{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T04:15:01Z","timestamp":1772252101896,"version":"3.50.1"},"reference-count":120,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T00:00:00Z","timestamp":1413936000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s10844-014-0341-4","type":"journal-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T03:41:09Z","timestamp":1413949269000},"page":"503-519","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["Mining the home environment"],"prefix":"10.1007","volume":"43","author":[{"given":"Diane J.","family":"Cook","sequence":"first","affiliation":[]},{"given":"Narayanan","family":"Krishnan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,22]]},"reference":[{"key":"341_CR1","unstructured":"Abowd, G., & Mynatt, E.D. (2005). \u201cDesigning for the human experience in smart environments,\u201d in Smart Environments: Technologies, Protocols and Applications, pp. 153\u2013174."},{"key":"341_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., & Srikant, R. (1995). \u201cMining sequential patterns,\u201d in Proceedings of the International Conference on Data Engineering, pp. 3\u201314.","DOI":"10.1109\/ICDE.1995.380415"},{"key":"341_CR3","doi-asserted-by":"crossref","first-page":"1685","DOI":"10.1109\/TPAMI.2008.203","volume":"31","author":"J Alon","year":"2008","unstructured":"Alon, J., Athitsos, V., Yuan, Q., & Sclaroff, S. (2008). A unified framework for gesture recognition and spatiotemporal gesture segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 31, 1685\u20131699.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"341_CR4","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1037\/0033-2909.111.2.256","volume":"2","author":"N Ambady","year":"1992","unstructured":"Ambady, N., & Rosenthal, R. (1992). Thin slices of expressive behavior as predictors of interpersonal consequences: a meta-analysis. Psychological Bulletin, 2, 256\u2013275.","journal-title":"Psychological Bulletin"},{"issue":"1","key":"341_CR5","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/s00779-011-0471-4","volume":"16","author":"A Aztiria","year":"2012","unstructured":"Aztiria, A., Augusto, J., & Cook, D. (2012). Discovering frequent user-environment interactions in intelligent environments. Personal Ubiquitous Computing, 16(1), 91\u2013103.","journal-title":"Personal Ubiquitous Computing"},{"key":"341_CR6","unstructured":"Baker, W. (2000). Achieving success through social capital. Wiley."},{"key":"341_CR7","doi-asserted-by":"crossref","unstructured":"Bao, L., & Intille, S. (2004) \u201cActivity recognition from user annotated acceleration data,\u201d in Pervasive, pp. 1\u201317.","DOI":"10.1007\/978-3-540-24646-6_1"},{"issue":"1","key":"341_CR8","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/TSMCA.2004.838474","volume":"35","author":"T Barger","year":"2005","unstructured":"Barger, T., Brown, D., & Alwan, M. (2005). Health status monitoring through analysis of behavioral patterns. IEEE Transaction. System Man, Cybernetics. Part A, 35(1), 22\u201327.","journal-title":"IEEE Transaction. System Man, Cybernetics. Part A"},{"key":"341_CR9","doi-asserted-by":"crossref","unstructured":"Barker, S.K., Mishra, A., Irwin, D., Shenoy, P., Albrecht, J.R. (2012). \u201cSmartCap: flattening peak electricity demand in smart homes,\u201d in IEEE International Conference on Pervasive Computing and Communications.","DOI":"10.1109\/PerCom.2012.6199851"},{"key":"341_CR10","doi-asserted-by":"crossref","unstructured":"Benerjee, T., Keller, M.J., Skubic, M. (2012). \u201cResident identification using Kinect depth image data and fuzzy clustering techniques,\u201d in International Conference of the IEEE Engineering in Medicine and Biology Society","DOI":"10.1109\/EMBC.2012.6347141"},{"key":"341_CR11","doi-asserted-by":"crossref","unstructured":"Brand, M., Oliver, N., Pentland, A. (1997). \u201cCoupled hidden Markov models for complex action recognition,\u201d in International Conference on Computer Vision and Pattern Recognition, pp. 994\u2013999.","DOI":"10.1109\/CVPR.1997.609450"},{"key":"341_CR12","unstructured":"Brdiczka, O., Crowley, J.L., Reignier, P. (2009). \u201cLearning situation models in a smart home,\u201d IEEE Trans. Syst. Man, Cybern. Part B, vol. 39, no. 1."},{"key":"341_CR13","doi-asserted-by":"crossref","unstructured":"Buettner, M., Prasad, R., Philipose, M., Wetherall, D. (2009). \u201cRecognizing daily activities with RFID-based sensors,\u201d in International Conference on Ubiquitous Computing, pp. 51\u201360.","DOI":"10.1145\/1620545.1620553"},{"issue":"6","key":"341_CR14","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1109\/TKDE.2011.51","volume":"24","author":"L Chen","year":"2012","unstructured":"Chen, L., Nugent, C. D., & Wang, H. (2012a). A knowledge-driven approach to activity recognition in smart homes. IEEE Transactions on Knowledge and Data Engineering, 24(6), 961\u2013974.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"341_CR15","unstructured":"Chen, C., Cook, D.J., Crandall, A. (2012). \u201cThe user side of sustainability: Modeling behavior and energy usage in the home,\u201d Pervasive Mob. Comput."},{"key":"341_CR16","unstructured":"Chen, D., Irwin, D., Shenoy, P., Albrecht, J. (2014). \u201cCombined heat and privacy: preventing occupancy detection from smart meters,\u201d in IEEE International Conference on Pervasive Computing and Communications."},{"key":"341_CR17","unstructured":"Cheng, S.Y., &Trivedi, M.M. (2007). \u201cArticulated human body pose inference from voxel data using a kinematically constrained Gaussian mixture model,\u201d in Workshop on Evaluation of Articulated Human Motion and Pose Estimation"},{"key":"341_CR18","doi-asserted-by":"crossref","unstructured":"Choe, E.K., Consolvo, S., Jung, J., Harrison, B., Kientz, J. A. (2011). \u201cLiving in a glass house: A survey of private moments in the home,\u201d in International Conference on Ubiquitous Computing.","DOI":"10.1145\/2030112.2030118"},{"key":"341_CR19","doi-asserted-by":"crossref","unstructured":"Cohn, G., Gupta, S., Lee T., Morris, D., Smith, J.R., Reynolds, M.S., Tan, D.S., Patel, S.N. (2012). \u201cAn ultra-low-power human body motion sensor using static electric field sensing,\u201d in ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 99\u2013102.","DOI":"10.1145\/2370216.2370233"},{"key":"341_CR20","unstructured":"Cook, D. \u201cLearning setting-generalized activity models for smart spaces,\u201d IEEE Intell. Syst."},{"key":"341_CR21","unstructured":"Cook, D.J. & Das, S. K. (2005). Smart Environments: Technologies, Protocols, and Applications. Wiley."},{"key":"341_CR22","doi-asserted-by":"crossref","unstructured":"Cook, D.J., Crandall, A., Thomas, B., Krishnan, N. (2012). \u201cCASAS: A smart home in a box,\u201d IEEE Comput.","DOI":"10.1109\/MC.2012.328"},{"issue":"3","key":"341_CR23","first-page":"820","volume":"43","author":"DJ Cook","year":"2013","unstructured":"Cook, D. J., Krishnan, N., & Rashidi, P. (2013). Activity discovery and activity recognition: a new partnership. IEEE Transaction System Man, Cybernetics Part B, 43(3), 820\u2013828.","journal-title":"IEEE Transaction System Man, Cybernetics Part B"},{"key":"341_CR24","doi-asserted-by":"crossref","unstructured":"Costanza, E., Ramchurcn, S., Jennings, N. (2012). \u201cUnderstanding domestic energy consumption through interactive visualisation: a field study,\u201d in International Conference on Ubiquitous Computing.","DOI":"10.1145\/2370216.2370251"},{"key":"341_CR25","doi-asserted-by":"crossref","unstructured":"Dawadi, P., Cook, D.J., Parsey, C., Schmitter-Edgecombe, M., Schneider, M. (2011). \u201cAn approach to cognitive assessment in smart homes,\u201d in KDD Workshop on Medicine and Healthcare","DOI":"10.1145\/2023582.2023592"},{"key":"341_CR26","unstructured":"Dawadi, P.,Cook, D.J., Schmitter-Edgecombe, M. (2012). \u201cAutomated cognitive health assessment using smart home monitoring of complex tasks,\u201d IEEE Trans. Syst. Man, Cybern. Part B."},{"issue":"2","key":"341_CR27","doi-asserted-by":"crossref","first-page":"145","DOI":"10.3233\/AIS-2010-0061","volume":"2","author":"S Deleawe","year":"2010","unstructured":"Deleawe, S., Kusznir, J., Lamb, B., & Cook, D. J. (2010). Predicting air quality in smart environments. Journal of Ambient Intelligence and Smart Environments, 2(2), 145\u2013154.","journal-title":"Journal of Ambient Intelligence and Smart Environments"},{"key":"341_CR28","doi-asserted-by":"crossref","first-page":"111","DOI":"10.3233\/THC-2008-16205","volume":"16","author":"G Demiris","year":"2008","unstructured":"Demiris, G., Oliver, D. P., Dickey, G., Skubic, M., & Rantz, M. (2008). Findings from a participatory evaluation of a smart home application for older adults. Technology Health Care, 16, 111\u2013118.","journal-title":"Technology Health Care"},{"key":"341_CR29","unstructured":"Department of Health. (2007). \u201cSpeech by the Rt Hon Patricia Hewitt MP, Secretary of State for Health,\u201d in Long-term Conditions Alliance Annual Conference."},{"key":"341_CR30","doi-asserted-by":"crossref","unstructured":"Derbach, S., Das, B., Krishnan, N., Thomas, B., Cook, D. (2012). \u201cSimple and complex activity recognition through smart phones,\u201d in International Conference on Intelligent Environments","DOI":"10.1109\/IE.2012.39"},{"key":"341_CR31","first-page":"211","volume":"24","author":"M Diel","year":"2005","unstructured":"Diel, M., Marsiske, M., Horgas, A., Rosenberg, A., Saczynski, J., & Willis, S. (2005). The revised observed tasks of daily living: a performance-based assessment of everyday problem solving in older adults. Journal Application Gerontechnology, 24, 211\u2013230.","journal-title":"Journal Application Gerontechnology"},{"key":"341_CR32","first-page":"23","volume":"19","author":"J-H Do","year":"2006","unstructured":"Do, J.