{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T21:05:18Z","timestamp":1774645518749,"version":"3.50.1"},"reference-count":214,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,8,5]],"date-time":"2015-08-05T00:00:00Z","timestamp":1438732800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EPJ Data Sci."],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1140\/epjds\/s13688-015-0046-0","type":"journal-article","created":{"date-parts":[[2015,8,3]],"date-time":"2015-08-03T10:18:20Z","timestamp":1438597100000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":463,"title":["A survey of results on mobile phone datasets analysis"],"prefix":"10.1140","volume":"4","author":[{"given":"Vincent D","family":"Blondel","sequence":"first","affiliation":[]},{"given":"Adeline","family":"Decuyper","sequence":"additional","affiliation":[]},{"given":"Gautier","family":"Krings","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,5]]},"reference":[{"key":"46_CR1","unstructured":"The world in 2014: ICT facts and figures. International Telecommunication Union. http:\/\/www.itu.int\/"},{"issue":"7241","key":"46_CR2","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1038\/458959a","volume":"458","author":"R Kwok","year":"2009","unstructured":"Kwok R (2009) Personal technology: phoning in data. Nature 458(7241):959-961","journal-title":"Nature"},{"key":"46_CR3","unstructured":"de Montjoye YA, Smoreda Z, Trinquart R, Ziemlicki C, Blondel VD (2014) D4D-Senegal: the second mobile phone data for development challenge. ArXiv preprint arXiv:1407.4885"},{"key":"46_CR4","unstructured":"Telecom Italia big data challenge. http:\/\/www.telecomitalia.com\/tit\/en\/bigdatachallenge\/contest.html"},{"issue":"4","key":"46_CR5","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s00779-005-0046-3","volume":"10","author":"N Eagle","year":"2006","unstructured":"Eagle N, Pentland A (2006) Reality mining: sensing complex social systems. Pers Ubiquitous Comput 10(4):255-268","journal-title":"Pers Ubiquitous Comput"},{"key":"46_CR6","first-page":"257","volume-title":"IEEE second international conference on social computing (SocialCom)","author":"J Karikoski","year":"2010","unstructured":"Karikoski J, Nelimarkka M (2010) Measuring social relations: case otasizzle. In: IEEE second international conference on social computing (SocialCom). IEEE Press, New York, pp\u00a0257-263"},{"issue":"4","key":"46_CR7","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0095978","volume":"9","author":"A Stopczynski","year":"2014","unstructured":"Stopczynski A, Sekara V, Sapiezynski P, Cuttone A, Madsen MM, Larsen JE, Lehmann S (2014) Measuring large-scale social networks with high resolution. PLoS ONE 9(4):e95978","journal-title":"PLoS ONE"},{"key":"46_CR8","volume-title":"Human behavior and the principle of least effort: an introduction to human ecology","author":"GK Zipf","year":"1949","unstructured":"Zipf GK (1949) Human behavior and the principle of least effort: an introduction to human ecology. Addison-Wesley Press, Reading"},{"key":"46_CR9","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/3-540-44816-0_11","volume-title":"Advances in intelligent data analysis","author":"C Cortes","year":"2001","unstructured":"Cortes C, Pregibon D, Volinsky C (2001) Communities of interest. In: Hoffman F et al. (eds) Advances in intelligent data analysis. LNCS, vol\u00a02189. Springer, Berlin, pp\u00a0105-114"},{"key":"46_CR10","unstructured":"Krings G (2012) Extraction of information from large networks. PhD thesis, Universit\u00e9 catholique de Louvain"},{"key":"46_CR11","series-title":"DIMACS Series in Discrete Mathematics and Theoretical Computer Science","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1090\/dimacs\/050\/06","volume-title":"External memory algorithms","author":"J Abello","year":"1999","unstructured":"Abello J, Pardalos PM, Resende MGC (1999) On maximum clique problems in very large graphs. In: External memory algorithms. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol 50. Am Math Soc, Providence, pp\u00a0119-130"},{"key":"46_CR12","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1145\/335305.335326","volume-title":"Proceedings of the thirty-second annual ACM symposium on theory of computing","author":"W Aiello","year":"2000","unstructured":"Aiello W, Chung F, Lu L (2000) A random graph model for massive graphs. In: Proceedings of the thirty-second annual ACM symposium on theory of computing. ACM, New York, pp\u00a0171-180"},{"issue":"21","key":"46_CR13","doi-asserted-by":"crossref","first-page":"5317","DOI":"10.1016\/j.physa.2008.05.014","volume":"387","author":"R Lambiotte","year":"2008","unstructured":"Lambiotte R, Blondel VD, de Kerchove C, Huens E, Prieur C, Smoreda X, Van Dooren P (2008) Geographical dispersal of mobile communication networks. Physica A 387(21):5317-5325","journal-title":"Physica A"},{"issue":"18","key":"46_CR14","doi-asserted-by":"crossref","first-page":"7332","DOI":"10.1073\/pnas.0610245104","volume":"104","author":"JP Onnela","year":"2007","unstructured":"Onnela JP, Saramaki J, Hyvonen J, Szabo G, Lazer D, Kaski K, Kertesz J, Barabasi AL (2007) Structure and tie strengths in mobile communication networks. Proc Natl Acad Sci USA 104(18):7332-7336","journal-title":"Proc Natl Acad Sci USA"},{"key":"46_CR15","volume":"16","author":"M-X Li","year":"2014","unstructured":"Li M-X, Palchykov V, Jiang Z-Q, Kaski K, Kert\u00e9sz J, Miccich\u00e8 S, Tumminello M, Zhou W-X, Mantegna RN (2014) Statistically validated mobile communication networks: evolution of motifs in European and Chinese data. New J Phys 16:083038. doi: 10.1088\/1367-2630\/16\/8\/083038","journal-title":"New J Phys"},{"issue":"2","key":"46_CR16","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1287\/mnsc.1090.1091","volume":"56","author":"Y Kim","year":"2010","unstructured":"Kim Y, Telang R, Vogt WB, Krishnan R (2010) An empirical analysis of mobile voice service and SMS: a structural model. Manag Sci 56(2):234-252","journal-title":"Manag Sci"},{"issue":"2","key":"46_CR17","first-page":"138","volume":"2","author":"L Kovanen","year":"2011","unstructured":"Kovanen L, Saram J, Kaski K (2011) Reciprocity of mobile phone calls. JDySES 2(2):138-151","journal-title":"JDySES"},{"issue":"2","key":"46_CR18","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1177\/1461444811412711","volume":"14","author":"R Ling","year":"2012","unstructured":"Ling R, Bertel TF, Sunds\u00f8y PR (2012) The socio-demographics of texting: an analysis of traffic data. New Media Soc 14(2):281-298. doi: 10.1177\/1461444811412711","journal-title":"New Media Soc"},{"key":"46_CR19","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1145\/1183614.1183678","volume-title":"Proceedings of the 15th ACM international conference on information and knowledge management","author":"AA Nanavati","year":"2006","unstructured":"Nanavati AA, Gurumurthy S, Das G, Chakraborty D, Dasgupta K, Mukherjea S, Joshi A (2006) On the structural properties of massive telecom call graphs: findings and implications. In: Proceedings of the 15th ACM international conference on information and knowledge management. ACM, New York, pp\u00a0435-444"},{"issue":"5939","key":"46_CR20","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1126\/science.1173299","volume":"325","author":"AL Barab\u00e1si","year":"2009","unstructured":"Barab\u00e1si AL (2009) Scale-free networks: a decade and beyond. Science 325(5939):412-413","journal-title":"Science"},{"issue":"6684","key":"46_CR21","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts DJ, Strogatz SH (1998) Collective dynamics of small-world networks. Nature 393(6684):440-442","journal-title":"Nature"},{"issue":"4","key":"46_CR22","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1137\/070710111","volume":"51","author":"A Clauset","year":"2009","unstructured":"Clauset A, Shalizi CR, Newman ME (2009) Power-law distributions in empirical data. SIAM Rev 51(4):661-703","journal-title":"SIAM Rev"},{"key":"46_CR23","doi-asserted-by":"crossref","first-page":"596","DOI":"10.1145\/1401890.1401963","volume-title":"Proceeding of the 14th ACM SIGKDD international conference on knowledge discovery and data mining","author":"M Seshadri","year":"2008","unstructured":"Seshadri M, Machiraju S, Sridharan A, Bolot J, Faloutsos C, Leskovec J (2008) Mobile call graphs: beyond power-law and lognormal distributions. In: Proceeding of the 14th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, pp\u00a0596-604"},{"key":"46_CR24","doi-asserted-by":"crossref","DOI":"10.1140\/epjds4","volume":"1","author":"G Krings","year":"2012","unstructured":"Krings G, Karsai M, Bernhardsson S, Blondel VD, Saram\u00e4ki J (2012) Effects of time window size and placement on the structure of an aggregated communication network. EPJ Data Sci 1:4","journal-title":"EPJ Data Sci"},{"key":"46_CR25","doi-asserted-by":"crossref","DOI":"10.1088\/1367-2630\/9\/6\/179","volume":"9","author":"JP Onnela","year":"2007","unstructured":"Onnela JP, Saramaki J, Hyvonen J, Szabo G, de Menezes MA, Kaski K, Barabasi AL, Kertesz J (2007) Analysis of a large-scale weighted network of one-to-one human communication. New J Phys 9:179","journal-title":"New J Phys"},{"key":"46_CR26","doi-asserted-by":"crossref","first-page":"1360","DOI":"10.1086\/225469","volume":"78","author":"MS Granovetter","year":"1973","unstructured":"Granovetter MS (1973) The strength of weak ties. Am J Sociol 78:1360-1380","journal-title":"Am J Sociol"},{"issue":"6","key":"46_CR27","volume":"71","author":"J-P Onnela","year":"2005","unstructured":"Onnela J-P, Saram\u00e4ki J, Kert\u00e9sz J, Kaski K (2005) Intensity and coherence of motifs in weighted complex networks. Phys Rev E 71(6):065103","journal-title":"Phys Rev E"},{"key":"46_CR28","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1145\/1557019.1557054","volume-title":"Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining","author":"N Du","year":"2009","unstructured":"Du N, Faloutsos C, Wang B, Akoglu L (2009) Large human communication networks: patterns and a utility-driven generator. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, pp\u00a0269-278"},{"issue":"3","key":"46_CR29","doi-asserted-by":"crossref","first-page":"6218","DOI":"10.1016\/j.eswa.2008.07.072","volume":"36","author":"K Kianmehr","year":"2009","unstructured":"Kianmehr K, Alhajj R (2009) Calling communities analysis and identification using machine learning techniques. Expert Syst Appl 36(3):6218-6226","journal-title":"Expert Syst Appl"},{"key":"46_CR30","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1007\/978-3-540-88875-8_72","volume-title":"On the move to meaningful Internet systems: OTM 2008 workshops","author":"H Zhang","year":"2008","unstructured":"Zhang H, Dantu R (2008) Discovery of social groups using call detail records. In: On the move to meaningful Internet systems: OTM 2008 workshops. Springer, Berlin, pp\u00a0489-498"},{"issue":"5","key":"46_CR31","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevE.83.056125","volume":"83","author":"G Tib\u00e9ly","year":"2011","unstructured":"Tib\u00e9ly G, Kovanen L, Karsai M, Kaski K, Kert\u00e9sz J, Saram\u00e4ki J (2011) Communities and beyond: mesoscopic analysis of a large social network with complementary methods. Phys Rev E 83(5):056125","journal-title":"Phys Rev E"},{"key":"46_CR32","doi-asserted-by":"crossref","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"2008","author":"VD Blondel","year":"2008","unstructured":"Blondel VD, Guillaume JL, Lambiotte R, Mech ELJS (2008) Fast unfolding of communities in large networks. J Stat Mech 2008:P10008","journal-title":"J Stat Mech"},{"issue":"4","key":"46_CR33","doi-asserted-by":"crossref","first-page":"1118","DOI":"10.1073\/pnas.0706851105","volume":"105","author":"M Rosvall","year":"2008","unstructured":"Rosvall M, Bergstrom CT (2008) Maps of random walks on complex networks reveal community structure. Proc Natl Acad Sci USA 105(4):1118-1123","journal-title":"Proc Natl Acad Sci USA"},{"issue":"7136","key":"46_CR34","doi-asserted-by":"crossref","first-page":"664","DOI":"10.1038\/nature05670","volume":"446","author":"G Palla","year":"2007","unstructured":"Palla G, Barab\u00e1si AL, Vicsek T (2007) Quantifying social group evolution. Nature 446(7136):664-667","journal-title":"Nature"},{"issue":"7307","key":"46_CR35","doi-asserted-by":"crossref","first-page":"761","DOI":"10.1038\/nature09182","volume":"466","author":"YY Ahn","year":"2010","unstructured":"Ahn YY, Bagrow JP, Lehmann S (2010) Link communities reveal multiscale complexity in networks. Nature 466(7307):761-764","journal-title":"Nature"},{"issue":"5915","key":"46_CR36","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1126\/science.1167742","volume":"323","author":"D Lazer","year":"2009","unstructured":"Lazer D, Pentland A, Adamic L, Aral S, Barab\u00e1si A-L, Brewer D, Christakis N, Contractor N, Fowler J, Gutmann M, Jebara T, King G, Macy M, Roy D, Van Alstyne M (2009) Computational social science. Science 323(5915):721-723. http:\/\/www.sciencemag.org\/content\/323\/5915\/721.full.pdf . doi: 10.1126\/science.1167742","journal-title":"Science"},{"issue":"36","key":"46_CR37","doi-asserted-by":"crossref","first-page":"15274","DOI":"10.1073\/pnas.0900282106","volume":"106","author":"N Eagle","year":"2009","unstructured":"Eagle N, Pentland AS, Lazer D (2009) Inferring friendship network structure by using mobile phone data. Proc Natl Acad Sci USA 106(36):15274-15278","journal-title":"Proc Natl Acad Sci USA"},{"key":"46_CR38","first-page":"765","volume-title":"Proceedings of the 2015 conference on computer supported cooperative work\u00a0- CSCW\u201915","author":"J Wiese","year":"2015","unstructured":"Wiese J, Min J-K, Hong JI, Zimmerman J (2015) \u2018You never call, you never write\u2019: call and SMS logs do not always indicate tie strength. In: Proceedings of the 2015 conference on computer supported cooperative work\u00a0- CSCW\u201915. ACM, New York, pp\u00a0765-774"},{"key":"46_CR39","first-page":"2","volume":"32","author":"JE Blumenstock","year":"2010","unstructured":"Blumenstock JE, Gillick D, Eagle N (2010) Who\u2019s calling? Demographics of mobile phone use in Rwanda. Transportation 32:2-5","journal-title":"Transportation"},{"issue":"3","key":"46_CR40","doi-asserted-by":"crossref","first-page":"238","DOI":"10.2307\/2695871","volume":"63","author":"Z Smoreda","year":"2000","unstructured":"Smoreda Z, Licoppe C (2000) Gender-specific use of the domestic telephone. Soc Psychol Q 63(3):238-252","journal-title":"Soc Psychol Q"},{"issue":"45","key":"46_CR41","doi-asserted-by":"crossref","first-page":"18070","DOI":"10.1073\/pnas.1307941110","volume":"110","author":"L Kovanen","year":"2013","unstructured":"Kovanen L, Kaski K, Kert\u00e9sz J, Saram\u00e4ki J (2013) Temporal motifs reveal homophily, gender-specific patterns, and group talk in call sequences. Proc Natl Acad Sci USA 110(45):18070-18075","journal-title":"Proc Natl Acad Sci USA"},{"key":"46_CR42","volume-title":"AAAI spring symposium: artificial intelligence for development","author":"V Frias-Martinez","year":"2010","unstructured":"Frias-Martinez V, Frias-Martinez E, Oliver N (2010) A gender-centric analysis of calling behavior in a developing economy using call detail records. In: AAAI spring symposium: artificial intelligence for development"},{"issue":"2","key":"46_CR43","first-page":"1","volume":"8","author":"JE Blumenstock","year":"2012","unstructured":"Blumenstock JE, Eagle N (2012) Divided we call: disparities in access and use of mobile phones in Rwanda. Inf Technol Int Dev 8(2):1-16","journal-title":"Inf Technol Int Dev"},{"key":"46_CR44","unstructured":"Chawla NV, Hachen D, Lizardo O, Toroczkai Z, Strathman A, Wang C (2011) Weighted reciprocity in human communication networks. Technical report arXiv:1108.2822"},{"key":"46_CR45","volume-title":"The 6th SNA-KDD workshop \u201912","author":"S Motahari","year":"2012","unstructured":"Motahari S, Mengshoel OJ, Reuther P, Appala S, Zoia L, Shah J (2012) The impact of social affinity on phone calling patterns: categorizing social ties from call data records. In: The 6th SNA-KDD workshop \u201912"},{"issue":"1","key":"46_CR46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.physrep.2010.11.002","volume":"499","author":"M Barth\u00e9lemy","year":"2011","unstructured":"Barth\u00e9lemy M (2011) Spatial networks. Phys Rep 499(1):1-101","journal-title":"Phys Rep"},{"issue":"45","key":"46_CR47","doi-asserted-by":"crossref","first-page":"15888","DOI":"10.1073\/pnas.1408439111","volume":"111","author":"P Deville","year":"2014","unstructured":"Deville P, Linard C, Martin S, Gilbert M, Stevens FR, Gaughan AE, Blondel VD, Tatem AJ (2014) Dynamic population mapping using mobile phone data. Proc Natl Acad Sci USA 111(45):15888-15893","journal-title":"Proc Natl Acad Sci USA"},{"key":"46_CR48","first-page":"108","volume-title":"Mobile phone data for development - analysis of mobile phone datasets for the development of Ivory Coast. Orange D4D challenge","author":"H Sterly","year":"2013","unstructured":"Sterly H, Hennig B, Dongo K (2013) \u2018Calling abidjan\u2019 - improving population estimations with mobile communication data. In: Mobile phone data for development - analysis of mobile phone datasets for the development of Ivory Coast. Orange D4D challenge, pp\u00a0108-114"},{"key":"46_CR49","doi-asserted-by":"crossref","DOI":"10.1088\/1742-5468\/2009\/07\/L07003","volume":"2009","author":"G Krings","year":"2009","unstructured":"Krings G, Calabrese F, Ratti C, Blondel VD (2009) Urban gravity: a model for inter-city telecommunication flows. J Stat Mech Theory Exp 2009:07003","journal-title":"J Stat Mech Theory Exp"},{"key":"46_CR50","first-page":"936","volume-title":"International conference on computational science and engineering","author":"G Krings","year":"2009","unstructured":"Krings G, Calabrese F, Ratti C, Blondel VD (2009) Scaling behaviors in the communication network between cities. In: International conference on computational science and engineering. IEEE Press, New York, pp\u00a0936-939"},{"issue":"4","key":"46_CR51","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0016939","volume":"6","author":"JP Onnela","year":"2011","unstructured":"Onnela JP, Arbesman S, Gonz\u00e1lez MC, Barab\u00e1si AL, Christakis NA (2011) Geographic constraints on social network groups. PLoS ONE 6(4):16939","journal-title":"PLoS ONE"},{"key":"46_CR52","first-page":"42","volume-title":"D4D book: mobile phone data for development. Analysis of mobile phone datasets for the development of Ivory Coast","author":"O Bucicovschi","year":"2013","unstructured":"Bucicovschi O, Douglass RW, Meyer DA, Ram M, Rideout D, Song D (2013) Analyzing social divisions using cell phone data. In: D4D book: mobile phone data for development. Analysis of mobile phone datasets for the development of Ivory Coast, pp\u00a042-54"},{"issue":"5","key":"46_CR53","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0037027","volume":"7","author":"A Noulas","year":"2012","unstructured":"Noulas A, Scellato S, Lambiotte R, Pontil M, Mascolo C (2012) A tale of many cities: universal patterns in human urban mobility. PLoS