{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T03:14:08Z","timestamp":1762917248033},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,12,3]],"date-time":"2009-12-03T00:00:00Z","timestamp":1259798400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1007\/s11277-009-9882-1","type":"journal-article","created":{"date-parts":[[2009,12,2]],"date-time":"2009-12-02T13:01:39Z","timestamp":1259758899000},"page":"37-53","source":"Crossref","is-referenced-by-count":22,"title":["Uncertainty Management in Context-Aware Applications: Increasing Usability and User Trust"],"prefix":"10.1007","volume":"56","author":[{"given":"Pedro","family":"Dami\u00e1n-Reyes","sequence":"first","affiliation":[]},{"given":"Jes\u00fas","family":"Favela","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Contreras-Castillo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,3]]},"reference":[{"issue":"3","key":"9882_CR1","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MPRV.2002.1037718","volume":"1","author":"G. D. Abowd","year":"2002","unstructured":"Abowd G. D., Ebling M., Hunt G., Lei H., Gellersen H.-W. (2002) Context-aware computing. IEEE Pervasive Computing 1(3): 22\u201323","journal-title":"IEEE Pervasive Computing"},{"issue":"4","key":"9882_CR2","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/98.943998","volume":"8","author":"M. Satyanarayanan","year":"2001","unstructured":"Satyanarayanan M. (2001) Pervasive computing: Vision and challenges. IEEE Personal Communications 8(4): 10\u201317","journal-title":"IEEE Personal Communications"},{"issue":"3","key":"9882_CR3","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M. Weiser","year":"1991","unstructured":"Weiser M. (1991) The computer for the 21st century. Scientific American 265(3): 94\u2013104","journal-title":"Scientific American"},{"issue":"1","key":"9882_CR4","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s007790170019","volume":"5","author":"A. K. Dey","year":"2001","unstructured":"Dey A. K. (2001) Understanding and using context. Personal and Ubiquitous Computing 5(1): 4\u20137","journal-title":"Personal and Ubiquitous Computing"},{"issue":"11","key":"9882_CR5","doi-asserted-by":"crossref","first-page":"1168","DOI":"10.1016\/S0140-3664(02)00251-7","volume":"26","author":"P. Prekop","year":"2003","unstructured":"Prekop P., Burnett M. (2003) Activities, context and ubiquitous computing. Computer Communications 26(11): 1168\u20131176","journal-title":"Computer Communications"},{"issue":"3","key":"9882_CR6","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/MPRV.2003.1228519","volume":"2","author":"M. Satyanarayanan","year":"2003","unstructured":"Satyanarayanan M. (2003) Coping with uncertainty. IEEE Pervasive Computing 2(3): 2","journal-title":"IEEE Pervasive Computing"},{"key":"9882_CR7","doi-asserted-by":"crossref","unstructured":"Antifakos, S., Kern, N., Schiele, B., & Schwaninger, A. (2005). Towards improving trust in context-aware systems by displaying system confidence. In 7th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCIG05) (pp. 9\u201314). ACM.","DOI":"10.1145\/1085777.1085780"},{"key":"9882_CR8","unstructured":"Gu, T., Pung, H. K., & Zhang, D. Q. (2004). A bayesian approach for dealing with uncertain contexts. In 2nd International Conference on Pervasive Computing (Pervasive 2004)."},{"issue":"2","key":"9882_CR9","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MPRV.2004.1316821","volume":"3","author":"A. Ranganathan","year":"2004","unstructured":"Ranganathan A., Al-Muhtadi J., Campbell R. H. (2004) Reasoning about uncertain contexts in pervasive computing environments. IEEE PERVASIVE Computing Journal 3(2): 62\u201370","journal-title":"IEEE PERVASIVE Computing Journal"},{"key":"9882_CR10","doi-asserted-by":"crossref","unstructured":"Truong, B. A., Lee, Y.-K., & Lee, S.