{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:17:55Z","timestamp":1730225875409,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/hsi.2015.7170680","type":"proceedings-article","created":{"date-parts":[[2015,7,30]],"date-time":"2015-07-30T17:26:20Z","timestamp":1438277180000},"page":"278-284","source":"Crossref","is-referenced-by-count":2,"title":["How to support the design and development of interactive pervasive environments"],"prefix":"10.1109","author":[{"given":"Pedro Mauricio","family":"Costa","sequence":"first","affiliation":[]},{"given":"Teresa","family":"Galvao","sequence":"additional","affiliation":[]},{"given":"Joao","family":"Falcao e Cunha","sequence":"additional","affiliation":[]},{"given":"Jeremy","family":"Pitt","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2541831.2541843"},{"key":"ref38","first-page":"29","article-title":"Modeling Both the Context and the User","volume":"5","author":"jameson","year":"2001","journal-title":"Personal Technologies"},{"article-title":"Middleware for Advanced Service Configurationa Policy Based Approach","year":"2008","author":"verlaenen","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1921641.1921649"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2006.12.001"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2307849.2307860"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/047168659X"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/11426646_2","article-title":"Context modelling and management in ambient-aware pervasive environments","volume":"3479","author":"strimpakou","year":"2005","journal-title":"Location and Context Awareness"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011145532042"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2009.06.002"},{"key":"ref10","article-title":"User experience white paper","author":"roto","year":"2010","journal-title":"Tech Rep"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1013115.1013152"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518813"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1996461.1996485"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1142\/p790","author":"pitt","year":"2012","journal-title":"This Pervasive Day"},{"key":"ref15","first-page":"198","article-title":"A grand day out: empathic approaches to design","volume":"1","author":"malins","year":"2008","journal-title":"Proceedings of the Eng and Product Design Education Conf Design Society"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0160-7383(99)00108-5"},{"key":"ref17","article-title":"Experience design in ubiquitous computing","author":"hull","year":"2002","journal-title":"HP Laboratories Bristol"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1535\/itj.1101.08"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-27139-2_2"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1049\/ic:20030145"},{"journal-title":"Everyware The Dawning Age of Ubiquitous Computing","year":"2006","author":"greenfield","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2009.4983195"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1185214"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2003.1200718"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2307849.2307860"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1140.001.0001","author":"picard","year":"2000","journal-title":"Affective Computing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2002.993144"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/98.943998"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/jsan1030217"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0991-94"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2012.2225458"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5183469"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4870(02)00172-1"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1094562.1094569"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990087"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(92)90075-U"},{"key":"ref25","article-title":"Privacy by Design The 7 Foundational Principles","author":"cavoukian","year":"2011","journal-title":"Office of the Information and Privacy Commissioner"}],"event":{"name":"2015 8th International Conference on Human-System Interactions (HSI)","start":{"date-parts":[[2015,6,25]]},"location":"Warsaw","end":{"date-parts":[[2015,6,27]]}},"container-title":["2015 8th International Conference on Human System Interaction (HSI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7158233\/7170630\/07170680.pdf?arnumber=7170680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T18:27:05Z","timestamp":1599503225000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7170680\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/hsi.2015.7170680","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}