{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T01:02:38Z","timestamp":1773795758406,"version":"3.50.1"},"reference-count":65,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T00:00:00Z","timestamp":1530057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Knowl. Discov. Data"],"published-print":{"date-parts":[[2018,10,31]]},"abstract":"<jats:p>The discovering of patterns regarding how, when, and where users interact with mobile applications reveals important insights for mobile service providers. In this work, we exploit for the first time a real and large-scale dataset representing the records of mobile application usage of 5,342 users during 2014. The data was collected by a software agent, installed at the users\u2019 smartphones, which monitors detailed usage of applications. First, we look for general patterns of how users access some of the most popular mobile applications in terms of frequency, duration, diversity, and data traffic. Next, we mine the dataset looking for temporal patterns in terms of when and how often accesses occur. Finally, we exploit the location of each access to detect users\u2019 points of interest and location-based communities. Based on the results, we derive a model to generate synthetic datasets of mobile application usage and evaluate solutions to predict the next application to be launched. We also discuss a series of implications of the findings regarding telecommunication services, mobile advertisements, and smart cities. This is the first time this dataset is used, and we also make it publicly available for other researchers.<\/jats:p>","DOI":"10.1145\/3209669","type":"journal-article","created":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T12:14:36Z","timestamp":1530101676000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Discovering Mobile Application Usage Patterns from a Large-Scale Dataset"],"prefix":"10.1145","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0713-0583","authenticated-orcid":false,"given":"Fabr\u00edcio A.","family":"Silva","sequence":"first","affiliation":[{"name":"Federal University of Vi\u00e7osa, MG, Brazil"}]},{"given":"Augusto C. S. A.","family":"Domingues","sequence":"additional","affiliation":[{"name":"Federal University of Minas Gerais, MG, Brazil"}]},{"given":"Thais R. M. Braga","family":"Silva","sequence":"additional","affiliation":[{"name":"Federal University of Vi\u00e7osa, MG, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2018,6,27]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917555"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of IEEE International Conference on Big Data. IEEE, 171--176","author":"Anderson Jason W."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454630.1454658"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmr.13.0503"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjst\/e2012-01703-3"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374688.1374698"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.12.009"},{"key":"e_1_2_1_8_1","volume-title":"Vinhoza","author":"Boban Mate","year":"2011"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12654-3_2"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702486"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISWC.2011.29"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0490-1"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785891"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SBRC.2015.25"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070481.2070550"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of KDD","volume":"96","author":"Ester Martin","year":"1996"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2671188.2749381"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the 9th International Conference on Pervasive Computing Technologies for Healthcare","author":"Ferdous Raihana"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2878801.2878802"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2015.7145326"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664551.2664561"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2010.5494208"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of Advances in Neural Information Processing Systems. MIT Press, 2672--2680","author":"Goodfellow Ian","year":"2014"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2820783.2820811"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370442"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2014.01.002"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307659"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0550-1"},{"key":"e_1_2_1_29_1","first-page":"1","volume-title":"Measurement, Simulation, and Modeling","author":"Jain Raj"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6588663"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.229"},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of Pervasive Computing. EPFL.","author":"Laurila Juha K.","year":"2012"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.05.003"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.426"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815686"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1463434.1463477"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.04.026"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.4939289"},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media (ICWSM\u201916)","author":"Malmi Eric","year":"2016"},{"key":"e_1_2_1_40_1","volume-title":"Proceedings of Workshop on Big Data Benchmarks. Springer, 138--154","author":"Ming Zijian","year":"2013"},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of IEEE International Conference on Big Data. IEEE, 580--588","author":"Mir Darakhshan J."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-011-0982-z"},{"key":"e_1_2_1_43_1","volume-title":"Large-scale mobile traffic analysis: A survey","author":"Naboulsi Diala","year":"2015"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493490"},{"key":"e_1_2_1_45_1","volume-title":"Information Filtering and Retrieval","author":"Pavan Marco"},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of International Conference on Machine Learning (ICML\u20192000)","volume":"1","author":"Pelleg Dan","year":"2000"},{"key":"e_1_2_1_47_1","volume-title":"A vehicular mobility model based on real traffic counting data. Nets4Cars\/Nets4Trains 6596","author":"Pign\u00e9 Yoann","year":"2011"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.2307\/2309088"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/GHTC.2015.7343962"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2636242.2636244"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370243"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632052"},{"key":"e_1_2_1_54_1","volume-title":"Intelligence in Telecommunications. Retrieved","year":"2017"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2508207"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.27"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815680"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2014.6835958"},{"key":"e_1_2_1_59_1","volume-title":"Proceedings of the 35th International Conference on Information Systems. AIS.","author":"Wang Xinwei","year":"2014"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413236.2413245"},{"key":"e_1_2_1_61_1","volume-title":"Proceedings of the 23rd European Conference on Information Systems. AIS.","author":"Xu Runhua","year":"2015"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307648"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2381512"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10804"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494091.2494146"}],"container-title":["ACM Transactions on Knowledge Discovery from Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209669","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3209669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:33Z","timestamp":1750210773000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209669"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,27]]},"references-count":65,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,10,31]]}},"alternative-id":["10.1145\/3209669"],"URL":"https:\/\/doi.org\/10.1145\/3209669","relation":{},"ISSN":["1556-4681","1556-472X"],"issn-type":[{"value":"1556-4681","type":"print"},{"value":"1556-472X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,27]]},"assertion":[{"value":"2017-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}