<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>ReDef: Context-aware Recognition of Interleaved Activities using OWL 2 and Defeasible Reasoning</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Georgios Meditskos</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Efstratios Kontopoulos</string-name>
          <email>skontopo@iti.gr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ioannis Kompatsiaris</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Information Technologies Institute, Centre for Research and Technology Hellas</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>Understanding human activities in pervasive environments is a key challenge that involves fusion and correlation of multimodal sensor information. Many research efforts have been recently focused on knowledge-driven solutions to human activity recognition, using ontologies for defining activity models and for capturing contextual information. In most cases, however, the unrealistic assumption is made that activities are performed in a sequential, non-interrupted manner, hampering their applicability in real-world scenarios. In this paper, we present a framework for detecting interleaved activities of daily living (ADL) using (a) OWL 2 for implementing the underlying model semantics capturing contextual dependencies among activities, and (b) defeasible reasoning for introducing a flexible conflict resolution mechanism. The proposed framework has been integrated in an existing context-aware ADL recognition framework, which is being used for supporting the diagnosis of the Alzheimer's disease in a controlled environment.</p>
      </abstract>
      <kwd-group>
        <kwd>ontologies</kwd>
        <kwd>defeasible reasoning</kwd>
        <kwd>interleaved activities</kwd>
        <kwd>context</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        In recent years, the demand for intelligent, customized user task support has
proliferated across a multitude of application domains, ranging from healthcare and smart
spaces to transportation and energy control [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In this quest, pervasive computing and
sensor technologies have driven the construction of ubiquitous computing
environments, transforming regular physical spaces into intelligent spaces capitalizing on the
ability to sense, process, combine and interpret data of different modalities.
      </p>
      <p>
        Out of the numerous domains of interest, the recognition of human activities is a
notable case where pervasive frameworks provide unique solutions for the
contextualized monitoring and assessment of daily activities and human behaviour. For example,
in the healthcare sector, the employment of multiple sensors and modalities for
monitoring daily activities of elderly people has many benefits towards improving healthcare
support [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. A key challenge in such domains is the ability to effectively fuse multiple
sources of heterogeneous, noisy and potentially inconsistent information in such a way
that will provide accurate and useful outputs.
      </p>
      <p>Given the inherently open nature of pervasive, sensor-driven systems, where a
crucial requirement is the need to aggregate low-level contextual information and
meaningfully integrate domain knowledge, it comes as no surprise that Semantic Web
technologies have been acknowledged as affording a number of highly desirable features.
In this context, ontologies provide the vocabulary for the representation of low-level
sensory observations (e.g. from video cameras, contact sensors, wearable devices etc.),
while background knowledge is captured using complex class descriptions (axioms)
that encapsulate contextual information specific to the domain (e.g. complex activity
models). In many cases, the domain ontology models are further enhanced with rules
for expressing richer relationships, like e.g. temporal. This coupling of (low-level) data
models and semantically rich domain descriptions enables the derivation of high-level
interpretations regarding the behaviour of individuals, e.g. by recognizing activities of
daily living (ADLs), through intelligent fusion and reasoning mechanisms.</p>
      <p>Several ontology-based reasoning architectures and prototypes have been proposed
for activity recognition (see Section 2), each of which follows a different approach for
handling intrinsic characteristics of the domain, such as data heterogeneity, temporal
extension, noise, uncertainty and missing information. However, little focus has been
given on the recognition of interleaved activities (i.e. non-consecutive), simplifying the
problem of activity recognition to only recognizing sequential activities, which is
usually an unrealistic assumption. In real-world situations, activities may be performed in
an interleaving manner, where one activity may be temporarily paused in order to
perform one or more other activities. For example, an individual may be preparing a tea
when the phone rings, so they have to pause the activity to answer the phone. Key
challenges in this context involve the recognition of the start and end timestamps of all
the activities involved and the derivation of the contextual interval when each activity
was active, e.g. to classify interrupted instances of the same task as a single activity.</p>
      <p>
        In this paper, we investigate the use of defeasible reasoning [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] for detecting and
classifying interleaved activities. Defeasible reasoning deploys a flexible conflict
resolution framework for handling inconsistent and conflicting information, which is
typical for (inherently uncertain and noisy) data coming from heterogeneous sensors. More
specifically, we define a defeasible reasoning layer that can be used on top of existing
ADL frameworks to facilitate the recognition of interleaved activities. Our framework
(ReDef) is based on the use of OWL 2 ontology models for capturing common sense
knowledge regarding the context of the domain activities, and provides a set of
defeasible rules that introduce semantic relationships among interleaved activities, such as
telicity and contextual dependencies. The proposed framework has been integrated in a
multi-level context-aware framework for ADL recognition [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] that is being used for
assessing the diagnosis of Alzheimer’s disease in control environments.
