{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:37Z","timestamp":1750307197643,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,1,14]],"date-time":"2010-01-14T00:00:00Z","timestamp":1263427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["MEST-2009-0083121"],"award-info":[{"award-number":["MEST-2009-0083121"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,1,14]]},"DOI":"10.1145\/2108616.2108702","type":"proceedings-article","created":{"date-parts":[[2012,1,24]],"date-time":"2012-01-24T16:47:19Z","timestamp":1327423639000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["ARHMAM"],"prefix":"10.1145","author":[{"given":"A. M. Jehad","family":"Sarkar","sequence":"first","affiliation":[{"name":"Kyung Hee University, Korea"}]},{"given":"Young-Koo","family":"Lee","sequence":"additional","affiliation":[{"name":"Kyung Hee University, Korea"}]},{"given":"Sungyoung","family":"Lee","sequence":"additional","affiliation":[{"name":"Kyung Hee University, Korea"}]}],"member":"320","published-online":{"date-parts":[[2010,1,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The essentials of google search (accessed: 2009 july 22). Available: http:\/\/www.google.com\/support\/bin\/static.py?page=searchguides.html&ctx=basics.  The essentials of google search (accessed: 2009 july 22). Available: http:\/\/www.google.com\/support\/bin\/static.py?page=searchguides.html&ctx=basics."},{"key":"e_1_3_2_1_2_1","unstructured":"Google search basics: More search help - web search help (accessed: 2009 july 22).Available: http:\/\/www.google.com\/support\/websearch\/bin\/answer.py?hl=en&answer=136861.  Google search basics: More search help - web search help (accessed: 2009 july 22).Available: http:\/\/www.google.com\/support\/websearch\/bin\/answer.py?hl=en&answer=136861."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.48"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74565-5_6"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"M. R.\n       \n      Hodges\n     and \n      \n      \n      M. E.\n       \n      Pollack\n      \n  \n  . \n  An 'object-use fingerprint': The use of electronic sensors for human identification. In J. Krumm G. D. Abowd A. Seneviratne and T. Strang editors Proc. Ubicomp volume \n  4717\n   of \n  Lecture Notes in Computer Science pages \n  289\n  --\n  303\n  . \n  Springer 2007\n  .   M. R. Hodges and M. E. Pollack. An 'object-use fingerprint': The use of electronic sensors for human identification. In J. Krumm G. D. Abowd A. Seneviratne and T. Strang editors Proc. Ubicomp volume 4717 of Lecture Notes in Computer Science pages 289--303. Springer 2007.","DOI":"10.1007\/978-3-540-74853-3_17"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409640"},{"key":"e_1_3_2_1_7_1","first-page":"1363","volume-title":"AAAI","author":"Hu D. H.","year":"2008"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11748625_22"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1093\/geront\/10.1_Part_1.20"},{"key":"e_1_3_2_1_10_1","first-page":"773","volume-title":"IJCAI","author":"Liao L.","year":"2005"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"D. J.\n       \n      Patterson L.\n       \n      Liao D.\n       \n      Fox and \n      \n      \n      H. A.\n       \n      Kautz\n      \n  \n  . \n  Inferring high-level behavior from low-level sensors. In A. K. Dey A. Schmidt and J. F. McCarthy editors Proc. Ubicomp volume \n  2864\n   of \n  Lecture Notes in Computer Science pages \n  73\n  --\n  89\n  . \n  Springer 2003\n  .  D. J. Patterson L. Liao D. Fox and H. A. Kautz. Inferring high-level behavior from low-level sensors. In A. K. Dey A. Schmidt and J. F. McCarthy editors Proc. Ubicomp volume 2864 of Lecture Notes in Computer Science pages 73--89. Springer 2003.","DOI":"10.1007\/978-3-540-39653-6_6"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988750"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"L. R. Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. pages 267--296 1990.   L. R. Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. pages 267--296 1990.","DOI":"10.1016\/B978-0-08-051584-7.50027-9"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"E. M.\n       \n      Tapia S. S.\n       \n      Intille and \n      \n      \n      K.\n       \n      Larson\n      \n  \n  . \n  Activity recognition in the home using simple and ubiquitous sensors. In A. Ferscha and F. Mattern editors Pervasive volume \n  3001\n   of \n  Lecture Notes in Computer Science pages \n  158\n  --\n  175\n  . \n  Springer 2004\n  .  E. M. Tapia S. S. Intille and K. Larson. Activity recognition in the home using simple and ubiquitous sensors. In A. Ferscha and F. Mattern editors Pervasive volume 3001 of Lecture Notes in Computer Science pages 158--175. Springer 2004.","DOI":"10.1007\/978-3-540-24646-6_10"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409637"},{"key":"e_1_3_2_1_16_1","first-page":"21","volume-title":"AAAI","author":"Wyatt D.","year":"2005"}],"event":{"name":"ICUIMC '10: The 4th International Conference on Ubiquitous Information Management and Communication","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGMOD ACM Special Interest Group on Management of Data"],"location":"Suwon Republic of Korea","acronym":"ICUIMC '10"},"container-title":["Proceedings of the 4th International Conference on Uniquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2108616.2108702","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2108616.2108702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:09Z","timestamp":1750241169000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2108616.2108702"}},"subtitle":["an activity recognition system based on hidden Markov minded activity model"],"short-title":[],"issued":{"date-parts":[[2010,1,14]]},"references-count":16,"alternative-id":["10.1145\/2108616.2108702","10.1145\/2108616"],"URL":"https:\/\/doi.org\/10.1145\/2108616.2108702","relation":{},"subject":[],"published":{"date-parts":[[2010,1,14]]},"assertion":[{"value":"2010-01-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}