<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Semantics for Privacy and Shared Context</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Roberto Yus</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Primal Pappachan</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Prajit Kumar Das</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tim Finin</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anupam Joshi</string-name>
          <email>joshig@umbc.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Eduardo Mena</string-name>
          <email>emenag@unizar.es</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Maryland</institution>
          ,
          <addr-line>Baltimore County, Baltimore</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Zaragoza</institution>
          ,
          <addr-line>Zaragoza</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Capturing, maintaining, and using context information helps mobile applications provide better services and generates data useful in specifying information sharing policies. Obtaining the full bene t of context information requires a rich and expressive representation that is grounded in shared semantic models. We summarize some of our past work on representing and using context models and brie y describe Triveni, a system for cross-device context discovery and enrichment. Triveni represents context in RDF and OWL and reasons over context models to infer additional information and detect and resolve ambiguities and inconsistencies. A unique feature, its ability to create and manage \contextual groups" of users in an environment, enables their members to share context information using wireless ad-hoc networks. Thus, it enriches the information about a user's context by creating mobile ad hoc knowledge networks.</p>
      </abstract>
      <kwd-group>
        <kwd>Context</kwd>
        <kwd>Semantic Web</kwd>
        <kwd>ontology</kwd>
        <kwd>OWL</kwd>
        <kwd>reasoning</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        A recent study by Cisco [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] predicts that the number of mobile devices in the
world will exceed the population by 2014 and that 54% of them will be smart
devices by 2018. In addition to smartphones, other mobile devices like tablets or
wearable computing devices (e.g., smart watches and glasses) are also becoming
ubiquitous.
      </p>
      <p>These smart devices and their applications store and have access to a great
deal of personal information about their users. Since communication is a primary
use, they know their users' contacts, phone activity, email correspondents, and
social media connections. They have a rich array of sensors that track location
and activity and installed software applications can access the device's audio
and video streams. Applications may also be able to extract information from
stored content that includes users' calendars, email, and social media streams.</p>
      <p>This data can be integrated, combined with background knowledge, and
reasoned over to produce even more information. Capturing, maintaining, and using
such information can help mobile applications provide better services by being
aware of their user's context. However, much of the information is personal and
sensitive and must be protected from undesired use or disclosure. As a result,
there are two related problems inherent in the ecosystem of smart devices,
sensors, applications, and users.</p>
      <p>
        The rst problem involves protecting the privacy and security of personal
data. For example, Android, the most popular mobile operating system as of
2014, follows a single \take-it-or-leave-it" install-time permission acquisition
model for handling user data security. This approach assumes that users are
able to understand the various permissions requested by application and di
erentiate between what is acceptable and what is not. Given the volatile nature of
personal data, mechanisms which allow exible management are important to
protect privacy and security of the users. To address this, we have been exploring
the use of policy-based, context-dependent privacy and security frameworks that
manage personal data and access to it. Our frameworks use semantic
technologies including Semantic Web representation languages (OWL and RDF) and
tools for reasoning with and enforcing context-dependent information sharing
policies [
        <xref ref-type="bibr" rid="ref12 ref13 ref4 ref8">4, 8, 12, 13</xref>
        ].
      </p>
      <p>The use of ontologies for de ning contextual concepts such as activity and
location enables us to apply our policies over generalized or speci c instances of
these concepts. It also allows us to de ne more ne-grained policies for
controlling various aspects of information sharing such as what information is shared,
with whom it is shared, and in which context. For example, enabling a user to
de ne a policy rule stating that social network apps cannot access a recording
device whenever she is in a research meeting with her colleagues. Additionally,
in situations where information sharing cannot be stopped, it can also support
obfuscation mechanisms, for example showing your location with a 100 kilometer
accuracy when you are not at work or are outside normal working hours.</p>
      <p>
        Since the framework requires a rich notion of context to enforce policies, the
second problem is how to obtain precise information about a user's context. In
previous work [
        <xref ref-type="bibr" rid="ref22 ref23">22, 23</xref>
        ] we explored how to recognize and distinguish high-level
descriptions from low-level sensor data. For example, using supervised learning
techniques we can determine a user's activity (e.g., attending class) and the role
she is playing in it (e.g., student). By accessing background knowledge available
from resources like DBpedia and Geonames we can map GPS locations to typed
places. For example, from coordinates (39.253798,-76.714354) we can learn that
we are in the ITE building which is part of UMBC which is an
EducationalInstitution and located in Maryland.