      </p>
      <p>The paper is structured as follows: Section 2 reviews existing ontology-based
approaches in recognizing ADLs and interleaved activities. Section 3 features a brief
introduction to defeasible logics, followed by Section 4 that describes the problem.
Section 5 presents the OWL 2 ontology models we have developed for modelling
contextual information of activities that are fed into the defeasible logic layer (Section 6) for
supporting the recognition of interleaved activities. Section 7 elaborates on the
deployment of the framework in a real-world scenario and Section 8 concludes the paper.</p>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>
        OWL (and OWL 2) has been widely used for modelling activity semantics, reducing
complex activity definitions to the intersection of their constituent parts [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In most
cases, the activity recognition process involves the segmentation of the data into
snapshots of atomic events that are fed into the ontology reasoner for classification. Time
windows [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] and slices [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], background knowledge about the order or duration [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]
of activities are common approaches for segmentation. In addition, rules have been
embraced as a means for compensating for the expressive limitations of OWL [
        <xref ref-type="bibr" rid="ref18 ref26">26, 18</xref>
        ].
In this paradigm, ontologies are used for modelling domain information, whereas rules
aggregate activities, describing the conditions that drive the derivation of complex
activities, e.g. temporal relations. In order to address additional intrinsic characteristics of
the domains, such as uncertainty and missing information, several approaches have
been also devoted to extending formalisms and reasoning services. Examples include,
among others, fuzzy and probabilistic extensions of OWL and SWRL [
        <xref ref-type="bibr" rid="ref12 ref24 ref6">6, 12, 24</xref>
        ].
      </p>
      <p>People often multitask, interrupt and switch between different types of activities,
such as making lunch and answering the phone. Those activities can be characterized
as interleaved activities. In other cases, individuals pursue different goals at the same
time without interrupting any of them. For example, eating and watching TV at the
same time would classify as concurrent activities. Therefore, a key challenge for human
activity recognition in realistic pervasive environments is the ability to correctly
segment and recognize non-sequential and uninterrupted activities, such as interleaved and
concurrent activities. In this paper, we focus on the recognition of interleaved activities.</p>
      <p>
        Despite the benefits that ontology-based reasoning solutions offer to activity
recognition frameworks (e.g. modelling of complex logical relations, sharing information
coming from heterogeneous sources, availability of sound and complete reasoning
engines), little focus has been given on the recognition of interleaved activities. In [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ],
the problem of detecting interleaved activities is approached by combining
statisticaltemporal models obtained from training data and background knowledge in the form of
temporal first-order rules. Although the combination of data- and knowledge-driven
solutions seems promising, the definition of strict temporal rules often fails to
incorporate the level of flexibility required in pervasive environments. The framework
presented in [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] is able to recognize multi-user concurrent activities using ontologies.
Although this work focuses on the detection of activities performed simultaneously by
different individuals, the adopted approach for recognizing false sensor activations
where activities are mapped on is based on the Pyramid Match Kernel technique.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ], activities are inferred using an ontology model and rules that check the
knowledge base for temporal overlaps between atomic activities relating to different
complex activities. The limitation of this approach is that the rules are static and
predefined, meaning that all the temporal relations need to be explicitly defined at design
time. In [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], a knowledge-driven agent-mediated approach based on hybrid
ontological and temporal formalisms for composite activity recognition is presented. Data
segmentation is performed using time windows. Ontological reasoning is used both for
deriving primitive actions and complex activities using subsumption and equivalence
reasoning. In each segment, more than one activity might be detected, which is
considered as interleaved. However, no information is provided about the semantic conditions
that drive the derivation and further aggregation of individual interleaved activity
instances.
