{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T14:40:28Z","timestamp":1759588828574,"version":"3.41.0"},"reference-count":65,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2017,6,30]],"date-time":"2017-06-30T00:00:00Z","timestamp":1498780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1618669 (III) and ACI-1642133 (CICI)"],"award-info":[{"award-number":["IIS-1618669 (III) and ACI-1642133 (CICI)"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Science and Technology, R.O.C.","award":["105-2221-E-006-140-MY2"],"award-info":[{"award-number":["105-2221-E-006-140-MY2"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Spatial Algorithms Syst."],"published-print":{"date-parts":[[2017,6,30]]},"abstract":"<jats:p>In this article, we explore a new mining paradigm, called<jats:italic>Indoor Stop-by Patterns<\/jats:italic>(<jats:italic>ISP<\/jats:italic>), to discover user stop-by behavior in mall-like indoor environments. The discovery of<jats:italic>ISPs<\/jats:italic>enables new marketing collaborations, such as a joint coupon promotion, among stores in indoor spaces (e.g., shopping malls). Moreover, it can also help in eliminating the overcrowding situation. To pursue better practicability, we consider the cost-effective wireless sensor-based environment and conduct the analysis of indoor stop-by behaviors on real data. However, it is a highly challenging issue, in indoor environments, to retrieve frequent<jats:italic>ISPs<\/jats:italic>, especially when the issue of user privacy is highlighted nowadays. The mining of<jats:italic>ISPs<\/jats:italic>will face a critical challenge from spatial uncertainty. Previous work on mining indoor movement patterns usually relies on precise spatio-temporal information by a specific deployment of positioning devices, which cannot be directly applied. In this article, the proposed Probabilistic Top-<jats:italic>k<\/jats:italic>Indoor Stop-by Patterns Discovery (<jats:italic>PTkISP<\/jats:italic>) framework incorporates the probabilistic model to identify top-<jats:italic>k<\/jats:italic><jats:italic>ISPs<\/jats:italic>over uncertain data collected from sensing logs. Moreover, we develop an uncertain model and devise an Index 1-itemset (IIS) algorithm to enhance the accuracy and efficiency. Our experimental studies show that the proposed<jats:italic>PTkISP<\/jats:italic>framework can efficiently discover high-quality<jats:italic>ISPs<\/jats:italic>and can provide insightful observations for marketing collaborations.<\/jats:p>","DOI":"10.1145\/3106736","type":"journal-article","created":{"date-parts":[[2017,8,29]],"date-time":"2017-08-29T17:49:18Z","timestamp":1504028958000},"page":"1-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Toward Mining Stop-by Behaviors in Indoor Space"],"prefix":"10.1145","volume":"3","author":[{"given":"Shan-Yun","family":"Teng","sequence":"first","affiliation":[{"name":"National Cheng Kung University, Tainan City, Taiwan (R.O.C.)"}]},{"given":"Wei-Shinn","family":"Ku","sequence":"additional","affiliation":[{"name":"Auburn University, AL, USA"}]},{"given":"Kun-Ta","family":"Chuang","sequence":"additional","affiliation":[{"name":"National Cheng Kung University, Tainan City, Taiwan (R.O.C.)"}]}],"member":"320","published-online":{"date-parts":[[2017,8,29]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/38713.38724"},{"key":"e_1_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Charu C. Aggarwal. 2010. Managing and Mining Uncertain Data. Springer Science 8 Business Media. Charu C. Aggarwal. 2010. Managing and Mining Uncertain Data. Springer Science 8 Business Media.","DOI":"10.1007\/978-0-387-09690-2"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07821-2"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557030"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.190"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5"},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Rakesh Agrawal Tomasz Imieli\u0144ski and Arun Swami. 1993. Mining association rules between sets of items in large databases. In ACM Sigmod Record. ACM 207--216. Rakesh Agrawal Tomasz Imieli\u0144ski and Arun Swami. 1993. Mining association rules between sets of items in large databases. In ACM Sigmod Record. ACM 207--216.","DOI":"10.1145\/170036.170072"},{"key":"e_1_2_1_8_1","unstructured":"R. Agrawal and R. Srikant. 1994. Fast algorithms for mining association rules in large databases. In VLDB. Morgan Kaufmann 487--499. R. Agrawal and R. Srikant. 1994. Fast algorithms for mining association rules in large databases. In VLDB. Morgan Kaufmann 487--499."