{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:51:46Z","timestamp":1742392306453,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,12]]},"DOI":"10.1109\/icpads.2007.4447725","type":"proceedings-article","created":{"date-parts":[[2008,2,15]],"date-time":"2008-02-15T17:32:18Z","timestamp":1203096738000},"page":"1-8","source":"Crossref","is-referenced-by-count":17,"title":["Mining temporal mobile sequential patterns in location-based service environments"],"prefix":"10.1109","author":[{"given":"V.S.","family":"Tseng","sequence":"first","affiliation":[]},{"given":"R.H.-C.","family":"Lu","sequence":"additional","affiliation":[]},{"family":"Cheng-Hsien Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337035"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1141277.1141478"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2005.248"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.infsof.2005.12.014","article-title":"Efficient Mining and Prediction of User Behavior Patterns in Mobile Web Systems","volume":"48","author":"tseng","year":"2006","journal-title":"Information and Software Technology"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/2.876290"},{"key":"ref15","first-page":"203","article-title":"Transaction in Mobile Electronic Commerce","author":"veijalainene","year":"1999","journal-title":"Proceeding of International Workshop on Foundations of Models and Languages for Data and Objects"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2005.855504"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2005.147"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/69.553155"},{"journal-title":"Adaptation in Natural and Artificial System","year":"1975","author":"holland","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124778"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/583982.583990"},{"key":"ref7","first-page":"285","article-title":"Efficient Mining of User Behaviors by Temporal Mobile Access Patterns","volume":"7","author":"lee","year":"2007","journal-title":"Int J Comput Sci Inf Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1995.380415"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/90.532872"}],"event":{"name":"2007 International Conference on Parallel and Distributed Systems","start":{"date-parts":[[2007,12,5]]},"location":"Hsinchu","end":{"date-parts":[[2007,12,7]]}},"container-title":["2007 International Conference on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4447704\/4447779\/04447725.pdf?arnumber=4447725","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T04:34:52Z","timestamp":1497760492000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4447725\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icpads.2007.4447725","relation":{},"subject":[],"published":{"date-parts":[[2007,12]]}}}