{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T21:22:08Z","timestamp":1769116928708,"version":"3.49.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,8,14]],"date-time":"2010-08-14T00:00:00Z","timestamp":1281744000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1007\/s00779-010-0331-7","type":"journal-article","created":{"date-parts":[[2010,8,13]],"date-time":"2010-08-13T08:16:21Z","timestamp":1281687381000},"page":"271-289","source":"Crossref","is-referenced-by-count":208,"title":["COSAR: hybrid reasoning for context-aware activity recognition"],"prefix":"10.1007","volume":"15","author":[{"given":"Daniele","family":"Riboni","sequence":"first","affiliation":[]},{"given":"Claudio","family":"Bettini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,14]]},"reference":[{"issue":"1","key":"331_CR1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1504\/IJWET.2009.025011","volume":"5","author":"A Agostini","year":"2009","unstructured":"Agostini A, Bettini C, Riboni D (2009) Hybrid reasoning in the CARE middleware for context awareness. Int J Web Eng Technol 5(1):3\u201323","journal-title":"Int J Web Eng Technol"},{"issue":"2","key":"331_CR2","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.artmed.2007.11.007","volume":"42","author":"O Amft","year":"2008","unstructured":"Amft O, Tr\u00f6ster G (2008) Recognition of dietary activity events using on-body sensors. Artif Intell Med 42(2):121\u2013136","journal-title":"Artif Intell Med"},{"key":"331_CR3","volume-title":"The description logic handbook: theory, implementation, and applications","year":"2003","unstructured":"Baader F, Calvanese D, McGuinness DL, Nardi D, Patel-Schneider PF (eds) (2003) The description logic handbook: theory, implementation, and applications. Cambridge University Press, Cambridge"},{"key":"331_CR4","unstructured":"Bishop CM (2008) Pattern recognition and machine learning. Springer, ISBN 0387310738"},{"key":"331_CR5","doi-asserted-by":"crossref","unstructured":"Brdiczka O, Crowley JL, Reignier P (2007) Learning situation models for providing context-aware services. In: Proceedings of HCI 2007, volume 4555 of lecture notes in computer science. Springer, pp 23\u201332","DOI":"10.1007\/978-3-540-73281-5_3"},{"key":"331_CR6","unstructured":"Chang K-H, Liu S-Y, Chu H-H, Yung-Jen Hsu J, Chen C, Lin T-Y, Chen C-Y, Huang P (2006) The diet-aware dining table: observing dietary behaviors over a tabletop surface. In: Proceedings of pervasive 2006, volume 3968 of lecture notes in computer science. Springer, pp 366\u2013382"},{"key":"331_CR7","doi-asserted-by":"crossref","unstructured":"Chen H, Finin T, Joshi A (2004) Semantic web in the context broker architecture. In: Proceedings of the second IEEE international conference on pervasive computing and communications (PerCom 2004). IEEE Computer Society, pp 277\u2013286","DOI":"10.1109\/PERCOM.2004.1276865"},{"key":"331_CR8","unstructured":"Golding AR, Lesh N (1999) Indoor navigation using a diverse set of cheap, wearable sensors. In: Proceedings of the third international symposium on wearable computers (ISWC\u201999). IEEE Computer Society, pp 29\u201336"},{"key":"331_CR9","unstructured":"Gu T, Wang XH, Pung HK, Zhang DQ (2004) An ontology-based context model in intelligent environments. In: Proceedings of communication networks and distributed systems modeling and simulation conference, San Diego"},{"key":"331_CR10","unstructured":"Gu T, Wu Z, Tao X, Pung HK, Lu J (2009) epSICAR: an emerging patterns based approach to sequential, interleaved and concurrent activity recognition. In: Proceedings of the seventh annual IEEE international conference on pervasive computing and communications (PerCom). IEEE Computer Society, pp 1\u20139"},{"key":"331_CR11","doi-asserted-by":"crossref","first-page":"1157","DOI":"10.1162\/153244303322753616","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon I, Elisseeff A (2003) An introduction to variable and feature selection. J Mach Learn Res 3:1157\u20131182","journal-title":"J Mach Learn Res"},{"issue":"3","key":"331_CR12","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1016\/j.pmcj.2008.05.002","volume":"5","author":"X Hong","year":"2009","unstructured":"Hong X, Nugent CD, Mulvenna MD, McClean SI, Scotney BW, Devlin S (2009) Evidential fusion of sensor data for activity recognition in smart homes. Pervasive and Mob Comput 5(3):236\u2013252","journal-title":"Pervasive and Mob Comput"},{"key":"331_CR13","unstructured":"Horrocks I, Patel-Schneider PF, van Harmelen F (2003) From SHIQ and RDF to OWL: the making of a web ontology language. J Web Semantics 1(1):7\u201326, ISSN 1570-8268"},{"key":"331_CR14","doi-asserted-by":"crossref","unstructured":"Huynh T, Schiele B (2006) Towards less supervision in activity recognition from wearable sensors. In: Proceedings of the tenth IEEE international symposium on wearable computers (ISWC 2006), pp 3\u201310. IEEE","DOI":"10.1109\/ISWC.2006.286336"},{"key":"331_CR15","doi-asserted-by":"crossref","unstructured":"Kern N, Schiele B, Schmidt A (2003) Multi-sensor activity context detection for wearable computing. In: Proceedings of the first European symposium on ambient intelligence (EUSAI 2003), volume 2875 of lecture notes in computer science. Springer, pp 220\u2013232","DOI":"10.1007\/978-3-540-39863-9_17"},{"issue":"1","key":"331_CR16","doi-asserted-by":"crossref","first-page":"191","DOI":"10.2307\/2347628","volume":"41","author":"S Cessie le","year":"1992","unstructured":"le Cessie S, van Houwelingen JC (1992) Ridge estimators in logistic regression. Appl Stat 41(1):191\u2013201","journal-title":"Appl Stat"},{"key":"331_CR17","unstructured":"Lester J, Choudhury T, Kern N, Borriello G, Hannaford B (2005) A hybrid discriminative\/generative approach for modeling human activities. In: Kaelbling LP, Saffiotti A (eds) In: IJCAI-05, Proceedings of the nineteenth international joint conference on artificial intelligence. Professional Book Center, pp 766\u2013772"},{"key":"331_CR18","unstructured":"Liao L, Fox D, Kautz HA (2005) Location-based activity recognition using relational markov networks. In: Proceedings of the nineteenth international joint conference on artificial intelligence (IJCAI-05). Professional Book Center, pp 773\u2013778"},{"key":"331_CR19","unstructured":"Liu H, Setiono R (1995) Chi2: feature selection and discretization of numeric attributes. In: Proceedings of the IEEE international conference on tools with artificial intelligence. IEEE Computer Society, pp 388\u2013391"},{"key":"331_CR20","doi-asserted-by":"crossref","unstructured":"Malandrino D, Mazzoni F, Riboni D, Bettini C, Colajanni M, Scarano V (2010) MIMOSA: context-aware adaptation for ubiquitous web access. Pers Ubiquit Comput 14(4):301\u2013320","DOI":"10.1007\/s00779-009-0232-9"},{"key":"331_CR21","doi-asserted-by":"crossref","unstructured":"Oliver N, Horvitz E, Garg A (2002) Layered representations for human activity recognition. In: Proceedings of the 4th IEEE international conference on multimodal interfaces (ICMI 2002). IEEE Computer Society, pp 3\u20138","DOI":"10.1109\/ICMI.2002.1166960"},{"key":"331_CR22","doi-asserted-by":"crossref","unstructured":"Pareschi L, Riboni D, Agostini A, Bettini C (2008) Composition and generalization of context data for privacy preservation. In: Sixth annual IEEE international conference on pervasive computing and communications (PerCom 2008), Proceedings of the workshops. IEEE Computer Society, pp 429\u2013433","DOI":"10.1109\/PERCOM.2008.47"},{"key":"331_CR23","doi-asserted-by":"crossref","unstructured":"Riboni D, Bettini C (2009) Context-aware activity recognition through a combination of ontological and statistical reasoning. In: Proceedings of the 6th international conference on ubiquitous intelligence and computing (UIC), volume 5585 of lecture notes in computer science. Springer, pp 39\u201353","DOI":"10.1007\/978-3-642-02830-4_5"},{"issue":"6","key":"331_CR24","doi-asserted-by":"crossref","first-page":"819","DOI":"10.1016\/j.pmcj.2008.04.008","volume":"4","author":"D Riboni","year":"2008","unstructured":"Riboni D, Pareschi L, Bettini C (2008) Shadow attacks on users\u2019 anonymity in pervasive computing environments. Pervasive Mob Comput 4(6):819\u2013835","journal-title":"Pervasive Mob Comput"},{"key":"331_CR25","unstructured":"Stikic M, Huynh T, Van Laerhoven K, Schiele B (2008) ADL Recognition based on the combination of RFID and accelerometer sensing. In: Proceedings of pervasive health 2008. IEEE Computer Society, pp 2237\u20132242"},{"issue":"2","key":"331_CR26","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MPRV.2008.24","volume":"7","author":"M Tentori","year":"2008","unstructured":"Tentori M, Favela J (2008) Activity-aware computing for healthcare. IEEE Pervasive Comput 7(2):51\u201357","journal-title":"IEEE Pervasive Comput"},{"key":"331_CR27","unstructured":"Wang S, Pentney W, Popescu A-M, Choudhury T, Philipose M (2007) Common sense based joint training of human activity recognizers. In: Proceedings of IJCAI 2007, pp 2237\u20132242"},{"key":"331_CR28","doi-asserted-by":"crossref","unstructured":"Yu Z, Yu Z, Aoyama H, Ozeki M, Nakamura Y (2010) Capture, recognition, and visualization of human semantic interactions in meetings. In: Proceedings of the 8th IEEE international conference on pervasive computing and communications (PerCom). IEEE Computer Society, pp 107\u2013115","DOI":"10.1109\/PERCOM.2010.5466987"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-010-0331-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-010-0331-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-010-0331-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T19:09:18Z","timestamp":1559416158000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-010-0331-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,14]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["331"],"URL":"https:\/\/doi.org\/10.1007\/s00779-010-0331-7","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,8,14]]}}}