ONE 7(5):37027","journal-title":"PLoS ONE"},{"issue":"33","key":"46_CR54","doi-asserted-by":"crossref","first-page":"11623","DOI":"10.1073\/pnas.0503018102","volume":"102","author":"D Liben-Nowell","year":"2005","unstructured":"Liben-Nowell D, Novak J, Kumar R, Raghavan P, Tomkins A (2005) Geographic routing in social networks. Proc Natl Acad Sci USA 102(33):11623-11628","journal-title":"Proc Natl Acad Sci USA"},{"key":"46_CR55","first-page":"1","volume-title":"IET Irish signals and systems conference (ISSC 2012)","author":"E Carolan","year":"2012","unstructured":"Carolan E, McLoone SC, McLoone SF, Farrell R (2012) Analysing Ireland\u2019s interurban communication network using call data records. In: IET Irish signals and systems conference (ISSC 2012). IET, Stevenage, pp\u00a01-6"},{"key":"46_CR56","doi-asserted-by":"crossref","DOI":"10.1098\/rsif.2013.0789","volume":"11","author":"M Schl\u00e4pfer","year":"2014","unstructured":"Schl\u00e4pfer M, Bettencourt L, Grauwin S, Raschke M, Claxton R, Smoreda Z, West GB, Ratti C (2014) The scaling of human interactions with city size. J R Soc Interface 11:20130789","journal-title":"J R Soc Interface"},{"key":"46_CR57","volume":"4","author":"H-H Jo","year":"2014","unstructured":"Jo H-H, Saram\u00e4ki J, Dunbar RI, Kaski K (2014) Spatial patterns of close relationships across the lifespan. Sci Rep 4:6988","journal-title":"Sci Rep"},{"issue":"4","key":"46_CR58","doi-asserted-by":"crossref","DOI":"10.1088\/1742-5468\/2014\/04\/P04022","volume":"2014","author":"C Herrera-Yag\u00fce","year":"2014","unstructured":"Herrera-Yag\u00fce C, Schneider CM, Smoreda Z, Couronn\u00e9 T, Zufiria PJ, Gonz\u00e1lez MC (2014) The elliptic model for communication fluxes. J Stat Mech Theory Exp 2014(4):04022","journal-title":"J Stat Mech Theory Exp"},{"key":"46_CR59","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/978-1-4614-0754-6_7","volume-title":"Handbook of optimization in complex networks","author":"D Grady","year":"2012","unstructured":"Grady D, Brune R, Thiemann C, Theis F, Brockmann D (2012) Modularity maximization and tree clustering: novel ways to determine effective geographic borders. In: Handbook of optimization in complex networks. Springer, Berlin, pp\u00a0169-208"},{"key":"46_CR60","unstructured":"Blondel VD, Deville P, Morlot F, Smoreda Z, Van Dooren P, Ziemlicki C (2011) Voice on the border: do cellphones redraw the maps? ParisTech Review"},{"issue":"4","key":"46_CR61","first-page":"1","volume":"42","author":"V Blondel","year":"2010","unstructured":"Blondel V, Krings G, Thomas I (2010) Regions and borders of mobile telephony in Belgium and in the Brussels metropolitan zone. Bruss Stud 42(4):1-12","journal-title":"Bruss Stud"},{"issue":"19","key":"46_CR62","doi-asserted-by":"crossref","first-page":"7663","DOI":"10.1073\/pnas.1018962108","volume":"108","author":"P Expert","year":"2011","unstructured":"Expert P, Evans TS, Blondel VD, Lambiotte R (2011) Uncovering space-independent communities in spatial networks. Proc Natl Acad Sci USA 108(19):7663-7668","journal-title":"Proc Natl Acad Sci USA"},{"issue":"12","key":"46_CR63","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0014248","volume":"5","author":"C Ratti","year":"2010","unstructured":"Ratti C, Sobolevsky S, Calabrese F, Andris C, Reades J, Martino M, Claxton R, Strogatz SH (2010) Redrawing the map of Great Britain from a network of human interactions. PLoS ONE 5(12):14248","journal-title":"PLoS ONE"},{"key":"46_CR64","volume-title":"Proceedings of the 4th annual symposium on computing for development. ACM DEV-4 \u201913","author":"JE Blumenstock","year":"2013","unstructured":"Blumenstock JE, Fratamico L (2013) Social and spatial ethnic segregation: a framework for analyzing segregation with large-scale spatial network data. In: Proceedings of the 4th annual symposium on computing for development. ACM DEV-4 \u201913. ACM, New York, article no 11"},{"issue":"5981","key":"46_CR65","doi-asserted-by":"crossref","first-page":"1029","DOI":"10.1126\/science.1186605","volume":"328","author":"N Eagle","year":"2010","unstructured":"Eagle N, Macy M, Claxton R (2010) Network diversity and economic development. Science 328(5981):1029-1031","journal-title":"Science"},{"key":"46_CR66","first-page":"17","volume-title":"Mobile phone data for development - analysis of mobile phone datasets for the development of Ivory Coast. Orange D4D challenge","author":"H Mao","year":"2013","unstructured":"Mao H, Shuai X, Ahn YY, Bollen J (2013) Mobile communications reveal the regional economy in C\u00f4te d\u2019Ivoire. In: Mobile phone data for development - analysis of mobile phone datasets for the development of Ivory Coast. Orange D4D challenge, pp\u00a017-34"},{"key":"46_CR67","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1145\/2556288.2557358","volume-title":"Proceedings of the 32nd annual ACM conference on human factors in computing systems","author":"C Smith-Clarke","year":"2014","unstructured":"Smith-Clarke C, Mashhadi A, Capra L (2014) Poverty on the cheap: estimating poverty maps using aggregated mobile communication networks. In: Proceedings of the 32nd annual ACM conference on human factors in computing systems. ACM, New York, pp\u00a0511-520"},{"key":"46_CR68","volume-title":"Qual meets quant workshop - QMQ","author":"V Frias-Martinez","year":"2010","unstructured":"Frias-Martinez V, Virseda J, Frias-Martinez E (2010) Socio-economic levels and human mobility. In: Qual meets quant workshop - QMQ"},{"key":"46_CR69","volume-title":"Proceedings of the 3rd ACM symposium on computing for development","author":"V Frias-Martinez","year":"2013","unstructured":"Frias-Martinez V, Soguero-Ruiz C, Frias-Martinez E, Josephidou M, (2013) Forecasting socioeconomic trends with cell phone records. In: Proceedings of the 3rd ACM symposium on computing for development. ACM, New York, article no 15"},{"key":"46_CR70","unstructured":"Gutierrez T, Krings G, Blondel VD (2013) Evaluating socio-economic state of a country analyzing airtime credit and mobile phone datasets. ArXiv preprint arXiv:1309.4496"},{"issue":"3","key":"46_CR71","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.physrep.2012.03.001","volume":"519","author":"P Holme","year":"2012","unstructured":"Holme P, Saram\u00e4ki J (2012) Temporal networks. Phys Rep 519(3):97-125","journal-title":"Phys Rep"},{"issue":"2","key":"46_CR72","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1287\/ijoc.1080.0292","volume":"21","author":"Z Huang","year":"2009","unstructured":"Huang Z, Lin DKJ (2009) The time-series link prediction problem with applications in communication surveillance. INFORMS J Comput 21(2):286-303. doi: 10.1287\/ijoc.1080.0292","journal-title":"INFORMS J Comput"},{"key":"46_CR73","first-page":"1553","volume-title":"Advances in neural information processing systems","author":"K Yu","year":"2006","unstructured":"Yu K, Chu W, Yu S, Tresp V, Xu Z (2006) Stochastic relational models for discriminative link prediction. In: Advances in neural information processing systems, pp\u00a01553-1560"},{"issue":"12","key":"46_CR74","doi-asserted-by":"crossref","first-page":"3017","DOI":"10.1016\/j.physa.2008.01.073","volume":"387","author":"CA Hidalgo","year":"2008","unstructured":"Hidalgo CA, Rodriguez-Sickert C (2008) The dynamics of a mobile phone network. Physica A 387(12):3017-3024","journal-title":"Physica A"},{"issue":"4","key":"46_CR75","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/j.socnet.2011.07.002","volume":"33","author":"T Raeder","year":"2011","unstructured":"Raeder T, Lizardo O, Hachen D, Chawla NV (2011) Predictors of short-term decay of cell phone contacts in a large scale communication network. Soc Netw 33(4):245-257","journal-title":"Soc Netw"},{"issue":"5757","key":"46_CR76","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1126\/science.1116869","volume":"311","author":"G Kossinets","year":"2006","unstructured":"Kossinets G, Watts DJ (2006) Empirical analysis of an evolving social network. Science 311(5757):88-90","journal-title":"Science"},{"key":"46_CR77","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-00110-4","volume-title":"Temporal patterns of communication in social networks","author":"G Miritello","year":"2013","unstructured":"Miritello G (2013) Temporal patterns of communication in social networks. Springer, Berlin"},{"key":"46_CR78","doi-asserted-by":"crossref","DOI":"10.1038\/srep04001","volume":"4","author":"M Karsai","year":"2014","unstructured":"Karsai M, Perra N, Vespignani A (2014) Time varying networks and the weakness of strong ties. Sci Rep 4:4001","journal-title":"Sci Rep"},{"key":"46_CR79","doi-asserted-by":"crossref","DOI":"10.1038\/srep01950","volume":"3","author":"G Miritello","year":"2013","unstructured":"Miritello G, Rub\u00e9n L, Cebrian M, Moro E (2013) Limited communication capacity unveils strategies for human interaction. Sci Rep 3:1950","journal-title":"Sci Rep"},{"issue":"1","key":"46_CR80","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.socnet.2013.01.003","volume":"35","author":"G Miritello","year":"2013","unstructured":"Miritello G, Moro E, Lara R, Mart\u00ednez-L\u00f3pez R, Belchamber J, Roberts SGB, Dunbar RIM (2013) Time as a limited resource: communication strategy in mobile phone networks. Soc Netw 35(1):89-95","journal-title":"Soc Netw"},{"issue":"3","key":"46_CR81","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1073\/pnas.1308540110","volume":"111","author":"J Saram\u00e4ki","year":"2014","unstructured":"Saram\u00e4ki J, Leicht EA, L\u00f3pez E, Roberts SGB, Reed-Tsochas F, Dunbar RIM (2014) The persistence