{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:56:15Z","timestamp":1773510975970,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,13]],"date-time":"2014-09-13T00:00:00Z","timestamp":1410566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,13]]},"DOI":"10.1145\/2632048.2632059","type":"proceedings-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T14:22:41Z","timestamp":1410963761000},"page":"703-714","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":223,"title":["CrowdRecruiter"],"prefix":"10.1145","author":[{"given":"Daqing","family":"Zhang","sequence":"first","affiliation":[{"name":"Institut Mines-T\u00e9l\u00e9com, Evry, France"}]},{"given":"Haoyi","family":"Xiong","sequence":"additional","affiliation":[{"name":"Institut Mines-T\u00e9l\u00e9com, Evry, France"}]},{"given":"Leye","family":"Wang","sequence":"additional","affiliation":[{"name":"Institut Mines-T\u00e9l\u00e9com, Evry, France"}]},{"given":"Guanling","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Massachusetts Lowell, MA"}]}],"member":"320","published-online":{"date-parts":[[2014,9,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6069707"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2011.5767596"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12654-3_21"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517351.2517372"},{"key":"e_1_3_2_2_5_1","first-page":"323","volume-title":"Proceedings of NetMob","author":"Xiong H.","year":"2013"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494091.2499575"},{"key":"e_1_3_2_2_7_1","unstructured":"Christos H. Papadimitriou and Yaron Singer. Budget feasible mechanisms. CoRR abs\/1002.2334 2010.  Christos H. Papadimitriou and Yaron Singer. Budget feasible mechanisms. CoRR abs\/1002.2334 2010."},{"key":"e_1_3_2_2_8_1","unstructured":"V. D. Blondel M. Esch C. Chan F. Clerot P. Deville E. Huens F. Morlot Z. Smoreda and C. Ziemlicki. Data for development: the d4d challenge on mobile phone data. 2012.  V. D. Blondel M. Esch C. Chan F. Clerot P. Deville E. Huens F. Morlot Z. Smoreda and C. Ziemlicki. Data for development: the d4d challenge on mobile phone data. 2012."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030160"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370288"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493504"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2021975.2021988"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2389148.2389158"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030623"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370241"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493435"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2015553.2015785"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814448"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030156"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370233"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.154"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISWC.2012.25"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2011.28"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070942.2070949"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2013.6526718"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2426656.2426658"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2013.6529564"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/INSS.2012.6240525"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2013.6526731"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2010.5663996"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12654-3_21"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195568"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01721-6_4"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12654-3_9"},{"key":"e_1_3_2_2_35_1","volume-title":"First AAAI Conference on Human Computation and Crowdsourcing","author":"Singla Adish","year":"2013"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6525603"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2011.5984884"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2013.6526723"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1198\/016214506000001455"},{"key":"e_1_3_2_2_40_1","unstructured":"Pranava R Goundan and Andreas S Schulz. Revisiting the greedy approach to submodular set function maximization. Optimization online pages 1--25 2007.  Pranava R Goundan and Andreas S Schulz. Revisiting the greedy approach to submodular set function maximization. Optimization online pages 1--25 2007."},{"key":"e_1_3_2_2_41_1","volume-title":"Workshop on Big Data Analytics","author":"Wagner Daniel T","year":"2013"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32320-1"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2010.5470553"},{"key":"e_1_3_2_2_44_1","volume-title":"Springer Berlin","author":"Crispin","year":"1985"},{"key":"e_1_3_2_2_45_1","unstructured":"David J Eck. Introduction to programming using java 2006.   David J Eck. Introduction to programming using java 2006."}],"event":{"name":"UbiComp '14: The 2014 ACM Conference on Ubiquitous Computing","location":"Seattle Washington","acronym":"UbiComp '14","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGSPATIAL ACM Special Interest Group on Spatial Information"]},"container-title":["Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2632048.2632059","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2632048.2632059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:14Z","timestamp":1750231154000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2632048.2632059"}},"subtitle":["selecting participants for piggyback crowdsensing under probabilistic coverage constraint"],"short-title":[],"issued":{"date-parts":[[2014,9,13]]},"references-count":45,"alternative-id":["10.1145\/2632048.2632059","10.1145\/2632048"],"URL":"https:\/\/doi.org\/10.1145\/2632048.2632059","relation":{},"subject":[],"published":{"date-parts":[[2014,9,13]]},"assertion":[{"value":"2014-09-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}