Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1864349.1864354acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

Identifying the activities supported by locations with community-authored content

Published: 26 September 2010 Publication History

Abstract

Community-authored content, such as location specific reviews, offers a wealth of information about virtually every imaginable location today. In this work, we process Yelp's community-authored reviews to identify a set of potential activities that are supported by the location reviewed. Using 14 test locations we show that the majority of the 40 most common results per location (determined by verb-noun pair frequency) are actual activities supported by their respective locations, achieving a mean precision of up to 79.3%. Although the number of reviews authored for a location has a strong influence on precision, we are able to achieve a precision up to 29.5% when processing only the first 50 reviews, increasing to 45.7% and 57.3% for the first 100 and 200 reviews, respectively. In addition, we present two context-aware services that leverage location-based activity information on a city scale that is accessible through a Web service we developed supporting multiple cities in North America.

References

[1]
}}Agre, P.E. 2001. Changing places: contexts of awareness in computing. Human-Computer Interaction 16, 2 (Dec. 2001), 177--192.
[2]
}}Bao, L. and Intille, S.S. 2004. Activity recognition from user-annotated acceleration data. In Proc. of the Second International Conference on Pervasive Computing. Pervasive '04. Springer-Verlag, Berlin, Heidelberg, 1--17.
[3]
}}Beyer, H. and Holtzblatt, K. 1998. Contextual design: defining customer-centered systems. San Francisco, CA, USA: Morgan Kaufmann.
[4]
}}Buettner, M., Prasad, R., Phillipose, M, and Wetherall, D. 2009. Recognizing daily activities with RFID-based sensors. In Proc. of the 11th International Conference of Ubiquitous Computing. Ubicomp'09. ACM Press, New York, NY, 51--61.
[5]
}}Chang, K., Chen, M.Y. and Canny, J. 2007. Tracking free-weight exercises. In Proc. of the 9th International Conference on Ubiquitous Computing. Ubicomp '07. Springer-Verlag, Berlin, Heidelberg, 19--37.
[6]
}}Dey, A.K. 2001. Understanding and using context. Personal and Ubiquitous Computing 5, 1 (Feb. 2001), 4--7.
[7]
}}Dourish, P. Seeking a foundation for context-aware computing. Human-Computer Interaction 16, 2 (Dec. 2001), 229--241.
[8]
}}Fogarty, J., Au, C. and Hudson, S.E. 2006. Sensing from the basement: a feasibility study of unobtrusive and low-cost home activity recognition. In Proc. Of the 19th Annual ACM Symposium on User Interface Software Technology. UIST '06, ACM Press, New York, NY, 91--100.
[9]
}}Froehlich, J., Larson, E., Campbell, T., Haggerty, C., Fogarty, J. and Patel, S.N. 2009. HydroSense: infrastructure-mediated single-point sensing of whole-home water activity. In Proc. of the 11th International Conference of Ubiquitous Computing. Ubicomp '09. ACM Press, New York, NY, 235--244.
[10]
}}Glaser, B.G. 1992. Basics of grounded theory analysis: emergence vs. forcing. Mill Valley, CA, USA: Sociology Press.
[11]
}}Hodges, M. and Pollack, M.E. 2007. An 'object-use fingerprint': The use of electronic sensors for human identification. In Proc. of the 9th International Conference on Ubiquitous Computing. Ubicomp '07. Springer-Verlag, Berlin, Heidelberg, 289--303.
[12]
}}Huynh, T., Fritz, M. and Schiele, B. 2008. Discovery of activity patterns using topic models. In Proc. of the Tenth International Conference on Ubiquitous Computing. Ubicomp '08. ACM Press, New York, NY, 10--19.
[13]
}}Kamvar, M., and Baluja, S. 2009. A large scale study of wireless search behavior: Google Mobile search. In Proc. of the SIGCHI Conference on Human Factors in Computing Systems. CHI '06. ACM Press, New York, NY, 701--709.
[14]
}}Lee, S-W. and Mase, K. 2002. Activity and location recognition using wearable sensors. IEEE Pervasive Computing 1, 3 (July 2002), 24--32.
[15]
}}Lester, J., Choudhury, T., Kern, N., Borriello, G. and Hannaford, B. 2005. A hybrid discriminative/generic approach for modeling human activities. In Proc. of the International Joint Conference on Artificial Intelligent. IJCAI '05, 766--772.
[16]
}}Lin, D. Automatic retrieval and clustering of similar words. In Proc. of the 17th International Conference on Computational Linguistics. COLING-ACL '98. ACL / Morgan Kaufmann, 768--774.
[17]
}}Lin, D. Dependency-based thesaurus. http://webdocs.cs.ualberta.ca/~lindek/demos.htm. Retrieved June 27, 2010.
[18]
}}Logan, B., Healey, J., Philipose, M., Tapia, E.M. and Intille, S. 2007. A long-term evaluation of sensing modalities for activity recognition. In Proc. of the 9th International Conference on Ubiquitous Computing. Ubicomp '07. Springer-Verlag, Berlin, Heidelberg, 483--500.
[19]
}}Mummidi, L.N. and Krumm, J. 2008. Discovering point of interest from users' map annotations. GeoJournal 72 (3--4), 215--227.
[20]
}}OpenNLP. http://opennlp.sourceforge.net. Retrieved June 27, 2010.
[21]
}}Patel, S.N., Reynolds, M.S. and Abowd, G.D. 2008. Detecting human movement by differential air pressure sensing in HVAC system ductwork: an exploration in infrastructure mediated sensing. In Proc. of the Sixth International Conference on Pervasive Computing. Pervasive '08. Springer-Verlag, Berlin, Heidelberg, 1--18.
[22]
}}Patel, S.N., Robertson, T., Kientz, J.A., Reynolds, M.S., Abowd, G.D. 2007. Flick of a switch: detecting and classifying unique electrical events on the residential power line. In Proc. of the 9th International Conference on Ubiquitous Computing. Ubicomp '07. Springer-Verlag, Berlin, Heidelberg, 271--288.
[23]
}}Patterson, D.J., Liao, L., Fox, D., Kautz, H. 2003. Inferring high-level behavior from low-level sensors. In Proc. of the 5th International Conference on Ubiquitous Computing. Ubicomp '03. Springer-Verlag, Berlin, Heidelberg, 73--89.
[24]
}}Philipose, M., Fishkin, K.P., Perkowitz, M., Patterson, D.J., Fox, D., Kautz, H. and Hahnel, D. 2004. Inferring activities from interactions with objects. IEEE Pervasive Computing 3, 4 (Oct. 2004), 50--57.
[25]
}}Stanford log-linear part-of-speech tagger. http://nlp.stanford.edu/software/tagger.shtml. Retrieved June 27, 2010.
[26]
}}Tapia, E.M., Intille, S.S. and Larkson, K. 2004. Activity recognition in the home using simple and ubiquitous sensors. In Proc. of the 2nd International Conference on Pervasive Computing. Pervasive '04. Springer-Verlag, Berlin, Heidelberg, 158--175.
[27]
}}WordNet. http://wordnet.princeton.edu/. Retrieved June 27, 2010.
[28]
}}Yahoo! Research Berkeley: Tag Maps. http://tagmaps.research.yahoo.com. Retrieved June 27, 2010.
[29]
}}Yelp. An Introduction to Yelp: metrics as of June 2009. http://www.yelp.com/html/pdf/press_yelp_snapshot_june_09.pdf.