of social signatures in human communication. Proc Natl Acad Sci USA 111(3):942-947","journal-title":"Proc Natl Acad Sci USA"},{"key":"46_CR82","first-page":"159","volume-title":"Dynamics on and of complex networks","author":"T Aynaud","year":"2013","unstructured":"Aynaud T, Fleury E, Guillaume J-L, Wang Q (2013) Communities in evolving networks: definitions, detection, and analysis techniques. In: Dynamics on and of complex networks, vol\u00a02. Springer, Berlin, pp\u00a0159-200"},{"issue":"5980","key":"46_CR83","doi-asserted-by":"crossref","first-page":"876","DOI":"10.1126\/science.1184819","volume":"328","author":"PJ Mucha","year":"2010","unstructured":"Mucha PJ, Richardson T, Macon K, Porter MA, Onnela J-P (2010) Community structure in time-dependent, multiscale, and multiplex networks. Science 328(5980):876-878. http:\/\/www.sciencemag.org\/content\/328\/5980\/876.full.pdf . doi: 10.1126\/science.1184819","journal-title":"Science"},{"key":"46_CR84","first-page":"2174","volume-title":"IEEE international conference on acoustics speech and signal processing (ICASSP)","author":"KS Xu","year":"2010","unstructured":"Xu KS, Kliger M, Hero AO (2010) Evolutionary spectral clustering with adaptive forgetting factor. In: IEEE international conference on acoustics speech and signal processing (ICASSP). IEEE Press, New York, pp\u00a02174-2177"},{"key":"46_CR85","first-page":"219","volume-title":"Social computing, behavioral-cultural modeling and prediction","author":"KS Xu","year":"2011","unstructured":"Xu KS, Kliger M, Hero AO, III (2011) Tracking communities in dynamic social networks. In: Social computing, behavioral-cultural modeling and prediction. Springer, Berlin, pp\u00a0219-226"},{"issue":"11","key":"46_CR86","doi-asserted-by":"crossref","DOI":"10.1088\/1742-5468\/2011\/11\/P11005","volume":"2011","author":"L Kovanen","year":"2011","unstructured":"Kovanen L, Karsai M, Kaski K, Kert\u00e9sz J, Saram\u00e4ki J (2011) Temporal motifs in time-dependent networks. J Stat Mech Theory Exp 2011(11):11005","journal-title":"J Stat Mech Theory Exp"},{"issue":"1-3","key":"46_CR87","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1080\/14786435.2011.634858","volume":"92","author":"S Kirkpatrick","year":"2012","unstructured":"Kirkpatrick S, Kulakovsky A, Cebrian M, Pentland A (2012) Social networks and spin glasses. Philos Mag 92(1-3):362-377. doi: 10.1080\/14786435.2011.634858","journal-title":"Philos Mag"},{"key":"46_CR88","doi-asserted-by":"crossref","first-page":"3319","DOI":"10.1145\/2556288.2556973","volume-title":"Proceedings of the 32nd annual ACM conference on human factors in computing systems","author":"M Pielot","year":"2014","unstructured":"Pielot M, de Oliveira R, Kwak H, Oliver N (2014) Didn\u2019t you see my message?: predicting attentiveness to mobile instant messages. In: Proceedings of the 32nd annual ACM conference on human factors in computing systems. ACM, New York, pp\u00a03319-3328"},{"key":"46_CR89","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1038\/nature03459","volume":"435","author":"AL Barab\u00e1si","year":"2005","unstructured":"Barab\u00e1si AL (2005) The origin of bursts and heavy tails in human activity. Nature 435:207-211","journal-title":"Nature"},{"issue":"2","key":"46_CR90","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevE.83.025102","volume":"83","author":"M Karsai","year":"2011","unstructured":"Karsai M, Kivel\u00e4 M, Pan RK, Kaski K, Kert\u00e9sz J, Barab\u00e1si AL, Saram\u00e4ki J (2011) Small but slow world: how network topology and burstiness slow down spreading. Phys Rev E 83(2):025102","journal-title":"Phys Rev E"},{"key":"46_CR91","doi-asserted-by":"crossref","DOI":"10.1038\/srep00397","volume":"2","author":"M Karsai","year":"2012","unstructured":"Karsai M, Kaski K, Barab\u00e1si AL, Kert\u00e9sz J (2012) Universal features of correlated bursty behaviour. Sci Rep 2:397","journal-title":"Sci Rep"},{"issue":"44","key":"46_CR92","doi-asserted-by":"crossref","first-page":"18803","DOI":"10.1073\/pnas.1013140107","volume":"107","author":"Y Wu","year":"2010","unstructured":"Wu Y, Zhou C, Xiao J, Kurths J, Schellnhuber HJ (2010) Evidence for a bimodal distribution in human communication. Proc Natl Acad Sci USA 107(44):18803-18808","journal-title":"Proc Natl Acad Sci USA"},{"key":"46_CR93","doi-asserted-by":"crossref","DOI":"10.1088\/1751-8113\/41\/22\/224015","volume":"41","author":"J Candia","year":"2008","unstructured":"Candia J, Gonz\u00e1lez MC, Wang P, Schoenharl T, Madey G, Barab\u00e1si AL (2008) Uncovering individual and collective human dynamics from mobile phone records. J Phys A, Math Theor 41:224015","journal-title":"J Phys A, Math Theor"},{"issue":"7","key":"46_CR94","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0040612","volume":"7","author":"M Karsai","year":"2012","unstructured":"Karsai M (2012) Correlated dynamics in egocentric communication networks. PLoS ONE 7(7):40612. doi: 10.1371\/journal.pone.0040612","journal-title":"PLoS ONE"},{"issue":"47","key":"46_CR95","doi-asserted-by":"crossref","first-page":"18153","DOI":"10.1073\/pnas.0800332105","volume":"105","author":"RD Malmgren","year":"2008","unstructured":"Malmgren RD, Stouffer DB, Motter AE, Amaral LA (2008) A Poissonian explanation for heavy tails in e-mail communication. Proc Natl Acad Sci USA 105(47):18153-18158","journal-title":"Proc Natl Acad Sci USA"},{"issue":"1","key":"46_CR96","volume":"14","author":"H-H Jo","year":"2012","unstructured":"Jo H-H, Karsai M, Kert\u00e9sz J, Kaski K (2012) Circadian pattern and burstiness in mobile phone communication. New J Phys 14(1):013055","journal-title":"New J Phys"},{"issue":"7196","key":"46_CR97","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1038\/nature06958","volume":"453","author":"MC Gonz\u00e1lez","year":"2008","unstructured":"Gonz\u00e1lez MC, Hidalgo CA, Barab\u00e1si AL (2008) Understanding individual human mobility patterns. Nature 453(7196):779-782","journal-title":"Nature"},{"key":"46_CR98","doi-asserted-by":"crossref","first-page":"818","DOI":"10.1038\/nphys1760","volume":"6","author":"C Song","year":"2010","unstructured":"Song C, Koren T, Wang P, Barab\u00e1si AL (2010) Modelling the scaling properties of human mobility. Nat Phys 6:818-823","journal-title":"Nat Phys"},{"issue":"6","key":"46_CR99","doi-asserted-by":"crossref","first-page":"1459","DOI":"10.1016\/j.physa.2012.11.040","volume":"392","author":"B Cs\u00e1ji","year":"2013","unstructured":"Cs\u00e1ji B, Browet A, Traag VA, Delvenne J-C, Huens E, Van Dooren P, Smoreda Z, Blondel VD (2013) Exploring the mobility of mobile phone users. Physica A 392(6):1459-1473","journal-title":"Physica A"},{"issue":"5","key":"46_CR100","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0037676","volume":"7","author":"JP Bagrow","year":"2012","unstructured":"Bagrow JP, Lin Y-R (2012) Mesoscopic structure and social aspects of human mobility. PLoS ONE 7(5):37676","journal-title":"PLoS ONE"},{"key":"46_CR101","first-page":"330","volume-title":"Mobile phone data for development - analysis of mobile phone datasets for the development of Ivory Coast. Orange D4D challenge","author":"A Amini","year":"2013","unstructured":"Amini A, Kung K, Kang C, Sobolevsky S, Ratti C (2013) The differing tribal and infrastructural influences on mobility in developing and industrialized regions. In: Mobile phone data for development - analysis of mobile phone datasets for the development of Ivory Coast. Orange D4D challenge, pp\u00a0330-339"},{"issue":"5968","key":"46_CR102","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1126\/science.1177170","volume":"327","author":"C Song","year":"2010","unstructured":"Song C, Qu Z, Blumm N, Barab\u00e1si AL (2010) Limits of predictability in human mobility. Science 327(5968):1018-1021","journal-title":"Science"},{"key":"46_CR103","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1109\/ITSC.2010.5625119","volume-title":"13th international IEEE conference on Intelligent transportation systems (ITSC)","author":"F Calabrese","year":"2010","unstructured":"Calabrese F, Di Lorenzo G, Ratti C (2010) Human mobility prediction based on individual and collective geographical preferences. In: 13th international IEEE conference on Intelligent transportation systems (ITSC). IEEE Press, New York, pp\u00a0312-317"},{"key":"46_CR104","volume":"2010","author":"J Park","year":"2010","unstructured":"Park J, Lee DS, Gonz\u00e1lez MC (2010) The eigenmode analysis of human motion. J Stat Mech Theory Exp 2010:11021","journal-title":"J Stat Mech Theory Exp"},{"issue":"7392","key":"46_CR105","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1038\/nature10856","volume":"484","author":"F Simini","year":"2012","unstructured":"Simini F, Gonzalez MC, Maritan A, Barabasi A-L (2012) A universal model for mobility and migration patterns. Nature 484(7392):96-100. doi: 10.1038\/nature10856","journal-title":"Nature"},{"key":"46_CR106","doi-asserted-by":"crossref","DOI":"10.1038\/srep06174","volume":"4","author":"V Palchykov","year":"2014","unstructured":"Palchykov V, Mitrovic M, Jo H-H, Saramaki J, Pan RK (2014) Inferring human mobility using communication patterns. Sci Rep 4:6174","journal-title":"Sci Rep"},{"key":"46_CR107","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1145\/1719970.1720030","volume-title":"Proceedings of the 15th international conference on intelligent user interfaces","author":"M Martino","year":"2010","unstructured":"Martino M, Calabrese F, Di Lorenzo G, Andris C, Liang L, Ratti C (2010) Ocean of information: fusing aggregate & individual dynamics for metropolitan analysis. In: Proceedings of the 15th international conference on intelligent user interfaces. ACM, New York, pp\u00a0357-360"},{"issue":"7","key":"46_CR108","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1007\/s00265-009-0739-0","volume":"63","author":"N Eagle","year":"2009","unstructured":"Eagle N, Pentland AS (2009) Eigenbehaviors: identifying structure in routine. Behav Ecol Sociobiol 63(7):1057-1066","journal-title":"Behav Ecol Sociobiol"},{"issue":"5","key":"46_CR109","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1068\/b32047","volume":"33","author":"C Ratti","year":"2006","unstructured":"Ratti C, Williams S, Frenchman D, Pulselli RM (2006) Mobile landscapes: using location data from cell phones for urban analysis. Environ Plan B, Plan Des 33(5):727-748","journal-title":"Environ Plan B, Plan Des"},{"issue":"1","key":"46_CR110","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1109\/TITS.2010.2074196","volume":"12","author":"F Calabrese","year":"2011","unstructured":"Calabrese F, Colonna M, Lovisolo P, Parata D, Ratti C (2011) Real-time urban monitoring using cell phones: a case study in Rome. IEEE Trans Intell Transp Syst 12(1):141-151","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"46_CR111","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MPRV.2007.53","volume":"6","author":"J Reades","year":"2007","unstructured":"Reades J, Calabrese F, Sevtsuk A, Ratti C (2007) Cellular census: explorations in urban data collection. IEEE Pervasive Comput 6:30-38","journal-title":"IEEE Pervasive Comput"},{"issue":"5","key":"46_CR112","doi-asserted-by":"crossref","first-page":"824","DOI":"10.1068\/b34133t","volume":"36","author":"J Reades","year":"2009","unstructured":"Reades J, Calabrese F, Ratti C (2009) Eigenplaces: analysing cities using the space-time structure of the mobile phone network. Environ Plan B, Plan Des 36(5):824-836","journal-title":"Environ Plan B, Plan Des"},{"issue":"3","key":"46_CR113","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1007\/s00779-011-0503-0","volume":"17","author":"J Karikoski","year":"2011","unstructured":"Karikoski J, Soikkeli T (2011) Contextual usage patterns in smartphone communication services. Pers Ubiquitous Comput 17(3):491-502","journal-title":"Pers Ubiquitous Comput"},{"key":"46_CR114","volume":"1","author":"H-H Jo","year":"2012","unstructured":"Jo H-H, Karsai M, Karikoski J, Kaski K (2012) Spatiotemporal correlations of handset-based service usages. EPJ Data Sci 1:10","journal-title":"EPJ Data Sci"},{"key":"46_CR115","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1145\/1644893.1644926","volume-title":"Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference","author":"I Trestian","year":"2009","unstructured":"Trestian I, Ranjan S, Kuzmanovic A, Nucci A (2009) Measuring serendipity: connecting people, locations and interests in a mobile 3G network. In: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. ACM, New York, pp\u00a0267-279"},{"key":"46_CR116","doi-asserted-by":"crossref","first-page":"1806","DOI":"10.1109\/INFOCOM.2014.6848119","volume-title":"Conference on computer communications - INFOCOM 2014","author":"D Naboulsi","year":"2014","unstructured":"Naboulsi D, Stanica R, Fiore M (2014) Classifying call profiles in large-scale mobile traffic datasets. In: Conference on computer communications - INFOCOM 2014. IEEE Press, New York, pp\u00a01806-1814"},{"key":"46_CR117","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/1734583.1734589","volume-title":"Proceedings of the eleventh workshop on mobile computing systems and applications","author":"S Isaacman","year":"2010","unstructured":"Isaacman S, Becker R, C\u00e1ceres R, Kobourov S, Rowland J, Varshavsky A (2010) A tale of two cities. In: Proceedings of the eleventh workshop on mobile computing systems and applications. ACM, New York, pp\u00a019-24"},{"key":"46_CR118","doi-asserted-by":"crossref","DOI":"10.1038\/srep05276","volume":"4","author":"T Louail","year":"2014","unstructured":"Louail T, Lenormand M, Cant\u00fa OG, Picornell M, Herranz R, Frias-Martinez E, Ramasco JJ, Barthelemy M (2014) From mobile phone data to the spatial structure of cities. Sci Rep 4:5276","journal-title":"Sci Rep"},{"key":"46_CR119","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1016\/j.telpol.2013.12.002","volume":"39","author":"R Trasarti","year":"2014","unstructured":"Trasarti R, Olteanu-Raimond A-M, Nanni M, Couronn\u00e9 T, Furletti B, Giannotti F, Smoreda Z, Ziemlicki C (2014) Discovering urban and country dynamics from mobile phone data with spatial correlation patterns. Telecommun Policy 39:347-362","journal-title":"Telecommun Policy"},{"key":"46_CR120","volume-title":"Proceedings of the 2nd ACM SIGKDD international workshop on urban computing","author":"S Jiang","year":"2013","unstructured":"Jiang S, Fiore GA, Yang Y, Ferreira J, Frazzoli E, Gonz\u00e1lez MC (2013) A review of urban computing for mobile phone traces: current methods, challenges and opportunities. In: Proceedings of the 2nd ACM SIGKDD international workshop on urban computing. ACM, New York, article no 2"},{"key":"46_CR121","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1007\/978-3-642-40994-3_50","volume-title":"Machine learning and knowledge discovery in databases","author":"M Berlingerio","year":"2013","unstructured":"Berlingerio M, Calabrese F, Di Lorenzo G, Nair R, Pinelli F, Sbodio M (2013) AllAboard: a system for exploring urban mobility and optimizing public transport using cellphone data. In: Blockeel H, Kersting K, Nijssen S, \u017delezn\u00fd F (eds) Machine learning and knowledge discovery in databases. LNCS, vol\u00a08190. Springer, Berlin, pp\u00a0663-666"},{"key":"46_CR122","first-page":"423","volume-title":"Mobile phone data for development - analysis of mobile phone datasets for the development of Ivory Coast. Orange D4D challenge","author":"M Nanni","year":"2013","unstructured":"Nanni M, Trasarti R, Furletti B, Gabrielli L, Van Der Mede P, De Bruijn J, De Romph E, Bruil G (2013) MP4-A project: mobility planning for Africa. In: Mobile phone data for development - analysis of mobile phone datasets for the development of Ivory Coast. Orange D4D challenge, pp\u00a0423-446"},{"key":"46_CR123","first-page":"412","volume-title":"Mobile phone data for development - analysis of mobile phone datasets for the development of Ivory Coast. Orange D4D challenge","author":"V Angelakis","year":"2013","unstructured":"Angelakis V, Gundleg\u00e5rd D, Rajna B, Rydergren C, Vrotsou K, Carlsson R, Forgeat J, Hu TH, Liu EL, Moritz S, Zhao S, Zheng Y (2013) Mobility modeling for transport efficiency - analysis of travel characteristics based on mobile phone data. In: Mobile phone data for development - analysis of mobile phone datasets for the development of Ivory Coast. Orange D4D challenge, pp\u00a0412-422"},{"issue":"3","key":"46_CR124","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0017680","volume":"6","author":"JP Bagrow","year":"2011","unstructured":"Bagrow JP, Wang D, Barab\u00e1si AL (2011) Collective response of human populations to large-scale emergencies. PLoS ONE 6(3):17680","journal-title":"PLoS ONE"},{"key":"46_CR125","volume":"4","author":"L Gao","year":"2014","unstructured":"Gao L, Song C, Gao Z, Barab\u00e1si AL, Bagrow JP, Wang D (2014) Quantifying information flow during emergencies. Sci Rep 4:3997","journal-title":"Sci Rep"},{"key":"46_CR126","volume-title":"NetMob 2013 - third international conference on the analysis of mobile phone datasets","author":"FHZ Xavier","year":"2013","unstructured":"Xavier FHZ, Silveira LM, Almeida JM, Malab CHS, Ziviani A, Marques-Neto HT (2013) Understanding human mobility due to large-scale events. In: NetMob 2013 - third international conference on the analysis of mobile phone datasets"},{"issue":"3","key":"46_CR127","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/s10955-013-0759-z","volume":"152","author":"Y Altshuler","year":"2013","unstructured":"Altshuler Y, Fire M, Shmueli E, Elovici Y, Bruckstein A, Pentland AS, Lazer D (2013) The social amplifier - reaction of human communities to emergencies. J Stat Phys 152(3):399-418","journal-title":"J Stat Phys"},{"issue":"29","key":"46_CR128","doi-asserted-by":"crossref","first-page":"11576","DOI":"10.1073\/pnas.1203882109","volume":"109","author":"X Lu","year":"2012","unstructured":"Lu X, Bengtsson L, Holme P (2012) Predictability of population displacement after the 2010 Haiti earthquake. Proc Natl Acad Sci USA 109(29):11576-11581","journal-title":"Proc Natl Acad Sci USA"},{"issue":"2","key":"46_CR129","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0117288","volume":"10","author":"Y Kryvasheyeu","year":"2015","unstructured":"Kryvasheyeu Y, Chen H, Moro E, Van Hentenryck P, Cebrian M (2015) Performance of social network sensors during hurricane Sandy. PLoS ONE 10(2):e0117288. doi: 10.1371\/journal.pone.0117288","journal-title":"PLoS ONE"},{"issue":"7","key":"46_CR130","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0020814","volume":"6","author":"F Calabrese","year":"2011","unstructured":"Calabrese F, Smoreda Z, Blondel VD, Ratti C (2011) Interplay between telecommunications and face-to-face interactions: a study using mobile phone data. PLoS ONE 6(7):20814","journal-title":"PLoS ONE"},{"key":"46_CR131","doi-asserted-by":"crossref","first-page":"1100","DOI":"10.1145\/2020408.2020581","volume-title":"17th ACM SIGKDD conference on knowledge discovery and data mining (KDD\u201911)","author":"D Wang","year":"2011","unstructured":"Wang D, Pedreschi D, Song C, Giannotti F, Barab\u00e1si AL (2011) Human mobility, social