      </p>
      <p>
        Such context information can help applications match user requirements to
available services. For example, by using the location of a user, applications like
Foursquare or Yelp can recommend restaurants. Activity tracking applications
like Endomondo allow users to track their daily activity and help them stay t.
Systems like SHERLOCK [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], which is a distributed architecture for mobile
devices, provide users with information about potentially interesting services in
the vicinity taking the context of the user into account. Context awareness has
been useful in community health care scenarios as well [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>
        Research in context-aware computing has predominantly focused on context
synthesizing [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] high-level context information from low-level information such
as sensor or user data [
        <xref ref-type="bibr" rid="ref14 ref9">9, 14</xref>
        ] (e.g., to infer that the user is in a meeting after
considering the data from sensors such as microphone, GPS, and the calendar
entry as busy). However, not all mobile devices have all the sensors nor does the
user provide their devices with all the data. The issue of data availability can be
overcome by sharing relevant context pieces among users from devices nearby,
which can help in creating a shared context model for these devices. For example,
my device may know I am located at UMBC but not know what activity I am
engaged in. Devices of nearby students may know and be willing to share the
fact that they believe they are attending a class with name Operating Systems
in room 231 of the ITE building. We can use this knowledge of commonality of
context across devices for building a richer shared, semantic context model.
      </p>
      <p>The remainder of this paper is organized as follows. In Section 2, we
introduce Triveni, a system that allows collaborative information to be shared within
a group of devices, and present a motivating use case. In Section 3, we show the
high-level architecture of the Triveni system and the acquisition of context
information and its integration performed by the system. Finally, Section 4 surveys
related works and conclusions and future work are presented in Section 5.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Exploring Collaborative Context Discovery</title>
      <p>Triveni3 is an experimental framework that allows a group of devices to discover
one another and share context information by combining existing techniques of
ad hoc network management, data access control, and semantic data
management. The potential is that all of the devices will bene t from a richer and more
accurate model of their context. Information privacy is protected by policies
running on each device that decide what information is made available to other
devices.</p>
      <p>
        Triveni builds knowledge ad hoc networks [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] to enable mobile devices to
create \contextual groups" among them and exchange relevant knowledge in
a secure and private manner. Our Triveni prototype implements methods to
gather and integrate high-level context pieces from multiple devices to produce
an enriched context which is available for all participating devices. The use
of OWL ontologies and Description Logic reasoners lets it detect and resolve
con icts and inconsistencies in the shared context, which occurs due to lack or
misinterpretation of low-level data and device failures.
2.1
      </p>
      <sec id="sec-2-1">
        <title>Motivating Use Case</title>
        <p>Je , Abed, and Annie are students at Greendale Community College (GCC) and
members of a study group that meets on Wednesdays in the study hall of the
3 Triveni Sangam is a con uence of three rivers and the point of con uence is said to
ush away all of one's sins.
library. On a given Wednesday, Pierce, who is not part of the study group, is
using his computer in the study hall.</p>
        <p>There are ve mobile devices on this particular Wednesday (see Figure 1):
Je 's tablet and smartphone, Abed's laptop, Annie's tablet, and Pierce's
laptop. Notice that these mobile devices are equipped with di erent number of
sensors (from smartphones that have compass, accelerometer, gyroscope, and GPS,
among others, to laptops that do not have any of these sensors). In addition,
the information that users provide can also be di erent and in varying detail.
In our speci c scenario, Annie's and Abed's calendar entries give information
about meeting scheduled for that day (e.g., duration, topic, and participants)
and Je 's smartphone just used Foursquare to check in Study room F. With the
information available on their devices, traditional context generation systems
will create di erent high-level context information for each device (see Figure 1
where the current context of each user is shown in blue boxes).</p>
        <p>Notice that some of the contexts obtained by the devices are wrong. For
example, Annie disabled the location gathering mechanism of her tablet, while
at home, to save battery and so, her device thinks that the location is still
\home". Summarizing, the devices have some information about the context
but most of them are not as rich in detail as it would be desired.</p>
        <p>In this scenario, the best possible context for these mobile devices would the
following:
{ For everyone in the study group (Je , Abed, and Annie) ! \study group
about Spanish with a duration of one hour with three participants: Je , Abed,
and Annie".
{ For everyone in the library (Je , Abed, Annie, and Pierce) ! \Study room</p>
        <p>F inside Greendale Community College at 25 C and with the lights on".