-H., Jung, S. H., Jang, H., Yang, S.-E., Jung, J.-W., & Bien, Z. (2006). Gesture-based interface for home appliance control in smart home. Smart Homes and Beyond - Proceedings of the 4th International Conference On Smart homes and health Telematics (ICOST2006), 19, 23\u201330.","journal-title":"Smart Homes and Beyond - Proceedings of the 4th International Conference On Smart homes and health Telematics (ICOST2006)"},{"key":"341_CR33","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1097\/01.wad.0000213849.51495.d9","volume":"20","author":"S Farias","year":"2006","unstructured":"Farias, S., Mungas, D., Reed, B., Harvey, D., Cahn-Weiner, D., & DeCarli, C. (2006). MCI is associated with deficits in everyday functioning. Alzheimer Disease & Associated Disorders, 20, 217\u2013223.","journal-title":"Alzheimer Disease & Associated Disorders"},{"key":"341_CR34","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/S0747-5632(99)00037-0","volume":"15","author":"F Foerster","year":"1999","unstructured":"Foerster, F., Smeja, M., & Fahrenberg, J. (1999). Detection of posture and motion by accelerometry: a validation study in ambulatory monitoring. Computer Human Behavior, 15, 571\u2013583.","journal-title":"Computer Human Behavior"},{"key":"341_CR35","doi-asserted-by":"crossref","first-page":"1315","DOI":"10.1016\/S0140-6736(00)02113-9","volume":"335","author":"L Fratiglioni","year":"2000","unstructured":"Fratiglioni, L., Wang, H., Ericsson, K., Maytan, M., & Winblad, B. (2000). Influence of social network on occurrence of dementia: a community-based longitudinal study. Lancet, 335, 1315\u20131319.","journal-title":"Lancet"},{"issue":"1","key":"341_CR36","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MPRV.2010.74","volume":"10","author":"J Froehlich","year":"2011","unstructured":"Froehlich, J., Larson, E., Gupta, S., Cohn, G., Reynolds, M., & Patel, S. N. (2011). Disaggregated end-use energy sensing for the smart grid. IEEE Pervasive Computing, 10(1), 28\u201339.","journal-title":"IEEE Pervasive Computing"},{"issue":"3","key":"341_CR37","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/s11263-009-0239-8","volume":"84","author":"A Gritai","year":"2009","unstructured":"Gritai, A., Sheikh, Y., Rao, C., & Shah, M. (2009). Matching trajectories of anatomical landmarks under viewpoint, anthropometric and temporal transforms. International Journal of Computer Vision, 84(3), 325\u2013343.","journal-title":"International Journal of Computer Vision"},{"issue":"6","key":"341_CR38","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1016\/j.datak.2010.01.004","volume":"69","author":"T Gu","year":"2010","unstructured":"Gu, T., Chen, S., Tao, X., & Lu, J. (2010). An unsupervised approach to activity recognition and segmentation based on object-use fingerprints. Data & Knowledge Engineering, 69(6), 533\u2013544.","journal-title":"Data & Knowledge Engineering"},{"key":"341_CR39","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/s11036-008-0112-y","volume":"14","author":"N Gyorbiro","year":"2008","unstructured":"Gyorbiro, N., Fabian, A., & Homanyi, G. (2008). An activity recognition system for mobile phones. Mobile Networks Application, 14, 82\u201391.","journal-title":"Mobile Networks Application"},{"key":"341_CR40","doi-asserted-by":"crossref","unstructured":"Hagras, H., Doctor, F., Lopez, A., Callaghan, V. (2007). \u201cAn incremental adaptive life long learning approach for type-2 fuzzy embedded agents in ambient intelligent environments,\u201d IEEE Trans. Fuzzy Syst.","DOI":"10.1109\/TFUZZ.2006.889758"},{"issue":"4","key":"341_CR41","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MPRV.2007.82","volume":"6","author":"G Hayes","year":"2007","unstructured":"Hayes, G., Poole, E., Iachello, G., Patel, S., Graimes, A., Abowd, G., & Truong, K. (2007). Physical, social, and experimental knowledge of privacy and security in a pervasive computing environment. IEEE Pervasive Computing, 6(4), 56\u201363.","journal-title":"IEEE Pervasive Computing"},{"key":"341_CR42","doi-asserted-by":"crossref","unstructured":"Heierman, E.O., & Cook, D.J. (2003). \u201cImproving home automation by discovering regularly occurring device usage patterns,\u201d in IEEE International Conference on Data Mining, pp. 537\u2013540.","DOI":"10.1109\/ICDM.2003.1250971"},{"issue":"3","key":"341_CR43","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MC.2005.107","volume":"38","author":"A Helal","year":"2005","unstructured":"Helal, A., Mann, W., El-Zabadani, H., King, J., Kaddoura, Y., & Jansen, E. (2005). The gator tech smart house: a programmable pervasive space. IEEE Computer, 38(3), 