{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:08:01Z","timestamp":1763017681082,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,9,12]],"date-time":"2016-09-12T00:00:00Z","timestamp":1473638400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Key Program of the National Natural Science Foundation of China","award":["61233007"],"award-info":[{"award-number":["61233007"]}]},{"name":"National Basic Research Program of China (973 Program)","award":["2011CBA00300, 2011CBA00301, 2013CB329105"],"award-info":[{"award-number":["2011CBA00300, 2011CBA00301, 2013CB329105"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61033001, 61361136003, 61472214, 61472210"],"award-info":[{"award-number":["61033001, 61361136003, 61472214, 61472210"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Global Talent Recruitment (Youth) Program"},{"name":"National High Technology Research and Development Program of China (863 Program)","award":["2013AA013302"],"award-info":[{"award-number":["2013AA013302"]}]},{"name":"Tsinghua National Laboratory for Information Science and Technology key projects"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,12]]},"DOI":"10.1145\/2971648.2971657","type":"proceedings-article","created":{"date-parts":[[2016,9,9]],"date-time":"2016-09-09T14:28:57Z","timestamp":1473431337000},"page":"316-327","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["EDUM"],"prefix":"10.1145","author":[{"given":"Mengyu","family":"Zhou","sequence":"first","affiliation":[{"name":"Tsinghua University"}]},{"given":"Minghua","family":"Ma","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Yangkun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Kaixin","family":"SuiA","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Dan","family":"Pei","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Thomas","family":"Moscibroda","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]}],"member":"320","published-online":{"date-parts":[[2016,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016a. Android 6.0 Changes on Access to Hardware Identifier. http:\/\/developer.android.com\/about\/versions\/marshmallow\/android-6.0-changes.html#behavior-hardware-id. (2016). Accessed: 2016-03-29.  2016a. Android 6.0 Changes on Access to Hardware Identifier. http:\/\/developer.android.com\/about\/versions\/marshmallow\/android-6.0-changes.html#behavior-hardware-id. (2016). Accessed: 2016-03-29."},{"volume-title":"Android phone interactive broadcast action","key":"e_1_3_2_1_2_1","unstructured":"2016b. Android phone interactive broadcast action . http:\/\/developer.android.com\/reference\/android\/content\/Intent.html#ACTION_SCREEN_ON. (2016). Accessed: 2016-03-29. 2016b. Android phone interactive broadcast action. http:\/\/developer.android.com\/reference\/android\/content\/Intent.html#ACTION_SCREEN_ON. (2016). Accessed: 2016-03-29."},{"volume-title":"Android Supplicant States from wpa_supplicant","key":"e_1_3_2_1_3_1","unstructured":"2016c. Android Supplicant States from wpa_supplicant . http:\/\/developer.android.com\/reference\/android\/net\/wifi\/SupplicantState.html. (2016). Accessed: 2016-03-29. 2016c. Android Supplicant States from wpa_supplicant. http:\/\/developer.android.com\/reference\/android\/net\/wifi\/SupplicantState.html. (2016). Accessed: 2016-03-29."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568042"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.11.002"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0105816"},{"key":"e_1_3_2_1_7_1","volume-title":"Cisco visual networking index: Forecast and methodology","author":"Cisco I","year":"2013","unstructured":"I Cisco . 2013. Cisco visual networking index: Forecast and methodology , 2013 --2018. CISCO White paper (2013), 2013--2018. I Cisco. 2013. Cisco visual networking index: Forecast and methodology, 2013--2018. CISCO White paper (2013), 2013--2018."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0900282106"},{"volume-title":"Styles of learning and teaching: An integrated outline of educational psychology for students, teachers and lecturers","author":"Entwistle Noel J","key":"e_1_3_2_1_9_1","unstructured":"Noel J Entwistle . 2013. Styles of learning and teaching: An integrated outline of educational psychology for students, teachers and lecturers . Routledge . Noel J Entwistle. 2013. Styles of learning and teaching: An integrated outline of educational psychology for students, teachers and lecturers. Routledge."},{"key":"e_1_3_2_1_10_1","volume-title":"Jacob Whitehill, Curtis G Northcutt, Joseph Jay Williams, John D Hansen, Glenn Lopez, and Rebecca Petersen.","author":"Ho Andrew Dean","year":"2015","unstructured":"Andrew Dean Ho , Isaac Chuang , Justin Reich , Cody Austun Coleman , Jacob Whitehill, Curtis G Northcutt, Joseph Jay Williams, John D Hansen, Glenn Lopez, and Rebecca Petersen. 2015 . HarvardX and MITx : Two years of open online courses fall 2012-summer 2014. Available at SSRN 2586847 (2015). Andrew Dean Ho, Isaac Chuang, Justin Reich, Cody Austun Coleman, Jacob Whitehill, Curtis G Northcutt, Joseph Jay Williams, John D Hansen, Glenn Lopez, and Rebecca Petersen. 