{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:04:36Z","timestamp":1754157876765,"version":"3.41.2"},"reference-count":40,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2012,8,31]],"date-time":"2012-08-31T00:00:00Z","timestamp":1346371200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8,31]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to provide a view on situation, activity and goal awareness (SAGAware) in ubiquitous computing. It discusses these concepts, articulates their roles in scalability and prevalence of pervasive applications, and speculates the future development.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The paper is a visionary essay that introduces the background, elaborates the basic concepts and presents the authors' views and insights into SAGAware research in pervasive computing based on the latest state of the art of the development of pervasive computing and its applications.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>SAGAware is closely related to the levels of automation and large\u2010scale uptake of pervasive applications. It is an interdisciplinary research area requiring collaboration and cooperation of multiple research communities.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The paper highlights the importance of the SAGAware research and further points out research trends and future research directions.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The paper helps stimulate research interests and draw attention of relevant researchers to this promising research area.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper pioneers the investigation of an increasingly important research theme, and presents an in\u2010depth view to its potentials and research trends.<\/jats:p><\/jats:sec>","DOI":"10.1108\/17427371211262626","type":"journal-article","created":{"date-parts":[[2012,8,22]],"date-time":"2012-08-22T17:46:46Z","timestamp":1345657606000},"page":"216-224","source":"Crossref","is-referenced-by-count":4,"title":["Situation, activity and goal awareness in ubiquitous computing"],"prefix":"10.1108","volume":"8","author":[{"given":"Liming","family":"Chen","sequence":"first","affiliation":[]},{"given":"Parisa","family":"Rashidi","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020620273080100_b1","unstructured":"AAAI (2011), The AAAI Conference on Artificial Intelligence, available at: www.aaai.org\/."},{"key":"key2022020620273080100_b2","unstructured":"ACRP\u2010TL (2011), Activity Context Representation: Techniques and Languages, AAAI 2011, available at: http:\/\/activitycontext.org\/."},{"key":"key2022020620273080100_b3","doi-asserted-by":"crossref","unstructured":"Bao, L. and Intille, S. (2004), \u201cActivity recognition from user\u2010annotated acceleration data\u201d, Proc. Pervasive, LNCS3001, pp. 1\u201017.","DOI":"10.1007\/978-3-540-24646-6_1"},{"key":"key2022020620273080100_b4","doi-asserted-by":"crossref","unstructured":"Bettini, C., Brdiczka, O., Henricksen, K., Indulska, J., Nicklas, D., Ranganathan, A. and Riboni, D. (2010), \u201cA survey of context modelling and reasoning techniques\u201d, Pervasive and Mobile Computing, Vol. 6, pp. 161\u201080.","DOI":"10.1016\/j.pmcj.2009.06.002"},{"key":"key2022020620273080100_b5","doi-asserted-by":"crossref","unstructured":"Brdiczka, O. and Crowley, J.L. (2009), \u201cLearning situation models in a smart home\u201d, IEEE : Transactions on Systems, Man and Cybernetics \u2013 Part B: Cybernetics, Vol. 39 No. 1, pp. 56\u201063.","DOI":"10.1109\/TSMCB.2008.923526"},{"key":"key2022020620273080100_b7","doi-asserted-by":"crossref","unstructured":"Chen, L., Nugent, C.D. and Wang, H. (2012), \u201cA knowledge \u2013 driven approach to activity recognition in smart homes\u201d, IEEE Transactions on Knowledge and Data Engineering, Vol. 24 No. 6, pp. 961\u201074.","DOI":"10.1109\/TKDE.2011.51"},{"key":"key2022020620273080100_b6","unstructured":"Chen, L., Nugent, C.D., Mulvenna, M., Finlay, D. and Hong, X. (2008), \u201cA logical framework for behaviour reasoning and assistance in a smart home\u201d, International Journal of Assistive Robotics and Mechatronics, Vol. 9 No. 4, pp. 20\u201034."},{"key":"key2022020620273080100_b8","unstructured":"CVPR (2011), Computer Vision and Pattern Recognition, available at: www.cvpr201x.org\/."},{"key":"key2022020620273080100_b9","doi-asserted-by":"crossref","unstructured":"Dey, A.K. (2001), \u201cUnderstanding and using context\u201d, Personal and Ubiquitous Computing Journal, Vol. 5 No. 1, pp. 4\u20107.","DOI":"10.1007\/s007790170019"},{"key":"key2022020620273080100_b10","doi-asserted-by":"crossref","unstructured":"Endsley, M.R. (1995), \u201cToward a theory of situation awareness in dynamic systems\u201d, Human Factors, Vol. 37, pp. 32\u201064.","DOI":"10.1518\/001872095779049543"},{"key":"key2022020620273080100_b11","unstructured":"GAPRec (2011), GAPRec, Goal, Activity and Plan Recognition, GAPRec, ICAPS2011, available at: http:\/\/icaps11.icaps\u2010conference.org\/workshops\/gaprec.html."},{"key":"key2022020620273080100_b12","unstructured":"HAR (2011), Workshop on robust machine learning techniques for human activity recognition, IEEE conf on Systems, Man and Cybernetics 2011, available at: www.opportunity\u2010project.eu\/workshopSMC."},{"key":"key2022020620273080100_b13","unstructured":"HAU3D (2011), International Workshop on Human Activity Understanding from 3D Data, CVPR 2011, available at: http:\/\/ictr.uow.edu.au\/hau3d11\/index.html."},{"key":"key2022020620273080100_b14","unstructured":"H\u00e4ussermann, K., Zweigle, O., Levi, P., Wieland, M., Leymann, F., Siemoneit, O. and Hubig, C. (2010), \u201cUnderstanding and designing situation\u2010aware mobile and ubiquitous computing systems\u201d, World Academy of Science, Engineering and Technology, Vol. 14 No. 1, pp. 329\u201039."},{"key":"key2022020620273080100_b15","unstructured":"HBU (2011), Workshop on Human Behavior Understanding: Inducing Behavioral Change, Ami2011, available at: http:\/\/staff.science.uva.nl\/\u223casalah\/hbu2011\/."},{"key":"key2022020620273080100_b16","unstructured":"Hoey, J. and Poupart, P. (2005), \u201cSolving POMDPs with continuous or large discrete observation spaces\u201d, Proc. Int'l. Joint Conf. on Artificial Intelligence, pp. 1332\u20108."},{"key":"key2022020620273080100_b17","unstructured":"ICAPS (2011), International Conference on Automated Planning and Scheduling, available at: http:\/\/icaps11.icaps\u2010conference.org\/."},{"key":"key2022020620273080100_b18","unstructured":"IJAMI (2011), International Joint Conference on Ambient Intelligence, available at: www.ami\u201011.org\/."},{"key":"key2022020620273080100_b19","unstructured":"IJCAI (2011), International Joint Conference on Artificial Intelligence, available at: http:\/\/ijcai.org\/."},{"key":"key2022020620273080100_b20","unstructured":"ISWC (n.d.), International Symposium on Wearable Computers, available at: www.iswc.net\/."},{"key":"key2022020620273080100_b21","unstructured":"IWFAR (2011), International Workshop on Frontiers in Activity Recognition using Pervasive Sensing, Pervasive2011, available at: http:\/\/di.ncl.ac.uk\/iwfar\/."},{"key":"key2022020620273080100_b22","doi-asserted-by":"crossref","unstructured":"Kowalski, R.A. and Sergot, M.J. (1986), \u201cA logic\u2010based calculus of events\u201d, New Generation Computing, Vol. 4, pp. 67\u201095.","DOI":"10.1007\/BF03037383"},{"key":"key2022020620273080100_b23","doi-asserted-by":"crossref","unstructured":"Lee, S.W. and Mase, K. (2002), \u201cActivity and location recognition using wearable sensors\u201d, IEEE Pervasive Computing, Vol. 1 No. 3, pp. 24\u201032.","DOI":"10.1109\/MPRV.2002.1037719"},{"key":"key2022020620273080100_b24","unstructured":"Levesque, H., Pirri, F. and Reiter, R. (1998), \u201cFoundations for the situation calculus\u201d, Electronic Transactions on Artificial Intelligence, Vol. 2 Nos 3\/4, pp. 159\u201078."},{"key":"key2022020620273080100_b25","unstructured":"Lin, M. and Easterbrook, S. (2007), \u201cValuating user\u2010centric adaptation with goal models\u201d, First International Workshop on Software Engineering for Pervasive Computing Applications, Systems, and Environments (SEPCASE'07), pp. 6\u201013."},{"key":"key2022020620273080100_b26","doi-asserted-by":"crossref","unstructured":"Moeslund, T.B., Hilton, A. and Kr\u00fcger, V. (2006), \u201cA survey of advances in vision\u2010based human motion capture and analysis\u201d, Comput. Vis. Image Understand., Vol. 104 No. 2, pp. 90\u2010126.","DOI":"10.1016\/j.cviu.2006.08.002"},{"key":"key2022020620273080100_b27","unstructured":"NIPS (2012), The Neural Information Processing Systems, available at: http:\/\/nips.cc\/."},{"key":"key2022020620273080100_b28","unstructured":"PAIR (2011), Workshop on Plan, Activity and Intent Recognition (PAIR), AAAI 2011, available at: http:\/\/people.ict.usc.edu\/\u223cpynadath\/PAIR\u20102011\/."},{"key":"key2022020620273080100_b29","doi-asserted-by":"crossref","unstructured":"Parkka, J., Ermes, M., Korpipaa, P., Mantyjarvi, J., Peltola, J. and Korhonen, I. (2006), \u201cActivity classification using realistic data from wearable sensors\u201d, IEEE Transactions on Information Technology in Biomedicine, Vol. 10 No. 1, pp. 119\u201028.","DOI":"10.1109\/TITB.2005.856863"},{"key":"key2022020620273080100_b30","unstructured":"PerCom (n.d.), IEEE International Conference on Pervasive Computing and Communications, available at: www.percom.org\/."},{"key":"key2022020620273080100_b31","unstructured":"Pervasive (2012), Conference on Pervasive Computing, available at: http:\/\/pervasiveconference.org\/."},{"key":"key2022020620273080100_b32","doi-asserted-by":"crossref","unstructured":"Philipose, M., Fishkin, K.P., Perkowitz, M., Patterson, D.J., Fox, D., Kautz, H. and Hahnel, D. (2004), \u201cInferring activities from interactions with objects\u201d, IEEE Pervasive Computing, Vol. 3 No. 4, pp. 50\u20107.","DOI":"10.1109\/MPRV.2004.7"},{"key":"key2022020620273080100_b33","doi-asserted-by":"crossref","unstructured":"Rashidi, P., Cook, D.J., Holder, L.B. and Schmitter\u2010Edgecombe, M. (2011), \u201cDiscovering activities to recognize and track in a smart environment\u201d, IEEE Trans. on Knowl. and Data Eng., Vol. 23 No. 4, pp. 527\u201039.","DOI":"10.1109\/TKDE.2010.148"},{"key":"key2022020620273080100_b34","unstructured":"SAGAware (2011), International Workshop on Situation, Activity and Goal Awareness, available at: http:\/\/scm.ulster.ac.uk\/\u223clchen\/SAGAware2011\/."},{"key":"key2022020620273080100_b35","doi-asserted-by":"crossref","unstructured":"Saha, D. and Mukherjee, A. (2003), \u201cPervasive computing: a paradigm for the 21st century\u201d, Computer, Vol. 36 No. 3, pp. 25\u201031.","DOI":"10.1109\/MC.2003.1185214"},{"key":"key2022020620273080100_b36","doi-asserted-by":"crossref","unstructured":"Sanchez, D. and Tentori, M. (2008), \u201cActivity recognition for the smart hospital\u201d, IEEE Intelligent Systems, Vol. 23 No. 2, pp. 50\u20107.","DOI":"10.1109\/MIS.2008.18"},{"key":"key2022020620273080100_b37","doi-asserted-by":"crossref","unstructured":"Smart, P.R., Bahrami, A., Braines, D., McRae\u2010Spencer, D., Yuan, J. and Shadbolt, N.R. (2007), \u201cSemantic technologies and enhanced situation awareness\u201d, paper presented at 1st Annual Conference of the International Technology Alliance (ACITA), Maryland, USA.","DOI":"10.1109\/MILCOM.2007.4454827"},{"key":"key2022020620273080100_b38","doi-asserted-by":"crossref","unstructured":"Turaga, P., Chellappa, R., Subrahmanian, V.S. and Udrea, O. (2008), \u201cMachine recognition of human activities: a survey\u201d, IEEE Transaction on Circuits and Systems for Vedio Technology, Vol. 18 No. 11, pp. 1473\u201088.","DOI":"10.1109\/TCSVT.2008.2005594"},{"key":"key2022020620273080100_b39","unstructured":"UbiComp (2012), Conference on Ubiquitous Computing, available at: http:\/\/ubicomp.org\/."},{"key":"key2022020620273080100_b40","doi-asserted-by":"crossref","unstructured":"Weiser, M. (2002), \u201cThe computer for the 21st century\u201d, Pervasive Computing, Vol. 1 No. 1, pp. 19\u201025 (reprint).","DOI":"10.1109\/MPRV.2002.993141"}],"container-title":["International Journal of Pervasive Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/17427371211262626\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/17427371211262626\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:24:23Z","timestamp":1753403063000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ijpcc\/article\/8\/3\/216-224\/161388"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,31]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,8,31]]}},"alternative-id":["10.1108\/17427371211262626"],"URL":"https:\/\/doi.org\/10.1108\/17427371211262626","relation":{},"ISSN":["1742-7371"],"issn-type":[{"type":"print","value":"1742-7371"}],"subject":[],"published":{"date-parts":[[2012,8,31]]}}}