{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T13:13:34Z","timestamp":1775222014383,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540396345","type":"print"},{"value":"9783540396352","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11853565_8","type":"book-chapter","created":{"date-parts":[[2006,9,13]],"date-time":"2006-09-13T11:42:12Z","timestamp":1158147732000},"page":"123-140","source":"Crossref","is-referenced-by-count":71,"title":["Farther Than You May Think: An Empirical Investigation of the Proximity of Users to Their Mobile Phones"],"prefix":"10.1007","author":[{"given":"Shwetak N.","family":"Patel","sequence":"first","affiliation":[]},{"given":"Julie A.","family":"Kientz","sequence":"additional","affiliation":[]},{"given":"Gillian R.","family":"Hayes","sequence":"additional","affiliation":[]},{"given":"Sooraj","family":"Bhat","sequence":"additional","affiliation":[]},{"given":"Gregory D.","family":"Abowd","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1177\/001316446002000104","volume":"20","author":"J. Cohen","year":"1960","unstructured":"Cohen, J.: A Coefficient of Agreement for Nominal Scales. Educational and Psychological Measurement\u00a020, 37\u201348 (1960)","journal-title":"Educational and Psychological Measurement"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Consolvo, S., Walker, M.: Using the experience sampling method to evalute ubicomp applications. In: IEEE Pervasive Computing, pp. 24\u201331 (2003)","DOI":"10.1109\/MPRV.2003.1203750"},{"key":"8_CR3","volume-title":"Mobicom 2002","author":"M.D. Corner","year":"2002","unstructured":"Corner, M.D., Noble, B.D.: Zero-Interaction Authentication. In: Mobicom 2002. ACM, Atlanta (2002)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Davis, M., Good, N., Sarvas, R.: From Context to Content: Leveraging Context for Mobile Media Metadata. In: International Multimedia Conference: 12th annual ACM international conference on Multimedia, New York, NY, USA (2004)","DOI":"10.1145\/1027527.1027572"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Demumieux, R., Losquin, P.: Gather customer\u2019s real usage on mobile phones. In: Conference on Human Computer Interaction with Mobile Devices & Services (2005)","DOI":"10.1145\/1085777.1085828"},{"issue":"4","key":"8_CR6","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00779-005-0046-3","volume":"10","author":"N. Eagle","year":"2005","unstructured":"Eagle, N., Pentland, A.: Reality Mining: Sensing Complex Social Systems. Personal and Ubiquitous Computing\u00a010(4), 255\u2013268 (2005)","journal-title":"Personal and Ubiquitous Computing"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-540-28637-0_15","volume-title":"Mobile Human-Computer Interaction - Mobile HCI 2004","author":"G.R. Hayes","year":"2004","unstructured":"Hayes, G.R., Patel, S.N., Truong, K.N., Iachello, G., Kientz, J.A., Farmer, R., Abowd, G.D.: The personal audio loop: Designing a ubiquitous audio-based memory aid. In: Dunlop, M.D. (ed.) Mobile HCI 2004. LNCS, vol.\u00a03160, pp. 168\u2013179. Springer, Heidelberg (2004)"},{"key":"8_CR8","unstructured":"Helal, S., Giraldo, C., Kaddoura, Y., Lee, C., Zabadani, H.e., Mann, W.: Smart phone based cognitive assistant. In: UbiHealth 2003: The 2nd International Workshop on Ubiquitous Computing for Pervasive Healthcare Applications, Seattle, Washington (2003)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Hightower, J., Borriello, G.: A Survey and Taxonomy of Location Systems for Ubiquitous Computing, University of Washington (2001)","DOI":"10.1109\/2.940014"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Kahneman, D., Krueger, A.B., Schkade, D.A., Schwarz, N., Stone, A.A.: A Survey Method for Characterizing Daily Life Experience: The Day Reconstruction Method. Science, 1776\u20131780 (2004)","DOI":"10.1126\/science.1103572"},{"key":"8_CR11","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1007\/11564126_59","volume-title":"Knowledge Discovery in Databases: PKDD 2005","author":"K. Laasonen","year":"2005","unstructured":"Laasonen, K.: Clustering and Prediction of Mobile User Routes from Cellular Data. In: Jorge, A.M., Torgo, L., Brazdil, P.B., Camacho, R., Gama, J. (eds.) PKDD 2005. LNCS (LNAI), vol.\u00a03721, pp. 569\u2013576. Springer, Heidelberg (2005)"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/11428572_8","volume-title":"Pervasive Computing","author":"A. LaMarca","year":"2005","unstructured":"LaMarca, A., et al.: Place lab: Device positioning using radio beacons in the wild. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol.\u00a03468, pp. 116\u2013133. Springer, Heidelberg (2005)"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-540-39653-6_15","volume-title":"UbiComp 2003: Ubiquitous Computing","author":"M. Lamming","year":"2003","unstructured":"Lamming, M.: SPECs: Another approach to human context and activity sensing research, using tiny peer-to-peer wireless computers. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol.\u00a02864, pp. 192\u2013199. Springer, Heidelberg (2003)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"McGuigan, J.: Towards a Sociology of the Mobile Phone. Human Technology (2005)","DOI":"10.17011\/ht\/urn.2005125"},{"key":"8_CR15","volume-title":"Machine Learning","author":"T. Mitchell","year":"1996","unstructured":"Mitchell, T.: Machine Learning. McGraw-Hill, New York (1996)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/11551201_9","volume-title":"UbiComp 2005: Ubiquitous Computing","author":"V. Otsason","year":"2005","unstructured":"Otsason, V., Varshavsky, A., LaMarca, A., de Lara, E.: Accurate GSM indoor localization. In: Beigl, M., Intille, S.S., Rekimoto, J., Tokuda, H. (eds.) UbiComp 2005. LNCS, vol.\u00a03660, pp. 141\u2013158. Springer, Heidelberg (2005)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Oulasvirta, A., Raento, M., Tiitta, S.: ContextContacts: Re-Designing SmartPhone\u2019s Contact Book to Support Mobile Awareness and Collaboration. In: MobileHCI 2005\u00a0(2005)","DOI":"10.1145\/1085777.1085805"},{"issue":"2","key":"8_CR18","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1145\/513665.513669","volume":"9","author":"L. Palen","year":"2002","unstructured":"Palen, L., Salzman, M.: Beyond the handset: designing for wireless communications usability. ACM Transactions on Computer-Human Interaction\u00a09(2), 125\u2013151 (2002)","journal-title":"ACM Transactions on Computer-Human Interaction"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Palen, L., Salzman, M., Youngs, E.: Going Wireless: Behavior & Practice of New Mobile Phone Users. In: CSCW 2000: Computer Supported Cooperative Work (2000)","DOI":"10.1145\/358916.358991"},{"key":"8_CR20","volume-title":"17th annual ACM symposium on User interface software and technology 2004","author":"S.N. Patel","year":"2004","unstructured":"Patel, S.N., Pierce, J.S., Abowd, G.D.: A gesture-based authentication scheme for untrusted public terminals. In: 17th annual ACM symposium on User interface software and technology 2004. ACM Press, Santa Fe (2004)"},{"key":"8_CR21","volume-title":"Interaction design: beyond human-computer interaction","author":"J. Preece","year":"2002","unstructured":"Preece, J., Rogers, Y., Sharp, H.: Interaction design: beyond human-computer interaction. John Wiley & Sons, Inc., Chichester (2002)"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Raento, M., Oulasvirta, A., Petit, R., Toivonen, H.: ContextPhone - A prototyping platform for context-aware mobile applications. In: IEEE Pervasive Computing (2005)","DOI":"10.1109\/MPRV.2005.29"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Satyanarayanan, M.: Swiss Army Knife or Wallet? In: IEEE Pervasive Computing (2005)","DOI":"10.1109\/MPRV.2005.39"},{"issue":"4","key":"8_CR24","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1002\/job.146","volume":"23","author":"F.K. Schlosser","year":"2002","unstructured":"Schlosser, F.K.: So, how do people really use their handheld devices? An interactive study of wireless technology use. Journal of Organizational Behavior\u00a023(4), 401\u2013423 (2002)","journal-title":"Journal of Organizational Behavior"},{"key":"8_CR25","unstructured":"Sullivan, J., Fischer, G.: Mobile Architectures and Prototypes to Assist Persons with Cognitive Disabilities using Public Transportation. In: 26th International Conference on Technology and Rehabilitation, Atlanta GA, USA (2003)"},{"key":"8_CR26","unstructured":"Vaananen-Vainio-Mattila, K., Ruuska, S.: User Needs for Mobile Communication Devices: Requirements Gathering and Analysis through Contextual Inquiry. In: First Workshop on HCI and Mobile Devices (1998)"},{"key":"8_CR27","unstructured":"Wang, X.H., Istepanian, R.S.H., Song, Y.H.: Mobile e-Health: The Unwired Evolution of Telemedicine. Telemedicine Journal and e-Health (2003)"},{"key":"8_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/3-540-45809-3_15","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"R. Want","year":"2002","unstructured":"Want, R., Pering, T., Danneels, G., Kumar, M., Sundar, M., Light, J.: The Personal Server: Changing the Way We Think about Ubiquitous Computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, p. 194. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","UbiComp 2006: Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11853565_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T14:43:11Z","timestamp":1605624191000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11853565_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540396345","9783540396352"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/11853565_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}