{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T03:44:48Z","timestamp":1752983088232,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/percom.2018.8444590","type":"proceedings-article","created":{"date-parts":[[2018,8,23]],"date-time":"2018-08-23T22:07:15Z","timestamp":1535062035000},"page":"1-10","source":"Crossref","is-referenced-by-count":14,"title":["NECTAR: Knowledge-based Collaborative Active Learning for Activity Recognition"],"prefix":"10.1109","author":[{"given":"Gabriele","family":"Civitarese","sequence":"first","affiliation":[]},{"given":"Claudio","family":"Bettini","sequence":"additional","affiliation":[]},{"given":"Timo","family":"Sztyler","sequence":"additional","affiliation":[]},{"given":"Daniele","family":"Riboni","sequence":"additional","affiliation":[]},{"given":"Heiner","family":"Stuckenschmidt","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1016\/j.pmcj.2012.07.003"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/MC.2012.328"},{"key":"ref31","first-page":"25","article-title":"Tracking activities in complex settings using smart environment technologies","volume":"1","author":"singla","year":"2009","journal-title":"International Journal of BioSciences Psychiatry and Technology"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1007\/s10994-006-5833-1"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"5","DOI":"10.29012\/jpc.v1i1.566","article-title":"Secure multiparty computation for privacy-preserving data mining","volume":"1","author":"lindell","year":"2009","journal-title":"Journal of Privacy and Confidentiality"},{"key":"ref34","first-page":"546","article-title":"Security issues in cloud computing: The potentials of homomorphic encryption","volume":"2","author":"atayero","year":"2011","journal-title":"Journal of Emerging Trends in Computing and Information Sciences"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.pmcj.2011.02.001"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/2493432.2493501"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/988672.988750"},{"key":"ref13","first-page":"21","article-title":"Unsupervised activity recognition using automatically mined common sense","author":"wyatt","year":"2005","journal-title":"Proceedings AAAI"},{"key":"ref14","first-page":"17","article-title":"Building reliable activity models using hierarchical shrinkage and mined ontology","volume":"3968","author":"tapia","year":"2006","journal-title":"Proceedings of Pervasive ser LNCS"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/WETICE.2017.38"},{"key":"ref16","first-page":"1261","article-title":"Toward unsupervised activity discovery using multi-dimensional motif detection in time series","author":"vahdatpour","year":"2009","journal-title":"Proceedings of the 21st International Joint Conference on Artificial Intelligence (IJCAI)"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TKDE.2010.148"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.4108\/icst.pervasivehealth.2012.248600"},{"key":"ref19","first-page":"16:1","article-title":"Usmart: An unsupervised semantic mining activity recognition technique","volume":"4","author":"ye","year":"2014","journal-title":"ACM Transactions on Interactive Intelligent Systems (TiiS)"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/PERCOM.2016.7456502"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/INSS.2010.5573462"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1016\/j.pmcj.2016.08.017"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/2971648.2971691"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/PERCOMW.2004.1276898"},{"key":"ref29","first-page":"1","article-title":"Markov logic networks with numerical constraints","author":"chekol","year":"2016","journal-title":"22st European Conference on Artificial Intelligence (ECAI2016)"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1017\/S0269888905000263","article-title":"Representing and reasoning with situations for context-aware pervasive computing: A logic programming perspective","volume":"19","author":"loke","year":"2004","journal-title":"The Knowledge Engineering Review"},{"key":"ref8","first-page":"1962","article-title":"Transfer learning for activity recognition via sensor mapping","author":"hu","year":"2011","journal-title":"IJCAI 2011 Proceedings of the 22nd International Joint Conference on Artificial Intelligence"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1108\/17440080911006199"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/j.artmed.2015.12.001"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/s10115-013-0665-3"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/TSMC.2013.2252338"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ICMLC.2010.5581050"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/PERCOM.2017.7917864"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2971648.2971701"},{"key":"ref24","first-page":"1567","article-title":"Active-learning assisted self-reconfigurable activity recognition in a dynamic environment","author":"ho","year":"2009","journal-title":"Proceedings of the 2009 IEEE International Conference on Robotics and Automation"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/ISWC.2008.4911590"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/2441776.2441912"},{"key":"ref25","article-title":"Robust active learning using crowdsourced annotations for activity recognition","author":"zhao","year":"2011","journal-title":"Human Computation Papers from the 2011 AAAI Workshop (WS-11?11)"}],"event":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications (PerCom)","start":{"date-parts":[[2018,3,19]]},"location":"Athens","end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 IEEE International Conference on Pervasive Computing and Communications (PerCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8428394\/8444570\/08444590.pdf?arnumber=8444590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T13:39:09Z","timestamp":1643204349000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8444590\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/percom.2018.8444590","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}