},{"key":"e_1_2_1_9_1","doi-asserted-by":"crossref","unstructured":"R. Agrawal and R. Srikant. 1995. Mining sequential patterns. In ICDE. IEEE Computer Society 3--14. R. Agrawal and R. Srikant. 1995. Mining sequential patterns. In ICDE. IEEE Computer Society 3--14.","DOI":"10.1109\/ICDE.1995.380415"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1995.380415"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882907"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2525314.2525461"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2014.21"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2013.68"},{"key":"e_1_2_1_15_1","unstructured":"Ron Brinkmann. 2008. The Art and Science of Digital Compositing: Techniques for Visual Effects Animation and Motion Graphics. Morgan Kaufmann. Ron Brinkmann. 2008. The Art and Science of Digital Compositing: Techniques for Visual Effects Animation and Motion Graphics. Morgan Kaufmann."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.46"},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Chun-Kit Chui and Ben Kao. 2008. A decremental approach for mining frequent itemsets from uncertain data. In PAKDD. Springer 64--75. Chun-Kit Chui and Ben Kao. 2008. A decremental approach for mining frequent itemsets from uncertain data. In PAKDD. Springer 64--75.","DOI":"10.1007\/978-3-540-68125-0_8"},{"key":"e_1_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Chun-Kit Chui Ben Kao and Edward Hung. 2007. Mining frequent itemsets from uncertain data. In PAKDD. Springer 47--58. Chun-Kit Chui Ben Kao and Edward Hung. 2007. Mining frequent itemsets from uncertain data. In PAKDD. Springer 47--58.","DOI":"10.1007\/978-3-540-71701-0_8"},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","first-page":"6335","DOI":"10.1016\/S0021-9258(18)62614-6","article-title":"Analysis of hill interaction coefficients and the invalidity of the Kwon and Brown equation","volume":"245","author":"Coval Myer L.","year":"1970","journal-title":"Journal of Biological Chemistry"},{"key":"e_1_2_1_20_1","unstructured":"Bettina Fazzinga Sergio Flesca Filippo Furfaro and Francesco Parisi. 2014. Cleaning trajectory data of RFID-monitored objects through conditioning under integrity constraints. In EDBT. OpenProceedings.org 379--390. Bettina Fazzinga Sergio Flesca Filippo Furfaro and Francesco Parisi. 2014. Cleaning trajectory data of RFID-monitored objects through conditioning under integrity constraints. In EDBT. OpenProceedings.org 379--390."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2618243.2618271"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939368"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083784.1083789"},{"key":"e_1_2_1_24_1","unstructured":"Carl Friedrich Gauss. 1809. Theoria Motus Corporum Coelestium in Sectionibus Conicis Solem Ambientium Auctore Carolo Friderico Gauss. sumtibus Frid. Perthes et IH Besser. Carl Friedrich Gauss. 1809. Theoria Motus Corporum Coelestium in Sectionibus Conicis Solem Ambientium Auctore Carolo Friderico Gauss. sumtibus Frid. Perthes et IH Besser."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11896548_24"},{"key":"e_1_2_1_26_1","unstructured":"Marco Gruteser Graham Schelle Ashish Jain Richard Han and Dirk Grunwald. 2003. Privacy-aware location sensor networks. In HotOS. USENIX 163--168. Marco Gruteser Graham Schelle Ashish Jain Richard Han and Dirk Grunwald. 2003. Privacy-aware location sensor networks. In HotOS. USENIX 163--168."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/602259.602266"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/380995.381002"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/347090.347167"},{"volume-title":"Prefixspan: Mining sequential patterns efficiently by prefix-projected pattern growth","year":"2001","author":"Han Jiawei","key":"e_1_2_1_30_1"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/11362197_8"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:DAMI.0000005258.31418.83"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03655-2_21"},{"key":"e_1_2_1_34_1","first-page":"4","article-title":"The possible effects of the aggregation of the molecules of haemoglobin on its dissociation curves","volume":"40","author":"Hill Archibald Vivian","year":"1910","journal-title":"J Physiol"},{"key":"e_1_2_1_35_1","unstructured":"Bernhard Hofmann-Wellenhof Herbert Lichtenegger and James Collins. 2012. Global Positioning System: Theory and Practice. Springer Science 8 Business Media. Bernhard Hofmann-Wellenhof Herbert Lichtenegger and James Collins. 