Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A survey on smartphone-based systems for opportunistic user context recognition
Hoseini-Tabatabaei S., Gluhak A., Tafazolli R. ACM Computing Surveys45 (3):1-51,2013.Type:Article
Date Reviewed: Sep 20 2013

This comprehensive and detailed review of existing approaches and techniques for opportunistic user context recognition concentrates on methods that operate autonomously. The approach proposed in this paper focuses on mobile phone-centric methodologies.

The analysis follows three main process stages: sensing, preprocessing, and context recognition. For the sensing stage, the authors explore three main types of sensors--inertial, positioning, and ambient--and describe how they work, the types of information they can provide, their strengths and weaknesses, and how they have been applied in context recognition systems for mobile phones.

The section devoted to preprocessing presents different approaches for filtering and converting raw sensor data into a finite set of features for further analysis. After a discussion of calibration methods to address the effects of variable device position and orientation on the measurements provided by sensors, the authors describe the types of features that can be generated from raw data (time domain, frequency domain, and heuristic features), organized around the types of contexts that can be inferred from them (user physical activity, social interactions, and environment).

Finally, the classification algorithms that have been employed to infer the user context from the input features on mobile devices are analyzed. Five discriminative models and three generative models are described; their advantages, drawbacks, and challenges are highlighted.

The paper closes with a reflective comparison of different approaches and the identification of future research challenges and recommendations. Extensive references to relevant literature appear throughout the survey, making this paper an excellent overview of the field and a perfect starting point for readers interested in exploring it in depth.

Reviewer:  Angelica de Antonio Review #: CR141577 (1312-1128)
Bookmark and Share
 
Feature Evaluation And Selection (I.5.2 ... )
 
 
Knowledge Acquisition (I.2.6 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Feature Evaluation And Selection": Date
Labeled point pattern matching by Delaunay triangulation and maximal cliques
Ogawa H. Pattern Recognition 19(1): 35-40, 1986. Type: Article
Feb 1 1988
Features selection and ‘possibility theory’
Di Gesù V., Maccarone M. Pattern Recognition 19(1): 63-72, 1986. Type: Article
Dec 1 1987
An analytic-to-holistic approach for face recognition based on a single frontal view
Lam K., Yan H. IEEE Transactions on Pattern Analysis and Machine Intelligence 20(7): 673-686, 1998. Type: Article
Oct 1 1998
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy