{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T18:02:13Z","timestamp":1751306533478,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,1,16]],"date-time":"2019-01-16T00:00:00Z","timestamp":1547596800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["CCF Trans. Pervasive Comp. Interact."],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s42486-018-00004-9","type":"journal-article","created":{"date-parts":[[2019,1,16]],"date-time":"2019-01-16T10:47:18Z","timestamp":1547635638000},"page":"125-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Opportunistic pervasive computing: adaptive context recognition and interfaces"],"prefix":"10.1007","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0695-2040","authenticated-orcid":false,"given":"Daniele","family":"Riboni","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,16]]},"reference":[{"issue":"2","key":"4_CR1","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1257\/jel.54.2.442","volume":"54","author":"A Acquisti","year":"2016","unstructured":"Acquisti, A., Taylor, C., Wagman, L.: The economics of privacy. J. Econ. Lit. 54(2), 442\u201392 (2016)","journal-title":"J. Econ. Lit."},{"issue":"5","key":"4_CR2","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1016\/j.pmcj.2008.04.002","volume":"4","author":"C Bettini","year":"2008","unstructured":"Bettini, C., Pareschi, L., Riboni, D.: Efficient profile aggregation and policy evaluation in a middleware for adaptive mobile applications. Pervasive Mob. Comput. 4(5), 697\u2013718 (2008)","journal-title":"Pervasive Mob. Comput."},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.pmcj.2014.09.010","volume":"17","author":"C Bettini","year":"2015","unstructured":"Bettini, C., Riboni, D.: Privacy protection in pervasive systems: state of the art and technical challenges. Pervasive Mob. Comput. 17, 159\u2013174 (2015)","journal-title":"Pervasive Mob. Comput."},{"key":"4_CR4","unstructured":"Botts, M., Robin, A.: OpenGIS sensor model language (SensorML) implementation specification. Tech. Rep. OGC 07-000, Open Geospatial Consortium Inc. (2007)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Chen, H., Perich, F., Finin, T.W., Joshi, A.: SOUPA: standard ontology for ubiquitous and pervasive applications. In: Proceedings of MobiQuitous, pp. 258\u2013267. IEEE Computer Society (2004)","DOI":"10.21236\/ADA439638"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Cornwell, J., Fette, I., Hsieh, G., Prabaker, M.K., Rao, J., Tang, K.P., Vaniea, K., Bauer, L., Cranor, L.F., Hong, J.I., McLaren, B., Reiter, M., Sadeh, N.M.: User-controllable security and privacy for pervasive computing. In: Eighth IEEE Workshop on Mobile Computing Systems and Applications, pp. 14\u201319. IEEE Computer Society (2007)","DOI":"10.1109\/HotMobile.2007.9"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Curci, S., Mura, A., Riboni, D.: Toward naturalistic self-monitoring of medicine intake. In: Proceedings of the 12th Biannual Conference on Italian SIGCHI Chapter (CHItaly), pp. 3:1\u20133:6. ACM (2017)","DOI":"10.1145\/3125571.3125582"},{"issue":"1","key":"4_CR8","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s007790170019","volume":"5","author":"AK Dey","year":"2001","unstructured":"Dey, A.K.: Understanding and using context. Personal Ubiquitous Comput. 5(1), 4\u20137 (2001)","journal-title":"Personal Ubiquitous Comput."},{"issue":"2","key":"4_CR9","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1057\/ejis.2014.1","volume":"23","author":"T Dinev","year":"2014","unstructured":"Dinev, T.: Why would we care about privacy? Eur. J. Inf. Syst. 23(2), 97\u2013102 (2014)","journal-title":"Eur. J. Inf. Syst."},{"key":"4_CR10","unstructured":"Gu, T., Kwok, Z., Koh, K.K., Pung, H.K.: A mobile framework supporting ontology processing and reasoning. In: 2nd Workshop on Requirements and Solutions for Pervasive Software Infrastructures. ACM (2007)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Gu, T., Pung, H.K., Tan, E., Zhang, D.: Contextpeers: Scalable peer-to-peer search for context information. In: Proceedings of International Workshop on Innovations in Web Infrastructure. WWW2005 (2005)","DOI":"10.1109\/ICCCN.2005.1523895"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Gu, T., Pung, H.K., Zhang, D.: Peer-to-peer context reasoning in pervasive computing environments. In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), IEEE Computer Society, pp. 406\u2013411 (2008)","DOI":"10.1109\/PERCOM.2008.37"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Gu, T., Tan, E., Pung, H.K., Zhang, D.: A peer-to-peer architecture for context lookup. In: 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), IEEE Computer Society, pp. 333\u2013341 (2005)","DOI":"10.1109\/MOBIQUITOUS.2005.5"},{"issue":"6","key":"4_CR14","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1016\/j.jnca.2012.12.028","volume":"36","author":"B Guo","year":"2013","unstructured":"Guo, B., Zhang, D., Wang, Z., Yu, Z., Zhou, X.: Opportunistic IOT: exploring the harmonious interaction between human and the internet of things. J. Netw. Comput. Appl. 36(6), 1531\u20131539 (2013)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"4_CR15","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"MA Hall","year":"2009","unstructured":"Hall, M.A., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. SIGKDD Explor. 