      </p>
      <p>
        Finally, regarding the deployment of defeasible logics in pervasive computing
environments, the work presented in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] constitutes the main recent research effort
investigating this setting. In their work, the authors propose a distributed reasoning approach
based on the representation of context knowledge shared by the ambient agents in the
environment. Taking into consideration the highly dynamic nature of the setting,
defeasible logic is proposed as the basis for representing the context knowledge possessed
by each agent (i.e. the agent’s local rule base). Additionally, defeasible logic is also
applied for resolving the potential conflicts that arise from the information exchange
between the agents.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Defeasible Logics</title>
      <p>
        Defeasible logics is a non-monotonic logics formalism that delivers intuitive
knowledge representation and advanced conflict resolution mechanisms [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. In
defeasible logics there are three distinct types of rules:
 Strict rules are denoted by A → p, where A is a set of literals and p is a (positive or
negative) literal, and are interpreted in the typical sense: whenever the premises are
indisputable, then so is the conclusion.
 Defeasible rules are denoted by A  p and, contrary to strict rules, they can be
defeated by contrary evidence. Two examples of defeasible rules are r1: holdsFork(X)
 havingLunch(X), which reads as “if individual X (i.e. the inhabitant of the house)
is holding a fork then he/she is probably having lunch”, and r2: onThePhone(X) 
¬havingLunch(X), which reads as “when X is on the phone then he/she is probably
not having lunch”.
 Defeaters are denoted by A  p and do not actively support conclusions, but can
only prevent deriving some of them. In other words, they are used to defeat
respective defeasible conclusions, by producing evidence to the contrary. A defeater
example is: r1': sleep(X)  ¬havingLunch(X) (“when X is sleeping then he/she is
definitely not having lunch”), which can defeat e.g. rule r1 mentioned previously.
      </p>
      <p>Additionally, the superiority relationship is used for resolving conflicts among
defeasible rules. For example, given the defeasible rules r1 and r2 above, no conclusive
decision can be made about whether X is having lunch or not. But, if the superiority
relationship r2 &gt; r1 is introduced, then r2 overrides r1 and we can eventually conclude
that X is not having lunch after all. In this case rule r2 is called superior to r1 and r1
inferior to r2. Note that the relation &gt; is acyclic.</p>
      <p>
        The advantages of applying defeasible instead of classical logics are outlined as
follows:
 Defeasible logics have low computational complexity [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ];
 They allow for reasoning with incomplete information; this is a critical trait in sensor
environments, where perfect knowledge of the environment is very hard, if not
impossible, to achieve;
 They introduce non-monotonicity, which leads to a more intuitive type of reasoning,
much closer to human reasoning especially for the non-accustomed users (e.g.
doctors, patients, etc.), where the emergence of new information can lead to abandoning
(i.e. defeating) previously established conclusions and adopting new ones.
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Problem Description</title>
      <p>
        In previous work [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], we investigated the viability of a multi-level context-aware
framework for recognizing ADLs. A key feature of the framework lies on the use of
ontologies for defining activity models as dependencies (links) between complex
activities and their low-level observations that we call situation descriptors. For example,
the situation descriptor of making tea links the MakeTea domain class to its lower level
observation types, such as objects used (e.g. Cup, Spoon) and location (e.g. TeaZone).
Given a set of low-level observations and a set of situation descriptors, the
contextaware algorithm segments the initial trace of observations into meaningful contexts, i.e.
clusters of observations, that are classified (with some plausibility) as complex
activities, generating semantically enriched knowledge graphs with activity traces.
      </p>
      <p>Despite the promising results we obtained by evaluating the framework in realistic
environments, the assumption that individuals carry out a single activity each time falls
short when handling interleaved activities. In this case, the interleaved contexts are
recognized as individual activities, affecting the performance of the algorithm. In order to
support the recognition of interleaved ADLs and to subsequently improve the accuracy
of the framework, we have developed ReDef, a knowledge-driven decision making
layer for the context-aware aggregation of non-sequential contexts. More specifically,
given an RDF graph with detected activities, along with their pertinent lower-level
observations, our framework aims to identify and link non-consecutive activity contexts
that belong to the same overall activity task. In the following section we describe the
ontologies we use for modelling domain knowledge, capturing the concept of activity
telicity, along with the defeasible rules that implement the underlying model semantics.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Modelling Activity Telicity</title>
      <p>
        ReDef provides two lightweight ontology patterns for capturing the concept of
activity telicity, i.e. the context that designates that an activity has been completed. Both
patterns implement the descriptions and situations (DnS) ontology pattern [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] of
DOLCE Ultra Lite (DUL) ontology and make use of the meta-modelling capabilities of
OWL 2, namely punning [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], allowing property assertions to be made among activity
classes. In that way, we enable the representation of contextualised views on complex
activities, and afford reusable pieces of knowledge that cannot otherwise be directly
expressed by the standard ontology semantics, e.g. temporal correlations among
activities that are not connected in a tree-like manner.
