{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T19:40:05Z","timestamp":1750621205071,"version":"3.41.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/wowmom.2017.7974316","type":"proceedings-article","created":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T20:47:46Z","timestamp":1499978866000},"page":"1-9","source":"Crossref","is-referenced-by-count":3,"title":["On the usage of smart devices to augment the user interaction with multimedia applications"],"prefix":"10.1109","author":[{"given":"Alan","family":"Ferrari","sequence":"first","affiliation":[]},{"given":"Vanni","family":"Galli","sequence":"additional","affiliation":[]},{"given":"Daniele","family":"Puccinelli","sequence":"additional","affiliation":[]},{"given":"Silvia","family":"Giordano","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1007\/978-3-540-39863-9_17","article-title":"Multi-sensor activity context detection for wearable computing","author":"kern","year":"2003","journal-title":"Ambient Intelligence"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1347390.1347395"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.11.016"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2505483.2505487"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2699343.2699350"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2745922"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1145\/2789168.2790121","article-title":"Mole: Motion leaks through smartwatch sensors","author":"wang","year":"2015","journal-title":"Proceedings of the 21st Annual International Conference on Mobile Computing and Networking"},{"key":"ref17","first-page":"311","article-title":"Gesture based soft authentication. Wireless and Mobile Computing, Networking and Communications (WiMob)","volume":"37","author":"ferrari","year":"2015","journal-title":"2015 IEEE 11th International Conference on"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1162\/089976600300015015"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2307\/2346830"},{"key":"ref4","article-title":"Using Barometric Pressure Data for Activity Recognition on Smartphones","author":"giordano","year":"2015","journal-title":"Under submission"},{"key":"ref27","first-page":"593","article-title":"Theory of the backpropagation neural network","author":"hecht-nielsen","year":"1989","journal-title":"Neural Networks 1989 IJCNN International Joint Conference on"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0239-x"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.1995.466880"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/RATFG.2001.938914"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"994","DOI":"10.1109\/CVPR.1997.609450","article-title":"Coupled hidden markov models for complex action recognition","author":"brand","year":"1997","journal-title":"Computer Vision and Pattern Recognition 1997 Proceedings 1997 IEEE Computer Society Conference on"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1964897.1964918"},{"key":"ref9","first-page":"1082","article-title":"Hierarchical recognition of intentional human gestures for sports video annotation","volume":"2","author":"chambers","year":"2002","journal-title":"Pattern Recognition 2002 Proceedings 16th International Conference on"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1007\/3-540-48157-5_29","article-title":"Towards a better understanding of context and context-awareness","author":"abowd","year":"1999","journal-title":"Handheld and Ubiquitous Computing"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1975.224297"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27835-1_10"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1561\/2200000006"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1162\/NECO_a_00052"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6248110"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.1994.409622"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2699343.2699349"}],"event":{"name":"2017 IEEE 18th International Symposium on \" World of Wireless, Mobile and Multimedia Networks (WoWMoM)","start":{"date-parts":[[2017,6,12]]},"location":"Macau, China","end":{"date-parts":[[2017,6,15]]}},"container-title":["2017 IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7965808\/7974270\/07974316.pdf?arnumber=7974316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T19:02:46Z","timestamp":1750618966000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7974316\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2017.7974316","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}