50\u201360.","journal-title":"IEEE Computer"},{"issue":"1","key":"341_CR44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1177\/193229680900300115","volume":"3","author":"A Helal","year":"2009","unstructured":"Helal, A., Cook, D. J., & Schmalz, M. (2009). Smart home-based health platform for behavioral monitoring and alteration of diabetes patients. Journal of Diabetes Science and Technology, 3(1), 1\u20138.","journal-title":"Journal of Diabetes Science and Technology"},{"issue":"4","key":"341_CR45","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1197\/jamia.M2026","volume":"13","author":"BK Hensel","year":"2006","unstructured":"Hensel, B. K., Demiris, G., & Courtney, K. L. (2006). Defining obtrusiveness in home telehealth technologies: a conceptual framework. Journal American Medical Informatics Association, 13(4), 428\u2013431.","journal-title":"Journal American Medical Informatics Association"},{"key":"341_CR46","unstructured":"Hill, K. (2013). \u201cWhen \u2018smart homes\u2019 get hacked: I haunted a complete stranger\u2019s house via the Internet,\u201d Forbes."},{"key":"341_CR47","doi-asserted-by":"crossref","unstructured":"Hodges, M., Kirsch, N., Newman, N.,Pollack, M. (2010). \u201cAutomatic assessment of cognitive impairment through electronic observation of object usage,\u201d in International Conference on Pervasive Computing, pp. 192\u2013209.","DOI":"10.1007\/978-3-642-12654-3_12"},{"key":"341_CR48","doi-asserted-by":"crossref","unstructured":"Hollosi, D., Schroder, J., Goetze, S., Appell, J. (2010). \u201cVoice activity detection driven acoustic event classification for monitoring in smart homes,\u201d in International Symposium on Applied Sciences in Biomedical and Communication Technologies, pp. 1\u20135.","DOI":"10.1109\/ISABEL.2010.5702763"},{"issue":"2","key":"341_CR49","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.cviu.2004.02.005","volume":"96","author":"S Hongeng","year":"2004","unstructured":"Hongeng, S., Nevatia, R., & Bremond, F. (2004). Video-based event recognition: activity representation and probabilistic recognition methods. Computer Vision and Image Understanding, 96(2), 129\u2013162.","journal-title":"Computer Vision and Image Understanding"},{"key":"341_CR50","unstructured":"Hu, D.H., & Yang, Q. (2011). \u201cTransfer learning for activity recognition via sensor mapping,\u201d in International Joint Conference on Artificial Intelligence, pp. 1962\u20131967."},{"issue":"3","key":"341_CR51","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1016\/j.pmcj.2010.11.005","volume":"7","author":"DH Hu","year":"2011","unstructured":"Hu, D. H., Zheng, V. W., & Yang, Q. (2011b). Cross-domain activity recognition via transfer learning. Pervasive and Mobile Computing, 7(3), 344\u2013358.","journal-title":"Pervasive and Mobile Computing"},{"key":"341_CR52","doi-asserted-by":"crossref","unstructured":"Huynh, T., Fritz, M., Schiele, B. (2008). \u201cDiscovery of activity patterns using topic models,\u201d in International Conference on Ubiquitous Computing, pp. 10\u201319.","DOI":"10.1145\/1409635.1409638"},{"issue":"1","key":"341_CR53","doi-asserted-by":"crossref","first-page":"70","DOI":"10.3414\/ME9103","volume":"47","author":"V Jakkula","year":"2008","unstructured":"Jakkula, V., & Cook, D. J. (2008). Anomaly detection using temporal data mining in a smart home environment. Methods of Information in Medicine, 47(1), 70\u201375.","journal-title":"Methods of Information in Medicine"},{"key":"341_CR54","unstructured":"Jarafi, R. Sastry, S. Bajcsy, R. (2009). \u201cDistributed recognition of human actions using wearable motion sensor networks,\u201d J. Ambient Intell. Smart Environ."},{"key":"341_CR55","doi-asserted-by":"crossref","unstructured":"Jiang, Y., Li, K., Tian, L., Piedrahita, R., Yun, X., Mansata, O., Lv, Q., Dick, R.P., Hannigan, M., Shang, L. (2011). \u201cMAQS: apersonalized mobile sensing system for indoor air quality monitoring,\u201d in International Conference on Ubiquitous Computing.","DOI":"10.1145\/2030112.2030150"},{"key":"341_CR56","doi-asserted-by":"crossref","first-page":"2010","DOI":"10.1016\/j.patcog.2007.11.016","volume":"41","author":"H Junker","year":"2008","unstructured":"Junker, H., Amft, O., Lukowicz, P., & Groster, G. (2008). Gesture spotting with body-worn inertial sensors to detect user activities. Pattern Recognition, 41, 2010\u20132024.","journal-title":"Pattern Recognition"},{"key":"341_CR57","doi-asserted-by":"crossref","unstructured":"Kan, P., Huq, R., Hoey, J., Mihailidis, A. (2011). \u201cThe development of an adaptive upper-limb stroke rehabilitation robotic system,\u201d J. Neuroeng. Rehabil., vol. 8, no. 33.","DOI":"10.1186\/1743-0003-8-33"},{"key":"341_CR58","doi-asserted-by":"crossref","unstructured":"Kjergarrd, M. B.,Wirz, M., Roggen, D., Troster, G. (2012). \u201cMobile sensing of pedestrian flocks in indoor environments using WiFi signals,\u201d in IEEE International Conference on Pervasive Computing and Communication.","DOI":"10.1109\/PerCom.2012.6199854"},{"key":"341_CR59","doi-asserted-by":"crossref","unstructured":"Komatsuzaki, M., Tsukada, K., Siio, L., Verronen P., Luimula, M., Pieska, S. (2011). \u201cIteMinder: Finding items in a room using passive RFID and an autonomous robot,\u201d in International Conference on Ubiquitous Computing.","DOI":"10.1145\/2030112.2030232"},{"key":"341_CR60","unstructured":"Krishnan, N., & Cook, D.J. (2012). \u201cActivity recognition on streaming sensor data,\u201d Pervasive Mob. Comput."