{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T16:59:35Z","timestamp":1774198775495,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,11,2]],"date-time":"2015-11-02T00:00:00Z","timestamp":1446422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,11,2]]},"DOI":"10.1145\/2810379.2810393","type":"proceedings-article","created":{"date-parts":[[2015,11,2]],"date-time":"2015-11-02T18:33:30Z","timestamp":1446489210000},"page":"55-61","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Taking Benefit from the User Density in Large Cities for Delivering SMS"],"prefix":"10.1145","author":[{"given":"Yannick","family":"Leo","sequence":"first","affiliation":[{"name":"ENS de Lyon, Lyon, France"}]},{"given":"Carlos","family":"Sarraute","sequence":"additional","affiliation":[{"name":"Grandata Labs, Lyon, France"}]},{"given":"Anthony","family":"Busson","sequence":"additional","affiliation":[{"name":"UCB Lyon 1, Lyon, France"}]},{"given":"Eric","family":"Fleury","sequence":"additional","affiliation":[{"name":"ENS de Lyon \/ Inria, ENS de Lyon, France"}]}],"member":"320","published-online":{"date-parts":[[2015,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493225"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2012.11.040"},{"key":"e_1_3_2_1_3_1","volume-title":"XXXIII Simposio Brasileiro de Redes de Computadores e Sistemas Distribu dos","author":"Curto H. N.","year":"2015","unstructured":"H. N. Curto , J. Caetano , J. Almeida , A. Ziviani , C. H. S. Malab , and H. T. Marques-Neto . Using smstransfer small data packets during periods of high workload on mobile data networks . In XXXIII Simposio Brasileiro de Redes de Computadores e Sistemas Distribu dos , 2015 . H. N. Curto, J. Caetano, J. Almeida, A. Ziviani, C. H. S. Malab, and H. T. Marques-Neto. Using smstransfer small data packets during periods of high workload on mobile data networks. In XXXIII Simposio Brasileiro de Redes de Computadores e Sistemas Distribu dos, 2015."},{"key":"e_1_3_2_1_4_1","volume-title":"Unique in the crowd: The privacy bounds of human mobility. Nature srep., 3","author":"de Montjoye Y.-A.","year":"2013","unstructured":"Y.-A. de Montjoye , C. A. Hidalgo , M. Verleysen , and V. D. Blondel . Unique in the crowd: The privacy bounds of human mobility. Nature srep., 3 , 2013 . Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel. Unique in the crowd: The privacy bounds of human mobility. Nature srep., 3, 2013."},{"key":"e_1_3_2_1_5_1","volume-title":"Short message service (sms) applications for disease prevention in developing countries. Journal of medical Internet research, 14(1):e3","author":"Deglise C.","year":"2012","unstructured":"C. Deglise , L. S. Suggs , and P. Odermatt . Short message service (sms) applications for disease prevention in developing countries. Journal of medical Internet research, 14(1):e3 , 2012 . C. Deglise, L. S. Suggs, and P. Odermatt. Short message service (sms) applications for disease prevention in developing countries. Journal of medical Internet research, 14(1):e3, 2012."},{"key":"e_1_3_2_1_6_1","first-page":"1411","volume-title":"Spatiotemporal detection of unusual human population behavior using mobile phone data. arXiv eprint archive","author":"Dobra A.","year":"2014","unstructured":"A. Dobra , N. E. Williams , and N. Eagle . Spatiotemporal detection of unusual human population behavior using mobile phone data. arXiv eprint archive , pages 1411 -- 6179 , 2014 . A. Dobra, N. E. Williams, and N. Eagle. Spatiotemporal detection of unusual human population behavior using mobile phone data. arXiv eprint archive, pages 1411--6179, 2014."},{"key":"e_1_3_2_1_7_1","volume-title":"Inferring unusual crowd events from mobile phone call detail records. arXiv preprint arXiv:1504.03643","author":"Dong Y.","year":"2015","unstructured":"Y. Dong , F. Pinelli , Y. Gkoufas , Z. Nabi , F. Calabrese , and N. V. Chawla . Inferring unusual crowd events from mobile phone call detail records. arXiv preprint arXiv:1504.03643 , 2015 . Y. Dong, F. Pinelli, Y. Gkoufas, Z. Nabi, F. Calabrese, and N. V. Chawla. Inferring unusual crowd events from mobile phone call detail records. arXiv preprint arXiv:1504.03643, 2015."},{"key":"e_1_3_2_1_8_1","first-page":"13","volume-title":"Information Processing in Sensor Networks (IPSN), 2011 10th International Conference on","author":"Faulkner M.","year":"2011","unstructured":"M. Faulkner , M. Olson , R. Chandy , J. Krause , K. M. Chandy , and A. Krause . The next big one: Detecting earthquakes and other rare events from community-based sensors . In Information Processing in Sensor Networks (IPSN), 2011 10th International Conference on , pages 13 -- 24 . IEEE, 2011 . M. Faulkner, M. Olson, R. Chandy, J. Krause, K. M. Chandy, and A. Krause. The next big one: Detecting earthquakes and other rare events from community-based sensors. In Information Processing in Sensor Networks (IPSN), 2011 10th International Conference on, pages 13--24. IEEE, 2011."