{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T01:40:01Z","timestamp":1749001201821,"version":"3.41.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319429953"},{"type":"electronic","value":"9783319429960"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42996-0_7","type":"book-chapter","created":{"date-parts":[[2016,7,14]],"date-time":"2016-07-14T14:23:26Z","timestamp":1468506206000},"page":"75-87","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Predicting Phone Usage Behaviors with Sensory Data Using a Hierarchical Generative Model"],"prefix":"10.1007","author":[{"given":"Chuankai","family":"An","sequence":"first","affiliation":[]},{"given":"Dan","family":"Rockmore","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,15]]},"reference":[{"issue":"3","key":"7_CR1","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1145\/857166.857170","volume":"3","author":"J Cho","year":"2003","unstructured":"Cho, J., Garcia-Molina, H.: Estimating frequency of change. ACM Trans. Internet Technol. (TOIT) 3(3), 256\u2013290 (2003)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Do, T.M.T., Blom, J., Gatica-Perez, D.: Smartphone usage in the wild: a large-scale analysis of applications and context. In: ICMI, pp. 353\u2013360. ACM (2011)","DOI":"10.1145\/2070481.2070550"},{"issue":"40","key":"7_CR3","doi-asserted-by":"publisher","first-page":"14333","DOI":"10.1073\/pnas.0405728101","volume":"101","author":"J Eckmann","year":"2004","unstructured":"Eckmann, J., Moses, E., Sergi, D.: Entropy of dialogues creates coherent structures in e-mail traffic. Proc. Nat. Acad. Sci. USA 101(40), 14333\u201314337 (2004)","journal-title":"Proc. Nat. Acad. Sci. USA"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Falaki, H., Mahajan, R., Kandula, S., Lymberopoulos, D., Govindan, R., Estrin, D.: Diversity in smartphone usage. In: MobiSys, pp. 179\u2013194. ACM (2010)","DOI":"10.1145\/1814433.1814453"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Farrahi, K., Gatica-Perez, D.: What did you do today?: discovering daily routines from large-scale mobile data. In: Proceedings of MM, pp. 849\u2013852. ACM (2008)","DOI":"10.1145\/1459359.1459503"},{"issue":"4","key":"7_CR6","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/JSTSP.2010.2049513","volume":"4","author":"K Farrahi","year":"2010","unstructured":"Farrahi, K., Gatica-Perez, D.: Probabilistic mining of socio-geographic routines from mobile phone data. Sel. Top. Signal Process. 4(4), 746\u2013755 (2010)","journal-title":"Sel. Top. Signal Process."},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Ferraz Costa, A., Yamaguchi, Y., Juci Machado Traina, A., Traina Jr., C., Faloutsos, C.: RSC: Mining and modeling temporal activity in social media. In: KDD, pp. 269\u2013278. ACM (2015)","DOI":"10.1145\/2783258.2783294"},{"issue":"2","key":"7_CR8","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1016\/j.physa.2005.12.035","volume":"369","author":"RCA Hidalgo","year":"2006","unstructured":"Hidalgo, R.C.A.: Conditions for the emergence of scaling in the inter-event time of uncorrelated and seasonal systems. Phys. A: Stat. Mech. Appl. 369(2), 877\u2013883 (2006)","journal-title":"Phys. A: Stat. Mech. Appl."},{"key":"7_CR9","unstructured":"Hollm\u00e9n, J., Tresp, V.: Call-based fraud detection in mobile communication networks using a hierarchical regime-switching model. In: Advances in Neural Information Processing Systems, pp. 889\u2013895 (1999)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Jin, Y., et al.: Characterizing data usage patterns in a large cellular network. In: SIGCOMM Workshop on Cellular Networks, pp. 7\u201312. ACM (2012)","DOI":"10.1145\/2342468.2342471"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-319-06605-9_17","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"D-C Juan","year":"2014","unstructured":"Juan, D.-C., Li, L., Peng, H.-K., Marculescu, D., Faloutsos, C.: Beyond poisson: modeling inter-arrival time of requests in a datacenter. In: Tseng, V.S., Ho, T.B., Zhou, Z.-H., Chen, A.L.P., Kao, H.-Y. (eds.) PAKDD 2014, Part II. LNCS, vol. 8444, pp. 198\u2013209. Springer, Heidelberg (2014)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Kang, J.M., Seo, S.S., Hong, J.W.K.: Usage pattern analysis of smartphones. In: Network Operations and Management Symposium, pp. 1\u20138. IEEE (2011)","DOI":"10.1109\/APNOMS.2011.6077030"},{"issue":"4","key":"7_CR13","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1023\/A:1024940629314","volume":"7","author":"J Kleinberg","year":"2003","unstructured":"Kleinberg, J.: Bursty and hierarchical structure in streams. Data Min. Knowl. Disc. 7(4), 373\u2013397 (2003)","journal-title":"Data Min. Knowl. Disc."