},{"key":"341_CR61","doi-asserted-by":"crossref","unstructured":"Krishnan, N., & Panchanathan, S. (2008). \u201cAnalysis of low resolution accelerometer data for human activity recognition,\u201d in International Conference on Acoustic Speech and Signal Processing.","DOI":"10.1109\/ICASSP.2008.4518365"},{"key":"341_CR62","unstructured":"Krishnan, N.C., Colbry, D., Juillard, C., Panchanathan, S. (2008). \u201cReal time human activity recognition using tri-axial accelerometers,\u201d in Sensors Signals and Information Processing Workshop."},{"key":"341_CR63","unstructured":"Kwapisz,J., Weiss, G., Moore, S. (2010). \u201cActivity recognition using cell phone accelerometers,\u201d in International Workshop on Knowledge Discovery from Sensor Data, pp. 10\u201318."},{"key":"341_CR64","unstructured":"Larson, S. (2013). \u201cPrivacy at home: 5 things the connected home can learn from social media,\u201d readwrite, [Online]. Available: http:\/\/readwrite.com\/2013\/11\/15\/five-things-the-connected-home-can-learn-from-social-media#feed=\/series\/home&awesm=~osmE1DqUR9mSt4 ."},{"key":"341_CR65","unstructured":"Larson, E., Froehlich, J., Campbell, T., Haggerty, C., Fogarty, J., Patel, S.N. (2012). \u201cDisaggregated water sensing from a single, pressure-based sensor,\u201d Pervasive Mob. Comput."},{"issue":"7","key":"341_CR66","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1109\/TKDE.2005.112","volume":"17","author":"M Laszlo","year":"2005","unstructured":"Laszlo, M. (2005). Minimum spanning tree partitioning algorithm for microaggregation. IEEE Transactions on Knowledge and Data Engineering, 17(7), 902\u2013911.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"341_CR67","unstructured":"Lee, A. \u201cHacking the connected home: When your house watches you,\u201d readwrite. [Online]. Available: http:\/\/readwrite.com\/2013\/11\/13\/hacking-the-connected-home-when-your-house-watches-you#feed=\/tag\/connected-home&awesm=~osmDA6o9bkgx84 ."},{"key":"341_CR68","unstructured":"Lee, M.L., & Dey, A.K. (2010). \u201cEmbedded assessment of aging adults: A concept validation with stake holders,\u201d in International Conference on Pervasive Computing Technologies for Healthcare, pp. 22\u201325."},{"key":"341_CR69","unstructured":"Lester, J., Choudhury, T., Kern, N., Borriello, G., Hannaford, B. (2005). \u201cA hybrid discriminative\/generative approach for modeling human activities,\u201d in International Joint Conference on Artificial Intelligence, pp. 766\u2013772."},{"key":"341_CR70","doi-asserted-by":"crossref","first-page":"1291","DOI":"10.1109\/TBME.2012.2186449","volume":"59","author":"Y Li","year":"2012","unstructured":"Li, Y., Ho, K. C., & Popescu, M. (2012a). A microphone array system for automatic fall detection. IEEE Transactions on Biomedical Engineering, 59, 1291\u20131301.","journal-title":"IEEE Transactions on Biomedical Engineering"},{"key":"341_CR71","doi-asserted-by":"crossref","unstructured":"Li, F., Zhao, C., Zhao, F., Ding, G., Gong, J.,Liu, C., Jian, S., Hsu, F.-H. (2012). \u201cA reliable and accurate indoor localization method using phone inertial sensors,\u201d in ACM International Conference on Ubiquitous Computing","DOI":"10.1145\/2370216.2370280"},{"issue":"5\u20136","key":"341_CR72","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.artint.2007.01.006","volume":"171","author":"L Liao","year":"2007","unstructured":"Liao, L., Patterson, D. J., Fox, D., & Kautz, H. (2007). Learning and inferring transportation routines. Artificial Intelligence, 171(5\u20136), 311\u2013331.","journal-title":"Artificial Intelligence"},{"key":"341_CR73","doi-asserted-by":"crossref","unstructured":"Logan, B., Healey, J., Philipose, M., Tapia, E.M., Intille, S. (2007). \u201cA long-term evaluation of sensing modalities for activity recognition,\u201d in Proceedings of the 9th International Conference on Ubiquitous Computing.","DOI":"10.1007\/978-3-540-74853-3_28"},{"key":"341_CR74","doi-asserted-by":"crossref","unstructured":"Lu, H., Rabbi, M., Chittaranjan, G.T., Frauendorfer, D., Schmid Mast, M., Campbell, A.T., Gatica-Perez, D., Choudhury, T. (2012). \u201cStressSense: detecting stress in unconstrained acoustic environments using smartphones,\u201d in ACM International Conference on Ubiquitous Computing.","DOI":"10.1145\/2370216.2370270"},{"key":"341_CR75","unstructured":"Lyons, P., Tran, A., Marsland, S., Dietric, J., Guesgen, H. (2010). \u201cUse cases for abnormal behavior detection in smart homes,\u201d in International Conference on Smart Homes and Health Telematics, pp. 144\u2013151."