},{"key":"e_1_3_2_1_9_1","volume-title":"Behavior change interventions delivered by mobile telephone short-message service. American journal of preventive medicine, 36(2):165--173","author":"Fjeldsoe B. S.","year":"2009","unstructured":"B. S. Fjeldsoe , A. L. Marshall , and Y. D. Miller . Behavior change interventions delivered by mobile telephone short-message service. American journal of preventive medicine, 36(2):165--173 , 2009 . B. S. Fjeldsoe, A. L. Marshall, and Y. D. Miller. Behavior change interventions delivered by mobile telephone short-message service. American journal of preventive medicine, 36(2):165--173, 2009."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.801403"},{"key":"e_1_3_2_1_11_1","volume-title":"A survey on real-time traffic monitoring & dynamic profile management in mobile data networks","author":"Gupta P.","year":"2015","unstructured":"P. Gupta and A. Dureja . A survey on real-time traffic monitoring & dynamic profile management in mobile data networks . 2015 . P. Gupta and A. Dureja. A survey on real-time traffic monitoring & dynamic profile management in mobile data networks. 2015."},{"key":"e_1_3_2_1_12_1","volume-title":"GSM networks: protocols, terminology, and implementation","author":"Heine G.","year":"1999","unstructured":"G. Heine and M. Horrer . GSM networks: protocols, terminology, and implementation . Artech House, Inc. , 1999 . G. Heine and M. Horrer. GSM networks: protocols, terminology, and implementation. Artech House, Inc., 1999."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:ISFI.0000046377.32617.3d"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814457"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of IEEE-EURASIP Workshop on Nonlinear Signal and Image Processing NSIP-03","author":"Rilling G.","year":"2003","unstructured":"G. Rilling , P. Flandrin , and P. Goncalves . On empirical mode decomposition and its algorithms . In Proceedings of IEEE-EURASIP Workshop on Nonlinear Signal and Image Processing NSIP-03 , Grado (Italy ), June 2003 . G. Rilling, P. Flandrin, and P. Goncalves. On empirical mode decomposition and its algorithms. In Proceedings of IEEE-EURASIP Workshop on Nonlinear Signal and Image Processing NSIP-03, Grado (Italy), June 2003."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/3191835.3192000"},{"key":"e_1_3_2_1_17_1","volume-title":"Pearson Education","author":"Toh C. K.","year":"2001","unstructured":"C. K. Toh . Ad hoc mobile wireless networks: protocols and systems . Pearson Education , 2001 . C. K. Toh. Ad hoc mobile wireless networks: protocols and systems. Pearson Education, 2001."},{"key":"e_1_3_2_1_18_1","first-page":"625","volume-title":"Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on","author":"Traag V. A.","year":"2011","unstructured":"V. A. Traag , A. Browet , F. Calabrese , and F. Morlot . Social event detection in massive mobile phone data using probabilistic location inference. In Privacy, Security , Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on , pages 625 -- 628 . IEEE, 2011 . V. A. Traag, A. Browet, F. Calabrese, and F. Morlot. Social event detection in massive mobile phone data using probabilistic location inference. In Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on, pages 625--628. IEEE, 2011."},{"key":"e_1_3_2_1_19_1","first-page":"29","volume-title":"Proceedings of the 2014 KDD Workshop on Learning about Emergencies from Social Information (KDD-LESI 2014","author":"Young W. C.","year":"2014","unstructured":"W. C. Young , J. E. Blumenstock , E. B. Fox , and T. H. McCormick . Detecting and classifying anomalous behavior in spatiotemporal network data . In Proceedings of the 2014 KDD Workshop on Learning about Emergencies from Social Information (KDD-LESI 2014 ), pages 29 -- 33 , 2014 . W. C. Young, J. E. Blumenstock, E. B. Fox, and T. H. McCormick. Detecting and classifying anomalous behavior in spatiotemporal network data. In Proceedings of the 2014 KDD Workshop on Learning about Emergencies from Social Information (KDD-LESI 2014), pages 29--33, 2014."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177114"}],"event":{"name":"MSWiM'15: 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","location":"Cancun Mexico","acronym":"MSWiM'15","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"]},"container-title":["Proceedings of the 12th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, &amp; Ubiquitous Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810379.2810393","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810379.2810393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:15Z","timestamp":1750273455000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810379.2810393"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,2]]},"references-count":20,"alternative-id":["10.1145\/2810379.2810393","10.1145\/2810379"],"URL":"https:\/\/doi.org\/10.1145\/2810379.2810393","relation":{},"subject":[],"published":{"date-parts":[[2015,11,2]]},"assertion":[{"value":"2015-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}