{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:54:24Z","timestamp":1767084864847,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/cidm.2013.6597218","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T16:09:55Z","timestamp":1379606995000},"page":"59-64","source":"Crossref","is-referenced-by-count":51,"title":["Ready-to-use activity recognition for smartphones"],"prefix":"10.1109","author":[{"given":"Pekka","family":"Siirtola","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Juha","family":"Roning","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2458-13-32"},{"year":"0","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2007.899496"},{"journal-title":"Principles of Data Mining","year":"2001","author":"hand","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79142-3_7"},{"key":"3","first-page":"796","article-title":"Activity recognition from accelerometer data on a mobile phone","volume":"5518","author":"brezmes","year":"2009","journal-title":"Distributed Computing Artificial Intelligence Bioinformatics Soft Computing and Ambient Assisted Living Ser Lecture Notes in Computer Science"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1869983.1869992"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2012.155"},{"year":"0","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/APWCS.2010.18"},{"key":"6","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1007\/978-3-642-16355-5_42","article-title":"Activity recognition on an accelerometer embedded mobile phone with varying positions and orientations","volume":"6406","author":"sun","year":"2010","journal-title":"Ubiquitous Intelligence and Computing Ser Lecture Notes in Computer Science"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.312"},{"key":"4","article-title":"Community-guided learning: Exploiting mobile sensor users to model human behavior","author":"peebles","year":"2010","journal-title":"Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence AAAI 2010"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1964897.1964918"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23808-6_44"}],"event":{"name":"2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM)","start":{"date-parts":[[2013,4,16]]},"location":"Singapore, Singapore","end":{"date-parts":[[2013,4,19]]}},"container-title":["2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6588692\/6597208\/06597218.pdf?arnumber=6597218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T22:11:39Z","timestamp":1498083099000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6597218\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cidm.2013.6597218","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}