5.1
      </p>
      <sec id="sec-5-1">
        <title>Telic Event Pattern</title>
        <p>The telic event pattern enables to formally define the terminating state of a complex
activity, i.e. the observation type that belongs to the activity’s situation descriptor and
denotes the completion of the activity. This pattern can be used for modelling telicity
either for activities that do have endpoints, e.g. the event of turning off the TV can be
considered as the telic event of watching TV. Fig. 1 (a) depicts the schema of the telic
event pattern, while Fig. 1 (b) illustrates an example instantiation for modelling the telic
event of watching TV. Following the conceptual model of DnS, the instantiation of the
pattern involves the definition of a description instance that captures information about
the activity type of interest and the telic event. The conceptual model of DnS also
requires the assertion of a situation instance that references (via the hasDescription
property assertion) the description instance. It is worth noting that the instantiation of
the pattern involves the use of ontology classes in property assertions, e.g. in
defineActivityType. The circles in Fig. 1 (b) denote anonymous ontology instances that
instantiate the pattern’s concepts.</p>
        <p>While for some activities it is possible to select an observation from their situation
descriptors to play the role of the telic event, there are other activities that cannot be
bounded to specific endpoints. For example, preparing breakfast is a dynamic task that
involves many activities without a predefined order or terminating contexts. For such
activities, telicity cannot be defined by means of an observation that belongs to the
situation descriptors.</p>
        <p>In order to support the concept of telicity for activities that cannot be explicitly linked
with a terminating state, ReDef provides the pattern depicted in Fig. 2 (a). The idea
behind this pattern is to capture activity telicity by means of existence of another
context (inter-context telicity). For example, the detection of an activity relevant to
cleaning the table in the morning is an indication that the individual may have prepared a
breakfast earlier, which can be considered as completed. Similar to the telic event
pattern, the instantiation of this pattern requires the assertion of situation and description
instances, designating the role of each instance by assigning it to the available concepts
(BoundedActivity or TelicContext). Moreover, this pattern allows us to capture
temporal dependencies among the bounded activities and the respective contexts. For
example, the instantiation of the pattern in Fig. 2 (b) explicitly models that the cleaning
table context should follow the prepare breakfast activity.</p>
        <p>The aim of ReDef is to provide a framework that can be used on top of existing
activity recognition solutions in order to enhance their performance with respect to the
detection of interleaved activities. This is achieved by examining the already detected
activities and their constituent observations to detect situations when the telicity
patterns are satisfied in order to further aggregate the individual activities and derive
interleaved tasks. As such, ReDef requires as input the following information:
 Activity traces: set of detected complex activities with start/end timestamps.
 Sub-events: the constituent parts (observations) of the complex activities.
 Activity telicity patterns: instantiations of the patterns described in Section 5.</p>
        <p>In the following, we assume that the rule-based methodology for determining which
activities are interleaved is based on the following set of core predicates:
 activity(A,T1,T2): A is an activity starting at T1 and ending at T2.
 type(A,P): Resource (observation/activity) A is of activity type P.
 subEvent(O,A): Observation O belongs to activity A.</p>
      </sec>
      <sec id="sec-5-2">
        <title>6.2 Interleaved Activities Through Direct Telicity</title>
        <p>The following set of defeasible rules implements the semantics of the telic event
pattern described in Section 5.1, asserting pairs of interleaved activities. In addition to
the core predicates, the predicate telic(TL,A) is defined that denotes that TL is the
telic event for activity A.