{ For every device of Je (Je 's tablet and smartphone) ! \heart rate 70bpm".</p>
        <p>However, not every mobile device has access to the information needed to
compute the fully enriched context. Nevertheless, the collaboration among them
can be used to address this problem.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Architecture of the System</title>
      <p>Triveni's primary goal is to enrich the information about a user's context,
obtained by context synthesizers, by leveraging the context of other users nearby4.
This way, applications are able to make use of the enriched context provided
by the system. Triveni has a decentralized architecture where mobile devices
communicate among themselves using wireless ad hoc networks and exchange
their context (see Figure 2 for the high-level architecture of each Triveni node).
Therefore, Triveni:
1. Obtains the context information (see Section 3.1) from: 1) the available
Context Synthesizer(s) (Context Manager module); and 2) devices discovered in
the vicinity (Communication module).
2. Reconciles the context information collected (see Section 3.2) to generate
the shared context models (Integration module) verifying the information
integrated to resolve inconsistencies (Inconsistency Resolving module).</p>
      <p>
        Triveni uses Semantic Web technologies (speci cally OWL ontologies and
semantic DL reasoners) for context modeling. This allows Triveni to detect
inconsistent information by using the reasoner and also to infer additional
information which has not been explicitly stated. Another bene t of using ontologies
to model context is that it would be possible to reconcile di erent context
models/de nitions by using ontology alignment techniques [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. Ontologies have been
widely used before to de ne and extract context [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. However, for the sake of
simplicity, we consider that mobile devices in our system use a common
ontology for context de nition (see Figure 3 for an excerpt of the ontology de ned
for our use case). We advocate using a local reasoner, a program that infers
logical consequences from a set of asserted facts or axioms [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], on each device.
The use of semantic reasoners (and Semantic Web technologies in general) on
mobile devices has been studied in [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] and our results show that today's mobile
devices can handle semantic reasoning.
3.1
      </p>
      <sec id="sec-3-1">
        <title>Context Acquisition</title>
        <p>
          To acquire information about the context of a user, Triveni modules running on
each device rst obtain the high-level context of the user using context
synthesizers, speci cally those modeling the context using ontologies [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. Such context
synthesizers can have varying degrees of certainty with regards to the accuracy
of the high-level context based on factors such as: 1) the sensors used in
obtaining the data; 2) liveness inferred from sensor update frequency; and 3) the
4 We refer to users and their mobile devices interchangeably along the paper.
accuracy versus power trade o considerations. Triveni uses context synthesizers
which can provide a measure of con dence for RDF relations, which gives the
probability that the high-level context fact is true [
          <xref ref-type="bibr" rid="ref17 ref2">2, 17</xref>
          ].
        </p>
        <p>Triveni leverages the context information provided by nearby devices to
enrich the context model of the user. For this task, the system creates ad hoc
wireless networks to communicate with other devices and to exchange context
information. The system considers short to mid range communications to
discover users nearby (e.g., the same room) because, in general, nearby users share
the same location and activity. While same activity could be performed by more
users located outside this range, this is out of the scope of this paper.</p>
        <p>
          When connecting with other devices through wireless networks, Triveni must
ensure that no eavesdroppers take part in the communication. We use Di
eHellman key exchange for sharing the secret key which can be further used in
encrypting information shared between Triveni devices. This shared key can be
used in symmetric encryption techniques such as Advanced Encryption Standard
or Blow sh. Thus we utilize a decentralized key agreement protocol similar to [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ].
Triveni then creates contextual groups among the devices connected enabling
devices to exchange contextual information that is interesting for them and thus
(1) limit the amount of data to share, and (2) allow them to share additional
details only with mobile devices of the group.
