{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:24Z","timestamp":1750306944628,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,6,25]],"date-time":"2013-06-25T00:00:00Z","timestamp":1372118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,6,25]]},"DOI":"10.1145\/2462456.2464457","type":"proceedings-article","created":{"date-parts":[[2013,7,1]],"date-time":"2013-07-01T12:27:34Z","timestamp":1372681654000},"page":"83-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Leveraging graphical models to improve accuracy and reduce privacy risks of mobile sensing"],"prefix":"10.1145","author":[{"given":"Abhinav","family":"Parate","sequence":"first","affiliation":[{"name":"University of Massachusetts-Amherst, Amherst, MA, USA"}]},{"given":"Meng-Chieh","family":"Chiu","sequence":"additional","affiliation":[{"name":"University of Massachusetts-Amherst, Amherst, MA, USA"}]},{"given":"Deepak","family":"Ganesan","sequence":"additional","affiliation":[{"name":"University of Massachusetts-Amherst, Amherst, MA, USA"}]},{"given":"Benjamin M.","family":"Marlin","sequence":"additional","affiliation":[{"name":"University of Massachusetts-Amherst, Amherst, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Java bayes. http:\/\/www.cs.cmu.edu\/~javabayes\/.  Java bayes. http:\/\/www.cs.cmu.edu\/~javabayes\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24646-6_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.21"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070942.2070949"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.63"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1316689.1316741"},{"key":"e_1_3_2_1_7_1","first-page":"139","volume-title":"UAI","author":"Friedman N.","year":"1999","unstructured":"N. Friedman , K. Murphy , and S. Russell . Learning the Structure of Dynamic Probabilistic Networks . In UAI , pages 139 -- 147 , 1999 . N. Friedman, K. Murphy, and S. Russell. Learning the Structure of Dynamic Probabilistic Networks. In UAI, pages 139--147, 1999."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213870"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_10_1","first-page":"324","volume-title":"UAI","author":"Krause A.","year":"2005","unstructured":"A. Krause and C. Guestrin . Near-optimal Nonmyopic Value of Information in Graphical Models . In UAI , pages 324 -- 331 , 2005 . A. Krause and C. Guestrin. Near-optimal Nonmyopic Value of Information in Graphical Models. In UAI, pages 324--331, 2005."},{"key":"e_1_3_2_1_11_1","first-page":"766","volume-title":"IJCAI","author":"Lester J.","year":"2005","unstructured":"J. Lester , T. Choudhury , N. Kern , G. Borriello , and B. Hannaford . A hybrid discriminative\/generative approach for modeling human activities . In IJCAI , pages 766 -- 772 , 2005 . J. Lester, T. Choudhury, N. Kern, G. Borriello, and B. Hannaford. A hybrid discriminative\/generative approach for modeling human activities. In IJCAI, pages 766--772, 2005."},{"key":"e_1_3_2_1_12_1","volume-title":"NSDI, page~23","author":"Li M.","year":"2006","unstructured":"M. Li , D. Ganesan , and P. Shenoy . Presto: feedback-driven data management in sensor networks . In NSDI, page~23 , 2006 . M. Li, D. Ganesan, and P. Shenoy. Presto: feedback-driven data management in sensor networks. In NSDI, page~23, 2006."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869983.1869992"},{"key":"e_1_3_2_1_14_1","first-page":"229","volume-title":"IPSN","author":"Meliou A.","year":"2009","unstructured":"A. Meliou , C. Guestrin , and J. M. Hellerstein . Approximating sensor network queries using in-network summaries . In IPSN , pages 229 -- 240 . IEEE, 2009 . A. Meliou, C. Guestrin, and J. M. Hellerstein. Approximating sensor network queries using in-network summaries. In IPSN, pages 229--240. IEEE, 2009."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307640"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01588971"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646147"},{"key":"e_1_3_2_1_18_1","volume-title":"Morgan Kaufmann","author":"Pearl J.","year":"1988","unstructured":"J. Pearl . Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference . Morgan Kaufmann , San Francisco, USA , 1988 . J. Pearl. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, San Francisco, USA, 1988."},{"key":"e_1_3_2_1_19_1","first-page":"335","volume-title":"Proceedings of the 18th conference on USENIX security symposium, SSYM'09","author":"Popa R. A.","year":"2009","unstructured":"R. A. Popa , H. Balakrishnan , and A. J. Blumberg . Vpriv: protecting privacy in location-based vehicular services . In Proceedings of the 18th conference on USENIX security symposium, SSYM'09 , pages 335 -- 350 , Berkeley, CA, USA , 2009 . USENIX Association. R. A. Popa, H. Balakrishnan, and A. J. Blumberg. Vpriv: protecting privacy in location-based vehicular services. In Proceedings of the 18th conference on USENIX security symposium, SSYM'09, pages 335--350, Berkeley, CA, USA, 2009. USENIX Association."},{"key":"e_1_3_2_1_20_1","first-page":"1541","volume-title":"IAAI","author":"Ravi N.","year":"2005","unstructured":"N. Ravi , N. Dandekar , P. Mysore , and M. L. Littman . Activity recognition from accelerometer data . In IAAI , pages 1541 -- 1546 , 2005 . N. Ravi, N. Dandekar, P. Mysore, and M. L. Littman. Activity recognition from accelerometer data. In IAAI, pages 1541--1546, 2005."},{"key":"e_1_3_2_1_21_1","volume-title":"Artificial Intelligence: A Modern Approach","author":"Russell S. J.","year":"2002","unstructured":"S. J. Russell and P. Norvig . Artificial Intelligence: A Modern Approach . Prentice Hall , second edition, 2002 . S. J. Russell and P. Norvig. Artificial Intelligence: A Modern Approach. Prentice Hall, second edition, 2002."}],"event":{"name":"MobiSys'13: The 11th Annual International Conference on Mobile Systems, Applications, and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Taipei Taiwan","acronym":"MobiSys'13"},"container-title":["Proceeding of the 11th annual international conference on Mobile systems, applications, and services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462456.2464457","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2462456.2464457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:35:56Z","timestamp":1750235756000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462456.2464457"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,25]]},"references-count":21,"alternative-id":["10.1145\/2462456.2464457","10.1145\/2462456"],"URL":"https:\/\/doi.org\/10.1145\/2462456.2464457","relation":{},"subject":[],"published":{"date-parts":[[2013,6,25]]},"assertion":[{"value":"2013-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}