{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T15:24:52Z","timestamp":1771946692027,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540732808","type":"print"},{"value":"9783540732815","type":"electronic"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-73281-5_19","type":"book-chapter","created":{"date-parts":[[2007,8,23]],"date-time":"2007-08-23T11:52:09Z","timestamp":1187869929000},"page":"178-187","source":"Crossref","is-referenced-by-count":9,"title":["Architectural Backpropagation Support for Managing Ambiguous Context in Smart Environments"],"prefix":"10.1007","author":[{"given":"Davy","family":"Preuveneers","sequence":"first","affiliation":[]},{"given":"Yolande","family":"Berbers","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"International Telecommunication Union: ITU Internet Reports 2005: The Internet of Things 2005, 7th edn. (2005)"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s007790170019","volume":"5","author":"A.K. Dey","year":"2001","unstructured":"Dey, A.K.: Understanding and Using Context. Personal Ubiquitous Comput.\u00a05, 4\u20137 (2001)","journal-title":"Personal Ubiquitous Comput."},{"key":"19_CR3","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/571985.572003","volume-title":"UIST 2002: Proceedings of the 15th annual ACM symposium on User interface software and technology","author":"A. Dey","year":"2002","unstructured":"Dey, A., Mankoff, J., Abowd, G., Carter, S.: Distributed mediation of ambiguous context in aware environments. In: UIST 2002: Proceedings of the 15th annual ACM symposium on User interface software and technology, pp. 121\u2013130. ACM Press, New York (2002)"},{"key":"19_CR4","unstructured":"Preuveneers, D., Berbers, Y.: Quality Extensions and Uncertainty Handling for Context Ontologies. In: Shvaiko, P., Euzenat, J., L\u00e9ger, A., McGuinness, D.L., Wache, H. (eds.) Proceedings of Context and Ontologies: Theory Practice and Applications (C&O 2006), Riva del Garda, Italy, pp. 62\u201364 ( 2006)"},{"key":"19_CR5","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/240455.240479","volume":"39","author":"Y. Wand","year":"1996","unstructured":"Wand, Y., Wang, R.Y.: Anchoring data quality dimensions in ontological foundations. Commun. ACM\u00a039, 86\u201395 (1996)","journal-title":"Commun. ACM"},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/S0378-7206(02)00043-5","volume":"40","author":"Y.W. Lee","year":"2002","unstructured":"Lee, Y.W., Strong, D.M., Kahn, B.K., Wang, R.Y.: AIMQ: a methodology for information quality assessment. Inf. Manage.\u00a040, 133\u2013146 (2002)","journal-title":"Inf. Manage."},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V. Hodge","year":"2004","unstructured":"Hodge, V., Austin, J.: A Survey of Outlier Detection Methodologies. Artif. Intell. Rev.\u00a022, 85\u2013126 (2004)","journal-title":"Artif. Intell. Rev."},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B.H. Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Commun. ACM\u00a013, 422\u2013426 (1970)","journal-title":"Commun. ACM"},{"key":"19_CR9","unstructured":"Buchholz, T., Kupper, A., Schiffers, M.: Quality of Context: What it is and why we need it. In: Proceedings of the 10th Workshop of the OpenView University Association: OVUA 2003, Geneva, Switzerland (2003)"},{"key":"19_CR10","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/PERCOMW.2004.1276901","volume-title":"PERCOMW 2004: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops","author":"K. Henricksen","year":"2004","unstructured":"Henricksen, K., Indulska, J.: Modelling and Using Imperfect Context Information. In: PERCOMW 2004: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, Washington, DC, USA, p. 33. IEEE Computer Society, Los Alamitos (2004)"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","volume-title":"UbiComp 2004: Ubiquitous Computing","author":"D. Chalmers","year":"2004","unstructured":"Chalmers, D., Dulay, N., Sloman, M.: Towards Reasoning About Context in the Presence of Uncertainty. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, vol.\u00a03205, Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Universal Access in Human-Computer Interaction. Ambient Interaction"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73281-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T22:18:10Z","timestamp":1582409890000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73281-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540732808","9783540732815"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73281-5_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007]]}}}