},{"key":"341_CR76","doi-asserted-by":"crossref","unstructured":"Maurer, U., Smailagic, A., Siewiorek, D., Deisher, M. (2006). \u201cActivity recognition and monitoring using multiple sensors on different body positions,\u201d in Proceedings of the International Workshop on Wearable and Implantable Body Sensor Networks, pp. 113\u2013116.","DOI":"10.1109\/BSN.2006.6"},{"key":"341_CR77","unstructured":"Mozer, M. (1998). \u201cThe neural network house: an environment that adapts to its inhabitants,\u201d in Proceedings of the AAAI Spring Symposium on Intelligent Environments, pp. 110\u2013114."},{"key":"341_CR78","doi-asserted-by":"crossref","unstructured":"Munguia Tapia, E., Choudhury, T., Philipose, M. (2006). \u201cBuilding reliable activity models using hierarchical shrinkage and mined ontology,\u201d in Pervasive, pp. 17\u201332.","DOI":"10.1007\/11748625_2"},{"key":"341_CR79","doi-asserted-by":"crossref","unstructured":"Natarajan, P., & Nevatia, R. (2007). \u201cCoupled hidden semi Markov models for activity recognition,\u201d in Workshop on Motion and Video Computing.","DOI":"10.1109\/WMVC.2007.12"},{"issue":"3","key":"341_CR80","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/s11263-007-0122-4","volume":"79","author":"JC Niebles","year":"2008","unstructured":"Niebles, J. C., Wang, H., & Fei-Fei, L. (2008). Unsupervised learning of human action categories using spatial-temporal words. International Journal of Computer Vision, 79(3), 299\u2013318.","journal-title":"International Journal of Computer Vision"},{"key":"341_CR81","unstructured":"Orsini, L. (2013). \u201cConnected home invasion: you\u2019ve seen the madness, here are the methods,\u201d readwrite."},{"key":"341_CR82","doi-asserted-by":"crossref","unstructured":"Pavel, M., Adami, A., Morris, M., Lundell, J., Hayes, T.L., Jimison, H., Kaye, J.A. (2006). \u201cMobility assessment using event-related responses,\u201d in Transdisciplinary Conference on Distributed Diagnosis and Home Healthcare, pp. 71\u201374.","DOI":"10.1109\/DDHH.2006.1624800"},{"issue":"2","key":"341_CR83","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s10844-006-0006-z","volume":"28","author":"J Pei","year":"2007","unstructured":"Pei, J., Han, J., & Wang, W. (2007). Constraint-based sequential pattern mining: the pattern-growth methods. Journal of Intelligent Information Systems, 28(2), 133\u2013160.","journal-title":"Journal of Intelligent Information Systems"},{"key":"341_CR84","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1002\/gps.1444","volume":"21","author":"R Perneczky","year":"2006","unstructured":"Perneczky, R., Sorg, C., Hartmann, J., Tosic, N., Grimmer, T., Heitele, S., & Kurz, A. (2006). Impairment of activities of daily living requiring memory or complex reasoning as part of the MCI syndrome. International Journal of Geriatric Psychiatry, 21, 158\u2013162.","journal-title":"International Journal of Geriatric Psychiatry"},{"issue":"4","key":"341_CR85","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MPRV.2004.7","volume":"3","author":"M Philipose","year":"2004","unstructured":"Philipose, M., Fishkin, K. P., Perkowitz, M., Patterson, D. J., Hahnel, D., Fox, D., & Kautz, H. (2004). Inferring activities from interactions with objects. IEEE Pervasive Computing, 3(4), 50\u201357.","journal-title":"IEEE Pervasive Computing"},{"key":"341_CR86","doi-asserted-by":"crossref","unstructured":"Rahal, Y., Pigot, H., Mabilleau, P. (2008). \u201cLocation estimation in a smart home: System implementation and evaluation using experimental data,\u201d Int. J. Telemed. Appl., p. 4.","DOI":"10.1155\/2008\/142803"},{"issue":"4","key":"341_CR87","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1109\/TKDE.2010.148","volume":"23","author":"P Rashidi","year":"2011","unstructured":"Rashidi, P., Cook, D., Holder, L., & Schmitter-Edgecombe, M. (2011). Discovering activities to recognize and track in a smart environment. IEEE Transactions on Knowledge and Data Engineering, 23(4), 527\u2013539.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"341_CR88","unstructured":"Ravi, N., Dandekar, N., Mysore, P., Littman, M.L. (2005). \u201cActivity recognition from accelerometer data,\u201d in Innovative Applications of Artificial Intelligence, pp. 1541\u20131546."