Context is key, Communications of the ACM, vol.48, issue.3, pp.49-53, 2005. ,
DOI : 10.1145/1047671.1047703
The Internet of Things: A survey, Computer Networks, vol.54, issue.15, pp.2787-2805, 2010. ,
DOI : 10.1016/j.comnet.2010.05.010
La problématique scientifique du traitement de l'information ,
Theories of uncertainty, " in Handbook of Fuzzy Computation, I. Press, 1998. ,
Evidential fusion of sensor data for activity recognition in smart homes, Health and Wellness Management, pp.236-252, 2009. ,
DOI : 10.1016/j.pmcj.2008.05.002
Activity Recognition for Smart Homes Using Dempster-Shafer Theory of Evidence Based on a Revised Lattice Structure, 2010 Sixth International Conference on Intelligent Environments, pp.46-51, 2010. ,
DOI : 10.1109/IE.2010.16
Using Dempster-Shafer Theory of Evidence for Situation Inference, Lecture Notes in Computer Science, vol.8, issue.2, pp.149-162, 2009. ,
DOI : 10.1016/S0019-9958(65)90241-X
Activity recognition using temporal evidence theory, J. Ambient Intell. Smart Environ, vol.2, pp.253-269, 2010. ,
Context management and reasoning about situations in pervasive computing, 2006. ,
Partial observability and probabilistic plan/goal recognition, Proceeding of the IJCAI workshop on Modeling Others from Observations (MOO), 2005. ,
Localisation d'habitant dans un environnement perceptif non visuel par propagation d'activation multisource, MAJECSTIC, pp.13-15, 2010. ,
Fault Detection by Combining Redundant Sensors: a Conflict Approach Within the TBM Framework, COGIS 2007, 2007. ,
A survey of context modelling and reasoning techniques, Pervasive and Mobile Computing, vol.6, issue.2, pp.161-180, 2010. ,
DOI : 10.1016/j.pmcj.2009.06.002
Techniques for plan recognition, User Modeling and User-Adapted Interaction, vol.11, issue.1/2, pp.31-48, 2001. ,
DOI : 10.1023/A:1011118925938
A New Model of Plan Recognition, Artificial Intelligence, vol.64, pp.53-79, 1999. ,
Assistive planning for people with cognitive impairments, Proc. of Workshop on Intelligent Systems for Assisted Cognition hosted by Int'l Joint Conference on Artificial Intelligence (IJCAI), 2009. ,
Hierarchical Task Network Planning, pp.229-261, 2004. ,
DOI : 10.1016/B978-155860856-6/50017-X
Plan recognition in intrusion detection systems, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, p.46, 2001. ,
DOI : 10.1109/DISCEX.2001.932191
A probabilistic plan recognition algorithm based on plan tree grammars A unifying model for representing and reasoning about context under uncertainty, Proceedings of the 11th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems (IPMU), pp.1101-1132, 2006. ,
Verification of uncertain context based on a theory of context spaces, International Journal of Pervasive Computing and Communications, vol.3, issue.1, pp.30-56, 2007. ,
DOI : 10.1108/17427370710841918
Extending Context Spaces Theory by Predicting Run-Time Context, NEW2AN '09 and ruSMART '09: Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces, pp.8-21, 2009. ,
DOI : 10.1007/978-3-642-04190-7_2
Extending Context Spaces Theory by Proactive Adaptation, Lecture Notes in Computer Science, vol.6294, pp.1-12, 2010. ,
DOI : 10.1007/978-3-642-14891-0_1
Belief inference with timed evidence, " in Belief Functions: Theory and Applications, ser. Advances in Intelligent and Soft Computing, pp.409-416 ,
Upper and Lower Probabilities Induced by a Multivalued Mapping, The Annals of Mathematical Statistics, vol.38, issue.2, pp.325-339, 1967. ,
DOI : 10.1214/aoms/1177698950
A Mathematical Theory of Evidence, 1976. ,
Belief function combination and conflict management, Information Fusion, vol.3, issue.2, pp.149-162, 2002. ,
DOI : 10.1016/S1566-2535(02)00053-2
Analyzing the combination of conflicting belief functions, Information Fusion, vol.8, issue.4, pp.387-412, 2007. ,
DOI : 10.1016/j.inffus.2006.04.003
Detection of defective sources in the setting of possibility theory, Fuzzy Sets and Systems, vol.158, issue.5, pp.555-571, 2007. ,
DOI : 10.1016/j.fss.2006.10.027
An evidential approach for detection of abnormal behaviour in the presence of unreliable sensors, Information Fusion, vol.13, issue.2, pp.146-160, 2012. ,
DOI : 10.1016/j.inffus.2011.01.004
Experiences in managing uncertainty and ignorance in a lightly instrumented smart home, International Journal of Pervasive Computing and Communications, vol.8, issue.3, pp.225-249, 2012. ,
DOI : 10.1108/17427371211262635
URL : https://hal.archives-ouvertes.fr/hal-00787049
Constructing consonant belief functions from sample data using confidence sets of pignistic probabilities, International Journal of Approximate Reasoning, vol.49, issue.3, pp.575-594, 2008. ,
DOI : 10.1016/j.ijar.2008.06.002
On the Validity of Dempster's Rule of Combination of Evidence, ser, 1979. ,
Conflict measure for the discounting operation on belief functions, Information Fusion 11th International Conference on, pp.1-8, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-00518580
Understanding the large family of Dempster-Shafer theory's fusion operators ?? a decision-based measure, 2006 9th International Conference on Information Fusion, pp.1-7, 2006. ,
DOI : 10.1109/ICIF.2006.301631
URL : https://hal.archives-ouvertes.fr/hal-00518673
The cautious rule of combination for belief functions and some extensions, Information Fusion 9th International Conference on, pp.1-8, 2006. ,
Phidgets, Proceedings of the 14th annual ACM symposium on User interface software and technology , UIST '01, pp.209-218, 2001. ,
DOI : 10.1145/502348.502388
6LoWPAN: The Wireless Embedded Internet, 2009. ,
DOI : 10.1002/9780470686218