ties, and link prediction. In: 17th ACM SIGKDD conference on knowledge discovery and data mining (KDD\u201911). ACM, New York, pp\u00a01100-1108"},{"key":"46_CR132","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/CSE.2009.91","volume-title":"2009 international conference on computational science and engineering","author":"N Eagle","year":"2009","unstructured":"Eagle N, de Montjoye YA, Bettencourt LMA (2009) Community computing: comparisons between rural and urban societies using mobile phone data. In: 2009 international conference on computational science and engineering. IEEE Press, New York, pp\u00a0144-150"},{"issue":"105","key":"46_CR133","doi-asserted-by":"crossref","DOI":"10.1098\/rsif.2014.1128","volume":"12","author":"JL Toole","year":"2015","unstructured":"Toole JL, Herrera-Yaq\u00fce C, Schneider CM, Gonz\u00e1lez MC (2015) Coupling human mobility and social ties. J R Soc Interface 12(105):20141128","journal-title":"J R Soc Interface"},{"issue":"12","key":"46_CR134","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0028860","volume":"6","author":"F Peruani","year":"2011","unstructured":"Peruani F, Tabourier L (2011) Directedness of information flow in mobile phone communication networks. PLoS ONE 6(12):28860","journal-title":"PLoS ONE"},{"key":"46_CR135","first-page":"1","volume-title":"Fourth international conference on communication systems and networks (COMSNETS)","author":"L Tabourier","year":"2012","unstructured":"Tabourier L, Stoica A, Peruani F (2012) How to detect causality effects on large dynamical communication networks: a case study. In: Fourth international conference on communication systems and networks (COMSNETS). IEEE Press, New York, pp\u00a01-7"},{"issue":"4","key":"46_CR136","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevE.83.045102","volume":"83","author":"G Miritello","year":"2011","unstructured":"Miritello G, Moro E, Lara R (2011) Dynamical strength of social ties in information spreading. Phys Rev E 83(4):045102","journal-title":"Phys Rev E"},{"key":"46_CR137","volume":"66","author":"MEJ Newman","year":"2002","unstructured":"Newman MEJ (2002) Spread of epidemic disease on networks. Phys Rev E 66:016128. doi: 10.1103\/PhysRevE.66.016128","journal-title":"Phys Rev E"},{"key":"46_CR138","volume-title":"The structure and dynamics of networks","author":"MEJ Newman","year":"2006","unstructured":"Newman MEJ, Barabasi AL, Watts DJ (2006) The structure and dynamics of networks. Princeton University Press, Princeton"},{"issue":"3","key":"46_CR139","doi-asserted-by":"crossref","DOI":"10.1088\/1742-5468\/2012\/03\/P03005","volume":"2012","author":"M Kivel\u00e4","year":"2012","unstructured":"Kivel\u00e4 M, Pan RK, Kaski K, Kert\u00e9sz J, Saram\u00e4ki J, Karsai M (2012) Multiscale analysis of spreading in a large communication network. J Stat Mech Theory Exp 2012(3):03005","journal-title":"J Stat Mech Theory Exp"},{"issue":"7346","key":"46_CR140","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1038\/nature10011","volume":"473","author":"YY Liu","year":"2011","unstructured":"Liu YY, Slotine JJ, Barab\u00e1si AL (2011) Controllability of complex networks. Nature 473(7346):167-173","journal-title":"Nature"},{"issue":"4","key":"46_CR141","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1109\/JSTSP.2010.2053093","volume":"4","author":"M Cebrian","year":"2010","unstructured":"Cebrian M, Lahiri M, Oliver N, Pentland A (2010) Measuring the collective potential of populations from dynamic social interaction data. IEEE J Sel Top Signal Process 4(4):677-686","journal-title":"IEEE J Sel Top Signal Process"},{"issue":"5930","key":"46_CR142","doi-asserted-by":"crossref","first-page":"1071","DOI":"10.1126\/science.1167053","volume":"324","author":"P Wang","year":"2009","unstructured":"Wang P, Gonz\u00e1lez MC, Hidalgo CA, Barab\u00e1si AL (2009) Understanding the spreading patterns of mobile phone viruses. Science 324(5930):1071-1074","journal-title":"Science"},{"key":"46_CR143","unstructured":"Wang P, Gonz\u00e1lez MC, Menezes R, Barab\u00e1si AL (2010) New generation of mobile phone viruses and corresponding countermeasures. Arxiv preprint arXiv:1012.3156"},{"issue":"5","key":"46_CR144","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/s10207-013-0203-z","volume":"12","author":"P Wang","year":"2013","unstructured":"Wang P, Gonz\u00e1lez MC, Menezes R, Barab\u00e1si AL (2013) Understanding the spread of malicious mobile-phone programs and their damage potential. Int J Inf Secur 12(5):383-392","journal-title":"Int J Inf Secur"},{"key":"46_CR145","doi-asserted-by":"crossref","first-page":"1467","DOI":"10.1109\/INFCOM.2011.5934934","volume-title":"2011 Proceedings IEEE INFOCOM","author":"F Baccelli","year":"2011","unstructured":"Baccelli F, Bolot J (2011) Modeling the economic value of location and preference data of mobile users. In: 2011 Proceedings IEEE INFOCOM. IEEE Press, New York, pp\u00a01467-1475"},{"issue":"2","key":"46_CR146","doi-asserted-by":"crossref","DOI":"10.1145\/2655691","volume":"47","author":"F Calabrese","year":"2014","unstructured":"Calabrese F, Ferrari L, Blondel VD (2014) Urban sensing using mobile phone network data: a survey of research. ACM Comput Surv 47(2):25","journal-title":"ACM Comput Surv"},{"key":"46_CR147","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-3-642-21726-5_9","volume-title":"Pervasive computing","author":"S Isaacman","year":"2011","unstructured":"Isaacman S, Becker R, C\u00e1ceres R, Kobourov S, Martonosi M, Rowland J, Varshavsky A (2011) Identifying important places in people\u2019s lives from cellular network data. In: Pervasive computing. LNCS, vol\u00a06696. Springer, Berlin, pp\u00a0133-151"},{"key":"46_CR148","first-page":"1","volume":"78","author":"J Steenbruggen","year":"2011","unstructured":"Steenbruggen J, Borzacchiello MT, Nijkamp P, Scholten H (2011) Mobile phone data from GSM networks for traffic parameter and urban spatial pattern assessment: a review of applications and opportunities. GeoJournal 78:1-21","journal-title":"GeoJournal"},{"key":"46_CR149","unstructured":"Toole JL, Colak S, Alhasoun F, Evsukoff A, Gonzalez MC (2014) The path most travelled: mining road usage patterns from massive call data. ArXiv preprint arXiv:1403.0636"},{"key":"46_CR150","volume":"2","author":"P Wang","year":"2012","unstructured":"Wang P, Hunter T, Bayen AM, Schechtner K, Gonz\u00e1lez MC (2012) Understanding road usage patterns in urban areas. Sci Rep 2:1001","journal-title":"Sci Rep"},{"key":"46_CR151","first-page":"447","volume-title":"Mobile phone data for development - analysis of mobile phone datasets for the development of Ivory Coast. Orange D4D challenge","author":"J McInerney","year":"2013","unstructured":"McInerney J, Roger A, Jennings NR (2013) Crowdsourcing physical package delivery using the existing routine mobility of a local population. In: Mobile phone data for development - analysis of mobile phone datasets for the development of Ivory Coast. Orange D4D challenge, pp\u00a0447-456"},{"key":"46_CR152","first-page":"457","volume-title":"Mobile phone data for development - analysis of mobile phone datasets for the development of Ivory Coast. Orange D4D challenge","author":"S Gambs","year":"2013","unstructured":"Gambs S, Killijian M-O (2013) Towards a recomender system for bush taxis. In: Mobile phone data for development - analysis of mobile phone datasets for the development of Ivory Coast. Orange D4D challenge, pp\u00a0457-466"},{"key":"46_CR153","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/978-3-642-12654-3_2","volume-title":"Pervasive computing","author":"F Calabrese","year":"2010","unstructured":"Calabrese F, Pereira F, Di Lorenzo G, Liu L, Ratti C (2010) The geography of taste: analyzing cell-phone mobility and social events. In: Pervasive computing. LNCS, vol\u00a06030. Springer, Berlin, pp\u00a022-37"},{"key":"46_CR154","first-page":"971","volume-title":"IEEE international conference on data mining","author":"D Quercia","year":"2010","unstructured":"Quercia D, Lathia N, Calabrese F, Di Lorenzo G, Crowcroft J (2010) Recommending social events from mobile phone location data. In: IEEE international conference on data mining. IEEE Press, New York, pp\u00a0971-976"},{"key":"46_CR155","unstructured":"Cloquet C, Blondel VD (2014) Forecasting event attendance with anonymized mobile phone data. Big Data Res (in press)"},{"key":"46_CR156","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/2413236.2413245","volume-title":"Proceedings of the first workshop on urban networking","author":"FHZ Xavier","year":"2012","unstructured":"Xavier FHZ, Silveira LM, Almeida JM, Ziviani A, Malab CHS, Marques-Neto HT (2012) Analyzing the workload dynamics of a mobile phone network in large scale events. In: Proceedings of the first workshop on urban networking. ACM, New York, pp\u00a037-42"},{"key":"46_CR157","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/978-3-642-21887-3_12","volume-title":"Computational science and its applications - ICCSA 2011, Part II","author":"F Manfredini","year":"2011","unstructured":"Manfredini F, Tagliolato P, Di Rosa C (2011) Monitoring temporary populations through cellular core network data. In: Murgante B et al. (eds) Computational science and its applications - ICCSA 2011, Part II. LNCS, vol\u00a06783. Springer, Berlin, pp\u00a0151-161"},{"key":"46_CR158","first-page":"1","volume-title":"XVII scientific conference on economic policy","author":"A Kuusik","year":"2009","unstructured":"Kuusik A, Ahas R, Tiru M (2009) Analysing repeat visitation on country level with passive mobile positioning method: an