{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:36:25Z","timestamp":1742380585526},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2005,8,1]],"date-time":"2005-08-01T00:00:00Z","timestamp":1122854400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["User Model User-Adap Inter"],"published-print":{"date-parts":[[2005,8]]},"DOI":"10.1007\/s11257-005-0001-z","type":"journal-article","created":{"date-parts":[[2005,11,9]],"date-time":"2005-11-09T18:11:15Z","timestamp":1131559875000},"page":"197-234","source":"Crossref","is-referenced-by-count":34,"title":["Consistent Modelling of Users, Devices and Sensors in a Ubiquitous Computing Environment"],"prefix":"10.1007","volume":"15","author":[{"given":"David J.","family":"Carmichael","sequence":"first","affiliation":[]},{"given":"Judy","family":"Kay","sequence":"additional","affiliation":[]},{"given":"Bob","family":"Kummerfeld","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Ackerman M., Cranor, L. and Reagle, J.: 1999, Privacy critics: UI components to safeguard user\u2019 privacy\u2019. In: M.H. Williams (ed.): The CHI is the Limit: Human Factors in Computing Systems, CHI99 Conference Proceedings. Pittsburgh, Pennsylvania, USA, pp. 1\u20138.","DOI":"10.1145\/632716.632875"},{"issue":"8","key":"1_CR2","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/2.940013","volume":"34","author":"M. Addlesee","year":"2001","journal-title":"IEEE Computer"},{"key":"1_CR3","first-page":"305","volume-title":"Proceedings of IV03-VSW Information Visualisation \u2013 Semantic Web Visualisation.","author":"T. Apted","year":"2003"},{"issue":"5-6","key":"1_CR4","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1007\/s007790200036","volume":"6","author":"M Bauer","year":"2002","journal-title":"Personal and Ubiquitous Computing"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Bellotti, V., Back, M., Edwards, W.K., Grinter, R.E., Henderson, A. and Lopes, C.V.: 2002, Making sense of sensing systems: five questions for designers and researchers. In: CHI \u201902: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Minneapolis, Minnesota, USA, pp. 415\u2013422.","DOI":"10.1145\/503376.503450"},{"issue":"1","key":"1_CR6","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1006\/ijhc.1994.1003","volume":"40","author":"G. Brajnik","year":"1994","journal-title":"International Journal of Human-Computer Studies"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Brummit, B., Krumm, J., Kern, A. and Shafer, S.A.: 2000, Easyliving: technologies for intelligent environments\u2019. In: Proceedings of: 2nd International Symposium on Handheld and Ubiquitous Computing. Bristol, United Kingdom, pp. 12\u201329.","DOI":"10.1007\/3-540-39959-3_2"},{"key":"1_CR8","first-page":"44","volume-title":"Proceedings of AIMS\u201904 \u2013 Artificial Intelligence in Mobile System.","author":"DJ. Carmichael","year":"2004"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Cheverst, K., Byun, H.E., Fitton, D., Sas, C., Kray, C. and Villar, N.: 2005, Exploring issues of user model transparency and proactive behaviour in an office environment control system. User Modeling and User-Adapted Interaction: The Journal of Personalization Research (this issue).","DOI":"10.1007\/s11257-005-1269-8"},{"key":"1_CR10","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/978-3-642-83230-7_4","volume-title":"User Models in Dialog Systems","author":"D. Chin","year":"1989"},{"key":"1_CR11","first-page":"121","volume-title":"Proceedings of Workshop on Adaptive Hypermedia and Adaptive Web-Based Systems User Modeling 2003 Session.","author":"M. Czarkowski","year":"2003"},{"issue":"3","key":"1_CR12","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/0004-3702(79)90008-0","volume":"12","author":"J. Doyle","year":"1979","journal-title":"Artificial Intelligence"},{"key":"1_CR13","unstructured":"EU, T.E.P. and the Council of the European Union, 1995, European Community Directive on Data Protection. http:\/\/www.doc.gov\/ecommerce\/eudir.htm."},{"key":"1_CR14","unstructured":"Godefroid, P., Herbsleb, J.D., Jagadeesan, L.J. and Li, D. (2000). Ensuring privacy in presence awareness systems: an automated verification approach. In: Proceedings of ACM Conference on Computer Supported Cooperative Work. Philadelphia, Pennsylvania, USA."},{"key":"1_CR15","unstructured":"Hatala, M. and Wakkary, R.: 2005, User modeling and semantic technologies in support of a tangible interface.User Modeling and User-Adapted Interaction: The Journal of Personalization Research (this issue)."},{"key":"1_CR16","unstructured":"Heckmann, D.: 2003a, Integrating privacy aspects into ubiquitous computing: a basic user interface for personalization. In: Proceedings of Artificial Intelligence in Mobile Systems Workshop at UbiComp 2003, Seattle, Washington, USA."},{"key":"1_CR17","unstructured":"Heckmann, D.: 2003b, A specialised representation for ubiquitous computing and user modeling. In: Proceedings of Workshop on User Modelling for Ubiquitous Computing at User Modelling 2003 (UM\u201903) . University of Pittsburgh, Johnstown, PA, USA. http:\/\/www.di.uniba.it\/ubium03\/heckmann-2.pdf."