{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T22:04:58Z","timestamp":1740175498108,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T00:00:00Z","timestamp":1658275200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T00:00:00Z","timestamp":1658275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s40860-022-00182-5","type":"journal-article","created":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T13:03:11Z","timestamp":1658322191000},"page":"223-226","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Intelligent environments with entangled quality properties"],"prefix":"10.1007","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5626-3115","authenticated-orcid":false,"given":"Carlos","family":"Rodr\u00edguez-Dom\u00ednguez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0220-9257","authenticated-orcid":false,"given":"Aditya","family":"Santokhee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5722-9816","authenticated-orcid":false,"given":"Miguel J.","family":"Hornos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,20]]},"reference":[{"key":"182_CR1","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1186\/2192-1962-3-12","volume":"3","author":"JC Augusto","year":"2013","unstructured":"Augusto JC, Callaghan V, Cook D, Kameas A, Satoh I (2013) Intelligent environments: a manifesto. HCIS 3:12. https:\/\/doi.org\/10.1186\/2192-1962-3-12","journal-title":"HCIS"},{"issue":"2","key":"182_CR2","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MIS.2008.19","volume":"23","author":"C Ramos","year":"2008","unstructured":"Ramos C, Augusto JC, Shapiro D (2008) Ambient intelligence\u2014the next step for artificial intelligence. IEEE Intell Syst 23(2):15\u201318. https:\/\/doi.org\/10.1109\/MIS.2008.19","journal-title":"IEEE Intell Syst"},{"key":"182_CR3","volume-title":"Smart environments: technology, protocols and applications, vol 43","author":"D Cook","year":"2005","unstructured":"Cook D, Das SK (2005) Smart environments: technology, protocols and applications, vol 43. Wiley, Hoboken"},{"issue":"7","key":"182_CR4","first-page":"97","volume":"22","author":"K Ashton","year":"2009","unstructured":"Ashton K (2009) That \u2018internet of things\u2019 thing. RFID J 22(7):97\u2013114","journal-title":"RFID J"},{"key":"182_CR5","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10796-014-9492-7","volume":"17","author":"S Li","year":"2015","unstructured":"Li S, Xu LD, Zhao S (2015) The internet of things: a survey. Inf Syst Front 17:243\u2013259. https:\/\/doi.org\/10.1007\/s10796-014-9492-7","journal-title":"Inf Syst Front"},{"key":"182_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/C2015-0-04135-1","volume-title":"Internet of things: principles and paradigms","year":"2016","unstructured":"Buyya R, Dastjerdi AV (eds) (2016) Internet of things: principles and paradigms. Elsevier, Amsterdam. https:\/\/doi.org\/10.1016\/C2015-0-04135-1"},{"issue":"1","key":"182_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40860-017-0043-0","volume":"3","author":"MJ Hornos","year":"2017","unstructured":"Hornos MJ (2017) Application of software engineering techniques to improve the reliability of intelligent environments. J Reliab Intell Environ 3(1):1\u20133. https:\/\/doi.org\/10.1007\/s40860-017-0043-0","journal-title":"J Reliab Intell Environ"},{"issue":"2","key":"182_CR8","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s40860-018-0063-4","volume":"4","author":"MJ Hornos","year":"2018","unstructured":"Hornos MJ, Rodr\u00edguez-Dom\u00ednguez C (2018) Increasing user confidence in intelligent environments. J Reliab Intell Environ 4(2):71\u201373. https:\/\/doi.org\/10.1007\/s40860-018-0063-4","journal-title":"J Reliab Intell Environ"},{"issue":"1","key":"182_CR9","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s40860-015-0001-7","volume":"1","author":"F