Estonian case study. In: XVII scientific conference on economic policy, pp\u00a01-3"},{"issue":"6104","key":"46_CR159","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1126\/science.1223467","volume":"338","author":"A Wesolowski","year":"2012","unstructured":"Wesolowski A, Eagle N, Tatem AJ, Smith DL, Noor AM, Snow RW, Buckee CO (2012) Quantifying the impact of human mobility on malaria. Science 338(6104):267-270","journal-title":"Science"},{"issue":"7","key":"46_CR160","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pcbi.1003716","volume":"10","author":"M Tizzoni","year":"2014","unstructured":"Tizzoni M, Bajardi P, Decuyper A, Kon Kam King G, Schneider CM, Blondel VD, Smoreda Z, Gonz\u00e1lez MC, Colizza V (2014) On the use of human mobility proxies for modeling epidemics. PLoS Comput Biol 10(7):1003716","journal-title":"PLoS Comput Biol"},{"key":"46_CR161","first-page":"57","volume-title":"Privacy, security, risk and trust (PASSAT) and IEEE third inernational conference on social computing (SocialCom)","author":"E Frias-Martinez","year":"2011","unstructured":"Frias-Martinez E, Williamson G, Frias-Martinez V (2011) An agent-based model of epidemic spread using human mobility and social network information. In: Privacy, security, risk and trust (PASSAT) and IEEE third inernational conference on social computing (SocialCom). IEEE Press, New York, pp\u00a057-64. doi: 10.1109\/PASSAT\/SocialCom.2011.142"},{"key":"46_CR162","unstructured":"Blondel VD, Esch M, Chan C, Cl\u00e9rot F, Deville P, Huens E, Morlot F, Smoreda Z, Ziemlicki C (2012) Data for development: the D4D challenge on mobile phone data. ArXiv preprint arXiv:1210.0137"},{"key":"46_CR163","unstructured":"Kafsi M, Kazemi E, Maystre L, Yartseva L, Grossglauser M, Thiran P (2013) Mitigating epidemics through mobile micro-measures. ArXiv preprint arXiv:1307.2084"},{"key":"46_CR164","unstructured":"Lima A, De Domenico M, Pejovic V, Musolesi M (2013) Exploiting cellular data for disease containment and information campaigns strategies in country-wide epidemics. ArXiv preprint arXiv:1306.4534"},{"key":"46_CR165","doi-asserted-by":"crossref","unstructured":"Wesolowski A, Buckee CO, Bengtsson L, Wetter E, Lu X, Tatem AJ (2014) Commentary: containing the Ebola outbreak - the potential and challenge of mobile network data. PLoS Curr Outbreaks. doi: 10.1371\/currents.outbreaks.0177e7fcf52217b8b634376e2f3efc5e","DOI":"10.1371\/currents.outbreaks.0177e7fcf52217b8b634376e2f3efc5e"},{"key":"46_CR166","unstructured":"de Montjoye YA, Kendall J, Kerry CF (2014) Enabling humanitarian use of mobile phone data. Issues in Technology Innovation 26"},{"key":"46_CR167","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1109\/PerComW.2014.6815230","volume-title":"IEEE international conference on pervasive computing and communications workshops (PERCOM workshops)","author":"A Bogomolov","year":"2014","unstructured":"Bogomolov A, Lepri B, Ferron M, Pianesi F, Pentland AS (2014) Pervasive stress recognition for sustainable living. In: IEEE international conference on pervasive computing and communications workshops (PERCOM workshops). IEEE Press, New York, pp\u00a0345-350"},{"key":"46_CR168","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1145\/2647868.2654933","volume-title":"Proceedings of the ACM international conference on multimedia","author":"A Bogomolov","year":"2014","unstructured":"Bogomolov A, Lepri B, Ferron M, Pianesi F, Pentland AS (2014) Daily stress recognition from mobile phone data, weather conditions and individual traits. In: Proceedings of the ACM international conference on multimedia. ACM, New York, pp\u00a0477-486"},{"key":"46_CR169","volume-title":"Personal influence, the part played by people in the flow of mass communications","author":"E Katz","year":"1970","unstructured":"Katz E, Lazarsfeld PF (1970) Personal influence, the part played by people in the flow of mass communications. Transaction Publishers, New Brunswick"},{"issue":"4","key":"46_CR170","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1086\/518527","volume":"34","author":"DJ Watts","year":"2007","unstructured":"Watts DJ, Dodds PS (2007) Influentials, networks, and public opinion formation. J Consum Res 34(4):441-458","journal-title":"J Consum Res"},{"key":"46_CR171","unstructured":"Szab\u00f3 G, Barab\u00e1si AL (2006) Network effects in service usage. Arxiv preprint arXiv:physics\/0611177"},{"issue":"2","key":"46_CR172","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1214\/088342306000000222","volume":"21","author":"S Hill","year":"2006","unstructured":"Hill S, Provost F, Volinsky C (2006) Network-based marketing: identifying likely adopters via consumer networks. Stat Sci 21(2):256-276","journal-title":"Stat Sci"},{"key":"46_CR173","volume-title":"Proceedings of the 2010 workshop on information in networks (WIN\u201910)","author":"N Aharony","year":"2010","unstructured":"Aharony N, Pan W, Ip C, Pentland A (2010) Tracing mobile phone app installations in the \u2018friends and family\u2019 study. In: Proceedings of the 2010 workshop on information in networks (WIN\u201910)"},{"issue":"2","key":"46_CR174","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1509\/jm.11.0592","volume":"78","author":"H Risselada","year":"2014","unstructured":"Risselada H, Verhoef PC, Bijmolt THA (2014) Dynamic effects of social influence and direct marketing on the adoption of high-technology products. J Mark 78(2):52-68","journal-title":"J Mark"},{"key":"46_CR175","volume":"89","author":"V-P Backlund","year":"2014","unstructured":"Backlund V-P, Saram\u00e4ki J, Pan RK (2014) Effects of temporal correlations on cascades: threshold models on temporal networks. Phys Rev E 89:062815. doi: 10.1103\/PhysRevE.89.062815","journal-title":"Phys Rev E"},{"key":"46_CR176","series-title":"Lecture notes in control and information sciences","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/3-540-34774-7_30","volume-title":"Social leaders in graphs","author":"V Blondel","year":"2006","unstructured":"Blondel V, de Kerchove C, Huens E, Van Dooren P (2006) Social leaders in graphs. Lecture notes in control and information sciences, vol\u00a0341, pp\u00a0231-237"},{"key":"46_CR177","unstructured":"de Kerchove d\u2019Exaerde C (2009) Ranking large networks: leadership. optimization and distrust. PhD thesis"},{"issue":"13","key":"46_CR178","doi-asserted-by":"crossref","first-page":"5733","DOI":"10.1016\/j.eswa.2014.03.024","volume":"41","author":"E Ferrara","year":"2014","unstructured":"Ferrara E, De Meo P, Catanese S, Fiumara G (2014) Detecting criminal organizations in mobile phone networks. Expert Syst Appl 41(13):5733-5750","journal-title":"Expert Syst Appl"},{"issue":"1","key":"46_CR179","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/s13278-012-0060-1","volume":"3","author":"S Catanese","year":"2013","unstructured":"Catanese S, Ferrara E, Fiumara G (2013) Forensic analysis of phone call networks. Soc Netw Anal Min 3(1):15-33","journal-title":"Soc Netw Anal Min"},{"key":"46_CR180","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1145\/2663204.2663254","volume-title":"Proceedings of the 16th international conference on multimodal interaction","author":"A Bogomolov","year":"2014","unstructured":"Bogomolov A, Lepri B, Staiano J, Oliver N, Pianesi F, Pentland A (2014) Once upon a crime: towards crime prediction from demographics and mobile data. In: Proceedings of the 16th international conference on multimodal interaction. ACM, New York, pp\u00a0427-434"},{"key":"46_CR181","volume-title":"Mobile phone data for development\u00a0- analysis of mobile phone datasets for the development of Ivory Coast. Orange D4D challenge","author":"VD Blondel","year":"2013","unstructured":"Blondel VD, de Cordes N, Decuyper A, Deville P, Raguenez J, Smoreda Z (eds) (2013) Mobile phone data for development\u00a0- analysis of mobile phone datasets for the development of Ivory Coast. Orange D4D challenge"},{"key":"46_CR182","doi-asserted-by":"crossref","DOI":"10.1140\/epjds21","volume":"3","author":"V Salnikov","year":"2014","unstructured":"Salnikov V, Schien D, Youn H, Lambiotte R, Gastner MT (2014) The geography and carbon footprint of mobile phone use in C\u00f4te d\u2019Ivoire. EPJ Data Sci 3:3","journal-title":"EPJ Data Sci"},{"key":"46_CR183","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1145\/2160673.2160684","volume-title":"Proceedings of the fifth international conference on information and communication technologies and development","author":"V Frias-Martinez","year":"2012","unstructured":"Frias-Martinez V, Virseda J (2012) On the relationship between socio-economic factors and cell phone usage. In: Proceedings of the fifth international conference on information and communication technologies and development. ACM, New York, pp\u00a076-84"},{"issue":"1","key":"46_CR184","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.tmaid.2012.12.003","volume":"11","author":"CO Buckee","year":"2013","unstructured":"Buckee CO, Wesolowski A, Eagle NN, Hansen E, Snow RW (2013) Mobile phones and malaria: modeling human and parasite travel. Travel Med Infect Dis 11(1):15-22","journal-title":"Travel Med Infect Dis"},{"issue":"3","key":"46_CR185","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevE.85.036106","volume":"85","author":"JP Onnela","year":"2012","unstructured":"Onnela JP, Christakis NA (2012) Spreading paths in partially observed social networks. Phys Rev E 85(3):036106","journal-title":"Phys Rev E"},{"issue":"3","key":"46_CR186","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/2412096.2412101","volume":"16","author":"G