r1: activity(A1,T11,T12), activity(A2,T21,T22), T21 &gt; T12,
type(A1,A), type(A2,A), telic(TL,A), subEvent(Z,A2), type(Z,TL)
 interleaved(A1,A2)
r2: activity(A1,T11,T12), activity(A2,T21,T22), T21 &gt; T12,
type(A1,A), type(A2,A), telic(TL,A), subEvent(Z,A1), type(Z,TL)
 interleaved(A1,A2)
r3: activity(A1,T11,T12), activity(A2,T21,T22),
activity(A3,T31,T32), T21 &gt; T12, T31 &gt; T22, type(A1,A), type(A2,A),
type(A3,A), telic(TL,A), subEvent(Z1,A2), subEvent(Z2,A3),
type(Z1,TL), type(Z2,TL)
 interleaved(A1,A3)
r2, r3 &gt; r1</p>
        <p>More specifically, rule r1 determines when two separate activities constitute a
single, interleaved one, based on the existence of the corresponding telic observation in
the activity context that takes place last. On the other hand, rule r2 establishes an
exception to r1 that takes place when the first activity (also) includes a telic observation.
An additional exception, r3, ensures that an activityis linked only with the most recent
telic context. Consequently, these exceptions are introduced as superior to r1 via the
superiority relationship. When the execution of rules terminates, the pair of intervened
activities are traversed to select the one with the longest duration as the final activity.</p>
      </sec>
      <sec id="sec-5-3">
        <title>6.3 Interleaved Activities Through Inter-context Telicity</title>
        <p>In order to implement the semantics of the inter-context telicity pattern described in
Section 5.2, the telic predicate is replaced by predicate final(A) indicating that
activity A is completed (no subsequent activities of the same type may be appended to
A), according to the pattern in Fig. 2. The following rule determines the final
activities:
r4: activity(A1,T11,T12), activity(B1,T21,T22), latest(A1,B1),
type(A1,A), type(B1,B), telicContext(A,B)
 final(A1)
where [latest(A1,B1), type(A1,A), type(B1, B)] retrieves the closest most
recent activity of type A to type B.</p>
        <p>Having detected the final activities, a rule set similar to the one presented in the
previous subsection (rules r2-r3) has to be deployed, where the telic predicate is
substituted by final.
7</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Use Case and Discussion</title>
      <p>ReDef is part of an ADL recognition framework deployed in a hospital for
monitoring Alzheimer's disease patients1. The aim of this deployment is to help clinicians
assess the condition of individuals, based on a goal-directed protocol where participants
perform predefined activities in an experimentation room. The participants have to
perform a list of 10 Instrumental Activities of Daily Living (IADL), i.e. tasks that support
an independent life style, such as preparing the drug box, talking on phone, preparing
tea and watering the plant. Automated ADL recognition is employed in this context for
detecting the IADLs performed by the participants and for informing the clinicians,
who are not in the room during the execution of the protocol, about activities that have
been missed or repeated, or problems regarding the duration of activities. The setting
involves ambient and wearable video and audio sensors, accelerometers and
physiological sensors. The collected sensor data, such as location with respect to predefined
zones, objects the participants interact with, posture and state of appliances are analysed
by software modules to recognise activities of participants.</p>
      <p>The majority of the tasks involved in the protocol can be performed in a sequential
manner, such as watering the plant or making a phone call. However, despite the
promising ADL recognition results we obtained, we observed a low accuracy in detecting
the preparation of hot tea. This was due to the fact that the majority of the participants
performed this task in an interleaved manner: after putting water in the kettle and
turning the kettle on, participants went on with other tasks before coming back and
completing the preparation of the tea. In this case, the ADL recognition framework detects
two separate activities that trigger the generation of a problem to be highlighted to the
clinical experts regarding activity repetition. ReDef has been integrated in this setting
in order to overcome this limitation and support the detection of interleaved activities.</p>
      <p>Fig. 3 depicts the instantiation of the telic event pattern that defines telicity by means
of the FillCup event. Fig. 4 presents example observations and detected activities
during a protocol. As explained above, the ADL recognition algorithm recognizes two
PrepareTea activities (with different plausibility, since different numbers of
tea-related observations are involved in each context) based on the provided situation
descriptor. In this example, ReDef will aggregate the two individual activities, taking into
account the information encapsulated in the pertinent telic event pattern2.</p>
      <p>ReDef has been tested so far with a small number of protocol participants, since the
experiment is still ongoing. Preliminary results indicate that the system is able to
correctly detect the start/end times of interleaved activities in the majority of the situations.
