{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T05:11:43Z","timestamp":1744953103400,"version":"3.37.3"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,12,12]],"date-time":"2018-12-12T00:00:00Z","timestamp":1544572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1007\/s00779-018-01190-0","type":"journal-article","created":{"date-parts":[[2018,12,12]],"date-time":"2018-12-12T03:25:39Z","timestamp":1544585139000},"page":"159-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Energy-efficient prediction of smartphone unlocking"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3814-1074","authenticated-orcid":false,"given":"Chu","family":"Luo","sequence":"first","affiliation":[]},{"given":"Aku","family":"Visuri","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Klakegg","sequence":"additional","affiliation":[]},{"given":"Niels","family":"van Berkel","sequence":"additional","affiliation":[]},{"given":"Zhanna","family":"Sarsenbayeva","sequence":"additional","affiliation":[]},{"given":"Antti","family":"M\u00f6tt\u00f6nen","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Goncalves","sequence":"additional","affiliation":[]},{"given":"Theodoros","family":"Anagnostopoulos","sequence":"additional","affiliation":[]},{"given":"Denzil","family":"Ferreira","sequence":"additional","affiliation":[]},{"given":"Huber","family":"Flores","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Velloso","sequence":"additional","affiliation":[]},{"given":"Vassilis","family":"Kostakos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,12]]},"reference":[{"key":"1190_CR1","doi-asserted-by":"publisher","unstructured":"Abdullah S, Matthews M, Murnane EL, Gay G, Choudhury T (2014) Towards circadian computing: \u201cearly to bed and early to rise\u201d makes some of us unhealthy and sleep deprived. In: Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing, UbiComp \u201914. ACM, New York, pp 673\u2013684. \n                    https:\/\/doi.org\/10.1145\/2632048.2632100","DOI":"10.1145\/2632048.2632100"},{"key":"1190_CR2","doi-asserted-by":"crossref","unstructured":"Avrahami D, Hudson SE (2006) Responsiveness in instant messaging: predictive models supporting inter-personal communication. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, pp 731\u2013740","DOI":"10.1145\/1124772.1124881"},{"key":"1190_CR3","doi-asserted-by":"crossref","unstructured":"Banovic N, Brant C, Mankoff J, Dey A (2014) Proactivetasks: the short of mobile device use sessions. In: Proceedings of the 16th international conference on human-computer interaction with mobile devices & services. ACM, pp 243\u2013252","DOI":"10.1145\/2628363.2628380"},{"key":"1190_CR4","doi-asserted-by":"crossref","unstructured":"Ben Abdesslem F, Phillips A, Henderson T (2009) Less is more: energy-efficient mobile sensing with senseless. In: Proceedings of the 1st ACM workshop on networking, systems, and applications for mobile handhelds. ACM, pp 61\u201362","DOI":"10.1145\/1592606.1592621"},{"key":"1190_CR5","doi-asserted-by":"crossref","unstructured":"van Berkel N, Luo C, Anagnostopoulos T, Ferreira D, Goncalves J, Hosio S, Kostakos V (2016) A systematic assessment of smartphone usage gaps. In: Proceedings of the 2016 CHI conference on human factors in computing systems. ACM, pp 4711\u20134721","DOI":"10.1145\/2858036.2858348"},{"key":"1190_CR6","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.knosys.2011.07.021","volume":"26","author":"J Bobadilla","year":"2012","unstructured":"Bobadilla J, Ortega F, Hernando A, Bernal J (2012) A collaborative filtering approach to mitigate the new user cold start problem. Knowl-Based Syst 26:225\u2013238","journal-title":"Knowl-Based Syst"},{"issue":"1","key":"1190_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"key":"1190_CR8","doi-asserted-by":"crossref","unstructured":"Brown B, McGregor M, McMillan D (2014) 100 days of iphone use: understanding the details of mobile device use. In: Proceedings of the 16th international conference on human-computer interaction with mobile devices & services. ACM, pp 223\u2013232","DOI":"10.1145\/2628363.2628377"},{"key":"1190_CR9","unstructured":"Carroll A, Heiser G (2010) An analysis of power consumption in a smartphone"},{"issue":"3","key":"1190_CR10","first-page":"27","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang CC, Lin CJ (2011) Libsvm: a library for support vector machines. ACM Trans Intell Syst Technol (TIST) 2(3):27","journal-title":"ACM Trans Intell Syst Technol (TIST)"},{"key":"1190_CR11","doi-asserted-by":"crossref","unstructured":"Chon Y, Talipov E, Shin H, Cha H (2011) Mobility prediction-based smartphone energy optimization for everyday location monitoring. In: Proceedings of the 9th ACM conference on embedded networked sensor systems. ACM, pp 82\u201395","DOI":"10.1145\/2070942.2070952"},{"key":"1190_CR12","unstructured":"Do TMT, Blom J, Gatica-Perez D (2011) Smartphone usage in the wild: a large-scale analysis of applications and context. In: Proceedings of the 13th international conference on multimodal interfaces. ACM, pp 353\u2013360"},{"key":"1190_CR13","doi-asserted-by":"crossref","unstructured":"Falaki H, Mahajan R, Kandula S, Lymberopoulos D, Govindan R, Estrin D (2010) Diversity in smartphone usage. In: Proceedings of the 8th international conference on mobile systems, applications, and services. ACM, pp 179\u2013194","DOI":"10.1145\/1814433.1814453"},{"key":"1190_CR14","doi-asserted-by":"crossref","unstructured":"Ferreira D, Dey A, Kostakos V (2011) Understanding human-smartphone concerns: a study of battery life. Pervas Comput, 19\u201333","DOI":"10.1007\/978-3-642-21726-5_2"},{"key":"1190_CR15","doi-asserted-by":"crossref","unstructured":"Ferreira D, Ferreira E, Goncalves J, Kostakos V, Dey AK (2013) Revisiting human-battery interaction with an interactive battery interface. In: Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing. ACM, pp 563\u2013572","DOI":"10.1145\/2493432.2493465"},{"key":"1190_CR16","doi-asserted-by":"crossref","unstructured":"Ferreira D, Goncalves J, Kostakos V, Barkhuus L, Dey AK (2014) Contextual experience sampling of mobile application micro-usage. In: Proceedings of the 16th international conference on human-computer interaction with mobile devices & services. ACM, pp 91\u2013100","DOI":"10.1145\/2628363.2628367"},{"key":"1190_CR17","doi-asserted-by":"publisher","first-page":"6","DOI":"10.3389\/fict.2015.00006","volume":"2","author":"D Ferreira","year":"2015","unstructured":"Ferreira D, Kostakos V, Dey AK (2015) Aware: mobile context instrumentation framework. Front ICT 2:6","journal-title":"Front ICT"},{"key":"1190_CR18","doi-asserted-by":"crossref","unstructured":"Fischer JE, Greenhalgh C, Benford S (2011) Investigating episodes of mobile phone activity as indicators of opportune moments to deliver notifications. In: Proceedings of the 13th international conference on human computer interaction with mobile devices and services. ACM, pp 181\u2013190","DOI":"10.1145\/2037373.2037402"},{"issue":"14","key":"1190_CR19","doi-asserted-by":"publisher","first-page":"2225","DOI":"10.1016\/j.patrec.2010.03.014","volume":"31","author":"R Genuer","year":"2010","unstructured":"Genuer R, Poggi JM, Tuleau-Malot C (2010) Variable selection using random forests. Pattern Recogn Lett 31(14):2225\u20132236","journal-title":"Pattern Recogn Lett"},{"key":"1190_CR20","unstructured":"Google (2017) Activity recognition api, \n                    https:\/\/developers.google.com\/android\/reference\/com\/google\/android\/gms\/location\/ActivityRecognitionApi"},{"key":"1190_CR21","unstructured":"Google (2017) Sensor, \n                    http:\/\/developer.android.com\/reference\/android\/hardware\/Sensor.html"},{"issue":"6","key":"1190_CR22","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1089\/cpb.2008.0096","volume":"11","author":"JH Ha","year":"2008","unstructured":"Ha JH, Chin B, Park DH, Ryu SH, Yu J (2008) Characteristics of excessive cellular phone use in korean adolescents. CyberPsychol Behav 11(6):783\u2013784","journal-title":"CyberPsychol Behav"},{"issue":"1","key":"1190_CR23","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The weka data mining software: an update. ACM SIGKDD Explor Newslett 11(1):10\u201318","journal-title":"ACM SIGKDD Explor Newslett"},{"key":"1190_CR24","unstructured":"Joachims T (1998) Text categorization with support vector machines: learning with many relevant features. Machine learning: ECML-98, 137\u2013142"},{"key":"1190_CR25","doi-asserted-by":"publisher","unstructured":"Jones SL, Ferreira D, Hosio S, Goncalves J, Kostakos V (2015) Revisitation