},{"key":"1_CR18","unstructured":"Heckmann, D.: 2004, Ubisworld. http:\/\/www.u2m.org\/."},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Hengartner, U. and Steenkiste, P.: 2003, Protecting access to people location information. In: Proceedings of First International Conference on Security in Pervasive Computing. Boppard, Germany, pp. 25\u201338.","DOI":"10.1007\/978-3-540-39881-3_6"},{"issue":"8","key":"1_CR20","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/2.940014","volume":"34","author":"J. Hightower","year":"2001","journal-title":"IEEE Computer"},{"key":"1_CR21","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/978-3-540-30119-6_6","volume-title":"Proceedings of 6th International Conference on Ubiquitous Computing (UbiComp 2004)","author":"J. Hightower","year":"2004"},{"issue":"1","key":"1_CR22","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/BF00158953","volume":"1","author":"X. Huang","year":"1991","journal-title":"User Modeling and User-Adapted Interaction: The Journal of Personalization Research"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Judd, G. and Steenkiste, P.: 2003, Providing contextual information to pervasive computing applications. In: Proccedings of IEEE International Conference on Pervasive Computing (PERCOM), Dallas, pp. 133\u2013142.","DOI":"10.1109\/PERCOM.2003.1192735"},{"issue":"3","key":"1_CR24","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/BF00141081","volume":"1","author":"R. Kass","year":"1991","journal-title":"User Modeling and User-Adapted Interaction: The Journal of Personalization Research"},{"issue":"3","key":"1_CR25","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/BF01100243","volume":"4","author":"J. Kay","year":"1995","journal-title":"User Modeling and User-Adapted Interaction: The Journal of Personalization Research"},{"key":"1_CR26","first-page":"203","volume-title":"Proceedings of AH\u20192002 Adaptive Hypertext 2002","author":"J. Kay","year":"2002"},{"key":"1_CR27","first-page":"12","volume-title":"UM03 Workshop on User Modeling for Ubiquitous Computing","author":"J. Kay","year":"2003"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Kidd, C.D., Orr, R., Abowd, G.D., Atkeson, C.G., Essa, I.A., MacIntyre, B., Mynatt, E.D., Starner, T.E. and Newstetter, W.: 1999, The Aware Home: a living laboratory for ubiquitous computing research. In: Proceedings of the Second International Workshop on Cooperative Buildings, Integrating Information, Organization, and Architecture, Pittsburgh, USA, pp. 191\u2013198.","DOI":"10.1007\/10705432_17"},{"issue":"1-2","key":"1_CR29","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1023\/A:1011187500863","volume":"11","author":"A. Kobsa","year":"2001","journal-title":"User Modeling and User-Adapted Interaction \u2013 Ten Year Anniversary Issue"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Kobsa A. (2001b). Invited keynote: tailoring privacy to user\u2019s needs. In: Proceedings of the User Modeling Conference. Sonthofen, Germany, pp. 303\u2013313.","DOI":"10.1007\/3-540-44566-8_52"},{"issue":"5","key":"1_CR31","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1145\/506218.506249","volume":"45","author":"A. Kobsa","year":"2002","journal-title":"Communications of the ACM"},{"issue":"2","key":"1_CR32","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/BF01099428","volume":"4","author":"A. Kobsa","year":"1995","journal-title":"User Modeling and User-Adapted Interaction: The Journal of Personalization Research"},{"issue":"2","key":"1_CR33","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1145\/767193.767196","volume":"3","author":"A. Kobsa","year":"2003","journal-title":"ACM Transactions on Internet Technology"},{"issue":"3","key":"1_CR34","first-page":"371","volume":"5","author":"Y. Kono","year":"1994","journal-title":"International Journal of Artificial Intelligence in Education"},{"key":"1_CR35","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/3-540-45427-6_23","volume-title":"Proceedings of 3rd International Conference on Ubiquitous Computing (UbiComp 2001)","author":"M. Langheinrich","year":"2001"},{"key":"1_CR36","unstructured":"Langheinrich, M.: 2002a, As we may live \u2013 real-world implications of ubiquitous computing. http:\/\/www.vs.inf.ethz.ch\/publ\/papers\/uc-implications.pdf."},{"key":"1_CR37","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/3-540-45809-3_19","volume-title":"Proceedings of 4th International Conference on Ubiquitous Computing (UbiComp 2002)","author":"M. Langheinrich","year":"2002"},{"issue":"10","key":"1_CR38","first-page":"89","volume":"42","author":"T. Lau","year":"1999","journal-title":"Communications of the ACM"},{"key":"1_CR39","unstructured":"Lederer, S., Hong, J.I., Jiang, X., Dey, A.K., Landay, J.A. and Mankoff, J.: 2003, Towards everyday privacy for ubiquitous computing of everyday privacy in ubiquitous computing environments. Technical report ucb-csd-03-1283, Computer Science Division, University of California, Berkley."