-Y. (2005). Modeling and reasoning about uncertainty in context-aware systems. In IEEE International Conference on e-Business Engineering (ICEBE\u201905) (pp.102\u2013109). IEEE Computer Society.","DOI":"10.1109\/ICEBE.2005.90"},{"key":"9882_CR11","doi-asserted-by":"crossref","unstructured":"Xu, C., & Cheung, S. (2005). Inconsistency detection and resolution for context-aware middleware support. In 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering ESEC\/FSE-13 (pp. 336\u2013345). ACM Press.","DOI":"10.1145\/1081706.1081759"},{"key":"9882_CR12","doi-asserted-by":"crossref","unstructured":"Dey, A. K., Mankoff, J., Abowd, G. D., & Carter, S. (2002). Distributed mediation of ambiguous context in aware environments. In Proceedings of the 15th Annual ACM Symposium on User Interface Software and Technology (pp. 121\u2013130). ACM Press.","DOI":"10.1145\/571985.572003"},{"key":"9882_CR13","doi-asserted-by":"crossref","unstructured":"Guan, D., Yuan, W., Gavrilov, A., Lee, S., Lee, Y.-K., & Han, S. (2006). Using fuzzy decision tree to handle uncertainty in context deduction. In D.-S. Huang, K. Li & G. W. Irwin (Eds.), International Conference on Intelligent Computing, ICIC 2006, Lecture Notes in Computer Science (Vol. 4114, pp. 63\u201372). Springer.","DOI":"10.1007\/978-3-540-37275-2_7"},{"key":"9882_CR14","unstructured":"Buchholz, T., Kpper, A., & Schiffers, M. (2003). Quality of context: What it is and why we need it. In 10th Workshop of the Open View University Association (OVUA 03)."},{"issue":"3","key":"9882_CR15","doi-asserted-by":"crossref","first-page":"83","DOI":"10.4304\/jsw.3.3.83-93","volume":"3","author":"K. Sheikh","year":"2008","unstructured":"Sheikh K., Wegdam M., Sinderen M. V. (2008) Quality-of-context and its use for protecting privacy in context aware systems. Journal of Software 3(3): 83\u201393","journal-title":"Journal of Software"},{"key":"9882_CR16","doi-asserted-by":"crossref","unstructured":"Kim, Y., & Lee, K. (2006). A quality measurement method of context information in ubiquitous environments. In Hybrid Information Technology (ICHIT 06) (pp. 576\u2013581). IEEE Computer Society.","DOI":"10.1109\/ICHIT.2006.253664"},{"key":"9882_CR17","doi-asserted-by":"crossref","unstructured":"Bu, Y., Gu, T., Tao, X., Li, J., Chen, S., & Lu, J. (2006). Managing quality of context in pervasive computing. In Sixth International Conference on Quality Software (QSIC 2006). IEEE Computer Society.","DOI":"10.1109\/QSIC.2006.38"},{"key":"9882_CR18","doi-asserted-by":"crossref","unstructured":"Park, I., Lee, D., & Hyun, S. J. (2005). A dynamic context-conflict management scheme for group-aware ubiquitous computing environments. In 29th Annual International Computer Software and Applications Conference (COMPSAC 2005) (pp. 359\u2013364). IEEE.","DOI":"10.1109\/COMPSAC.2005.21"},{"issue":"1","key":"9882_CR19","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1145\/1057237.1057241","volume":"12","author":"A. K. Dey","year":"2005","unstructured":"Dey A. K., Mankoff J. (2005) Designing mediation for context-aware applications. ACM Transactions on Computer-Human Interaction 12(1): 53\u201380","journal-title":"ACM Transactions on Computer-Human Interaction"},{"key":"9882_CR20","doi-asserted-by":"crossref","unstructured":"Rukzio, E., Hamard, J., Noda, C., & Luca, A. D. (2006). Visualization of uncertainty in context aware mobile applications. In 8th Conference on Human-Computer Interaction with Mobile Devices and Services (pp. 247\u2013250). ACM Press.","DOI":"10.1145\/1152215.1152267"},{"issue":"1","key":"9882_CR21","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1145\/1143518.1143522","volume":"13","author":"S. Benford","year":"2006","unstructured":"Benford S., Crabtree A., Flintham M., Drozd A., Anastasi R., Paxton M., Tandavanitj N., Adams M., Row-Farr J. (2006) Can you see me now? ACM Transactions on Computer-Human Interaction 13(1): 100\u2013133","journal-title":"ACM Transactions on Computer-Human Interaction"},{"key":"9882_CR22","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1007\/s00779-006-0091-6","volume":"11","author":"A. Beeharee","year":"2007","unstructured":"Beeharee A., Steed A. (2007) Exploiting real world knowledge in ubiquitous applications. Personal and Ubiquitous Computing 11: 429\u2013437","journal-title":"Personal and Ubiquitous Computing"},{"key":"9882_CR23","doi-asserted-by":"crossref","unstructured":"Poole, D., & Smyth, C. (2005). Type uncertainty in ontologically-grounded qualitative probabilistic matching. In L. Godo (Ed.), 8th European Conference, ECSQARU 2005, LNCS (Vol. 3571, p. 763). Springer Verlag.","DOI":"10.1007\/11518655_64"},{"key":"9882_CR24","unstructured":"Hightower, J., Consolvo, S., LaMarca, A., Smith, I., & Hughes, J. (2005). Learning and recognizing the places we go. In Ubiquitous Computing: 7th International Conference on Ubiquitous Computing, UBICOMP 2005 (pp. 159\u2013176). Springer."