{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:06Z","timestamp":1750308726131,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,10,15]],"date-time":"2013-10-15T00:00:00Z","timestamp":1381795200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,10,15]]},"DOI":"10.1145\/2589649.2554671","type":"proceedings-article","created":{"date-parts":[[2014,3,4]],"date-time":"2014-03-04T13:25:03Z","timestamp":1393939503000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Identifying abnormal patterns in cellular communication flows"],"prefix":"10.1145","author":[{"given":"David","family":"Goergen","sequence":"first","affiliation":[{"name":"Interdisciplinary Centre for Security, Reliability and Trust, 4, rue Alphonse Weicker, Luxembourg, L-2721"}]},{"given":"Veena","family":"Mendiratta","sequence":"additional","affiliation":[{"name":"Bell Laboratories, Alcatel-Lucent, 1960 Lucent Lane, Naperville, Illinois 60563"}]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[{"name":"Interdisciplinary Centre for Security, Reliability and Trust, 4, rue Alphonse Weicker, Luxembourg, L-2721"}]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[{"name":"Interdisciplinary Centre for Security, Reliability and Trust, 4, rue Alphonse Weicker, Luxembourg, L-2721"}]}],"member":"320","published-online":{"date-parts":[[2013,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"NetMob","author":"J.","year":"2013","unstructured":"J. ao Pedro Craveiro, F. M. V. Ramos, E. Kanjo, and N. E. Mawass. Towards an early warning system: the effect of weather on mobile phone usage A case study in Abidjan . In NetMob , 2013 . J. ao Pedro Craveiro, F. M. V. Ramos, E. Kanjo, and N. E. Mawass. Towards an early warning system: the effect of weather on mobile phone usage A case study in Abidjan. In NetMob, 2013."},{"key":"e_1_3_2_1_2_1","volume-title":"Data for Development: the D4D Challenge on Mobile Phone Data","author":"Blondel V. D.","year":"2013","unstructured":"V. D. Blondel , M. Esch , C. Chan , F. Clerot , P. Deville , E. Huens , and F. Morlot . Data for Development: the D4D Challenge on Mobile Phone Data , 2013 . V. D. Blondel, M. Esch, C. Chan, F. Clerot, P. Deville, E. Huens, and F. Morlot. Data for Development: the D4D Challenge on Mobile Phone Data, 2013."},{"key":"e_1_3_2_1_3_1","volume-title":"NetMob","author":"Cerin\u0161ek M.","year":"2013","unstructured":"M. Cerin\u0161ek , J. Bodlaj , and V. Batagelj . Symbolic clustering of users and antennae . In NetMob , 2013 . M. Cerin\u0161ek, J. Bodlaj, and V. Batagelj. Symbolic clustering of users and antennae. In NetMob, 2013."},{"key":"e_1_3_2_1_4_1","first-page":"281","volume-title":"Map-Reduce for Machine Learning on Multicore","author":"Chu C. T.","year":"2006","unstructured":"C. T. Chu , S. K. Kim , Y. A. Lin , Y. Yu , G. R. Bradski , A. Y. Ng , and K. Olukotun . Map-Reduce for Machine Learning on Multicore . In B. Sch\u00f6lkopf, J. C. Platt, and T. Hoffman, editors, NIPS, pages 281 -- 288 . MIT Press , 2006 . C. T. Chu, S. K. Kim, Y. A. Lin, Y. Yu, G. R. Bradski, A. Y. Ng, and K. Olukotun. Map-Reduce for Machine Learning on Multicore. In B. Sch\u00f6lkopf, J. C. Platt, and T. Hoffman, editors, NIPS, pages 281--288. MIT Press, 2006."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_3_2_1_6_1","volume-title":"NetMob","author":"Huang Z.","year":"2013","unstructured":"Z. Huang and U. Kumar . Combining call records and road data for strategic disaster response planning . In NetMob , 2013 . Z. Huang and U. Kumar. Combining call records and road data for strategic disaster response planning. In NetMob, 2013."},{"key":"e_1_3_2_1_7_1","first-page":"2009","author":"Krings G.","year":"2009","unstructured":"G. Krings , F. Calabrese , C. Ratti , and V. D. Blondel . Urban Gravity: A Model For Intercity Telecommunication Flows. Journal Of Statistical Mechanics: Theory And Experiment , 2009 , 2009 . G. Krings, F. Calabrese, C. Ratti, and V. D. Blondel. Urban Gravity: A Model For Intercity Telecommunication Flows. Journal Of Statistical Mechanics: Theory And Experiment, 2009, 2009.","journal-title":"Journal Of Statistical Mechanics: Theory And Experiment"},{"key":"e_1_3_2_1_8_1","volume-title":"NetMob","author":"Smith J.","year":"2013","unstructured":"J. Smith , J. Stevens , and M. Y. Idris . NVizABLE: A Web-Based Network Visualization Interface . In NetMob , 2013 . J. Smith, J. Stevens, and M. Y. Idris. NVizABLE: A Web-Based Network Visualization Interface. In NetMob, 2013."},{"key":"e_1_3_2_1_9_1","volume-title":"Risk and Trust (PASSAT), 2011 IEEE Third International Conference on Social Computing (SocialCom)","author":"Traag V. A.","year":"2011","unstructured":"V. A. Traag , A. Browet , F. Calabrese , and F. Morlot . Social Event Detection in Massive Mobile Phone Data Using Probabilistic Location Inference. In Privacy, Security , Risk and Trust (PASSAT), 2011 IEEE Third International Conference on Social Computing (SocialCom) , 2011 . V. A. Traag, A. Browet, F. Calabrese, and F. Morlot. Social Event Detection in Massive Mobile Phone Data Using Probabilistic Location Inference. In Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on Social Computing (SocialCom), 2011."},{"key":"e_1_3_2_1_10_1","volume-title":"NetMob","author":"Trestian R.","year":"2013","unstructured":"R. Trestian , F. Zaman , and G.-M. Muntean . Spotted : Connecting People, Locations and Real-World Events in a Cellular Network . In NetMob , 2013 . R. Trestian, F. Zaman, and G.-M. Muntean. Spotted: Connecting People, Locations and Real-World Events in a Cellular Network. In NetMob, 2013."},{"key":"e_1_3_2_1_11_1","volume-title":"NetMob","author":"van den Elzen S.","year":"2013","unstructured":"S. van den Elzen , D. H. Jorik Blaas , J.-K. Buenen , J. J. van Wijk , R. Spousta , A. Miao , S. Sala , and S. Chan . Exploration and Analysis of Massive Mobile Phone Data: A Layered Visual Analytics approach . In NetMob , 2013 . S. van den Elzen, D. H. Jorik Blaas, J.-K. Buenen, J. J. van Wijk, R. Spousta, A. Miao, S. Sala, and S. Chan. Exploration and Analysis of Massive Mobile Phone Data: A Layered Visual Analytics approach. In NetMob, 2013."}],"event":{"name":"IPTComm '13: Principles, Systems and Applications of IP Telecommunications","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Chicago IL USA","acronym":"IPTComm '13"},"container-title":["Proceedings of Principles, Systems and Applications on IP Telecommunications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2589649.2554671","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2589649.2554671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:46Z","timestamp":1750277686000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2589649.2554671"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,15]]},"references-count":11,"alternative-id":["10.1145\/2589649.2554671","10.1145\/2589649"],"URL":"https:\/\/doi.org\/10.1145\/2589649.2554671","relation":{},"subject":[],"published":{"date-parts":[[2013,10,15]]},"assertion":[{"value":"2013-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}