{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T17:45:54Z","timestamp":1773683154716,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,11,13]],"date-time":"2016-11-13T00:00:00Z","timestamp":1478995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,11,13]]},"DOI":"10.1145\/2988272.2990291","type":"proceedings-article","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T19:39:50Z","timestamp":1478288390000},"page":"95-101","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards Future Situation-Awareness"],"prefix":"10.1145","author":[{"given":"Kai","family":"Yang","sequence":"first","affiliation":[{"name":"School of Electronics Engineering and Computer Science, Peking University, BeiJing, China"}]},{"given":"Jing","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Tunnel Engineering CO.,LTD, Shanghai, China"}]},{"given":"Lixia","family":"Bao","sequence":"additional","affiliation":[{"name":"Shanghai Urban Construction Design and Research Institute, Shanghai, China"}]},{"given":"Mei","family":"Ding","sequence":"additional","affiliation":[{"name":"Shanghai Urban Construction Design and Research Institute, Shanghai, China"}]},{"given":"Jiangtao","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering and Computer Science, Peking University, BeiJing, China"}]},{"given":"Yasha","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering and Computer Science, Peking University, BeiJing, China"}]}],"member":"320","published-online":{"date-parts":[[2016,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2011.01.004"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.2005594"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1771592.1771620"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.08.002"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409686"},{"key":"e_1_3_2_1_6_1","first-page":"73","volume-title":"Ubicomp'03: Proceedings of Proceedings of the 5th International Conference on Ubiquitous Computing","author":"Patterson L.","year":"2003","unstructured":"D.J. Patterson , L. Liao , D. Fox , H. Kautz, Inferring high-level behavior from low-level sensors , in: Ubicomp'03: Proceedings of Proceedings of the 5th International Conference on Ubiquitous Computing , Springer, Berlin, Heidelberg , 2003 ,pp. 73 -- 89 . D.J.Patterson, L.Liao, D.Fox, H.Kautz, Inferring high-level behavior from low-level sensors, in: Ubicomp'03: Proceedings of Proceedings of the 5th International Conference on Ubiquitous Computing, Springer, Berlin, Heidelberg, 2003,pp.73--89."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1811681.1811692"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1049\/cp:20070370"},{"key":"e_1_3_2_1_9_1","first-page":"843","volume-title":"ICACT'08: Proceedings of 10th International Conference on Advanced Communication Technology,Vol.1,2008","author":"Hasan H.A.","unstructured":"M.K. Hasan , H.A. Rubaiyeat , Y.-K. Lee , S. Lee , A reconfigurable HMM for activity recognition , in: ICACT'08: Proceedings of 10th International Conference on Advanced Communication Technology,Vol.1,2008 , pp. 843 -- 846 . M.K. Hasan, H.A. Rubaiyeat, Y.-K. Lee, S. Lee, A reconfigurable HMM for activity recognition, in: ICACT'08: Proceedings of 10th International Conference on Advanced Communication Technology,Vol.1,2008, pp.843--846."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409637"},{"key":"e_1_3_2_1_11_1","volume-title":"Mobile and Multimedia Networks & Workshops, 2009. WoWMoM 2009. IEEE International Symposium on a (pp. 1--6). IEEE.","author":"Roggen D.","year":"2009","unstructured":"Roggen , D. , Forster , K. , Calatroni , A. , Holleczek , T. , Fang , Y. , Troster , G. , ... & del R Millan , J. ( 2009 , June). OPPORTUNITY: Towards opportunistic activity and context recognition systems. In World of Wireless , Mobile and Multimedia Networks & Workshops, 2009. WoWMoM 2009. IEEE International Symposium on a (pp. 1--6). IEEE. Roggen, D., Forster, K., Calatroni, A., Holleczek, T., Fang, Y., Troster, G., ... & del R Millan, J. (2009, June). OPPORTUNITY: Towards opportunistic activity and context recognition systems. In World of Wireless, Mobile and Multimedia Networks & Workshops, 2009. WoWMoM 2009. IEEE International Symposium on a (pp. 1--6). IEEE."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/172831"},{"key":"e_1_3_2_1_13_1","volume-title":"2013 IEEE International Conference on Pervasive Computing and Communications (PERCOM","author":"Longqi Yang","year":"2013","unstructured":"Longqi Yang , Kevin Ting, Mani B. Srivastava . Inferring Occupancy from Opportunistically Available Sensor Data . 