},{"key":"341_CR89","doi-asserted-by":"crossref","first-page":"63","DOI":"10.3414\/ME9102","volume":"47","author":"V Rialle","year":"2008","unstructured":"Rialle, V., Ollivet, C., Guigui, C., & Herve, C. (2008). What do family caregivers of Alzheimer\u2019s disease patients desire in smart home technologies? Methods of Information in Medicine, 47, 63\u201369.","journal-title":"Methods of Information in Medicine"},{"key":"341_CR90","unstructured":"Ruotsalainen, A., & Ala-Kleemola, T. (2007). \u201cGais: A method for detecting discontinuous sequential patterns from imperfect data,\u201d in Proceedings of the International Conference on Data Mining, pp. 530\u2013534."},{"key":"341_CR91","doi-asserted-by":"crossref","unstructured":"Ryoo, M.S.,& Aggarwal, J.K. (2006). \u201cRecognition of composite human activities through context-free grammar based representation,\u201d in IEEE Conference on Computer Vision and Pattern Recognition.","DOI":"10.1109\/CVPR.2006.242"},{"key":"341_CR92","unstructured":"Sahaf, Y., Krishnan, N., Cook, D.J. (2011). \u201cDefining the complexity of an activity,\u201d in AAAI Workshop on Activity Context Representation: Techniques and Languages."},{"key":"341_CR93","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1037\/a0014186","volume":"23","author":"M Schmitter-Edgecombe","year":"2009","unstructured":"Schmitter-Edgecombe, M., Woo, E., & Greeley, D. (2009). Characterizing multiple memory deficits and their relation to everyday functioning in individuals with mild cognitive impairment. Neuropsychology, 23, 168\u2013177.","journal-title":"Neuropsychology"},{"key":"341_CR94","doi-asserted-by":"crossref","unstructured":"Scott, J., Brush, A.J.B., Krumm, J.,Meyers, B., Hazas, M., Hodges, S., Villar, N. (2011). \u201cPreHeat: Controlling home heating using occupancy prediction,\u201d in International Conference on Ubiquitous Computing.","DOI":"10.1145\/2030112.2030151"},{"key":"341_CR95","unstructured":"Seryak, J., & Kissock, K. (2003). \u201cOccupancy and behavioral effects on residential energy use,\u201d Sol. Conf., pp. 717\u2013722."},{"key":"341_CR96","first-page":"713","volume":"7","author":"C Song","year":"2010","unstructured":"Song, C., Koren, T., Wang, P., & Barabasi, A. L. (2010). Modeling the scaling properties of human mobility. Nature Physics, 7, 713\u2013718.","journal-title":"Nature Physics"},{"issue":"12","key":"341_CR97","doi-asserted-by":"crossref","first-page":"1371","DOI":"10.1109\/34.735811","volume":"20","author":"T Starner","year":"1998","unstructured":"Starner, T., & Pentland, A. (1998). Real-time American sign language recognition from video using hidden Markov models. IEEE Transactions on Pattern Analysis and Machine Intelligence, 20(12), 1371\u20131375.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"341_CR98","doi-asserted-by":"crossref","unstructured":"Su, B.Y., Ho, K.C., Skubic, M., Rosales, L. (2012). \u201cPulse rate estimation using hydraulic bed sensor,\u201d in International Conference of the IEEE Engineering in Medicine and Biology Society","DOI":"10.1109\/EMBC.2012.6346493"},{"key":"341_CR99","unstructured":"Suk, M., Ramadass, A., Jim, Y., Prabhakaran, B. (2012). \u201cVideo human motion recognition using a knowledge-based hybrid method based on a hidden Markov model,\u201d ACM Trans. Intell. Syst. Technol., vol. 3, no. 3."},{"key":"341_CR100","doi-asserted-by":"crossref","unstructured":"Teixeira, T., Jung, D., Dublon, G., Savvides, A. (2009). \u201cRecognizing activities from context and arm pose using finite state machines,\u201d in ACM\/IEEE International Conference on Distributed Smart Cameras","DOI":"10.1109\/ICDSC.2009.5289370"},{"key":"341_CR101","unstructured":"Tukey, J. (1977). Exploratory Data Analysis. Addison-Wesley, 1977."},{"key":"341_CR102","unstructured":"U. Nations. (2012). \u201cWorld population ageing: 1950\u20132050,\u201d [Online]. Available: www.un.org\/esa\/population\/publications\/worldageing19502050\/ ."},{"key":"341_CR103","unstructured":"van Kasteren T., & Krose, B. (2007). \u201cBayesian activity recognition in residence for elders,\u201d in Proceedings of the IET International Conference on Intelligent Environments pp. 209\u2013212."},{"key":"341_CR104","doi-asserted-by":"crossref","unstructured":"Vergara,I., Mendez, D., Labrador, M. A. (2013). \u201cOn the interactions between privacy-preserving, incentive, and inerence mechanisms in participatory sensing systems,\u201d in International Conference on Network and System Security.","DOI":"10.1007\/978-3-642-38631-2_47"},{"key":"341_CR105","doi-asserted-by":"crossref","unstructured":"Vergara-Laurens, I., Mendez, D., Labrador, M.A. (2014). \u201cPrivacy, quality of information, and energy consumption in participatory sensing systems,\u201d in IEEE International Conference on Pervasive Computing and Communications.","DOI":"10.1109\/PerCom.2014.6813961"},{"key":"341_CR106","unstructured":"Vincent, G., & Velkoff, V. (2010). \u201cThe next four decades - the older population in the United States: 2010 to 2050\u201d."