11(1), 10\u201318 (2009)","journal-title":"SIGKDD Explor."},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Helaoui, R., Riboni, D., Stuckenschmidt, H.: A probabilistic ontological framework for the recognition of multilevel human activities. In: Proceedings of ACM UbiComp, ACM, pp. 345\u2013354 (2013)","DOI":"10.1145\/2493432.2493501"},{"issue":"11\u201312","key":"4_CR17","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.1002\/spe.760","volume":"36","author":"K Henricksen","year":"2006","unstructured":"Henricksen, K., Indulska, J., Rakotonirainy, A.: Using context and preferences to implement self-adapting pervasive computing applications. Softw. Pract. Exper. 36(11\u201312), 1307\u20131330 (2006)","journal-title":"Softw. Pract. Exper."},{"issue":"4","key":"4_CR18","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1142\/S0218843005001237","volume":"14","author":"R Hull","year":"2005","unstructured":"Hull, R., Kumar, B., Lieuwen, D.F., Patel-Schneider, P.F., Sahuguet, A., Varadarajan, S., Vyas, A.: Improving user experience through rule-based service customization. Int. J. Cooperative Inf. Syst. 14(4), 469\u2013502 (2005)","journal-title":"Int. J. Cooperative Inf. Syst."},{"key":"4_CR19","unstructured":"Klyne, G., Reynolds, F., Woodrow, C., Ohto, H., Hjelm, J., Butler, M.H., Tran, L.: Composite capability\/preference profiles (CC\/PP): structure and vocabularies\u00a01.0, W3C recommendation. Tech. rep., W3C (2004)"},{"issue":"3","key":"4_CR20","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1057\/dddmp.2014.7","volume":"15","author":"N Newman","year":"2014","unstructured":"Newman, N.: Apple ibeacon technology briefing. J. Direct, Data Digital Market. Pract. 15(3), 222\u2013225 (2014)","journal-title":"J. Direct, Data Digital Market. Pract."},{"issue":"3","key":"4_CR21","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s00779-010-0331-7","volume":"15","author":"D Riboni","year":"2011","unstructured":"Riboni, D., Bettini, C.: COSAR: hybrid reasoning for context-aware activity recognition. Pers. Ubiquitous Comput. 15(3), 271\u2013289 (2011)","journal-title":"Pers. Ubiquitous Comput."},{"issue":"3","key":"4_CR22","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.pmcj.2011.02.001","volume":"7","author":"D Riboni","year":"2011","unstructured":"Riboni, D., Bettini, C.: OWL 2 modeling and reasoning with complex human activities. Pervasive Mob. Comput. 7(3), 379\u2013395 (2011)","journal-title":"Pervasive Mob. Comput."},{"issue":"7","key":"4_CR23","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1007\/s00779-011-0448-3","volume":"16","author":"D Riboni","year":"2012","unstructured":"Riboni, D., Bettini, C.: Context provenance to enhance the dependability of ambient intelligence systems. Pers. Ubiquitous Comput. 16(7), 799\u2013818 (2012)","journal-title":"Pers. Ubiquitous Comput."},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Yu, Z., Nakamura, Y., Jang, S., Kajita, S., Mase, K.: Ontology-based semantic recommendation for context-aware e-learning. In: Proc. of Ubiquitous Intelligence and Computing (UIC), Lecture Notes in Computer Science, vol. 4611, pp. 898\u2013907. Springer (2007)","DOI":"10.1007\/978-3-540-73549-6_88"},{"issue":"4","key":"4_CR25","first-page":"585","volume":"20","author":"D Zhang","year":"2006","unstructured":"Zhang, D., Yu, Z., Wang, X., Ma, M.Y.: Supporting development of context-aware applications using semantic space toolkit. IJPRAI 20(4), 585\u2013608 (2006)","journal-title":"IJPRAI"}],"container-title":["CCF Transactions on Pervasive Computing and Interaction"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s42486-018-00004-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42486-018-00004-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42486-018-00004-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,15]],"date-time":"2020-01-15T19:23:40Z","timestamp":1579116220000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s42486-018-00004-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,16]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["4"],"URL":"https:\/\/doi.org\/10.1007\/s42486-018-00004-9","relation":{},"ISSN":["2524-521X","2524-5228"],"issn-type":[{"type":"print","value":"2524-521X"},{"type":"electronic","value":"2524-5228"}],"subject":[],"published":{"date-parts":[[2019,1,16]]},"assertion":[{"value":"25 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}