        </p>
        <p>
          Once this network of mobile devices has been established the next step is to
exchange context information among the members. For this purpose, a mobile
device requests context information from other devices in the group. The device
which receives the request replies with the appropriate information taking into
account the user de ned policies, based on various context options, to determine
what pieces of context are shareable, under what contextual situations, and with
whom. The idea of using context-aware policies for sharing of any private user
data was explored in our previous work [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
3.2
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Context Reconciliation</title>
        <p>When mobile devices using di erent context providers and synthesizers exchange
context information, some of which is possibly imprecise, sometimes there can
be divergent information. For example, consider Annie's tablet which receives
information about the location such as GCC and Study room F while her own
device thinks the location is Home (see Table 1). In this situation and for each
piece of context, the system has to determine from all the possible values which
ones are most likely.</p>
        <p>Identity</p>
        <p>Annie</p>
        <p>Triveni uses the semantic reasoner and ontology to deduce if a given fact
is supporting a di erent one. For example, Je 's smartphone states that its
location is Study room F and so, Je 's device is implicitly supporting that its
location is GCC. Therefore, in the example of Table 1 three devices support
that the location is GCC (Pierce's, Abed's, and Je 's). The same situation can
arise with activities, both Abed's and Annie's devices share that the activity
performed is a tvn:Study Group and so, they support the tvn:Meeting activity
shared by Je 's device.</p>
        <p>For each di erent context piece, cpx, (e.g., cploc for location) we have to
compute a global con dence on each of the di erent facts shared, fi, (e.g., GCC,
Home, and Study room F) taking into account that some of them can be
supported by more than one device (e.g., GCC is supported by Pierce, Abed, and
Je as mentioned before). Then, let T be the set of normalized con dence values
related to a piece of context cpi, and let S be the set of normalized con dence
values that support a context value fi (e.g., location facts from Abed's and Pierce's
devices support location as GCC ). We sum up the values in S and normalize it
over T , to compute the global con dence gci, as follows:
gci =</p>
        <p>Pi nci
Pj ncj
8ci 2 S; ncj 2 T
(1)</p>
        <p>After the context integration process, the system will nally obtain a list
of candidate context pieces with their computed con dence, GC(cpx). In our
previous example, the nal possible locations computed for the users along
with their con dences are: GC(cploc)=fHome(0.23), GCC(0.77), Study room
F(0.22)g. Notice, that there is an inconsistency in this shared primary context
information as there are two con icting locations present, namely Study Room
F/GCC and Home.</p>
        <p>To detect semantic inconsistencies, constraints should be modeled in the
ontology. For example, in the context ontology that we de ned for our use case
(see Figure 3) we stated that a user can only have one location (by de ning the
tvn:hasLocation property as functional), and that the activity classs tvn:Standing
and tvn:Running are disjoint. Triveni uses the context facts along with their
condence values for inconsistency detection and resolution. For each piece of
context, cpx, and the list of possible values, GC(cpx), the system reorders GC(cpx)
according to the con dence computed for each element in descending order.</p>
        <p>The list of possible locations in our example will be reordered to GC(cploc) =
fGCC(0.77), Home(0.23), Study room F(0.22)g. Then, for each element of GC(cpx),
it creates an axiom and materialize it in the local ontology and use the reasoner
to check whether the ontology is still consistent. In the case of the reasoner
inferring that the ontology is inconsistent, Triveni removes the last axiom
materialized because its con dence will be lower than previous one(s).</p>
        <p>In some scenarios it is possible that only a few devices share interesting and
precise information and so the con dence computed for them will be low (e.g.,
in our previous example only Je shares that the location is Study room F and
then the con dence computed is the lowest). However, it is also possible that
this low con dence is caused by wrong information being shared. A variety of
approaches could be followed to tackle this problem, from conservative solutions
(only use the context with the highest con dence) to optimistic approaches (use
all context pieces that are not inconsistent). Our system uses a semi-optimistic
approach: use all context pieces that are not inconsistent and whose con dence
is greater than a threshold value.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Related Work and Discussion</title>
      <p>
        Context-aware computing is a very active eld. A survey of the literature [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]
shows that context extraction and user context generation from mobile sensors
or other sources, has been well studied. The techniques proposed can be broadly
classi ed into two categories: the rst relies on machine learning models to learn
about features from sensor data to predict the user context [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]; the second
focuses on de ning context using ontologies and rules and uses a reasoner to
infer associations between sensor data and user context [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        In our work we avoid low-level context extraction and focus on using
peerto-peer (P2P) networks of devices to share high level context information and in
a context enrichment process. Wibisono et al. [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] also leverages P2P networks
of devices in context-awareness computing. However, in their approach, devices
in a speci c location (e.g., a room) are used to detect the \situation" there (the
situation concept they use is similar to the activity concept used in this paper).
They integrate low-level sensor information and use machine learning techniques
to reason the most probable situation from the previously de ned list of
situations for the room. In our approach, we consider high-level context information
shared by the devices and base our integration on semantic techniques
(ontologies and a semantic reasoner). In addition, we do not start with a set of possible
situations for a location. Finally, the contextual groups enable us to limit the
information that the devices in a P2P network share.