},{"issue":"4","key":"9882_CR25","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1016\/S0953-5438(03)00038-9","volume":"15","author":"J. M\u00e4ntyj\u00e4rvia","year":"2003","unstructured":"M\u00e4ntyj\u00e4rvia J., Sepp\u00e4nen T. (2003) Adapting applications in handheld devices using fuzzy context information. Interacting with Computers 15(4): 521\u2013538","journal-title":"Interacting with Computers"},{"issue":"6","key":"9882_CR26","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1007\/s00779-003-0251-x","volume":"7","author":"A. Ranganathan","year":"2003","unstructured":"Ranganathan A., Campbell R. H. (2003) An infrastructure for context-awareness based on first order logic. Personal and Ubiquitous Computing 7(6): 353\u2013364","journal-title":"Personal and Ubiquitous Computing"},{"issue":"3","key":"9882_CR27","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MPRV.2003.1228525","volume":"2","author":"S. Benford","year":"2003","unstructured":"Benford S., Anastasi R., Flintham M., Drozd A., Crabtree A., Greenhalgh C., Tandavanitj N., Adams M., Row-Farr J. (2003) Coping with uncertainty in a location-based game. IEEE Pervasive Computing 2(3): 34\u201341","journal-title":"IEEE Pervasive Computing"},{"key":"9882_CR28","doi-asserted-by":"crossref","unstructured":"Castro, L. A., & Favela, J. (2005). Continuous tracking of user location in wlans using recurrent neural networks. In Sexto Encuentro Internacional de Computaci\u00f3n (ENC 2005) (pp. 174\u2013181). IEEE Press.","DOI":"10.1109\/ENC.2005.16"},{"issue":"4","key":"9882_CR29","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1504\/IJAHUC.2007.014070","volume":"2","author":"M. Baldauf","year":"2007","unstructured":"Baldauf M., Dustdar S., Rosenberg F. (2007) A survey on context-aware systems. International Journal of Ad Hoc and Ubiquitous Computing 2(4): 263\u2013277","journal-title":"International Journal of Ad Hoc and Ubiquitous Computing"},{"key":"9882_CR30","unstructured":"Indulska, J., & Sutton, P. (2003). Location management in pervasive systems. In The Australasian Information Security Workshop, Conferences in Research and Practice in Information Technology (Vol. 34, pp. 143\u2013151). ACM."},{"issue":"2","key":"9882_CR31","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1504\/IJIPT.2007.012374","volume":"2","author":"T. Broens","year":"2007","unstructured":"Broens T., Halteren A. V., Sinderen M. V., Wac K. (2007) Towards an application framework for context-aware m-health applications. International Journal of Internet Protocol Technology 2(2): 109\u2013116","journal-title":"International Journal of Internet Protocol Technology"},{"key":"9882_CR32","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/s00779-006-0116-1","volume":"11","author":"S. Konomi","year":"2007","unstructured":"Konomi S., Roussos G. (2007) Ubiquitous computing in the real world: Lessons learnt from large scale rfid deployments. Personal and Ubiquitous Computing 11: 507\u2013521","journal-title":"Personal and Ubiquitous Computing"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-009-9882-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-009-9882-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-009-9882-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T13:05:21Z","timestamp":1559394321000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-009-9882-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,3]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"alternative-id":["9882"],"URL":"https:\/\/doi.org\/10.1007\/s11277-009-9882-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,12,3]]}}}