Ranjan","year":"2012","unstructured":"Ranjan G, Zang H, Zhang ZL, Bolot J (2012) Are call detail records biased for sampling human mobility? ACM SIGMOBILE Mob Comput Commun Rev 16(3):33-44","journal-title":"ACM SIGMOBILE Mob Comput Commun Rev"},{"key":"46_CR187","unstructured":"Singel R (2009) Netflix spilled your Brokeback Mountain secret, lawsuit claims. Threat Level (blog), Wired"},{"key":"46_CR188","doi-asserted-by":"crossref","unstructured":"Barth-Jones DC (2012) The \u2019re-identification\u2019 of governor William Weld\u2019s medical information: a critical re-examination of health data Identification risks and privacy protections, then and now","DOI":"10.2139\/ssrn.2076397"},{"key":"46_CR189","unstructured":"E Commission (2012) Commission proposes a comprehensive reform of data protection rules to increase users\u2019 control of their data and to cut costs for businesses. Reference IP\/12\/46"},{"key":"46_CR190","first-page":"31","volume":"38","author":"EU","year":"1995","unstructured":"EU (1995) Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Off\u00a0J\u00a0EC 38:31-50","journal-title":"Off\u00a0J\u00a0EC"},{"key":"46_CR191","volume-title":"Data protection and privacy in 26 juristictions worldwide","year":"2014","unstructured":"Jay RP (ed) (2014) Data protection and privacy in 26 juristictions worldwide. Gideon Roberton"},{"key":"46_CR192","unstructured":"European Commission (2012) Commission proposes a comprehensive reform of data protection rules to increase users\u2019 control of their data and to cut costs for businesses. http:\/\/europa.eu\/rapid\/press-release_IP-12-46_en.htm?locale=en"},{"key":"46_CR193","first-page":"145","volume-title":"ACM MobiCom","author":"H Zang","year":"2011","unstructured":"Zang H, Bolot J (2011) Anonymization of location data does not work: a large-scale measurement study. In: ACM MobiCom. ACM, New York, pp\u00a0145-156"},{"key":"46_CR194","doi-asserted-by":"crossref","DOI":"10.1038\/srep01376","volume":"3","author":"YA Montjoye de","year":"2013","unstructured":"de Montjoye YA, Hidalgo CA, Verleysen M, Blondel VD (2013) Unique in the Crowd: the privacy bounds of human mobility. Sci Rep 3:1376","journal-title":"Sci Rep"},{"key":"46_CR195","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1145\/1242572.1242598","volume-title":"Proceedings of the 16th international conference on World Wide Web","author":"L Backstrom","year":"2007","unstructured":"Backstrom L, Dwork C, Kleinberg J (2007) Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th international conference on World Wide Web. ACM, New York, pp\u00a0181-190"},{"key":"46_CR196","first-page":"173","volume-title":"30th IEEE symposium on security and privacy","author":"A Narayanan","year":"2009","unstructured":"Narayanan A, Shmatikov V (2009) De-anonymizing social networks. In: 30th IEEE symposium on security and privacy. IEEE Press, New York, pp\u00a0173-187"},{"key":"46_CR197","first-page":"1","volume":"671","author":"L Sweeney","year":"2000","unstructured":"Sweeney L (2000) Simple demographics often identify people uniquely. Health (San Francisco) 671:1-34","journal-title":"Health (San Francisco)"},{"key":"46_CR198","first-page":"19","volume-title":"Proceeding of the 1st international workshop on privacy-preserving IR: when information retrieval meets privacy and security (PIR 2014)","author":"Y Song","year":"2014","unstructured":"Song Y, Dahlmeier D, Bressan S (2014) Not so unique in the crowd: a simple and effective algorithm for anonymizing location data. In: Proceeding of the 1st international workshop on privacy-preserving IR: when information retrieval meets privacy and security (PIR 2014), pp\u00a019-24"},{"key":"46_CR199","unstructured":"Telecom Italia big data challenge - open data. http:\/\/theodi.fbk.eu\/openbigdata\/"},{"issue":"5","key":"46_CR200","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) k-Anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl-Based Syst 10(5):557-570","journal-title":"Int J Uncertain Fuzziness Knowl-Based Syst"},{"key":"46_CR201","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1145\/2307636.2307659","volume-title":"Proceedings of the 10th international conference on mobile systems, applications, and services","author":"S Isaacman","year":"2012","unstructured":"Isaacman S, Becker R, C\u00e1ceres R, Martonosi M, Rowland J, Varshavsky A, Willinger W (2012) Human mobility modeling at metropolitan scales. In: Proceedings of the 10th international conference on mobile systems, applications, and services. ACM, New York, pp\u00a0239-252"},{"key":"46_CR202","first-page":"580","volume-title":"IEEE international conference on big data","author":"DJ Mir","year":"2013","unstructured":"Mir DJ, Isaacman S, C\u00e1ceres R, Martonosi M, Wright RN (2013) DP-WHERE: differentially private modeling of human mobility. In: IEEE international conference on big data. IEEE Press, New York, pp\u00a0580-588"},{"key":"46_CR203","unstructured":"Madan A, Waber BN, Ding M, Kominers P, Pentland AS (2009). Reality mining and personal privacy"},{"issue":"4","key":"46_CR204","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MSP.2013.90","volume":"11","author":"S Landau","year":"2013","unstructured":"Landau S (2013) Making sense from Snowden. IEEE Secur Priv 11(4):54-63","journal-title":"IEEE Secur Priv"},{"key":"46_CR205","unstructured":"Pentland A (2009) Reality mining of mobile communications: toward a new deal on data. The global information technology report 2008-2009, 1981"},{"key":"46_CR206","volume-title":"First international forum on the application and management of personal electronic information","author":"N Eagle","year":"2009","unstructured":"Eagle N (2009) Engineering a common good: fair use of aggregated, anonymized behavioral data. In: First international forum on the application and management of personal electronic information"},{"issue":"3","key":"46_CR207","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1016\/j.eswa.2005.09.080","volume":"31","author":"SY Hung","year":"2006","unstructured":"Hung SY, Yen DC, Wang HY (2006) Applying data mining to telecom churn management. Expert Syst Appl 31(3):515-524","journal-title":"Expert Syst Appl"},{"key":"46_CR208","doi-asserted-by":"crossref","first-page":"668","DOI":"10.1145\/1353343.1353424","volume-title":"Proceedings of the 11th international conference on extending database technology: advances in database technology","author":"K Dasgupta","year":"2008","unstructured":"Dasgupta K, Singh R, Viswanathan B, Chakraborty D, Mukherjea S, Nanavati AA, Joshi A (2008) Social ties and their relevance to churn in mobile telecom networks. In: Proceedings of the 11th international conference on extending database technology: advances in database technology. ACM, New York, pp\u00a0668-677"},{"key":"46_CR209","doi-asserted-by":"crossref","first-page":"732","DOI":"10.1137\/1.9781611972801.64","volume-title":"Proceedings of the 2010 SIAM international conference on data mining (SDM 2010)","author":"Y Richter","year":"2010","unstructured":"Richter Y, Yom-Tov E, Slonim N (2010) Predicting customer churn in mobile networks through analysis of social groups. In: Proceedings of the 2010 SIAM international conference on data mining (SDM 2010). SIAM, Philadelphia, pp\u00a0732-741"},{"issue":"3","key":"46_CR210","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/j.dss.2011.01.002","volume":"51","author":"T Dierkes","year":"2011","unstructured":"Dierkes T, Bichler M, Krishnan R (2011) Estimating the effect of word of mouth on churn and cross-buying in the mobile phone market with Markov logic networks. Decision Support Systems 51(3):361-371","journal-title":"Decision Support Systems"},{"key":"46_CR211","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1049\/cp:20010013","volume-title":"Second international conference on 3G mobile communication technologies","author":"ED Fitkov-Norris","year":"2001","unstructured":"Fitkov-Norris ED, Khanifar A (2001) Dynamic pricing in cellular networks, a mobility model with a provider-oriented approach. In: Second international conference on 3G mobile communication technologies. IET, London, pp\u00a063-67"},{"key":"46_CR212","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1088\/2058-7058\/23\/06\/32","volume":"23","author":"AL Barab\u00e1si","year":"2010","unstructured":"Barab\u00e1si AL (2010) You\u2019re so predictable. Phys World 23:22-26","journal-title":"Phys World"},{"key":"46_CR213","doi-asserted-by":"crossref","DOI":"10.1038\/ncomms1396","volume":"2","author":"G Ghoshal","year":"2011","unstructured":"Ghoshal G, Barab\u00e1si AL (2011) Ranking stability and super-stable nodes in complex networks. Nat Commun 2:394","journal-title":"Nat Commun"},{"key":"46_CR214","unstructured":"Afripop Project. http:\/\/www.worldpop.org.uk"}],"container-title":["EPJ Data Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-015-0046-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1140\/epjds\/s13688-015-0046-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-015-0046-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,12]],"date-time":"2023-08-12T19:43:27Z","timestamp":1691869407000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.epjdatascience.com\/content\/4\/1\/10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,5]]},"references-count":214,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["46"],"URL":"https:\/\/doi.org\/10.1140\/epjds\/s13688-015-0046-0","relation":{},"ISSN":["2193-1127"],"issn-type":[{"value":"2193-1127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,5]]},"article-number":"10"}}