Corno","year":"2015","unstructured":"Corno F, Guercio E, De Russis L, Gargiulo E (2015) Designing for user confidence in intelligent environments. J Reliab Intell Environ 1(1):11\u201321. https:\/\/doi.org\/10.1007\/s40860-015-0001-7","journal-title":"J Reliab Intell Environ"},{"key":"182_CR10","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.advengsoft.2012.12.004","volume":"58","author":"JC Augusto","year":"2013","unstructured":"Augusto JC, Hornos MJ (2013) Software simulation and verification to increase the reliability of intelligent environments. Adv Eng Softw 58:18\u201334. https:\/\/doi.org\/10.1016\/j.advengsoft.2012.12.004","journal-title":"Adv Eng Softw"},{"issue":"2","key":"182_CR11","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s40860-016-0019-5","volume":"2","author":"D Preuveneers","year":"2016","unstructured":"Preuveneers D, Joosen W (2016) Semantic analysis and verification of context-driven adaptive applications in intelligent environments. J Reliab Intell Environ 2(2):53\u201373. https:\/\/doi.org\/10.1007\/s40860-016-0019-5","journal-title":"J Reliab Intell Environ"},{"issue":"2","key":"182_CR12","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s40860-016-0020-z","volume":"2","author":"T Le Guilly","year":"2016","unstructured":"Le Guilly T, Nielsen MK, Pedersen T, Skou A, Kjeldskov J, Skov M (2016) User constraints for reliable user-defined smart home scenarios. J Reliab Intell Environ 2(2):75\u201391. https:\/\/doi.org\/10.1007\/s40860-016-0020-z","journal-title":"J Reliab Intell Environ"},{"issue":"1","key":"182_CR13","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s10209-017-0527-y","volume":"17","author":"CL Oguego","year":"2018","unstructured":"Oguego CL, Augusto JC, Mu\u00f1oz A, Springett M (2018) A survey on managing users\u2019 preferences in ambient intelligence. Univ Access Inf Soc 17(1):97\u2013114. https:\/\/doi.org\/10.1007\/s10209-017-0527-y","journal-title":"Univ Access Inf Soc"},{"issue":"12","key":"182_CR14","doi-asserted-by":"publisher","first-page":"2840","DOI":"10.1016\/j.jss.2012.07.052","volume":"85","author":"S Hallsteinsen","year":"2012","unstructured":"Hallsteinsen S, Geihs K, Paspallis N, Eliassen F, Horn G, Lorenzo J, Mamelli A, Papadopoulos GA (2012) A development framework and methodology for self-adapting applications in ubiquitous computing environments. J Syst Softw 85(12):2840\u20132859. https:\/\/doi.org\/10.1016\/j.jss.2012.07.052","journal-title":"J Syst Softw"},{"issue":"3","key":"182_CR15","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1016\/j.jss.2011.05.022","volume":"85","author":"K Benghazi","year":"2012","unstructured":"Benghazi K, Hurtado MV, Hornos MJ, Rodr\u00edguez ML, Rodr\u00edguez-Dom\u00ednguez C, Pelegrina AB, Rodr\u00edguez-F\u00f3rtiz MJ (2012) Enabling correct design and formal analysis of ambient assisted living systems. J Syst Softw 85(3):498\u2013510. https:\/\/doi.org\/10.1016\/j.jss.2011.05.022","journal-title":"J Syst Softw"},{"key":"182_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2017.04.058","volume":"85","author":"A Coronato","year":"2017","unstructured":"Coronato A, Paragliola G (2017) A structured approach for the designing of safe AAL applications. Expert Syst Appl 85:1\u201313. https:\/\/doi.org\/10.1016\/j.eswa.2017.04.058","journal-title":"Expert Syst Appl"},{"issue":"2","key":"182_CR17","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s40860-018-0060-7","volume":"4","author":"YH Suh","year":"2018","unstructured":"Suh YH, Lee KW, Cho ES (2018) A software framework for robotic mediators in smart environments. J Reliab Intell Environ 4(2):89\u2013105. https:\/\/doi.org\/10.1007\/s40860-018-0060-7","journal-title":"J Reliab Intell Environ"},{"issue":"2","key":"182_CR18","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s40860-018-0058-1","volume":"4","author":"T