1 The system has been installed in the Memory Resource and Research Centre (CMRR) of the</p>
      <p>
        University Hospital in Nice (CHUN), under the Dem@Care FP7 EU Project.
2 The implementation of the defeasible reasoning layer is currently based on SPINdle, a
Javabased defeasible reasoning engine [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>Problems have been identified in cases when the analysis modules fail to detect the telic
event of an activity, e.g. the FillCup events in our example. In this case, telicity cannot
be inferred and the detection of interleaved activities fails. We are currently
investigating the extension of the defeasible rules presented in Section 6, so as to handle missing
information, e.g. by integrating negation-as-failure or more refined/explicit rules
expressing exceptions.</p>
      <p>In this paper, we presented the ReDef framework for detecting interleaved activities
in multi-sensor pervasive environments. The aim of the framework is to enrich existing
activity recognition solutions that support the detection of sequential only activities
with the ability to handle interleaved tasks. To this end, two lightweight ontology
patterns have been defined to capture the concept of activity telicity. The semantics of
these models is implemented by a set of defeasible rules, providing a context-aware
decision making layer for aggregating interrupted activities into single activities.</p>
      <p>ReDef has been integrated in an existing framework for ADL recognition,
supporting the diagnosis of Alzheimer’s disease. Preliminary results indicate that ReDef is able
to correctly detect the start/end times of interleaved activities in the majority of the
situations in our setting, failing though to handle cases where the telic events and
contexts are not detected by the underlying monitoring framework.</p>
      <p>The key directions that underpin our ongoing research involve the definition of
additional patterns to capture more complex notions of activity telicity, e.g. taking into
account the starting context of activities. Moreover, we are investigating a data-driven
extension to our framework, using machine learning algorithms to automatically extract
telic events for certain activities in order to support personalisation capabilities and
adaptive services.</p>
      <p>Acknowledgments. This work has been supported by the EU FP7 project Dem@Care:
Dementia Ambient Care - Multi-Sensing Monitoring for Intelligent Remote
Management and Decision Support under contract No. 288199.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Baader</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvanese</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McGuinness</surname>
            ,
            <given-names>D. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nardi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel-Schneider</surname>
            ,
            <given-names>P. F.</given-names>
          </string-name>
          :
          <article-title>The Description Logic Handbook: Theory, Implementation, and Applications</article-title>
          . Cambridge University Press (
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Bikakis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Antoniou</surname>
          </string-name>
          , G.:
          <article-title>Defeasible Contextual Reasoning with Arguments in Ambient Intelligence</article-title>
          .
          <source>IEEE Trans. on Knowledge and Data Engineering</source>
          <volume>22</volume>
          (
          <issue>11</issue>
          ), pp.
          <fpage>1492</fpage>
          -
          <lpage>1506</lpage>
          (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Bikakis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hassapis</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Antoniou</surname>
          </string-name>
          , G.:
          <article-title>Strategies for contextual reasoning with conflicts in ambient intelligence</article-title>
          .
          <source>Knowledge and Information Systems</source>
          <volume>27</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>45</fpage>
          -
          <lpage>84</lpage>
          (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Buettner</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prasad</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Philipose</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wetherall</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Recognizing daily activities with rfidbased sensors</article-title>
          .
          <source>11th International Conference on Ubiquitous Computing</source>
          , pp.
          <fpage>51</fpage>
          -
          <lpage>60</lpage>
          (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nugent</surname>
          </string-name>
          , C.D.:
          <article-title>Ontology-based activity recognition in intelligent pervasive environments</article-title>
          .
          <source>Int. Journal of Web Information Systems</source>
          <volume>5</volume>
          (
          <issue>4</issue>
          ),
          <fpage>410</fpage>
          -
          <lpage>430</lpage>
          (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Ciaramella</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Cimino</surname>
            ,
            <given-names>M. G. C. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marcelloni</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Straccia</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Combining fuzzy logic and semantic web to enable situation-awareness in service recommendation</article-title>
          .
          <source>21st International Conference on Database and Expert Systems Applications: Part I, DEXA'10</source>
          , Berlin, Heidelberg, pp.
