{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:20:04Z","timestamp":1743117604248,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319196947"},{"type":"electronic","value":"9783319196954"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19695-4_22","type":"book-chapter","created":{"date-parts":[[2015,5,18]],"date-time":"2015-05-18T08:36:13Z","timestamp":1431938173000},"page":"213-221","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Sensor-Based Framework to Support Clinicians in Dementia Assessment: The Results of a Pilot Study"],"prefix":"10.1007","author":[{"given":"Anastasios","family":"Karakostas","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Meditskos","sequence":"additional","affiliation":[]},{"given":"Thanos G.","family":"Stavropoulos","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Kompatsiaris","sequence":"additional","affiliation":[]},{"given":"Magda","family":"Tsolaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,19]]},"reference":[{"key":"22_CR1","unstructured":"M.L. Lee, A.K. Dey, Capturing and Reviewing Context in Memory Aids. Human-Computer Interaction Institute, Carnegie Mellon University, Pittsburgh, PA. Presented in: Workshop on Designing Technology for People with Cognitive Impairments (2006)"},{"key":"22_CR2","unstructured":"N. Kapur, E.L. Glisky, B.A. Wilson, External memory aids and computers in memory rehabilitation, in The Hand-book of Memory Disorders (Chichester, Wiley, 2002), pp. 757\u2013784"},{"key":"22_CR3","unstructured":"S. Housden, Reminiscence and lifelong learning. Int. J. Comput. Healthcare 161\u2013176 (2007)"},{"key":"22_CR4","unstructured":"J.C. Augusto, C.D. Nugentn, Designing Smart Homes: The Role of Artificial Intelligence, LNAI 4008. (Springer, Berlin, 2006)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"M. Chan, E. Campo, D. Este`ve, Assessment of activity of elderly people using a home monitoring system. Int. J. Rehabil. Res. 28:69\u201376 (2005)","DOI":"10.1097\/00004356-200503000-00010"},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1258\/135763306777488780","volume":"12","author":"R Suzuki","year":"2006","unstructured":"R. Suzuki, S. Otake, T. Izutsu, M. Yoshida, T. Iwaya, Rhythm of daily living and detection of atypical days for elderly people living alone as determined with a monitoring system. J. Telemed. Telecare 12, 208\u2013214 (2006)","journal-title":"J. Telemed. Telecare"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"H.W. Tyrer, M.A. Aud, G. Alexander, M. Skubic, M. Rantz, Early detection of health changes in older adults. Conf. Proc. IEEE Eng. Med. Biol. Soc. 4045\u20134048 (2007)","DOI":"10.1109\/IEMBS.2007.4353221"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"R. Romdhane, C.F. Crispim, F. Bremond, M. Thonnat (2013) Activity recognition and uncertain knowledge in video scenes, in 2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 377\u2013382","DOI":"10.1109\/AVSS.2013.6636669"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"K. Avgerinakis, A. Briassouli, I. Kompatsiaris Recognition of activities of daily living for smart home environments, in 2013 9th International Conference on Intelligent Environments (IE), pp. 173\u2013180 (2013)","DOI":"10.1109\/IE.2013.37"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"A. Satt, A. Sorin, O. Toledo-Ronen, O. Barkan, I. Kompatsiaris, A. Kokonozi, M. Tsolaki, Evaluation of speech-based protocol for detection of early-stage dementia, in INTERSPEECH, pp. 1692\u20131696 (2013)","DOI":"10.21437\/Interspeech.2013-32"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"T. Tiberghien, M. Mokhtari, H. Aloulou, J. Biswas, Semantic reasoning in context-aware assistive environments to support ageing with dementia, in International Semantic Web Conference, pp. 212\u2013227 (2012)","DOI":"10.1007\/978-3-642-35173-0_14"},{"key":"22_CR12","unstructured":"F. Baader, The description logic handbook: theory, implementation, and applications. (Cambridge University press, Cambridge, 2003)"},{"issue":"3","key":"22_CR13","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s00779-010-0331-7","volume":"15","author":"D Riboni","year":"2011","unstructured":"D. Riboni, C. Bettini, COSAR: hybrid reasoning for context-aware activity recognition. Pers. Ubiquit. Comput. 15(3), 271\u2013289 (2011)","journal-title":"Pers. Ubiquit. Comput."},{"issue":"4","key":"22_CR14","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1108\/17440080911006199","volume":"5","author":"L Chen","year":"2009","unstructured":"L. Chen, C. Nugent, Ontology-based activity recognition in intelligent pervasive environments. Int. J. Web Inf. Syst. 5(4), 410\u2013430 (2009)","journal-title":"Int. J. Web Inf. Syst."},{"key":"22_CR15","unstructured":"G. Okeyo, L. Chen, H. Wang, R. Sterritt, Dynamic sensor data segmentation for real-time knowledge-driven activity recognition. Pervasive Mob. Comput. (2012)"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"G. Okeyo, L. Chen, H. Wang, R. Sterritt, A hybrid ontological and temporal approach for composite activity modelling, in Trust, Security and Privacy in Computing and Communications, pp. 763\u20131770 (2012)","DOI":"10.1109\/TrustCom.2012.34"}],"container-title":["Advances in Intelligent Systems and Computing","Ambient Intelligence - Software and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19695-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T09:41:46Z","timestamp":1676454106000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19695-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319196947","9783319196954"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19695-4_22","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"19 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}