Cited By

View all
  • (2022)Affinder: Expressing Concepts of Situations that Afford Activities using Context-DetectorsProceedings of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491102.3501902(1-18)Online publication date: 29-Apr-2022
  • (2021)Compositional Learning and Verification of Neural Network ControllersACM Transactions on Embedded Computing Systems10.1145/347702320:5s(1-26)Online publication date: 22-Sep-2021
  • (2021)A Hierarchical Hybrid Locking Protocol for Parallel Real-Time TasksACM Transactions on Embedded Computing Systems10.1145/347701720:5s(1-22)Online publication date: 22-Sep-2021
  • Show More Cited By

Index Terms

  1. Identifying the activities supported by locations with community-authored content

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      UbiComp '10: Proceedings of the 12th ACM international conference on Ubiquitous computing
      September 2010
      366 pages
      ISBN:9781605588438
      DOI:10.1145/1864349
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      • University of Florida: University of Florida

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 26 September 2010

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. activity
      2. community-authored content
      3. location
      4. reviews

      Qualifiers

      • Research-article

      Conference

      Ubicomp '10
      Ubicomp '10: The 2010 ACM Conference on Ubiquitous Computing
      September 26 - 29, 2010
      Copenhagen, Denmark

      Acceptance Rates

      UbiComp '10 Paper Acceptance Rate 39 of 202 submissions, 19%;
      Overall Acceptance Rate 764 of 2,912 submissions, 26%

      Upcoming Conference

      UbiComp '24

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 21 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Affinder: Expressing Concepts of Situations that Afford Activities using Context-DetectorsProceedings of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491102.3501902(1-18)Online publication date: 29-Apr-2022
      • (2021)Compositional Learning and Verification of Neural Network ControllersACM Transactions on Embedded Computing Systems10.1145/347702320:5s(1-26)Online publication date: 22-Sep-2021
      • (2021)A Hierarchical Hybrid Locking Protocol for Parallel Real-Time TasksACM Transactions on Embedded Computing Systems10.1145/347701720:5s(1-22)Online publication date: 22-Sep-2021
      • (2021)Real-time Attack-recovery for Cyber-physical Systems Using Linear-quadratic RegulatorACM Transactions on Embedded Computing Systems10.1145/347701020:5s(1-24)Online publication date: 17-Sep-2021
      • (2021)We Dare YouJournal on Computing and Cultural Heritage 10.1145/343986214:3(1-21)Online publication date: 1-Jul-2021
      • (2021)Characterizing Stage-aware Writing Assistance for Collaborative Document AuthoringProceedings of the ACM on Human-Computer Interaction10.1145/34341804:CSCW3(1-29)Online publication date: 5-Jan-2021
      • (2021)Opportunistic Collective ExperiencesProceedings of the ACM on Human-Computer Interaction10.1145/34341784:CSCW3(1-32)Online publication date: 5-Jan-2021
      • (2021)A Novel Approach for Efficient Packet Transmission in Volunteered Computing MANETACM Transactions on Internet Technology10.1145/341820321:4(1-15)Online publication date: 3-Sep-2021
      • (2021)Detecting Malicious Switches for a Secure Software-defined Tactile InternetACM Transactions on Internet Technology10.1145/341514621:4(1-23)Online publication date: 3-Sep-2021
      • (2019)Understanding Context for Tasks and ActivitiesProceedings of the 2019 Conference on Human Information Interaction and Retrieval10.1145/3295750.3298929(133-142)Online publication date: 8-Mar-2019
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media