          <fpage>31</fpage>
          -
          <lpage>45</lpage>
          (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Cook</surname>
            ,
            <given-names>D.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Augusto</surname>
            ,
            <given-names>J.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jakkula</surname>
            ,
            <given-names>V.R.</given-names>
          </string-name>
          :
          <article-title>Ambient intelligence: Technologies, applications, and opportunities</article-title>
          .
          <source>Perv. and Mobile Computing</source>
          <volume>5</volume>
          (
          <issue>4</issue>
          ), pp.
          <fpage>277</fpage>
          -
          <lpage>298</lpage>
          (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Gangemi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mika</surname>
            ,
            <given-names>P. Understanding</given-names>
          </string-name>
          <article-title>the semantic web through descriptions and situations</article-title>
          .
          <source>On The Move to Meaningful Internet Systems</source>
          <year>2003</year>
          : CoopIS, DOA, and ODBASE (pp.
          <fpage>689</fpage>
          -
          <lpage>706</lpage>
          ). Springer Berlin Heidelberg (
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Grau</surname>
            ,
            <given-names>B. C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Motik</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parsia</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel-Schneider</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>OWL 2: The Next Step for OWL</article-title>
          .
          <source>Web Semantics: Science, Services and Agents on the World Wide Web</source>
          <volume>6</volume>
          (
          <issue>4</issue>
          ), pp.
          <fpage>309</fpage>
          -
          <lpage>322</lpage>
          (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Gu</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tao</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lu</surname>
            ,
            <given-names>J:</given-names>
          </string-name>
          <article-title>An unsupervised approach to activity recognition and segmentation based on object-use fingerprints</article-title>
          .
          <source>Data &amp; Knowledge Engineering 533-544</source>
          (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Helaoui</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Niepert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stuckenschmidt</surname>
          </string-name>
          , H.:
          <article-title>Recognizing interleaved and concurrent activities using qualitative and quantitative temporal relationships</article-title>
          .
          <source>Pervasive and Mobile Computing</source>
          <volume>7</volume>
          (
          <issue>6</issue>
          ), pp.
          <fpage>660</fpage>
          -
          <lpage>670</lpage>
          (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Helaoui</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Riboni</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stuckenschmidt</surname>
          </string-name>
          , H.:
          <article-title>A probabilistic ontological framework for the recognition of multilevel human activities</article-title>
          .
          <source>2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing</source>
          , pp.
          <fpage>345</fpage>
          -
          <lpage>354</lpage>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Jekjantuk</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grner</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
          </string-name>
          , J.:
          <article-title>Modelling and reasoning in metamodelling enabled ontologies</article-title>
          .
          <source>Knowledge Science, Engin. and Management</source>
          ,
          <volume>51</volume>
          -
          <fpage>62</fpage>
          (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Lam</surname>
            ,
            <given-names>H. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Governatori</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          <article-title>The Making of SPINdle</article-title>
          .
          <source>2009 Int. Symposium on Rule Interchange and Applications (RuleML '09)</source>
          , Governatori,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Hall</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            , &amp;
            <surname>Paschke</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (Eds.), Springer-Verlag, Berlin, Heidelberg, p.p.
          <fpage>315</fpage>
          -
          <lpage>322</lpage>
          (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Maher</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Propositional defeasible logic has linear complexity</article-title>
          .
          <source>Theory and Practice of Logic Programming</source>
          ,
          <volume>1</volume>
          (
          <issue>6</issue>
          ):
          <fpage>691</fpage>
          -
          <lpage>711</lpage>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Meditskos</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kontopoulos</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kompatsiaris</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Knowledge-driven Activity Recognition and Segmentation Using Context Connections</article-title>
          .
          <source>International Semantic Web Conference (ISWC)</source>
          , pp.
          <fpage>260</fpage>
          -
          <lpage>275</lpage>
          ,
          <source>Riva del Garda</source>
          , Trento, Italy,
          <fpage>19</fpage>
          -23
          <string-name>
            <surname>October</surname>
          </string-name>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Modayil</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bai</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kautz</surname>
          </string-name>
          , H.:
          <article-title>Improving the recognition of interleaved activities</article-title>
          ,
          <source>10th International Conference on Ubiquitous Computing</source>
          , pp.
          <fpage>40</fpage>
          -
          <lpage>43</lpage>
          (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Motik</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cuenca Grau</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sattler</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>Structured objects in OWL: representation and reasoning</article-title>
          . World Wide Web, pp.
