{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T04:14:58Z","timestamp":1768623298882,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,2]],"date-time":"2014-06-02T00:00:00Z","timestamp":1401667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,2]]},"DOI":"10.1145\/2611040.2611062","type":"proceedings-article","created":{"date-parts":[[2014,5,27]],"date-time":"2014-05-27T12:57:10Z","timestamp":1401195430000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Classification of movement data concerning user's activity recognition via mobile phones"],"prefix":"10.1145","author":[{"given":"Spiridoula","family":"Tragopoulou","sequence":"first","affiliation":[{"name":"Harokopio University of Athens, Department of Informatics and Telematics, Omirou 9, 17778 Tavros, Greece"}]},{"given":"Iraklis","family":"Varlamis","sequence":"additional","affiliation":[{"name":"Harokopio University of Athens, Department of Informatics and Telematics, Omirou 9 Tavros, 17778, Greece"}]},{"given":"Magdalini","family":"Eirinaki","sequence":"additional","affiliation":[{"name":"San Jose State University, Computer Engineering Department, One Washington Square San Jose, CA, 95192, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,6,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Int. J. on Advances in Life Sciences, 4(1 and 2)","author":"Azam M. A.","year":"2012","unstructured":"M. A. Azam , J. Loo , S. K. A. Khan , M. Adeel , and W. Ejaz . Human behaviour analysis using data collected from mobile devices . Int. J. on Advances in Life Sciences, 4(1 and 2) , 2012 . M. A. Azam, J. Loo, S. K. A. Khan, M. Adeel, and W. Ejaz. Human behaviour analysis using data collected from mobile devices. Int. J. on Advances in Life Sciences, 4(1 and 2), 2012."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISWC.2010.5665868"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02481-8_120"},{"key":"e_1_3_2_1_5_1","first-page":"1","article-title":"Activity recognition using k-nearest neighbor algorithm on smartphone with tri-axal accelerometer","author":"Kaghyan S.","year":"2012","unstructured":"S. Kaghyan and H. Sarukhanyan . Activity recognition using k-nearest neighbor algorithm on smartphone with tri-axal accelerometer . International Journal Information Models and Analyses , 1 , 2012 . S. Kaghyan and H. Sarukhanyan. Activity recognition using k-nearest neighbor algorithm on smartphone with tri-axal accelerometer. International Journal Information Models and Analyses, 1, 2012.","journal-title":"International Journal Information Models and Analyses"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-005-0466-3"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247546"},{"key":"e_1_3_2_1_8_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1007\/978-3-642-21219-2_58","volume-title":"Hybrid Artificial Intelligent Systems","author":"Lee Y.-S.","year":"2011","unstructured":"Y.-S. Lee and S.-B. Cho . Activity recognition using hierarchical hidden markov models on a smartphone with 3d accelerometer . In E. Corchado, M. Kurzynski, and M. Wozniak, editors, Hybrid Artificial Intelligent Systems , volume 6678 of Lecture Notes in Computer Science , pages 460 -- 467 . Springer Berlin Heidelberg , 2011 . Y.-S. Lee and S.-B. Cho. Activity recognition using hierarchical hidden markov models on a smartphone with 3d accelerometer. In E. Corchado, M. Kurzynski, and M. Wozniak, editors, Hybrid Artificial Intelligent Systems, volume 6678 of Lecture Notes in Computer Science, pages 460--467. Springer Berlin Heidelberg, 2011."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/0278364907073775"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(03)00171-3"},{"key":"e_1_3_2_1_11_1","volume-title":"Programs for Machine Learning","author":"Quinlan R.","year":"1993","unstructured":"R. Quinlan . C4.5 : Programs for Machine Learning . Morgan Kaufmann Publishers , San Mateo, CA , 1993 . R. Quinlan. C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, San Mateo, CA, 1993."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11853565_13"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2010.118"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11564126_72"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2012.6386017"},{"key":"e_1_3_2_1_16_1","first-page":"264","volume-title":"Mobile Data Mining on Small Devices through Web Services","author":"Talia D.","year":"2010","unstructured":"D. Talia and P. Trunfio . Mobile Data Mining on Small Devices through Web Services , pages 264 -- 276 . John Wiley and Sons, Inc. , 2010 . D. Talia and P. Trunfio. Mobile Data Mining on Small Devices through Web Services, pages 264--276. John Wiley and Sons, Inc., 2010."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/15501320601069499"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020591"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.202"}],"event":{"name":"WIMS '14: 4th International Conference on Web Intelligence, Mining and Semantics","location":"Thessaloniki Greece","acronym":"WIMS '14","sponsor":["Aristotle University of Thessaloniki"]},"container-title":["Proceedings of the 4th International Conference on Web Intelligence, Mining and Semantics (WIMS14)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2611040.2611062","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2611040.2611062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:48Z","timestamp":1750229748000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2611040.2611062"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,2]]},"references-count":19,"alternative-id":["10.1145\/2611040.2611062","10.1145\/2611040"],"URL":"https:\/\/doi.org\/10.1145\/2611040.2611062","relation":{},"subject":[],"published":{"date-parts":[[2014,6,2]]},"assertion":[{"value":"2014-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}