{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:05:39Z","timestamp":1760043939354,"version":"3.41.0"},"reference-count":28,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2009,7,1]],"date-time":"2009-07-01T00:00:00Z","timestamp":1246406400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGBED Rev."],"published-print":{"date-parts":[[2009,7]]},"abstract":"<jats:p>Assistive Cyberphysical Systems (ACPS) are pervasive and ubiquitous systems connecting the cyber with the physical worlds, with the aim to assist a human's daily activities both at home and at work. We present an event driven framework with event identification mechanisms that drive actuators, transform a substrate and alter human behavior in a feedback loop process that allows a human to control her ACPS. This framework is a dynamic, context aware, adaptive, self-repairing and high-confidence system that couples computational power with physical substrate (testbed) control and command; it monitors human activities with differential privacy and security capabilities, recognizes events, human needs from lifestyle, and processes environmental and longitudinal health data.<\/jats:p>","DOI":"10.1145\/1859823.1859826","type":"journal-article","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T11:55:58Z","timestamp":1285156558000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["An event driven framework for assistive CPS environments"],"prefix":"10.1145","volume":"6","author":[{"given":"Fillia","family":"Makedon","sequence":"first","affiliation":[{"name":"University of Texas at Arlington"}]},{"given":"Zhengyi","family":"Le","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington"}]},{"given":"Heng","family":"Huang","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington"}]},{"given":"Eric","family":"Becker","sequence":"additional","affiliation":[]},{"given":"Dimitrios","family":"Kosmopoulos","sequence":"additional","affiliation":[{"name":"The Institute of Informatics and Telecommunications, the NCSR Demokritos, Greece"}]}],"member":"320","published-online":{"date-parts":[[2009,7]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1579114.1579144"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1579114.1579118"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1579114.1579121"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1579114.1579131"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1579114.1579150"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1579114.1579163"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1579114.1579120"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1579114.1579122"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1389586.1389616"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1389586.1389602"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1389586.1389601"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1389586.1389635"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1389586.1389633"},{"key":"e_1_2_1_14_1","first-page":"34","volume-title":"Proceedings of the 1996 IEEE Symposium on Security and Privacy","author":"Anderson R.","unstructured":"}} R. Anderson , \" A Security Policy Model for Clinical Information Systems ,\" Proceedings of the 1996 IEEE Symposium on Security and Privacy , pp. 34 .48, May 1996. }}R. Anderson, \"A Security Policy Model for Clinical Information Systems,\" Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 34.48, May 1996."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278940.1278948"},{"key":"e_1_2_1_16_1","volume-title":"New York","author":"Durbin J.","year":"2001","unstructured":"}} J. Durbin and S. J. Koopman , \" Time Series Analysis by State Space Methods,\" Oxford University Press Inc , New York 2001 . }}J. Durbin and S. J. Koopman, \"Time Series Analysis by State Space Methods,\" Oxford University Press Inc, New York 2001."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.33"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87785-1_5"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICESS.Symposia.2008.84"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.67"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2008.85"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1366283.1366303"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.21"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1785001.1785013"},{"key":"e_1_2_1_26_1","first-page":"1","volume-title":"Robust Tensor Factorization Using R1 Norm,\" IEEE Conference on Computer Vision and Pattern Recognition (CVPR","author":"Huang H.","year":"2008","unstructured":"}} H. Huang and C. Ding , \" Robust Tensor Factorization Using R1 Norm,\" IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2008 ), pp. 1 -- 8 , 2008. }}H. Huang and C. Ding, \"Robust Tensor Factorization Using R1 Norm,\" IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2008), pp. 1--8, 2008."},{"key":"e_1_2_1_27_1","first-page":"1","volume-title":"Tensor Reduction Error Analysis --- Applications to Video Compression and Classification,\" IEEE Conference on Computer Vision and Pattern Recognition (CVPR","author":"Ding C.","year":"2008","unstructured":"}} C. Ding , H. Huang , and D. Luo , \" Tensor Reduction Error Analysis --- Applications to Video Compression and Classification,\" IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2008 ), pp. 1 -- 8 , 2008. }}C. Ding, H. Huang, and D. Luo, \"Tensor Reduction Error Analysis --- Applications to Video Compression and Classification,\" IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2008), pp. 1--8, 2008."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401933"}],"container-title":["ACM SIGBED Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1859823.1859826","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1859823.1859826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:32Z","timestamp":1750248512000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1859823.1859826"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,7]]}},"alternative-id":["10.1145\/1859823.1859826"],"URL":"https:\/\/doi.org\/10.1145\/1859823.1859826","relation":{},"ISSN":["1551-3688"],"issn-type":[{"type":"electronic","value":"1551-3688"}],"subject":[],"published":{"date-parts":[[2009,7]]},"assertion":[{"value":"2009-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}