      </p>
      <p>
        The idea of using user groups to share information, like in a meeting,
discussion or party was explored in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. They used activity history and contact
information to suggest relevant groups. In this paper we have explained the idea
of a data-driven need-based contextual group formation. In another work done by
Lane et al. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] crowd-sourcing to correct context classi cation errors and label
sensor-data was exploited. The idea of Community Similarity Networks (CSN)
proposed in [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] is however, signi cantly di erent from contextual groups de ned
in this paper. While CSN uses similarity dimensions (based on lifestyle, physical
di erences and sensor-data) to cluster users, contextual groups are based on the
primary pieces of context. Also CSN uses a centralized classi cation approach
to context recognition thereby creating a single point of failure, while contextual
groups are distributed in nature.
5
      </p>
    </sec>
    <sec id="sec-5">
      <title>Conclusion and Future Work</title>
      <p>A richer notion of context is required for providing relevant services to users and
protect their privacy at the same time. We described a system for cross-device,
semantic context management that enriches intra-device context. By gathering
context pieces collaboratively and reasoning over them to discover and resolve
inconsistencies, the system is resilient in the face of missing or erroneous sources
of information.</p>
      <p>The resulting shared context models have the potential to be more complete
and accurate than any of the participating intra-device models. Using the Triveni
system, mobile devices perform two key activities: 1) performing cross-device
context discovery and integration to create a richer context model using the
shared information, and 2) using secure communication and semantic policies to
facilitate the exchange of context information within contextual groups.</p>
      <p>
        As future work we plan to evaluate the e ectiveness of our system through the
development of a prototype. Also, we plan to incorporate transition of context
in the groups as well as the collaboration among di erent groups for further
enrichment. Finally, we plan to take into account the trade o between energy
consumption and creation and maintenance of contextual groups [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
Acknowledgments. This research work was supported by the CICYT projects
TIN2010-21387-C02-02, TIN-2013-46238-C4-4-R and DGA-FSE and NSF grants
0910838 and 1228198.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Alvarez</given-names>
            <surname>Bermejo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Lodroman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Lopez-Ramos</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.:</surname>
          </string-name>
          <article-title>A decentralized protocol for mobile control access</article-title>
          .
          <source>The J. of Supercomputing</source>
          <volume>70</volume>
          (
          <issue>2</issue>
          ),
          <volume>1</volume>
          {
          <fpage>12</fpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Baldauf</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dustdar</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosenberg</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>A survey on context-aware systems</article-title>
          .
          <source>Int. J. Ad Hoc Ubiquitous Comput</source>
          .
          <volume>2</volume>
          (
          <issue>4</issue>
          ),
          <volume>263</volume>
          {
          <fpage>277</fpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Bettini</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brdiczka</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Henricksen</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Indulska</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nicklas</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ranganathan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Riboni</surname>
            ,
            <given-names>D.:</given-names>
          </string-name>
          <article-title>A survey of context modelling and reasoning techniques</article-title>
          .
          <source>Pervasive and Mobile Computing</source>
          <volume>6</volume>
          (
          <issue>2</issue>
          ),
          <volume>161</volume>
          {
          <fpage>180</fpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Perich</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Joshi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications</article-title>
          .
          <source>In: Int. Conf. on Mobile and Ubiquitous Systems: Networking and Services (Mobiquitous)</source>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5. Cisco:
          <article-title>Cisco visual networking index: Global mobile data tra c forecast update</article-title>
          ,
          <year>2013</year>
          2018. http://bit.ly/CiScOWP (February
          <year>2013</year>
          ),
          <source>white paper c11-520862</source>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Das</surname>
            ,
            <given-names>P.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Joshi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Energy e cient sensing for managing context and privacy on smartphones</article-title>
          .
          <source>In: First Int. Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn)</source>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Dentler</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cornet</surname>
          </string-name>
          , R., ten
          <string-name>
            <surname>Teije</surname>
          </string-name>
          , A.,
          <string-name>
            <surname>de Keizer</surname>
          </string-name>
          , N.:
          <article-title>Comparison of reasoners for large ontologies in the OWL 2 EL pro le</article-title>
          .
          <source>Semantic Web</source>
          <volume>2</volume>
          (
          <issue>2</issue>
          ),
          <volume>71</volume>
          {
          <fpage>87</fpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Ghosh</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Joshi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jagtap</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Privacy control in smart phones using semantically rich reasoning and context modeling</article-title>
          .
          <source>In: IEEE Workshop on Semantic Computing and Security (WSCS)</source>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Gu</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>X.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pung</surname>
            ,
            <given-names>H.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>D.Q.:</given-names>
          </string-name>
          <article-title>An ontology-based context model in intelligent environments</article-title>
          .