2013 IEEE International Conference on Pervasive Computing and Communications (PERCOM 2013 ). Longqi Yang, Kevin Ting, Mani B. Srivastava. Inferring Occupancy from Opportunistically Available Sensor Data. 2013 IEEE International Conference on Pervasive Computing and Communications (PERCOM 2013)."},{"key":"e_1_3_2_1_14_1","volume-title":"Pervasive Computing and Communications Workshops (PERCOM Workshops)","author":"Ghai S K","unstructured":"Ghai S K , Thanayankizil L V , Seetharam D P , Occupancy detection in commercial buildings using opportunistic context sources . Pervasive Computing and Communications Workshops (PERCOM Workshops) , 2012: 463--46 Ghai S K, Thanayankizil L V, Seetharam D P, et al. Occupancy detection in commercial buildings using opportunistic context sources. Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012: 463--46"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom.2014.82"},{"key":"e_1_3_2_1_16_1","volume-title":"Morgan Kaufmann","author":"Quinlan","year":"1993","unstructured":"J. R. Quinlan . C4.5 : Programs for Machine Learning . Morgan Kaufmann , San Mateo, CA , 1993 . J. R. Quinlan. C4.5: Programs for Machine Learning. Morgan Kaufmann, San Mateo, CA, 1993."},{"key":"e_1_3_2_1_17_1","first-page":"717","volume-title":"Proceedings of the Thirteenth National Conference on Artifical Intelligence","author":"Friedman R.","year":"1996","unstructured":"J. H. Friedman , R. Kohavi , and Y. Yun . Lazy decision trees. In Howard Shrobe and Ted Senator, editors , Proceedings of the Thirteenth National Conference on Artifical Intelligence , pages 717 -- 724 , Menlo Park, California , 1996 . J. H. Friedman, R. Kohavi, and Y. Yun. Lazy decision trees. In Howard Shrobe and Ted Senator, editors, Proceedings of the Thirteenth National Conference on Artifical Intelligence, pages 717--724, Menlo Park, California, 1996."},{"key":"e_1_3_2_1_18_1","article-title":"Handling missing values when applying classification models","volume":"7","author":"Saar-Tsechansky","year":"2007","unstructured":"Saar-Tsechansky , Maytal, and Foster Provost . \" Handling missing values when applying classification models .\" Journal of machine learning research8 . 7 ( 2007 ). Saar-Tsechansky, Maytal, and Foster Provost. \"Handling missing values when applying classification models.\" Journal of machine learning research8.7 (2007).","journal-title":"Journal of machine learning research8"},{"key":"e_1_3_2_1_19_1","volume-title":"A genetic algorithm for function optimization: a Matlab implementation. NCSU-IE TR, 95(09)","author":"Houck C. R.","year":"1995","unstructured":"Houck , C. R. , Joines , J. , & Kay , M. G. ( 1995 ). A genetic algorithm for function optimization: a Matlab implementation. NCSU-IE TR, 95(09) . Houck, C. R., Joines, J., & Kay, M. G. (1995). A genetic algorithm for function optimization: a Matlab implementation. NCSU-IE TR, 95(09)."},{"key":"e_1_3_2_1_20_1","volume-title":"Workshop \"Benchmarks and a database for context recognition\" in conjuction with the 2nd Int. Conf. on Pervasive Computing (PERVASIVE","author":"Jani M\u00e4ntyj\u00e4rvi","year":"2004","unstructured":"Jani M\u00e4ntyj\u00e4rvi , Johan Himberg, Petri Kangas , Urpo Tuomela, and Pertti Huuskonen . Sensor Signal Data Set for Exploring Context Recognition of Mobile Devices . In Workshop \"Benchmarks and a database for context recognition\" in conjuction with the 2nd Int. Conf. on Pervasive Computing (PERVASIVE 2004 ), April 18--23, Linz\/Vienna, Austria , 2004 Jani M\u00e4ntyj\u00e4rvi, Johan Himberg, Petri Kangas, Urpo Tuomela, and Pertti Huuskonen. Sensor Signal Data Set for Exploring Context Recognition of Mobile Devices. In Workshop \"Benchmarks and a database for context recognition\" in conjuction with the 2nd Int. Conf. on Pervasive Computing (PERVASIVE 2004), April 18--23, Linz\/Vienna, Austria, 2004"}],"event":{"name":"MSWiM '16: 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","location":"Malta Malta","acronym":"MSWiM '16","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"]},"container-title":["Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2988272.2990291","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2988272.2990291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:36Z","timestamp":1750218636000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2988272.2990291"}},"subtitle":["A Conceptual Middleware Framework for Opportunistic Situation Identification"],"short-title":[],"issued":{"date-parts":[[2016,11,13]]},"references-count":20,"alternative-id":["10.1145\/2988272.2990291","10.1145\/2988272"],"URL":"https:\/\/doi.org\/10.1145\/2988272.2990291","relation":{},"subject":[],"published":{"date-parts":[[2016,11,13]]},"assertion":[{"value":"2016-11-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}