analysis of smartphone app use. In: International joint conference on pervasive and ubiquitous computing, UbiComp, pp 1197\u20131208. \n                    https:\/\/doi.org\/10.1145\/2750858.2807542\n                    \n                  , \n                    http:\/\/people.eng.unimelb.edu.au\/vkostakos\/files\/papers\/ubicomp15.pdf","DOI":"10.1145\/2750858.2807542"},{"issue":"1","key":"1190_CR26","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1186\/1472-6947-11-51","volume":"11","author":"M Khalilia","year":"2011","unstructured":"Khalilia M, Chakraborty S, Popescu M (2011) Predicting disease risks from highly imbalanced data using random forest. BMC Med Inform Decis Making 11(1):51","journal-title":"BMC Med Inform Decis Making"},{"key":"1190_CR27","doi-asserted-by":"crossref","unstructured":"Khoshgoftaar TM, Golawala M, Van Hulse J (2007) An empirical study of learning from imbalanced data using random forest. In: 19th IEEE International conference on tools with artificial intelligence, 2007. ICTAI 2007, vol 2. IEEE, pp 310\u2013317","DOI":"10.1109\/ICTAI.2007.46"},{"issue":"4","key":"1190_CR28","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/3085556","volume":"24","author":"V Kostakos","year":"2017","unstructured":"Kostakos V, Musolesi M (2017) Avoiding pitfalls when using machine learning in hci studies. Interactions 24(4):34\u201337","journal-title":"Interactions"},{"key":"1190_CR29","unstructured":"Krstic I (2016) Behind the scenes of ios security. Black Hat"},{"key":"1190_CR30","doi-asserted-by":"crossref","unstructured":"Lane N, Miluzzo E, Lu H, Peebles D, Choudhury T, Campbell A (2010) A survey of mobile phone sensing. IEEE Commun Mag, 48(9)","DOI":"10.1109\/MCOM.2010.5560598"},{"issue":"8","key":"1190_CR31","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1016\/j.sysarc.2014.04.001","volume":"60","author":"M Lee","year":"2014","unstructured":"Lee M, Bak C, Lee JW (2014) A prediction and auto-execution system of smartphone application services based on user context-awareness. J Syst Archit 60(8):702\u2013710","journal-title":"J Syst Archit"},{"key":"1190_CR32","unstructured":"Liu Y, Xu C, Cheung SC (2013) Where has my battery gone? finding sensor related energy black holes in smartphone applications. In: 2013 IEEE International conference on pervasive computing and communications (PerCom). IEEE, pp 2\u201310"},{"key":"1190_CR33","doi-asserted-by":"crossref","unstructured":"Lu H, Yang J, Liu Z, Lane N, Choudhury T, Campbell A (2010) The jigsaw continuous sensing engine for mobile phone applications. In: Proceedings of the 8th ACM conference on embedded networked sensor systems. ACM, pp 71\u201384","DOI":"10.1145\/1869983.1869992"},{"key":"1190_CR34","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s00779-011-0412-2","volume":"16","author":"A Oulasvirta","year":"2012","unstructured":"Oulasvirta A, Rattenbury T, Ma L, Raita E (2012) Habits make smartphone use more pervasive. Pers Ubiquit Comput 16:105\u2013114","journal-title":"Pers Ubiquit Comput"},{"key":"1190_CR35","doi-asserted-by":"crossref","unstructured":"Pielot M (2014) Large-scale evaluation of call-availability prediction. In: Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing. ACM, pp 933\u2013937","DOI":"10.1145\/2632048.2632060"},{"key":"1190_CR36","doi-asserted-by":"crossref","unstructured":"Pielot M, Dingler T, Pedro JS, Oliver N (2015) When attention is not scarce-detecting boredom from mobile phone usage. In: Proceedings of the 2015 ACM international joint conference on pervasive and ubiquitous computing. ACM, pp 825\u2013836","DOI":"10.1145\/2750858.2804252"},{"key":"1190_CR37","doi-asserted-by":"crossref","unstructured":"Pielot M, de Oliveira R, Kwak H, Oliver N (2014) Didn\u2019t you see my message?: predicting attentiveness to mobile instant messages. In: Proceedings of the 32nd annual ACM conference on human factors in computing systems. ACM, pp 3319\u20133328","DOI":"10.1145\/2556288.2556973"},{"issue":"1","key":"1190_CR38","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MPRV.2014.15","volume":"13","author":"B Poppinga","year":"2014","unstructured":"Poppinga B, Heuten W, Boll S (2014) Sensor-based identification of opportune moments for triggering notifications. IEEE Pervas Comput 13(1):22\u201329","journal-title":"IEEE