCS, vol. 5643, pp. 709\u2013714. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-02658-4_59"},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-319-40216-1_30","volume-title":"Games and Learning Alliance","author":"MK Phan Tran","year":"2016","unstructured":"Phan Tran, M.K., Bremond, F., Robert, P.: Assistance for older adults in serious game using an interactive system. In: de De Gloria, A., Veltkamp, R. (eds.) GALA 2015. LNCS, vol. 9599, pp. 286\u2013291. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-40216-1_30"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Ujjwal, U., Dziri, A., Leroy, B., Bremond, F.: Late fusion of multiple convolutional layers for pedestrian detection. In: 15th IEEE International Conference on Advanced Video and Signal-Based Surveillance (AVSS) (2018)","DOI":"10.1109\/AVSS.2018.8639083"},{"key":"7_CR25","doi-asserted-by":"publisher","first-page":"28","DOI":"10.3389\/frobt.2015.00028","volume":"2","author":"M Vrigkas","year":"2015","unstructured":"Vrigkas, M., Nikou, C., Kakadiaris, I.A.: A review of human activity recognition methods. Front. Robot. AI 2, 28 (2015)","journal-title":"Front. Robot. AI"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Weerachai, S., Mizukawa, M.: Human behavior recognition via top-view vision for intelligent space. In: International Conference on Control, Automation and Systems (ICCAS) (2010)","DOI":"10.1109\/ICCAS.2010.5669768"},{"key":"7_CR27","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.3390\/s19051005","volume":"19","author":"HB Zhang","year":"2019","unstructured":"Zhang, H.B., et al.: A comprehensive survey of vision-based human action recognition methods. Sensors 19, 1005 (2019)","journal-title":"Sensors"}],"container-title":["Communications in Computer and Information Science","Formal Techniques for Safety-Critical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-46902-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,11]],"date-time":"2021-03-11T00:28:50Z","timestamp":1615422530000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-46902-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030469016","9783030469023"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-46902-3_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"26 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FTSCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Formal Techniques for Safety-Critical Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ftscs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ftscs.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Other types of papers included: 1 invited paper, 1 tool paper 1 work in progress","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}