2015. HarvardX and MITx: Two years of open online courses fall 2012-summer 2014. Available at SSRN 2586847 (2015)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804289"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808797.2809387"},{"key":"e_1_3_2_1_13_1","first-page":"1","article-title":"Extracting a Mobility Model from Real User Traces","volume":"6","author":"Kim Minkyong","year":"2006","unstructured":"Minkyong Kim , David Kotz , and Songkuk Kim . 2006 . Extracting a Mobility Model from Real User Traces .. In INFOCOM , Vol. 6. 1 -- 13 . Minkyong Kim, David Kotz, and Songkuk Kim. 2006. Extracting a Mobility Model from Real User Traces.. In INFOCOM, Vol. 6. 1--13.","journal-title":"INFOCOM"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674982"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639118"},{"key":"e_1_3_2_1_16_1","volume-title":"A comparative analysis of the statistical properties of large mobile phone calling networks. Scientific reports 4","author":"Li Ming-Xia","year":"2014","unstructured":"Ming-Xia Li , Zhi-Qiang Jiang , Wen-Jie Xie , Salvatore Miccich\u00e8 , Michele Tumminello , Wei-Xing Zhou , and Rosario N Mantegna . 2014a. A comparative analysis of the statistical properties of large mobile phone calling networks. Scientific reports 4 ( 2014 ). Ming-Xia Li, Zhi-Qiang Jiang, Wen-Jie Xie, Salvatore Miccich\u00e8, Michele Tumminello, Wei-Xing Zhou, and Rosario N Mantegna. 2014a. A comparative analysis of the statistical properties of large mobile phone calling networks. Scientific reports 4 (2014)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500430"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSensT.2015.7438514"},{"key":"e_1_3_2_1_19_1","unstructured":"Allison Mooney and Jordan Rost. 2014. A Report Card on Back to School 2014: The Season's Trends and What They Mean for Holiday. https:\/\/www.thinkwithgoogle.com\/articles\/a-report-card-on-back-to-school.html (2014). Accessed: 2016-07-17.  Allison Mooney and Jordan Rost. 2014. A Report Card on Back to School 2014: The Season's Trends and What They Mean for Holiday. https:\/\/www.thinkwithgoogle.com\/articles\/a-report-card-on-back-to-school.html (2014). Accessed: 2016-07-17."},{"key":"e_1_3_2_1_20_1","volume-title":"The strength of friendship ties in proximity sensor data. PLoS One 9, 7","author":"Sekara Vedran","year":"2014","unstructured":"Vedran Sekara and Sune Lehmann J\u00f8rgensen . 2014. The strength of friendship ties in proximity sensor data. PLoS One 9, 7 ( 2014 ). Vedran Sekara and Sune Lehmann J\u00f8rgensen. 2014. The strength of friendship ties in proximity sensor data. PLoS One 9, 7 (2014)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668332.2668340"},{"key":"#cr-split#-e_1_3_2_1_22_1.1","doi-asserted-by":"crossref","unstructured":"Kaixin Sui Youjian Zhao Dan Pei and Li Zimu. 2015. How Bad Are The Rogues' Impact on Enterprise 802.11 Network Performance? 361--369. DOI:http:\/\/dx.doi.org\/10.1109\/INFOCOM.2015.7218401 10.1109\/INFOCOM.2015.7218401","DOI":"10.1109\/INFOCOM.2015.7218401"},{"key":"#cr-split#-e_1_3_2_1_22_1.2","doi-asserted-by":"crossref","unstructured":"Kaixin Sui Youjian Zhao Dan Pei and Li Zimu. 2015. How Bad Are The Rogues' Impact on Enterprise 802.11 Network Performance? 361--369. DOI:http:\/\/dx.doi.org\/10.1109\/INFOCOM.2015.7218401","DOI":"10.1109\/INFOCOM.2015.7218401"},{"volume-title":"Modern applied statistics with S-PLUS","author":"Venables William N","key":"e_1_3_2_1_23_1","unstructured":"William N Venables and Brian D Ripley . 2013. Modern applied statistics with S-PLUS . Springer Science & Business Media . William N Venables and Brian D Ripley. 2013. Modern applied statistics with S-PLUS. Springer Science & Business Media."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020581"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632054"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804251"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.179"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2935651.2935654"}],"event":{"name":"UbiComp '16: The 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Heidelberg Germany","acronym":"UbiComp '16"},"container-title":["Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2971648.2971657","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2971648.2971657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:04Z","timestamp":1750218604000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2971648.2971657"}},"subtitle":["classroom education measurements via large-scale WiFi networks"],"short-title":[],"issued":{"date-parts":[[2016,9,12]]},"references-count":29,"alternative-id":["10.1145\/2971648.2971657","10.1145\/2971648"],"URL":"https:\/\/doi.org\/10.1145\/2971648.2971657","relation":{},"subject":[],"published":{"date-parts":[[2016,9,12]]},"assertion":[{"value":"2016-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}