{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:20:27Z","timestamp":1765268427298},"reference-count":50,"publisher":"Oxford University Press (OUP)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3,1]]},"DOI":"10.1093\/comjnl\/bxx082","type":"journal-article","created":{"date-parts":[[2017,8,28]],"date-time":"2017-08-28T11:06:21Z","timestamp":1503918381000},"page":"349-368","source":"Crossref","is-referenced-by-count":69,"title":["Individualized Time-Series Segmentation for Mining Mobile Phone User Behavior"],"prefix":"10.1093","volume":"61","author":[{"given":"Iqbal H","family":"Sarker","sequence":"first","affiliation":[{"name":"Department of Computer Science and Software Engineering, School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, Australia"}]},{"given":"Alan","family":"Colman","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering, School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, Australia"}]},{"given":"Muhammad Ashad","family":"Kabir","sequence":"additional","affiliation":[{"name":"School of Computing and Mathematics, Charles Sturt University, NSW, Australia"}]},{"given":"Jun","family":"Han","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering, School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, Australia"}]}],"member":"286","published-online":{"date-parts":[[2017,9,7]]},"reference":[{"key":"key\n\t\t\t\t20180307065455_bxx082C1","author":"Pejovic","year":"2014"},{"key":"key\n\t\t\t\t20180307065455_bxx082C2","first-page":"21:1","article-title":"Behavior-based adaptive call predictor","volume":"6","author":"Phithakkitnukoon","year":"2011","journal-title":"ACM Trans. Auton. Adaptive Syst."},{"key":"key\n\t\t\t\t20180307065455_bxx082C3","author":"Srinivasan","year":"2014"},{"key":"key\n\t\t\t\t20180307065455_bxx082C4","author":"Mehrotra","year":"2016"},{"key":"key\n\t\t\t\t20180307065455_bxx082C5","author":"Halvey","year":"2005"},{"key":"key\n\t\t\t\t20180307065455_bxx082C6","doi-asserted-by":"crossref","first-page":"58:1","DOI":"10.1145\/2532515","article-title":"Mining mobile user preferences for personalized context-aware recommendation","volume":"5","author":"Zhu","year":"2014","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"key\n\t\t\t\t20180307065455_bxx082C7","author":"Halvey","year":"2006"},{"key":"key\n\t\t\t\t20180307065455_bxx082C8","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/s00779-013-0640-8","article-title":"A probabilistic approach to mining mobile phone data sequences","volume":"18","author":"Farrahi","year":"2014","journal-title":"Person. Ubiquitous Comput."},{"key":"key\n\t\t\t\t20180307065455_bxx082C9","author":"Song"},{"key":"key\n\t\t\t\t20180307065455_bxx082C10","author":"Xu","year":"2013"},{"key":"key\n\t\t\t\t20180307065455_bxx082C11","author":"Mukherji","year":"2014"},{"key":"key\n\t\t\t\t20180307065455_bxx082C12","doi-asserted-by":"crossref","first-page":"908","DOI":"10.1093\/comjnl\/bxv075","article-title":"Predicting the location and time of mobile phone users by using sequential pattern mining techniques","volume":"59","author":"Ozer","year":"2016","journal-title":"Comput. J."},{"key":"key\n\t\t\t\t20180307065455_bxx082C13","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1007\/978-3-642-14715-9_3","volume-title":"Human Behavior Understanding. Lecture Notes in Computer Science","author":"Phithakkitnukoon","year":"2010"},{"key":"key\n\t\t\t\t20180307065455_bxx082C14","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.pmcj.2013.03.006","article-title":"Where and what: using smartphones to predict next locations and applications in daily life","volume":"12","author":"Do","year":"2014","journal-title":"Pervasive Mobile Comput."},{"key":"key\n\t\t\t\t20180307065455_bxx082C15","author":"Agrawal","year":"1994"},{"key":"key\n\t\t\t\t20180307065455_bxx082C16","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/360402.360423","article-title":"Understanding the crucial differences between classification and discovery of association rules: a position paper","volume":"2","author":"Freitas","year":"2000","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"key\n\t\t\t\t20180307065455_bxx082C17","author":"Sarker","year":"2016"},{"key":"key\n\t\t\t\t20180307065455_bxx082C18","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s00779-005-0046-3","article-title":"Reality mining: sensing complex social systems","volume":"10","author":"Eagle","year":"2006","journal-title":"Person. Ubiquitous Comput."