{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:53:38Z","timestamp":1755838418214,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,2,28]],"date-time":"2015-02-28T00:00:00Z","timestamp":1425081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CHS-1404698"],"award-info":[{"award-number":["CHS-1404698"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,2,28]]},"DOI":"10.1145\/2675133.2675213","type":"proceedings-article","created":{"date-parts":[[2015,2,24]],"date-time":"2015-02-24T14:09:31Z","timestamp":1424786971000},"page":"1612-1621","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Using Multiple Contexts to Detect and Form Opportunistic Groups"],"prefix":"10.1145","author":[{"given":"Adrian A.","family":"de Freitas","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Anind K.","family":"Dey","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,2,28]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982277"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.56"},{"volume-title":"Secure Device Pairing Using Audio. ICCST '09","year":"2009","author":"Clay W. R.","key":"e_1_3_2_2_3_1"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208377"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.37"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/647987.741340"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24646-6_3"},{"volume-title":"RhythmLink. UIST '11","year":"2011","author":"Lin F. X.","key":"e_1_3_2_2_8_1"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380116.2380121"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.51"},{"volume-title":"HUC '99","year":"1999","author":"McCarthy J. F.","key":"e_1_3_2_2_11_1"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2002.1037722"},{"key":"e_1_3_2_2_13_1","first-page":"511","volume":"3","author":"Rekimoto J.","year":"2003","journal-title":"A Direct Manipulation Technique for Wireless Networking. Interact"},{"volume-title":"Proximity Mining: Finding Proximity Using Sensor Data History. DARPA Information Survivability Conference and Exposition","year":"2003","author":"Takada T.","key":"e_1_3_2_2_14_1"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180891"},{"volume-title":"Issues in Personalizing Shared Ubiquitous Devices. Ubicomp '02","year":"2002","author":"Trevor J.","key":"e_1_3_2_2_16_1"},{"volume-title":"E. Amigo: Proximity-Based Authentication of Mobile Devices. Ubicomp '07","year":"2007","author":"Varshavsky A.","key":"e_1_3_2_2_17_1"},{"volume-title":"Supporting Persistent Social Groups in Ubiquitous Computing Environments Using Context-Aware Ephemeral Group Service. PerCom '04","year":"2004","author":"Wang B.","key":"e_1_3_2_2_18_1"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.199"},{"key":"e_1_3_2_2_20_1","unstructured":"Recognizing the User's Current Activity | Android Developers. http:\/\/developer.android.com\/training\/location\/activityrecognition.html.  Recognizing the User's Current Activity | Android Developers. http:\/\/developer.android.com\/training\/location\/activityrecognition.html."},{"key":"e_1_3_2_2_21_1","unstructured":"Disney StoryLight. http:\/\/www.usa.philips.com\/cp\/719945548\/disney.  Disney StoryLight. http:\/\/www.usa.philips.com\/cp\/719945548\/disney."}],"event":{"name":"CSCW '15: Computer Supported Cooperative Work and Social Computing","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Vancouver BC Canada","acronym":"CSCW '15"},"container-title":["Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work &amp; Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2675133.2675213","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2675133.2675213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:09Z","timestamp":1750227129000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2675133.2675213"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,28]]},"references-count":21,"alternative-id":["10.1145\/2675133.2675213","10.1145\/2675133"],"URL":"https:\/\/doi.org\/10.1145\/2675133.2675213","relation":{},"subject":[],"published":{"date-parts":[[2015,2,28]]},"assertion":[{"value":"2015-02-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}