          <source>In: Communication Networks and Distributed Systems Modeling and Simulation Conf. (CNDS)</source>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Guo</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>He</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          :
          <article-title>GroupMe: Supporting group formation with mobile sensing and social graph mining</article-title>
          .
          <source>In: 10th Int. Conf. on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous)</source>
          . Springer (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Joshi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>A framework for secure knowledge management in pervasive computing</article-title>
          .
          <source>In: Workshop on Secure Knowledge Management</source>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Jagtap</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Joshi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zavala</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Preserving privacy in context-aware systems</article-title>
          .
          <source>In: 5th IEEE Int. Conf. on Semantic Computing (ICSC)</source>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Kagal</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Joshi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Greenspan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Security and Privacy Challenges in Open and Dynamic Environments</article-title>
          .
          <source>Computer</source>
          <volume>39</volume>
          (
          <issue>6</issue>
          ),
          <volume>89</volume>
          {
          <fpage>91</fpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Lane</surname>
            ,
            <given-names>N.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miluzzo</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lu</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peebles</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Choudhury</surname>
          </string-name>
          , T.,
          <string-name>
            <surname>Campbell</surname>
          </string-name>
          , A.T.:
          <article-title>A survey of mobile phone sensing</article-title>
          .
          <source>IEEE Communications Mag</source>
          . pp.
          <volume>140</volume>
          {
          <issue>150</issue>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Lane</surname>
            ,
            <given-names>N.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lu</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Choudhury</surname>
          </string-name>
          , T.,
          <string-name>
            <surname>Campbell</surname>
            ,
            <given-names>A.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Enabling large-scale human activity inference on smartphones using community similarity networks (CSN)</article-title>
          .
          <source>In: 13th Int. Conf. on Ubiquitous Computing</source>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Pappachan</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yus</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Joshi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Ra ki: A semantic and collaborative approach to community health-care in underserved areas</article-title>
          .
          <source>In: 10th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)</source>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Ranganathan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Al-Muhtadi</surname>
          </string-name>
          , J.,
          <string-name>
            <surname>Campbell</surname>
            ,
            <given-names>R.H.</given-names>
          </string-name>
          :
          <article-title>Reasoning about uncertain contexts in pervasive computing environments</article-title>
          .
          <source>IEEE Pervasive Computing</source>
          <volume>3</volume>
          (
          <issue>2</issue>
          ),
          <volume>62</volume>
          {
          <fpage>70</fpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Shvaiko</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Euzenat</surname>
          </string-name>
          , J.:
          <article-title>Ontology matching: State of the art and future challenges</article-title>
          .
          <source>IEEE Trans. on Knowledge and Data Engineering</source>
          <volume>25</volume>
          (
          <issue>1</issue>
          ),
          <volume>158</volume>
          {
          <fpage>176</fpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Wibisono</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaslavsky</surname>
            ,
            <given-names>A.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ling</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Situation-awareness and reasoning using uncertain context in mobile peer-to-peer environments</article-title>
          .
          <source>Int. J. Pervasive Computing and Communications</source>
          <volume>9</volume>
          (
          <issue>1</issue>
          ),
          <volume>52</volume>
          {
          <fpage>71</fpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Yus</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bobed</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Esteban</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bobillo</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mena</surname>
          </string-name>
          , E.:
          <article-title>Android goes semantic: DL reasoners on smartphones</article-title>
          .
          <source>In: 2nd Int. Workshop on OWL Reasoner Evaluation (ORE)</source>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Yus</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mena</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ilarri</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Illarramendi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>SHERLOCK: Semantic management of location-based services in wireless environments</article-title>
          .
          <source>Pervasive and Mobile Computing</source>
          <volume>15</volume>
          (
          <issue>0</issue>
          ),
          <volume>87</volume>
          {
          <fpage>99</fpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Zavala</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dharurkar</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jagtap</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Joshi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Mobile, Collaborative, Context-Aware Systems</article-title>
          .
          <source>In: AAAI Workshop on Activity Context Representation: Techniques and Languages. AAAI</source>
          , AAAI Press (
          <year>August 2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Zavala</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Murukannaiah</surname>
            ,
            <given-names>P.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Poosamani</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Joshi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rhee</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , ,
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>M.P.</given-names>
          </string-name>
          :
          <article-title>Platys: from position to place-oriented mobile computing</article-title>
          .
          <source>AI</source>
          Magazine
          <volume>35</volume>
          (
          <issue>4</issue>
          ), 1{
          <issue>9</issue>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>