},{"key":"341_CR107","doi-asserted-by":"crossref","unstructured":"Vines, J., Lindsay, S., Pritchard, G.W., Lie, M., Greathead, D., Olivier, P., Brittain, K. (2013). \u201cMaking family care work: dependence, privacy and remote home monitoring,\u201d in ACM International Joint Conference on Pervasive and Ubiquitous Computing","DOI":"10.1145\/2493432.2493469"},{"key":"341_CR108","unstructured":"Waltz, E. (2012). \u201cHow I quantified myself,\u201d IEEE Spectr., vol. September, pp. 43\u201347."},{"key":"341_CR109","doi-asserted-by":"crossref","unstructured":"Wang, J. (2009). \u201cA survey on privacy preserving data mining,\u201d in International Workshop on Database Technology and Applications, pp. 111\u2013114.","DOI":"10.1109\/DBTA.2009.147"},{"key":"341_CR110","unstructured":"Wang, S., Pentney, W., Popescu, A.M., Choudhury, T., Philipose, M. (2007). \u201cCommon sense based joint training of human activity recognizers,\u201d in International Joint Conference on Artificial Intelligence, pp. 2237\u20132242."},{"key":"341_CR111","doi-asserted-by":"crossref","unstructured":"Wang, S., Skubic, M., Zhu, Y., Galambos, C. (2011). \u201cUsing passive sensing to estimate relative energy expenditure for eldercare monitoring,\u201d in PerCom Workshop on Smart Environments to Enhance Health Care.","DOI":"10.1109\/PERCOMW.2011.5766968"},{"issue":"1","key":"341_CR112","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.pmcj.2010.12.001","volume":"8","author":"L Wang","year":"2012","unstructured":"Wang, L., Gu, T., Tao, X., & Lu, J. (2012). A hierarchical approach to real-time activity recognition in body sensor networks. Pervasive and Mobile Computing, 8(1), 115\u2013130.","journal-title":"Pervasive and Mobile Computing"},{"key":"341_CR113","unstructured":"Wbcsd. (2012). \u201cEnergy efficiency in buildings,\u201d [Online]. Available: www.wbcsd.org ."},{"key":"341_CR114","doi-asserted-by":"crossref","unstructured":"Wightman,P., Zulbaran, M., Rodriguez, M., Labrador, M.A. (2013). \u201cMaPIR: Mapping-based private information retrieval for location privacy in LBS,\u201d in IEEE Local Computer Networks Conference.","DOI":"10.1109\/LCNW.2013.6758539"},{"key":"341_CR115","doi-asserted-by":"crossref","unstructured":"Wilson, D., & Atkeson, C. (2005). \u201cSimultaneous tracking and activity recognition (STAR) using many anonymous, binary sensors,\u201d in Pervasive, pp. 62\u201379.","DOI":"10.1007\/11428572_5"},{"key":"341_CR116","unstructured":"Wyatt, D., Philipose, M., Choudhury, T. (2005). \u201cUnsupervised activity recognition using automatically mined common sense,\u201d in National Conference on Artificial Intelligence, pp. 21\u201327."},{"key":"341_CR117","doi-asserted-by":"crossref","unstructured":"Yatani, K., & Truong, K. (2012). \u201cBodyScope: A wearable acoustic sensor for activity recognition,\u201d in ACM International Conference on Ubiquitous Computing.","DOI":"10.1145\/2370216.2370269"},{"issue":"8","key":"341_CR118","doi-asserted-by":"crossref","first-page":"1082","DOI":"10.1109\/TKDE.2007.1042","volume":"20","author":"J Yin","year":"2008","unstructured":"Yin, J., Yang, Q., & Pan, J. J. (2008). Sensor-based abnormal human-activity detection. IEEE Transactions on Knowledge and Data Engineering, 20(8), 1082\u20131090.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"1","key":"341_CR119","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1177\/002214650905000103","volume":"50","author":"E York","year":"2009","unstructured":"York, E., & White, L. (2009). Social disconnectedness, perceived isolation, and health among older adults. Journal of Health and Social Behavior, 50(1), 31\u201348.","journal-title":"Journal of Health and Social Behavior"},{"issue":"4","key":"341_CR120","first-page":"1","volume":"37","author":"GM Youngblood","year":"2007","unstructured":"Youngblood, G. M., & Cook, D. J. (2007). Data mining for hierarchical model creation. IEEE Transaction System Man, Cybernetics Part C, 37(4), 1\u201312.","journal-title":"IEEE Transaction System Man, Cybernetics Part C"}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-014-0341-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10844-014-0341-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-014-0341-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T01:31:32Z","timestamp":1598405492000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10844-014-0341-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,22]]},"references-count":120,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["341"],"URL":"https:\/\/doi.org\/10.1007\/s10844-014-0341-4","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"value":"0925-9902","type":"print"},{"value":"1573-7675","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,22]]}}}