          <fpage>555</fpage>
          -
          <lpage>564</lpage>
          (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Nute</surname>
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Defeasible Reasoning</article-title>
          ,
          <source>Proc. 20th Int. Conference on Systems Science</source>
          , IEEE Press, pp.
          <fpage>470</fpage>
          -
          <lpage>477</lpage>
          (
          <year>1987</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Okeyo</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sterritt</surname>
          </string-name>
          , R.:
          <article-title>Dynamic sensor data segmentation for real-time knowledge-driven activity recognition</article-title>
          .
          <source>Pervasive and Mobile Computing</source>
          <volume>10</volume>
          , pp.
          <fpage>155</fpage>
          -
          <lpage>172</lpage>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Okeyo</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          :
          <article-title>An Agent-mediated Ontology-based Approach for Composite Activity Recognition in Smart Homes</article-title>
          ,
          <source>J. UCS</source>
          <volume>19</volume>
          (
          <issue>17</issue>
          ), pp.
          <fpage>2577</fpage>
          -
          <lpage>2597</lpage>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Patkos</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chrysakis</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bikakis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Plexousakis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Antoniou</surname>
          </string-name>
          , G.:
          <article-title>A reasoning framework for ambient intelligence</article-title>
          .
          <source>6th Hellenic Conf. on Artificial Intelligence</source>
          . pp.
          <fpage>213</fpage>
          -
          <lpage>222</lpage>
          . SETN'
          <volume>10</volume>
          , Springer-Verlag, Berlin, Heidelberg (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Riboni</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pareschi</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Radaelli</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bettini</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Is ontology-based activity recognition really effective? Perv</article-title>
          . Comp. and Commun., pp.
          <fpage>427</fpage>
          -
          <lpage>431</lpage>
          (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Rodrguez</surname>
            ,
            <given-names>N. D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cullar</surname>
            ,
            <given-names>M. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lilius</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvo-Flores M. D.</surname>
          </string-name>
          :
          <article-title>A fuzzy ontology for semantic modelling and recognition of human behaviour</article-title>
          .
          <source>Knowledge-Based Systems</source>
          ,
          <volume>46</volume>
          -
          <fpage>60</fpage>
          , (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Tiberghien</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mokhtari</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aloulou</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Biswas</surname>
          </string-name>
          , J.:
          <article-title>Semantic reasoning in context-aware assistive environments to support ageing with dementia</article-title>
          .
          <source>11th International Conference on The Semantic</source>
          Web - Volume
          <string-name>
            <surname>Part</surname>
            <given-names>II</given-names>
          </string-name>
          ,
          <source>ISWC'12</source>
          , pp.
          <fpage>212</fpage>
          -
          <lpage>227</lpage>
          (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Wessel</surname>
            ,
            <given-names>M</given-names>
          </string-name>
          , Luther,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Wagner</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.:</surname>
          </string-name>
          <article-title>The difference a day makes - recognizing important events in daily context logs. C&amp;O:RR</article-title>
          , volume
          <volume>298</volume>
          <source>of CEUR Workshop Proceedings. CEURWS.org</source>
          ,
          <year>2007</year>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Ye</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stevenson</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dobson</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>KCAR: A knowledge-driven approach for concurrent activity recognition</article-title>
          .
          <source>Pervasive and Mobile Computing</source>
          <volume>19</volume>
          , pp.
          <fpage>47</fpage>
          -
          <lpage>70</lpage>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Zaslavsky</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chakraborty</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Recognizing concurrent and interleaved activities in social interactions</article-title>
          .
          <source>Dependable, Autonomic and Secure Computing (DASC)</source>
          , pp.
          <fpage>230</fpage>
          -
          <lpage>237</lpage>
          (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McCullagh</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nugent</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zheng</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          :
          <article-title>An ontology-based context-aware approach for behaviour analysis</article-title>
          .
          <source>Activity Recognition in Pervasive Intelligent Environments</source>
          , Vol.
          <volume>4</volume>
          of Atlantis Ambient and
          <string-name>
            <given-names>Pervasive</given-names>
            <surname>Intelligence</surname>
          </string-name>
          , Atlantis Press,
          <fpage>127</fpage>
          -
          <lpage>148</lpage>
          (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>