{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:27:09Z","timestamp":1761611229629,"version":"3.41.0"},"reference-count":58,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2008,8,1]],"date-time":"2008-08-01T00:00:00Z","timestamp":1217548800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002920","name":"Research Grants Council, University Grants Committee, Hong Kong","doi-asserted-by":"publisher","award":["HKUST 6187\/04E"],"award-info":[{"award-number":["HKUST 6187\/04E"]}],"id":[{"id":"10.13039\/501100002920","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2008,8]]},"abstract":"<jats:p>A major issue of activity recognition in sensor networks is automatically recognizing a user's high-level goals accurately from low-level sensor data. Traditionally, solutions to this problem involve the use of a location-based sensor model that predicts the physical locations of a user from the sensor data. This sensor model is often trained offline, incurring a large amount of calibration effort. In this article, we address the problem using a goal-based segmentation approach, in which we automatically segment the low-level user traces that are obtained cheaply by collecting the signal sequences as a user moves in wireless environments. From the traces we discover primitive signal segments that can be used for building a probabilistic activity model to recognize goals directly. A major advantage of our algorithm is that it can reduce a significant amount of human effort in calibrating the sensor data while still achieving comparable recognition accuracy. We present our theoretical framework for activity recognition, and demonstrate the effectiveness of our new approach using the data collected in an indoor wireless environment.<\/jats:p>","DOI":"10.1145\/1387663.1387665","type":"journal-article","created":{"date-parts":[[2008,9,4]],"date-time":"2008-09-04T12:51:35Z","timestamp":1220532695000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Activity recognition via user-trace segmentation"],"prefix":"10.1145","volume":"4","author":[{"given":"Jie","family":"Yin","sequence":"first","affiliation":[{"name":"CSIRO ICT Centre, NSW, Australia"}]},{"given":"Qiang","family":"Yang","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Kowloon, Hong Kong"}]},{"given":"Dou","family":"Shen","sequence":"additional","affiliation":[{"name":"Microsoft Adcenter Labs, Redmond, WA"}]},{"given":"Ze-Nian","family":"Li","sequence":"additional","affiliation":[{"name":"Simon Fraser University, Burnaby B.C., Canada"}]}],"member":"320","published-online":{"date-parts":[[2008,9,4]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008238218679"},{"key":"e_1_2_1_2_1","unstructured":"Anderson B. D. O. and Moore J. B. 1979. Optimal Filtering. Prentice-Hall Englewood Cliffs New Jersey. Anderson B. D. O. and Moore J. B. 1979. Optimal Filtering. Prentice-Hall Englewood Cliffs New Jersey."},{"key":"e_1_2_1_3_1","unstructured":"Bahl P. Balachandran A. and Padmanabhan V. 2000. Enhancements to the RADAR user location and tracking system. Tech. rep. MSR-TR-2000-12 Microsoft Research. Bahl P. Balachandran A. and Padmanabhan V. 2000. Enhancements to the RADAR user location and tracking system. Tech. rep. MSR-TR-2000-12 Microsoft Research."},{"volume-title":"Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). Tel-Aviv, Israel, 775--784","author":"Bahl P.","key":"e_1_2_1_4_1"},{"volume-title":"Proceedings of the 8th International Joint Conference on Artificial Intelligence (IJCAI)","author":"Blaylock N.","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/794189.794493"},{"volume-title":"Proceedings of the 19th National Conference on Artificial Intelligence (AAAI)","author":"Bui H.","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622810.1622824"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.34"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(93)90060-O"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956808"},{"volume-title":"Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI)","author":"Czielniak G.","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","article-title":"Maximum likelihood from incomplete data via EM algorithm","volume":"39","author":"Dempster A. P.","year":"1977","journal-title":"J. Royal Statis. Soc. Series B"},{"volume-title":"GPS: The global positioning system. Proc","year":"1999","author":"Enge P.","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007469218079"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1228524"},{"volume-title":"Adaptive Processing of Temporal Information","series-title":"Lecture Notes in Artificial Intelligence","author":"Ghahramani Z.","key":"e_1_2_1_17_1"},{"key":"e_1_2_1_18_1","unstructured":"Ghahramani Z. and Hinton G. E. 1998. Switching state-space models. Tech. Rep. 6 King's College Road Toronto M5S 3H5 Canada. Ghahramani Z. and Hinton G. E. 1998. Switching state-space models. Tech. Rep. 6 King's College Road Toronto M5S 3H5 Canada."