{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T15:21:03Z","timestamp":1767626463554,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,14]],"date-time":"2015-04-14T00:00:00Z","timestamp":1428969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000774","name":"Defense Threat Reduction Agency","doi-asserted-by":"publisher","award":["HDTRA1-1010120"],"award-info":[{"award-number":["HDTRA1-1010120"]}],"id":[{"id":"10.13039\/100000774","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 13-29886"],"award-info":[{"award-number":["CNS 13-29886"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,14]]},"DOI":"10.1145\/2735960.2735965","type":"proceedings-article","created":{"date-parts":[[2015,5,5]],"date-time":"2015-05-05T12:41:01Z","timestamp":1430829661000},"page":"60-69","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Exploiting structured human interactions to enhance estimation accuracy in cyber-physical systems"],"prefix":"10.1145","author":[{"given":"Yunlong","family":"Gao","sequence":"first","affiliation":[{"name":"University of Illinois, Urbana-Champaign"}]},{"given":"Shaohan","family":"Hu","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana-Champaign"}]},{"given":"Renato","family":"Mancuso","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana-Champaign"}]},{"given":"Hongwei","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana-Champaign"}]},{"given":"Minje","family":"Kim","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana-Champaign"}]},{"given":"PoLiang","family":"Wu","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana-Champaign"}]},{"given":"Lu","family":"Su","sequence":"additional","affiliation":[{"name":"State University of New York, Buffalo"}]},{"given":"Lui","family":"Sha","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana-Champaign"}]},{"given":"Tarek","family":"Abdelzaher","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana-Champaign"}]}],"member":"320","published-online":{"date-parts":[[2015,4,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Carle foundation hospital. http:\/\/http:\/\/www.carle.org\/.  Carle foundation hospital. http:\/\/http:\/\/www.carle.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"ACLS. Cardiac arrest algorithm. http:\/\/goo.gl\/RRy8PG.  ACLS. Cardiac arrest algorithm. http:\/\/goo.gl\/RRy8PG."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1097\/ALN.0b013e318201c44f"},{"key":"e_1_3_2_1_4_1","unstructured":"Google Speech API. http:\/\/goo.gl\/64VHz5.  Google Speech API. http:\/\/goo.gl\/64VHz5."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.01.027"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6393(00)00034-0"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2008.916056"},{"key":"e_1_3_2_1_8_1","unstructured":"Algorithms for Advanced Cardiac Life Support 2014. https:\/\/www.acls.net\/aclsalg.html\/.  Algorithms for Advanced Cardiac Life Support 2014. https:\/\/www.acls.net\/aclsalg.html\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1561\/2000000004"},{"key":"e_1_3_2_1_10_1","unstructured":"InterGraph. Plant operations. http:\/\/goo.gl\/poev4p.  InterGraph. Plant operations. http:\/\/goo.gl\/poev4p."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.2307\/1268779"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45238-6_3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04772-5_95"},{"key":"e_1_3_2_1_14_1","unstructured":"Linux. espeak. http:\/\/espeak.sourceforge.net\/.  Linux. espeak. http:\/\/espeak.sourceforge.net\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6393(97)00021-6"},{"key":"e_1_3_2_1_16_1","unstructured":"Jos\u013a\u0119 Lopes Maxine Eskenazi and Isabel Trancoso. Incorporating asr information in spoken dialog system confidence score.  Jos\u013a\u0119 Lopes Maxine Eskenazi and Isabel Trancoso. Incorporating asr information in spoken dialog system confidence score."},{"key":"e_1_3_2_1_17_1","unstructured":"Dragon Medical. http:\/\/goo.gl\/st0rrW.  Dragon Medical. http:\/\/goo.gl\/st0rrW."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/375360.375365"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1161\/CIRCULATIONAHA.110.971002"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"e_1_3_2_1_21_1","unstructured":"Er I. Rudnicky. Predicting tasks in goal-oriented spoken dialog systems using semantic knowledge bases.  Er I. Rudnicky. Predicting tasks in goal-oriented spoken dialog systems using semantic knowledge bases."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 6th International ISCRAM Conference","volume":"41","author":"Sell Christian","year":"2009","unstructured":"Christian Sell and Iris Braun . Using a workflow management system to manage emergency plans . In Proceedings of the 6th International ISCRAM Conference , volume 41 . Citeseer , 2009 . Christian Sell and Iris Braun. Using a workflow management system to manage emergency plans. In Proceedings of the 6th International ISCRAM Conference, volume 41. Citeseer, 2009."},{"key":"e_1_3_2_1_23_1","unstructured":"SpeechMagic. http:\/\/goo.gl\/d9a5E6.  SpeechMagic. http:\/\/goo.gl\/d9a5E6."},{"key":"e_1_3_2_1_24_1","unstructured":"Stanley. healthcare workflow. http:\/\/goo.gl\/8te7Qo.  Stanley. healthcare workflow. http:\/\/goo.gl\/8te7Qo."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070942.2070948"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2012.83"},{"key":"e_1_3_2_1_27_1","unstructured":"uwhealth.org. Acls algorithm. http:\/\/goo.gl\/r6plc0.  uwhealth.org. Acls algorithm. http:\/\/goo.gl\/r6plc0."},{"key":"e_1_3_2_1_28_1","series-title":"Hidden Markov Models for Individual Time Series","volume-title":"van der Maas","author":"Visser Ingmar","year":"2009","unstructured":"Ingmar Visser , Maartje E. J. Raijmakers , and Han L. J . van der Maas . Hidden Markov Models for Individual Time Series . Springer US , 2009 . Ingmar Visser, Maartje E. J. Raijmakers, and Han L. J. van der Maas. Hidden Markov Models for Individual Time Series. Springer US, 2009."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIP.2013.6568164"},{"key":"e_1_3_2_1_30_1","first-page":"539","volume-title":"Hmms and related speech recognition technologies","author":"Young Steve","year":"2008","unstructured":"Steve Young . Hmms and related speech recognition technologies . In Springer Handbook of Speech Processing, pages 539 -- 558 . Springer , 2008 . Steve Young. Hmms and related speech recognition technologies. In Springer Handbook of Speech Processing, pages 539--558. Springer, 2008."}],"event":{"name":"ICCPS '15: ACM\/IEEE 6th International Conference on Cyber-Physical Systems","sponsor":["IEEE","IEEE-CSS Control Systems Society","IEEE-CS\\TCRT TC on Real-Time Systems","IEEE Signal Processing Society","ACM Association for Computing Machinery","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Seattle Washington","acronym":"ICCPS '15"},"container-title":["Proceedings of the ACM\/IEEE Sixth International Conference on Cyber-Physical Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2735960.2735965","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2735960.2735965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:36Z","timestamp":1750227396000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2735960.2735965"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,14]]},"references-count":30,"alternative-id":["10.1145\/2735960.2735965","10.1145\/2735960"],"URL":"https:\/\/doi.org\/10.1145\/2735960.2735965","relation":{},"subject":[],"published":{"date-parts":[[2015,4,14]]},"assertion":[{"value":"2015-04-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}