Given-Wilson","year":"2018","unstructured":"Given-Wilson T, Legay A, Sedwards S, Zendra O (2018) Group abstraction for assisted navigation of social activities in intelligent environments. J Reliab Intell Environ 4(2):107\u2013120. https:\/\/doi.org\/10.1007\/s40860-018-0058-1","journal-title":"J Reliab Intell Environ"},{"key":"182_CR19","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145","author":"P Mell","year":"2011","unstructured":"Mell P, Grance T (2011) The NIST definition of cloud computing. Comput Secur Div Inf Technol Lab. https:\/\/doi.org\/10.6028\/NIST.SP.800-145","journal-title":"Comput Secur Div Inf Technol Lab"},{"key":"182_CR20","doi-asserted-by":"publisher","unstructured":"Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on mobile cloud computing (MCC\u201912), Helsinki, Finland, pp 13\u201316. https:\/\/doi.org\/10.1145\/2342509.2342513","DOI":"10.1145\/2342509.2342513"},{"key":"182_CR21","doi-asserted-by":"publisher","first-page":"47980","DOI":"10.1109\/ACCESS.2018.2866491","volume":"6","author":"RK Naha","year":"2018","unstructured":"Naha RK, Garg S, Georgakopoulos D, Jayaraman PP, Gao L, Xiang Y, Ranjan R (2018) Fog computing: survey of trends, architectures, requirements, and research directions. IEEE Access 6:47980\u201348009. https:\/\/doi.org\/10.1109\/ACCESS.2018.2866491","journal-title":"IEEE Access"},{"issue":"2","key":"182_CR22","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1109\/JSEN.2016.2628346","volume":"17","author":"M Cornacchia","year":"2017","unstructured":"Cornacchia M, Ozcan K, Zheng Y, Velipasalar S (2017) A survey on activity detection and classification using wearable sensors. IEEE Sens J 17(2):386\u2013403. https:\/\/doi.org\/10.1109\/JSEN.2016.2628346","journal-title":"IEEE Sens J"},{"issue":"3","key":"182_CR23","doi-asserted-by":"publisher","first-page":"1321","DOI":"10.1109\/JSEN.2014.2370945","volume":"15","author":"SC Mukhopadhyay","year":"2015","unstructured":"Mukhopadhyay SC (2015) Wearable sensors for human activity monitoring: a review. IEEE Sens J 15(3):1321\u20131330. https:\/\/doi.org\/10.1109\/JSEN.2014.2370945","journal-title":"IEEE Sens J"},{"key":"182_CR24","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.5555\/944919.944968","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon I, Elisseeff A (2003) An introduction to variable and feature selection. J Mach Learn Res 3:1157\u20131182. https:\/\/doi.org\/10.5555\/944919.944968","journal-title":"J Mach Learn Res"},{"key":"182_CR25","unstructured":"Yayah F (2017) A Security Framework to Protect Data in Cloud Storage. PhD Thesis. University of Southampton. Southampton"},{"key":"182_CR26","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s40860-017-0038-x","volume":"3","author":"N Vithanwattana","year":"2017","unstructured":"Vithanwattana N, Mapp G, George C (2017) Developing a comprehensive information security framework for mHealth: a detailed analysis. J Reliab Intell Environ 3:21\u201339. https:\/\/doi.org\/10.1007\/s40860-017-0038-x","journal-title":"J Reliab Intell Environ"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-022-00182-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40860-022-00182-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-022-00182-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T11:39:46Z","timestamp":1659613186000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40860-022-00182-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,20]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["182"],"URL":"https:\/\/doi.org\/10.1007\/s40860-022-00182-5","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"type":"print","value":"2199-4668"},{"type":"electronic","value":"2199-4676"}],"subject":[],"published":{"date-parts":[[2022,7,20]]},"assertion":[{"value":"20 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}