},{"volume-title":"Proceedings of the 15th Annual Conference on Uncertainty in Artificial Intelligence (UAI)","author":"Goldman R.","key":"e_1_2_1_19_1"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023720.1023728"},{"volume-title":"Robotics Research: the 9th International Symposium. Springer-Verlag","author":"Han K.","key":"e_1_2_1_21_1"},{"volume-title":"Proceedings of the 1st International Conference on Data Mining (ICDM)","author":"Himberg J.","key":"e_1_2_1_22_1"},{"volume-title":"Proceedings of the 5th National Conference on Artificial Intelligence (AAAI)","author":"Kautz H.","key":"e_1_2_1_23_1"},{"volume-title":"Proceedings of the International Conference on Data Mining (ICDM)","author":"Keogh E. J.","key":"e_1_2_1_24_1"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570674"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/0885-2308(90)90022-X"},{"volume-title":"Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI)","author":"Lesh N.","key":"e_1_2_1_27_1"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/566570.566604"},{"volume-title":"Proceedings of the 19th National Conference in Artificial Intelligence (AAAI)","author":"Liao L.","key":"e_1_2_1_29_1"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888905000263"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127777.1127817"},{"key":"e_1_2_1_32_1","unstructured":"Minka T. 1998. Expectation-maximization as lower bound maximization. Tutorial. http:\/\/research.microsoft.com\/~minka\/papers\/em.html. Minka T. 1998. Expectation-maximization as lower bound maximization. Tutorial. http:\/\/research.microsoft.com\/~minka\/papers\/em.html."},{"volume-title":"Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications (PerCom)","author":"Muhlenbrock M.","key":"e_1_2_1_33_1"},{"key":"e_1_2_1_34_1","unstructured":"Murphy K. 1998. Learning switching Kalman filter models. Tech. rep. TR 98--10 Compaq Cambridge Research Lab. Murphy K. 1998. Learning switching Kalman filter models. Tech. rep. TR 98--10 Compaq Cambridge Research Lab."},{"key":"e_1_2_1_35_1","unstructured":"Murphy K. 2002. Dynamic Bayesian networks: Representation inference and learning. Ph.D. thesis University of California Berkeley. Murphy K. 2002. Dynamic Bayesian networks: Representation inference and learning. Ph.D. thesis University of California Berkeley."},{"volume-title":"Proceedings of International Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Nguyen N.","key":"e_1_2_1_36_1"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/844380.844732"},{"volume-title":"Proceedings of the 20th National Conference in Artificial Intelligence (AAAI)","author":"Oh S. M.","key":"e_1_2_1_38_1"},{"volume-title":"Proceedings of the 5th International Conference on Ubiquitous Computing (UbiComp)","author":"Patterson D.","key":"e_1_2_1_39_1"},{"volume-title":"Proceedings of the International Conference on Computer Vision and Pattern Recognition (CVPR). Hilton Head Island, SC, 788--795","author":"Pavlovi\u0107 V.","key":"e_1_2_1_40_1"},{"volume-title":"Proceedings of the 6th IEEE International Conference on Computer Vision (ICCV). Kerkyra","author":"Pavlovi\u0107 V.","key":"e_1_2_1_41_1"},{"volume-title":"Advances in Neural Information Processing Systems (NIPS).","author":"Pavlovi\u0107 V.","key":"e_1_2_1_42_1"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/1018430.1021255"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345917"},{"volume-title":"Proceedings of the 16th Conference on Uncertainty in Artificial Intelligence (UAI)","author":"Pynadath D. V.","key":"e_1_2_1_45_1"},{"key":"e_1_2_1_46_1","first-page":"3","article-title":"A probabilistic approach to WLAN user location estimation","volume":"9","author":"Roos T.","year":"2002","journal-title":"Int. J. Wireless Inform. Netw."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2002.1043849"},{"volume-title":"Proceedings of the 2nd International Conference on Pervasive Computing (Pervasive)","author":"Tapia E. M.","key":"e_1_2_1_48_1"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.1998.667408"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/128756.128759"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/11752967_12"},{"volume-title":"Proceedings of the 19th National Conference in Artificial Intelligence (AAAI)","author":"Yin J.","key":"e_1_2_1_52_1"},{"volume-title":"Proceedings of the 20th National Conference on Artificial Intelligence (AAAI)","author":"Yin J.","key":"e_1_2_1_53_1"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.7"},{"volume-title":"Proceedings of the 23rd IEEE Conference on Computer Communications and Networking (INFOCOM)","author":"Youssef M.","key":"e_1_2_1_55_1"},{"volume-title":"Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom)","author":"Youssef M.","key":"e_1_2_1_56_1"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007652502315"},{"key":"e_1_2_1_58_1","unstructured":"Zhu X. 2005. Semi-supervised learning literature survey. Tech. rep. 1530 Computer Sciences University of Wisconsin-Madison. Zhu X. 2005. Semi-supervised learning literature survey. Tech. rep. 1530 Computer Sciences University of Wisconsin-Madison."}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1387663.1387665","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1387663.1387665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:25Z","timestamp":1750258045000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1387663.1387665"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8]]},"references-count":58,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2008,8]]}},"alternative-id":["10.1145\/1387663.1387665"],"URL":"https:\/\/doi.org\/10.1145\/1387663.1387665","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2008,8]]},"assertion":[{"value":"2007-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2007-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-09-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}