2012. Global Positioning System: Theory and Practice. Springer Science 8 Business Media."},{"key":"e_1_2_1_36_1","unstructured":"S. R. Jeffery M. N. Garofalakis and M. J. Franklin. 2006. Adaptive cleaning for RFID data streams. In VLDB. ACM 163--174. S. R. Jeffery M. N. Garofalakis and M. J. Franklin. 2006. Adaptive cleaning for RFID data streams. In VLDB. ACM 163--174."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2009.23"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJCEE.2011.V3.306"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1610555.1610557"},{"key":"e_1_2_1_40_1","unstructured":"Carson Kai-Sang Leung Mark Anthony F. Mateo and Dale A. Brajczuk. 2008. A tree-based approach for frequent pattern mining from uncertain data. In PAKDD. Springer 653--661. Carson Kai-Sang Leung Mark Anthony F. Mateo and Dale A. Brajczuk. 2008. A tree-based approach for frequent pattern mining from uncertain data. In PAKDD. Springer 653--661."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.157"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774305"},{"key":"e_1_2_1_43_1","unstructured":"Carson Kai-Sang Leung Mark Anthony F. Mateo and Dale A. Brajczuk. 2008. A tree-based approach for frequent pattern mining from uncertain data. In PAKDD. Springer 653--661. Carson Kai-Sang Leung Mark Anthony F. Mateo and Dale A. Brajczuk. 2008. A tree-based approach for frequent pattern mining from uncertain data. In PAKDD. Springer 653--661."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29038-1_21"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.307"},{"key":"e_1_2_1_46_1","unstructured":"Hua Lu Chenjuan Guo Bin Yang and Christian S. Jensen. 2016. Finding frequently visited indoor POIs using symbolic indoor tracking data. In EDBT. OpenProceedings.org 449--460. Hua Lu Chenjuan Guo Bin Yang and Christian S. Jensen. 2016. Finding frequently visited indoor POIs using symbolic indoor tracking data. In EDBT. OpenProceedings.org 449--460."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767902"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0094818"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00221-007-0917-0"},{"volume-title":"SIGMOD Workshop. ACM, 21--30","year":"2000","author":"Pei Jian","key":"e_1_2_1_50_1"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-006-0006-z"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/502585.502600"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2013.29"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45368-7_4"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/2960717.2960729"},{"key":"e_1_2_1_56_1","first-page":"34","article-title":"RFID implementation challenges persist, all this time later","volume":"1059","author":"Sullivan Laurie","year":"2005","journal-title":"InformationWeek"},{"key":"e_1_2_1_57_1","first-page":"1","article-title":"Data mining and domestic security: Connecting the dots to make sense of data","volume":"5","author":"Taipale Kim A","year":"2003","journal-title":"Colum. Sci. 8 Tech. L. Rev."},{"volume-title":"Encyclopedia of Database Systems","author":"Wang Jianyong","key":"e_1_2_1_58_1"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956779"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1035594.1035619"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118256107.ch63"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.13"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2452376.2452408"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972726.27"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2011.5984908"}],"container-title":["ACM Transactions on Spatial Algorithms and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106736","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106736","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106736","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T05:55:00Z","timestamp":1750830900000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106736"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,30]]},"references-count":65,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,6,30]]}},"alternative-id":["10.1145\/3106736"],"URL":"https:\/\/doi.org\/10.1145\/3106736","relation":{},"ISSN":["2374-0353","2374-0361"],"issn-type":[{"type":"print","value":"2374-0353"},{"type":"electronic","value":"2374-0361"}],"subject":[],"published":{"date-parts":[[2017,6,30]]},"assertion":[{"value":"2016-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-08-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}