{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T04:19:52Z","timestamp":1745381992304,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642355202"},{"type":"electronic","value":"9783642355219"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35521-9_56","type":"book-chapter","created":{"date-parts":[[2012,11,26]],"date-time":"2012-11-26T15:21:32Z","timestamp":1353943292000},"page":"381-388","source":"Crossref","is-referenced-by-count":0,"title":["General Bayesian Network in Performing Micro-reality Mining with Mobile Phone Usage Data for Device Personalization"],"prefix":"10.1007","author":[{"given":"Seong Wook","family":"Chae","sequence":"first","affiliation":[]},{"given":"Jungsik","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Kun Chang","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"56_CR1","doi-asserted-by":"crossref","unstructured":"Chae, S.W., Hahn, M.H., Lee, K.C.: Micro Reality Mining of a Cell Phone Usage Behavior: A General Bayesian Network Approach. In: 2011 International Conference on Ubiquitous Computing and Multimedia Applications (UCMA), pp. 119\u2013122 (2011)","DOI":"10.1109\/UCMA.2011.34"},{"key":"56_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1130","DOI":"10.1007\/978-3-540-73549-6_110","volume-title":"Ubiquitous Intelligence and Computing","author":"M.-H. Park","year":"2007","unstructured":"Park, M.-H., Hong, J.-H., Cho, S.-B.: Location-Based Recommendation System Using Bayesian User\u2019s Preference Model in Mobile Devices. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol.\u00a04611, pp. 1130\u20131139. Springer, Heidelberg (2007)"},{"key":"56_CR3","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1145\/1999995.2000007","volume-title":"Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys 2011)","author":"B. Yan","year":"2011","unstructured":"Yan, B., Chen, G.: AppJoy: personalized mobile application discovery. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys 2011), pp. 113\u2013126. ACM, New York (2011)"},{"key":"56_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-642-24082-9_29","volume-title":"Convergence and Hybrid Information Technology","author":"J. Lee","year":"2011","unstructured":"Lee, J., McKay, B.: Optimizing a Personalized Cellphone Keypad. In: Lee, G., Howard, D., \u015al\u0119zak, D. (eds.) ICHIT 2011. LNCS, vol.\u00a06935, pp. 237\u2013244. Springer, Heidelberg (2011)"},{"key":"56_CR5","unstructured":"How, Y., Kan, M.-Y.: Optimizing Predictive Text Entry for Short Message Service on Mobile Phones. In: Human Computer Interfaces International, HCII 2005 (2005)"},{"key":"56_CR6","doi-asserted-by":"crossref","unstructured":"Moradi, S., Nickabadi, A.: Optimization of Mobile Phone Keypad Layout Via Genetic Algorithm. In: Information and Communication Technologies, ICTTA 2006, 2nd edn., pp. 1676\u20131681 (2006)","DOI":"10.1109\/ICTTA.2006.1684637"},{"key":"56_CR7","doi-asserted-by":"publisher","first-page":"3393","DOI":"10.1145\/1978942.1979447","volume-title":"Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems (CHI 2011)","author":"A. Olwal","year":"2011","unstructured":"Olwal, A., Lachanas, D., Zacharouli, E.: Oldgen: Mobile Phone Personalization for Older Adults. In: Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems (CHI 2011), pp. 3393\u20133396. ACM, New York (2011)"},{"key":"56_CR8","doi-asserted-by":"crossref","unstructured":"Mishra, V., Arya, P., Dixit, M.: Improving Mobile Search through Location Based Context and Personalization. In: 2012 International Conference on Communication Systems and Network Technologies, pp. 392\u2013396 (2012)","DOI":"10.1109\/CSNT.2012.91"},{"key":"56_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-642-21726-5_11","volume-title":"Pervasive Computing","author":"S. Rosenthal","year":"2011","unstructured":"Rosenthal, S., Dey, A.K., Veloso, M.: Using Decision-Theoretic Experience Sampling to Build Personalized Mobile Phone Interruption Models. In: Lyons, K., Hightower, J., Huang, E.M. (eds.) Pervasive 2011. LNCS, vol.\u00a06696, pp. 170\u2013187. Springer, Heidelberg (2011)"},{"issue":"11","key":"56_CR10","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/240455.240464","volume":"39","author":"U. Fayyad","year":"1996","unstructured":"Fayyad, U., Piatetsky-Shapiro, G., Smyth, P.: The Kdd Process for Extracting Useful Knowledge from Volumes of Data. Communications of the ACM\u00a039(11), 27\u201334 (1996)","journal-title":"Communications of the ACM"},{"issue":"1","key":"56_CR11","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1023\/A:1009730122752","volume":"1","author":"D. Heckerman","year":"1997","unstructured":"Heckerman, D.: Bayesian Networks for Data Mining. Data Mining and Knowledge Discovery\u00a01(1), 79\u2013119 (1997)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"56_CR12","volume-title":"Probabilistic Networks and Expert Systems","author":"R.G. Cowell","year":"1999","unstructured":"Cowell, R.G., Dawid, A.P., Lauritzen, S.L., Spiegelhalter, D.J.: Probabilistic Networks and Expert Systems. Springer, New York (1999)"},{"key":"56_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-3502-4","volume-title":"Bayesian Networks and Decision Graphs","author":"F.V. Jensen","year":"2001","unstructured":"Jensen, F.V.: Bayesian Networks and Decision Graphs. Springer, New York (2001)"},{"key":"56_CR14","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970043","volume-title":"Probabilistic Expert Systems","author":"G. Shafer","year":"1996","unstructured":"Shafer, G.: Probabilistic Expert Systems. Society for Industrial and Applied Mathematics, Philadelphia (1996)"},{"key":"56_CR15","unstructured":"Langley, C.J., Holcomb, M.C.: Creating Logistics Customer Value. Journal of Business Logistics\u00a013(2) (1992)"},{"key":"56_CR16","unstructured":"Langley, P., Sage, S.: Induction of Selective Bayesian Classifiers. In: Proceedings of the 10th Conference on Uncertainty in Artificial Intelligence, pp. 339\u2013406 (2006)"},{"issue":"2","key":"56_CR17","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1023\/A:1007465528199","volume":"29","author":"N. Friedman","year":"1997","unstructured":"Friedman, N., Geiger, M., Goldszmidt, M.: Bayesian Network Classifiers. Machine Learning\u00a029(2), 131\u2013163 (1997)","journal-title":"Machine Learning"},{"key":"56_CR18","doi-asserted-by":"crossref","unstructured":"Cheng, J., Greiner, R.: Learning Bayesian Belief Network Classifiers: Algorithms and System. In: 14th Canadian Conference on Artificial Intelligence, pp. 141\u2013151 (2001)","DOI":"10.1007\/3-540-45153-6_14"},{"key":"56_CR19","unstructured":"Silander, T., Myllym\u00e4ki, P.: A Simple Approach for Finding the Globally Optimal Bayesian Network Structure. In: Proceedings of 22nd Conference on Uncertainty in Artificial Intelligence (2006)"},{"issue":"6","key":"56_CR20","doi-asserted-by":"crossref","first-page":"1949","DOI":"10.13031\/2013.28547","volume":"36","author":"K. Liao","year":"1993","unstructured":"Liao, K., Paulsen, M.R., Reid, J.F., Ni, B.C., Bonifacio-Maghirang, E.P.: Corn Kernel Breakage Classification by Machine Vision Using a Neural Network Classifier. Transactions of the ASAE (American Society of Agricultural Engineers)\u00a036(6), 1949\u20131953 (1993)","journal-title":"Transactions of the ASAE (American Society of Agricultural Engineers)"},{"key":"56_CR21","unstructured":"Cristianini, N., Shawe-Taylor, J.: Introduction to Support Vector Machines. Cambridge University Press (2000)"},{"key":"56_CR22","doi-asserted-by":"crossref","unstructured":"Jin, R., Agrawal, G.: Effcient Decision Tree Construction on Streaming Data. In: SIGKDD Conference on Knowledge Discovery and Data Mining (KD), pp. 571\u2013576 (2003)","DOI":"10.1145\/956804.956821"},{"issue":"4","key":"56_CR23","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00779-005-0046-3","volume":"10","author":"N. Eagle","year":"2006","unstructured":"Eagle, N., Pentland, A.S.: Reality Mining: Sensing Complex Social Systems. Personal and Ubiquitous Computing\u00a010(4), 255\u2013268 (2006)","journal-title":"Personal and Ubiquitous Computing"},{"issue":"1","key":"56_CR24","first-page":"10","volume":"11","author":"M. Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The Weka Data Mining Software: An Update. ACM Special Interest Group on Knowledge Discovery and Data Mining (SIGKDD) Explorations Newsletter\u00a011(1), 10\u201318 (2009)","journal-title":"ACM Special Interest Group on Knowledge Discovery and Data Mining (SIGKDD) Explorations Newsletter"},{"key":"56_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-642-22362-4_35","volume-title":"User Modeling, Adaption and Personalization","author":"V. Soto","year":"2011","unstructured":"Soto, V., Frias-Martinez, V., Virseda, J., Frias-Martinez, E.: Prediction of Socioeconomic Levels Using Cell Phone Records. In: Konstan, J.A., Conejo, R., Marzo, J.L., Oliver, N. (eds.) UMAP 2011. LNCS, vol.\u00a06787, pp. 377\u2013388. Springer, Heidelberg (2011)"}],"container-title":["Communications in Computer and Information Science","Computer Applications for Bio-technology, Multimedia, and Ubiquitous City"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35521-9_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T20:55:24Z","timestamp":1745355324000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35521-9_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642355202","9783642355219"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35521-9_56","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}