},{"key":"key\n\t\t\t\t20180307065455_bxx082C19","doi-asserted-by":"crossref","first-page":"1456","DOI":"10.1109\/TC.2014.2298013","article-title":"Time-series pattern based effective noise generation for privacy protection on cloud","volume":"64","author":"Zhang","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"key\n\t\t\t\t20180307065455_bxx082C20","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-642-03270-7_5","volume-title":"Transactions on Edutainment II","author":"Paireekreng","year":"2009"},{"key":"key\n\t\t\t\t20180307065455_bxx082C21","author":"Jayarajah","year":"2014"},{"key":"key\n\t\t\t\t20180307065455_bxx082C22","author":"Do","year":"2010"},{"key":"key\n\t\t\t\t20180307065455_bxx082C23","doi-asserted-by":"crossref","first-page":"3098","DOI":"10.1109\/TKDE.2016.2592527","article-title":"Scalable daily human behavioral pattern mining from multivariate temporal data","volume":"28","author":"Rawassizadeh","year":"2016","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"key\n\t\t\t\t20180307065455_bxx082C24","author":"Farrahi","year":"2008"},{"key":"key\n\t\t\t\t20180307065455_bxx082C25","author":"Karatzoglou","year":"2012"},{"key":"key\n\t\t\t\t20180307065455_bxx082C26","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/s00779-011-0412-2","article-title":"Habits make smartphone use more pervasive","volume":"16","author":"Oulasvirta","year":"2012","journal-title":"Person. Ubiquitous Comput."},{"key":"key\n\t\t\t\t20180307065455_bxx082C27","author":"Yu","year":"2012"},{"key":"key\n\t\t\t\t20180307065455_bxx082C28","author":"Naboulsi","year":"2014"},{"key":"key\n\t\t\t\t20180307065455_bxx082C29","author":"Dashdorj","year":"2013"},{"key":"key\n\t\t\t\t20180307065455_bxx082C30","author":"Shin","year":"2009"},{"key":"key\n\t\t\t\t20180307065455_bxx082C31","author":"Shin","year":"2012"},{"key":"key\n\t\t\t\t20180307065455_bxx082C32","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/JSTSP.2010.2049513","article-title":"Probabilistic mining of socio-geographic routines from mobile phone data","volume":"4","author":"Farrahi","year":"2010","journal-title":"IEEE J. Selected Top. Signal Process."},{"key":"key\n\t\t\t\t20180307065455_bxx082C33","first-page":"2060","article-title":"A mobile intelligent interruption management system","volume":"16","author":"Zulkernain","year":"2010","journal-title":"J. UCS."},{"key":"key\n\t\t\t\t20180307065455_bxx082C34","author":"Parate","year":"2013"},{"key":"key\n\t\t\t\t20180307065455_bxx082C35","author":"Ma","year":"2012"},{"key":"key\n\t\t\t\t20180307065455_bxx082C36","author":"Cao","year":"2010"},{"key":"key\n\t\t\t\t20180307065455_bxx082C37","author":"Das","year":"1998"},{"key":"key\n\t\t\t\t20180307065455_bxx082C38","doi-asserted-by":"crossref","first-page":"914","DOI":"10.1109\/TKDE.2010.155","article-title":"Mining cluster-based temporal mobile sequential patterns in location-based service environments","volume":"23","author":"Lu","year":"2011","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"key\n\t\t\t\t20180307065455_bxx082C39","doi-asserted-by":"crossref","first-page":"185","DOI":"10.17485\/ijst\/2015\/v8iS7\/64308","article-title":"Modified pso based optimal time interval identification for predicting mobile user behaviour in location based services","volume":"8","author":"Kandasamy","year":"2015","journal-title":"Indian J. Sci. Technol."},{"key":"key\n\t\t\t\t20180307065455_bxx082C40","author":"Hartono","year":"2014"},{"key":"key\n\t\t\t\t20180307065455_bxx082C41","author":"Shokoohi-Yekta","year":"2015"},{"key":"key\n\t\t\t\t20180307065455_bxx082C42","author":"Jang","year":"2015"},{"key":"key\n\t\t\t\t20180307065455_bxx082C43","author":"Henze","year":"2011"},{"key":"key\n\t\t\t\t20180307065455_bxx082C44","author":"Xu","year":"2011"},{"key":"key\n\t\t\t\t20180307065455_bxx082C45","author":"B\u00f6hmer","year":"2011"},{"key":"key\n\t\t\t\t20180307065455_bxx082C46","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1109\/TNN.2005.845141","article-title":"Survey of clustering algorithms","volume":"16","author":"Xu","year":"2005","journal-title":"IEEE Trans. Neural Netw."},{"key":"key\n\t\t\t\t20180307065455_bxx082C47","volume-title":"Data Mining: Concepts and Techniques","author":"Han","year":"2011"},{"key":"key\n\t\t\t\t20180307065455_bxx082C48","first-page":"6:1","article-title":"Nuisance level of a voice call","volume":"5","author":"Kolan","year":"2008","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl. (TOMM)"},{"key":"key\n\t\t\t\t20180307065455_bxx082C49","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1145\/1978622.1978628","article-title":"Towards ubiquitous computing with call prediction","volume":"15","author":"Phithakkitnukoon","year":"2011","journal-title":"ACM SIGMOBILE Mobile Comput. Commun. Rev."},{"key":"key\n\t\t\t\t20180307065455_bxx082C50","author":"Chang","year":"2015"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/3\/349\/24269357\/bxx082.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,7]],"date-time":"2018-03-07T11:55:14Z","timestamp":1520423714000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/3\/349\/4107199"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,7]]},"references-count":50,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2017,9,7]]},"published-print":{"date-parts":[[2018,3,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxx082","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,3]]},"published":{"date-parts":[[2017,9,7]]}}}