Pervas Comput"},{"key":"1190_CR39","doi-asserted-by":"crossref","unstructured":"Shin C, Hong JH, Dey AK (2012) Understanding and prediction of mobile application usage for smart phones. In: Proceedings of the 2012 ACM conference on ubiquitous computing. ACM, pp 173\u2013182","DOI":"10.1145\/2370216.2370243"},{"key":"1190_CR40","doi-asserted-by":"crossref","unstructured":"Song J, S\u00f6r\u00f6s G, Pece F, Fanello SR, Izadi S, Keskin C, Hilliges O (2014) In-air gestures around unmodified mobile devices. In: Proceedings of the 27th annual ACM symposium on user interface software and technology. ACM, pp 319\u2013329","DOI":"10.1145\/2642918.2647373"},{"issue":"1","key":"1190_CR41","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1186\/1471-2105-8-25","volume":"8","author":"C Strobl","year":"2007","unstructured":"Strobl C, Boulesteix AL, Zeileis A, Hothorn T (2007) Bias in random forest variable importance measures: illustrations, sources and a solution. BMC Bioinform 8(1):25","journal-title":"BMC Bioinform"},{"issue":"6","key":"1190_CR42","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1021\/ci034160g","volume":"43","author":"V Svetnik","year":"2003","unstructured":"Svetnik V, Liaw A, Tong C, Culberson JC, Sheridan RP, Feuston BP (2003) Random forest: a classification and regression tool for compound classification and qsar modeling. J Chem Inf Comput Sci 43 (6):1947\u20131958","journal-title":"J Chem Inf Comput Sci"},{"key":"1190_CR43","doi-asserted-by":"crossref","unstructured":"Truong KN, Shihipar T, Wigdor DJ (2014) Slide to x: unlocking the potential of smartphone unlocking. In: Proceedings of the 32nd annual ACM conference on human factors in computing systems. ACM, pp 3635\u20133644","DOI":"10.1145\/2556288.2557044"},{"issue":"5","key":"1190_CR44","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/s00779-008-0197-0","volume":"13","author":"H Verkasalo","year":"2009","unstructured":"Verkasalo H (2009) Contextual patterns in mobile service usage. Pers Ubiquit Comput 13(5):331\u2013342","journal-title":"Pers Ubiquit Comput"},{"key":"1190_CR45","doi-asserted-by":"crossref","unstructured":"Xu Y, Lin M, Lu H, Cardone G, Lane N, Chen Z, Campbell A, Choudhury T (2013) Preference, context and communities: a multi-faceted approach to predicting smartphone app usage patterns. In: Proceedings of the 2013 international symposium on wearable computers. ACM, pp 69\u201376","DOI":"10.1145\/2493988.2494333"},{"key":"1190_CR46","doi-asserted-by":"crossref","unstructured":"Yan T, Chu D, Ganesan D, Kansal A, Liu J (2012) Fast app launching for mobile devices using predictive user context. In: Proceedings of the 10th international conference on mobile systems, applications, and services. ACM, pp 113\u2013126","DOI":"10.1145\/2307636.2307648"},{"issue":"2","key":"1190_CR47","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.compenvurbsys.2011.07.003","volume":"36","author":"Y Yuan","year":"2012","unstructured":"Yuan Y, Raubal M, Liu Y (2012) Correlating mobile phone usage and travel behavior\u2013a case study of harbin, china. Comput Environ Urban Syst 36(2):118\u2013130","journal-title":"Comput Environ Urban Syst"},{"key":"1190_CR48","doi-asserted-by":"crossref","unstructured":"Zhuang Z, Kim KH, Singh JP (2010) Improving energy efficiency of location sensing on smartphones. In: Proceedings of the 8th international conference on mobile systems, applications, and services. ACM, pp 315\u2013330","DOI":"10.1145\/1814433.1814464"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-018-01190-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-018-01190-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-018-01190-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,11]],"date-time":"2019-12-11T19:15:15Z","timestamp":1576091715000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-018-01190-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,12]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["1190"],"URL":"https:\/\/doi.org\/10.1007\/s00779-018-01190-0","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"type":"print","value":"1617-4909"},{"type":"electronic","value":"1617-4917"}],"subject":[],"published":{"date-parts":[[2018,12,12]]},"assertion":[{"value":"6 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}