{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:31:43Z","timestamp":1761676303690,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319193113"},{"type":"electronic","value":"9783319193120"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19312-0_27","type":"book-chapter","created":{"date-parts":[[2015,5,29]],"date-time":"2015-05-29T14:06:47Z","timestamp":1432908407000},"page":"307-312","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Feature Sub-set Selection for Activity Recognition"],"prefix":"10.1007","author":[{"given":"Francisco J.","family":"Quesada","sequence":"first","affiliation":[]},{"given":"Francisco","family":"Moya","sequence":"additional","affiliation":[]},{"given":"Macarena","family":"Espinilla","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Mart\u00ednez","sequence":"additional","affiliation":[]},{"given":"Chris D.","family":"Nugent","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,30]]},"reference":[{"issue":"3","key":"27_CR1","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/1047671.1047700","volume":"48","author":"N Streitz","year":"2005","unstructured":"Streitz, N., Nixon, P.: The disappearing computer. Communications of the ACM 48(3), 32\u201335 (2005)","journal-title":"Communications of the ACM"},{"key":"27_CR2","first-page":"121","volume":"94","author":"GH John","year":"1994","unstructured":"John, G.H., Kohavi, R., Pfleger, K., et al.: Irrelevant features and the subset selection problem. ICML 94, 121\u2013129 (1994)","journal-title":"ICML"},{"key":"27_CR3","unstructured":"Koller, D., Sahami, M.: Toward optimal feature selection. Stanford InfoLab (1996)"},{"issue":"3","key":"27_CR4","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/S1088-467X(97)00008-5","volume":"1","author":"M Dash","year":"1997","unstructured":"Dash, M., Liu, H.: Feature selection for classification. Intelligent data analysis 1(3), 131\u2013156 (1997)","journal-title":"Intelligent data analysis"},{"issue":"6","key":"27_CR5","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1109\/TSMCC.2012.2198883","volume":"42","author":"L Chen","year":"2012","unstructured":"Chen, L., Hoey, J., Nugent, C.D., Cook, D.J., Yu, Z.: Sensor-based activity recognition. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 42(6), 790\u2013808 (2012)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews"},{"issue":"1","key":"27_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10115-007-0114-2","volume":"14","author":"X Wu","year":"2008","unstructured":"Wu, X., Kumar, V., Quinlan, J.R., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G.J., Ng, A., Liu, B., Philip, S.Y., et al.: Top 10 algorithms in data mining. Knowledge and Information Systems 14(1), 1\u201337 (2008)","journal-title":"Knowledge and Information Systems"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"van Kasteren, T., Krose, B.: Bayesian activity recognition in residence for elders. IET (2007)","DOI":"10.1049\/cp:20070370"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Vapnik, V.: The nature of statistical learning theory. Springer Science & Business Media (2000)","DOI":"10.1007\/978-1-4757-3264-1"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Cherkassky, V., Mulier, F.M.: Learning from data: concepts, theory, and methods. John Wiley & Sons (2007)","DOI":"10.1002\/9780470140529"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Van Kasteren, T., Noulas, A., Englebienne, G., Kr\u00f6se, B.: Accurate activity recognition in a home setting. In: Proceedings of the 10th International Conference on Ubiquitous Computing, pp. 1\u20139. ACM (2008)","DOI":"10.1145\/1409635.1409637"},{"issue":"1","key":"27_CR11","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: an update. ACM SIGKDD explorations newsletter 11(1), 10\u201318 (2009)","journal-title":"ACM SIGKDD explorations newsletter"},{"key":"27_CR12","volume-title":"Data mining: Practical machine learning tools and techniques","author":"M Hall","year":"2011","unstructured":"Hall, M., Witten, I., Frank, E.: Data mining: Practical machine learning tools and techniques. Kaufmann, Burlington (2011)"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Calzada, A., Liu, J., Wang, H., Kashyap, A.: Dynamic rule activation for extended belief rule bases. In: International Conference on Machine Learning and Cybernetics (ICMLC), vol. 4, pp. 1836\u20131841. IEEE (2013)","DOI":"10.1109\/ICMLC.2013.6890895"},{"key":"27_CR14","unstructured":"Kohavi, R., Sommerfield, D.: Feature subset selection using the wrapper method: Overfitting and dynamic search space topology. In: KDD, pp. 192\u2013197 (1995)"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Calzada, A., Liu, J., Nugent, C., Wang, H., Martinez, L.: Sensor-based activity recognition using extended belief rule-based inference methodology. In: 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 2694\u20132697. IEEE (2014)","DOI":"10.1109\/EMBC.2014.6944178"}],"container-title":["Lecture Notes in Computer Science","Inclusive Smart Cities and e-Health"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19312-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T16:55:23Z","timestamp":1675270523000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19312-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319193113","9783319193120"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19312-0_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"30 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}