},{"key":"1_CR40","doi-asserted-by":"crossref","unstructured":"Lehmann, O., Bauer, M., Becker, C. and Nicklas, D.: 2004, From home to world - supporting context-aware applications through world models. In: Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PERCOM\u201904) . Orlando, Florida, pp. 297\u2013306.","DOI":"10.1109\/PERCOM.2004.1276867"},{"key":"1_CR41","first-page":"45","volume-title":"Proceedings of Fourth International Symposium on Human Computer Interaction with Mobile Devices (Mobile HCI 2002), Vol. 2411 of Lecture Notes in Computer Science.","author":"J. Lin","year":"2002"},{"key":"1_CR42","first-page":"80","volume-title":"Papers from 2000 Adaptive User Interfaces AAAI Spring Symposium, Technical Report SS-00-01","author":"C. Miller","year":"2000"},{"issue":"1","key":"1_CR43","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MPRV.2003.1186726","volume":"2","author":"G. Myles","year":"2003","journal-title":"IEEE Pervasive Computing"},{"key":"1_CR44","unstructured":"Mynatt, E.D. and Nguyen, D.: 2001, Making Ubiquitous Computing Visible. In: Proceedings of CHI 2001 Workshop on Building the Ubiquitous Computing User Experience. Minneapolis, Minnesota. http:\/\/www2.parc.com\/csl\/ projects\/ubicomp-workshop\/positionpapers\/mynatt.pdf (visited April 2003)."},{"key":"1_CR45","volume-title":"Designing Web Usability","author":"J. Nielsen","year":"2000"},{"key":"1_CR46","unstructured":"P3P: 2004, Platform for Privacy Preferences (P3P). http:\/\/www.w3.org\/P3P\/ (visited April 2004)."},{"issue":"3","key":"1_CR47","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/BF01100244","volume":"4","author":"A. Paiva","year":"1995","journal-title":"User Modeling and User-Adapted Interaction: The Journal of Personalization Research"},{"key":"1_CR48","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/978-3-540-30119-6_26","volume-title":"Proceedings of 6th International Conference on Ubiquitous Computing (UbiComp 2004)","author":"D. Patterson","year":"2004"},{"key":"1_CR49","doi-asserted-by":"crossref","unstructured":"Petrelli, D. and Not, E.: 2005, User-centred design of flexible hypermedia for a mobile guide: reflections on the HyperAudio Experience. User Modeling and User-Adapted Interaction: The Journal of Personalization Research (this issue).","DOI":"10.1007\/s11257-006-9003-8"},{"key":"1_CR50","doi-asserted-by":"crossref","unstructured":"Priyantha, N.B., Chakraborty, A. and Balakrishnan, H.: 2000, The Cricket location-support system. In: MobiCom \u201900: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, Massachusetts, pp.32\u201343.","DOI":"10.1145\/345910.345917"},{"key":"1_CR51","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-642-83230-7_2","volume-title":"User Models in Dialog Systems","author":"E. Rich","year":"1989"},{"key":"1_CR52","doi-asserted-by":"crossref","unstructured":"Scott, J. and Hazas, M.: 2003, User-friendly surveying techniques for location-aware systems. In: Proceedings of 5th International Conference on Ubiquitous Computing (UbiComp 2003). Seattle, Washington, USA, pp. 44\u201353.","DOI":"10.1007\/978-3-540-39653-6_4"},{"key":"1_CR53","unstructured":"Segall, B., Arnold, D., Boot, J., Henderson, M. and Phelps, T.: 2000, Content based routing with Elvin4. In: Proceedings AUUG2K. Canberra, Australia. http:\/\/elvin.dstc.edu.au\/doc\/papers\/auug2k\/auug2k.pdf."},{"key":"1_CR54","first-page":"198","volume-title":"Proceedings of 9th International Conference on User Modeling (UM 2003)","author":"J. Uther","year":"2003"},{"key":"1_CR55","doi-asserted-by":"crossref","unstructured":"Want R., Hopper A., Falco V., Gibbons J. (1992). The active badge location system. ACM Transactions on Information Systems. 10(1)","DOI":"10.1145\/128756.128759"},{"key":"1_CR56","doi-asserted-by":"crossref","unstructured":"Zimmermann, A., Sprecht, M. and Lorenz, A.: 2005, Personalisation and context-management. User Modeling and User-Adapted Interaction: The Journal of Personalization Research. (this issue).","DOI":"10.1007\/s11257-005-1092-2"},{"key":"1_CR57","volume-title":"Human Behaviour and the Principle of Least Effort","author":"G.K. Zipf","year":"1949"}],"container-title":["User Modeling and User-Adapted Interaction"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11257-005-0001-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11257-005-0001-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11257-005-0001-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T19:23:59Z","timestamp":1586546639000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11257-005-0001-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,8]]},"references-count":57,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2005,8]]}},"alternative-id":["1"],"URL":"https:\/\/doi.org\/10.1007\/s11257-005-0001-z","relation":{},"ISSN":["0924-1868","1573-1391"],"issn-type":[{"value":"0924-1868","type":"print"},{"value":"1573-1391","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,8]]}}}