{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:16:27Z","timestamp":1756894587677,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,9,12]],"date-time":"2016-09-12T00:00:00Z","timestamp":1473638400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,12]]},"DOI":"10.1145\/2971648.2971716","type":"proceedings-article","created":{"date-parts":[[2016,9,9]],"date-time":"2016-09-09T14:28:57Z","timestamp":1473431337000},"page":"37-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A weakly supervised activity recognition framework for real-time synthetic biology laboratory assistance"],"prefix":"10.1145","author":[{"given":"Chandrashekhar","family":"Lavania","sequence":"first","affiliation":[{"name":"University Of Washington"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sunil","family":"Thulasidasan","sequence":"additional","affiliation":[{"name":"Los Alamos National Laboratory and University Of Washington"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anthony","family":"LaMarca","sequence":"additional","affiliation":[{"name":"Intel Labs"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jeffrey","family":"Scofield","sequence":"additional","affiliation":[{"name":"University Of Washington"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jeff","family":"Bilmes","sequence":"additional","affiliation":[{"name":"University Of Washington"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2016,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2015.7301270"},{"volume-title":"PCR protocols","author":"Bartlett John MS","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11744023_32"},{"volume-title":"Drug development: Raise standards for preclinical cancer research. Nature 483, 7391","year":"2012","author":"Glenn Begley C","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1038\/nrg1637"},{"key":"e_1_3_2_1_6_1","unstructured":"Jeff Bilmes. 2004. On virtual evidence and soft evidence in bayesian networks. (2004).  Jeff Bilmes. 2004. On virtual evidence and soft evidence in bayesian networks. (2004)."},{"key":"e_1_3_2_1_7_1","volume-title":"2002 IEEE International Conference on","volume":"4","author":"Bilmes Jeff","year":"2002"},{"volume-title":"Dynamic Graphical Models and the Graphical Models Toolkit (GMTK)","author":"Bilmes Jeff A.","key":"e_1_3_2_1_8_1"},{"volume-title":"Neural Networks: Tricks of the Trade","author":"Bottou L\u00e9on","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"H. Bourlard and N. Morgan. 1994. Connectionist Speech Recognition: A Hybrid Approach. Kluwer Academic Publishers.   H. Bourlard and N. Morgan. 1994. Connectionist Speech Recognition: A Hybrid Approach. Kluwer Academic Publishers.","DOI":"10.1007\/978-1-4615-3210-1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(93)90060-O"},{"volume-title":"Diffusion maps. Applied and computational harmonic analysis 21, 1","year":"2006","author":"Coifman Ronald R","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"e_1_3_2_1_14_1","series-title":"Series B (methodological)","volume-title":"Maximum likelihood from incomplete data via the EM algorithm. Journal of the royal statistical society","author":"Dempster Arthur P","year":"1977"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298878"},{"volume-title":"Proceedings of The 31st International Conference on Machine Learning. 647--655","year":"2014","author":"Donahue Jeff","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2021068"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.231"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature03508"},{"volume-title":"Construction of a genetic toggle switch in Escherichia coli. Nature 403, 6767","year":"2000","author":"Gardner Timothy S","key":"e_1_3_2_1_20_1"},{"volume-title":"Enzymatic assembly of DNA molecules up to several hundred kilobases. Nature methods 6, 5","year":"2009","author":"Gibson Daniel G","key":"e_1_3_2_1_21_1"},{"volume-title":"Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on. IEEE, 6645--6649","year":"2013","author":"Graves Alex","key":"e_1_3_2_1_22_1"},{"volume-title":"Synthetic biologists seek standards for nascent field. Nature 520, 7546","year":"2015","author":"Hayden Erika Check","key":"e_1_3_2_1_23_1"},{"volume-title":"Pervasive Computing","author":"Hile Harlan","key":"e_1_3_2_1_24_1"},{"volume-title":"Sorting out the FACS: a devil in the details. Cell reports 6, 5","year":"2014","author":"Hines William C","key":"e_1_3_2_1_25_1"},{"volume-title":"Modern Multivariate Statistical Techniques","author":"Izenman Alan Julian","key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-78189-1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.59"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654889"},{"volume-title":"Principal component analysis","author":"Jolliffe Ian","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/computers2020088"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1980.1102314"},{"key":"e_1_3_2_1_33_1","unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105.   Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105."},{"key":"e_1_3_2_1_34_1","first-page":"1704","article-title":"A sound and fast goal recognizer","volume":"95","author":"Lesh Neal","year":"1995","journal-title":"IJCAI"},{"key":"e_1_3_2_1_35_1","volume-title":"The proceedings of the seventh IEEE international conference on","volume":"2","author":"Lowe David G","year":"1999"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/826025.826390"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7299155"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4960722"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.2.5.66-76"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Judea Pearl. 1988. Probabilistic reasoning in intelligent systems: networks of plausible inference. Morgan Kaufmann.   Judea Pearl. 1988. Probabilistic reasoning in intelligent systems: networks of plausible inference. Morgan Kaufmann.","DOI":"10.1016\/B978-0-08-051489-5.50008-4"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.07.071"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2790044.2790055"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2807547"},{"volume-title":"Mining logic gates in prokaryotic transcriptional regulation networks. FEBS letters 582, 8","year":"2008","author":"Silva-Rocha Rafael","key":"e_1_3_2_1_44_1"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.244"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.290.5500.2319"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409637"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25167-2_9"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2010.10.002"}],"event":{"name":"UbiComp '16: The 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Heidelberg Germany","acronym":"UbiComp '16"},"container-title":["Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2971648.2971716","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2971648.2971716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:15Z","timestamp":1750218615000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2971648.2971716"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,12]]},"references-count":48,"alternative-id":["10.1145\/2971648.2971716","10.1145\/2971648"],"URL":"https:\/\/doi.org\/10.1145\/2971648.2971716","relation":{},"subject":[],"published":{"date-parts":[[2016,9,12]]},"assertion":[{"value":"2016-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}