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Liao, Z.X., Lei, P.R., Shen, T.J., Li, S.C., Peng, W.C.: Mining temporal profiles of mobile applications for usage prediction. In: ICDMW, pp. 890\u2013893. IEEE (2012)","DOI":"10.1109\/ICDMW.2012.11"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Liao, Z.X., Li, S.C., Peng, W.C., Yu, P.S., Liu, T.C.: On the feature discovery for app usage prediction in smartphones. In: ICDM, pp. 1127\u20131132. IEEE (2013)","DOI":"10.1109\/ICDM.2013.130"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Liao, Z.X., Pan, Y.C., Peng, W.C., Lei, P.R.: On mining mobile apps usage behavior for predicting apps usage in smartphones. In: CIKM, pp. 609\u2013618. ACM (2013)","DOI":"10.1145\/2505515.2505529"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Malmgren, R.D., Hofman, J.M., Amaral, L.A., Watts, D.J.: Characterizing individual communication patterns. In: KDD, pp. 607\u2013616. ACM (2009)","DOI":"10.1145\/1557019.1557088"},{"issue":"47","key":"7_CR18","doi-asserted-by":"publisher","first-page":"18153","DOI":"10.1073\/pnas.0800332105","volume":"105","author":"RD Malmgren","year":"2008","unstructured":"Malmgren, R.D., Stouffer, D.B., Motter, A.E., Amaral, L.A.: A poissonian explanation for heavy tails in e-mail communication. Proc. Nat. Acad. Sci. 105(47), 18153\u201318158 (2008)","journal-title":"Proc. Nat. Acad. Sci."},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Vaz de Melo, P.O.S., Faloutsos, C., Assun\u00e7\u00e3o, R., Loureiro, A.: The self-feeding process: a unifying model for communication dynamics in the web. In: WWW, pp. 1319\u20131330 (2013)","DOI":"10.1145\/2488388.2488503"},{"issue":"3","key":"7_CR20","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/2700399","volume":"9","author":"PO Melo","year":"2015","unstructured":"Melo, P.O., Faloutsos, C., Assun\u00e7ao, R., Alves, R., Loureiro, A.A.: Universal and distinct properties of communication dynamics: how to generate realistic inter-event times. TKDD 9(3), 24 (2015)","journal-title":"TKDD"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Shin, C., Hong, J.H., Dey, A.K.: Understanding and prediction of mobile application usage for smart phones. In: Ubicomp, pp. 173\u2013182. ACM (2012)","DOI":"10.1145\/2370216.2370243"},{"issue":"7","key":"7_CR22","doi-asserted-by":"publisher","first-page":"950","DOI":"10.1109\/TKDE.2007.1041","volume":"19","author":"KC Sia","year":"2007","unstructured":"Sia, K.C., Cho, J., Cho, H.K.: Efficient monitoring algorithm for fast news alerts. IEEE Trans. Knowl. Data Eng. 19(7), 950\u2013961 (2007)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Verkasalo, H.: Analysis of smartphone user behavior. In: Mobile Business and 2010 Ninth Global Mobility Roundtable (ICMB-GMR), pp. 258\u2013263. IEEE (2010)","DOI":"10.1109\/ICMB-GMR.2010.74"},{"issue":"4","key":"7_CR24","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/2627534.2627553","volume":"41","author":"DT Wagner","year":"2014","unstructured":"Wagner, D.T., Rice, A., Beresford, A.R.: Device analyzer: large-scale mobile data collection. ACM SIGMETRICS Perform. Eval. Rev. 41(4), 53\u201356 (2014)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"7_CR25","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/978-3-319-11569-6_16","volume-title":"Mobile and Ubiquitous Systems: Computing, Networking, and Services","author":"DT Wagner","year":"2014","unstructured":"Wagner, D.T., Rice, A., Beresford, A.R.: Device analyzer: understanding smartphone usage. In: Stojmenovic, I., Cheng, Z., Guo, S. (eds.) MOBIQUITOUS 2013. LNICST, vol. 131, pp. 195\u2013208. Springer, Heidelberg (2014)"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Xu, Y., et al.: Preference, context and communities: a multi-faceted approach to predicting smartphone app usage patterns. In: ISWC, pp. 69\u201376. ACM (2013)","DOI":"10.1145\/2493988.2494333"}],"container-title":["Lecture Notes in Computer Science","Trends and Applications in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42996-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T01:07:25Z","timestamp":1748999245000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42996-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319429953","9783319429960"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42996-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"15 July 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Auckland","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Zealand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 April 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 April 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}