{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:30Z","timestamp":1750220850392,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,28]],"date-time":"2019-08-28T00:00:00Z","timestamp":1566950400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Fundamental Research Funds for the Central Universities"},{"name":"National Key R&D Program","award":["2016YFE0204500"],"award-info":[{"award-number":["2016YFE0204500"]}]},{"name":"Beijing Natural Science Foundation under Grant","award":["4172042"],"award-info":[{"award-number":["4172042"]}]},{"name":"National Natural Science Foundation of China under Grants","award":["61671081,61720106007"],"award-info":[{"award-number":["61671081,61720106007"]}]},{"name":"Beijing University of Posts and Telecommunications 2017 Education and Teaching Reform Project","award":["2017JY31"],"award-info":[{"award-number":["2017JY31"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,28]]},"DOI":"10.1145\/3358528.3358554","type":"proceedings-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T13:34:22Z","timestamp":1571664862000},"page":"262-267","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Two-Step User Profiling Framework Based on Terminal-cloud Collaboration"],"prefix":"10.1145","author":[{"given":"Kun","family":"Niu","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]},{"given":"Xiao","family":"Xu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]},{"given":"Chao","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]},{"given":"Cheng","family":"Cheng","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]},{"given":"Huiyang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]},{"given":"Jielin","family":"Chang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications"}]}],"member":"320","published-online":{"date-parts":[[2019,8,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.09.011"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-012-0368-0"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700360"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.10.044"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.10.004"},{"volume-title":"2016 2nd International Conference on. IEEE","author":"Atote B S","key":"e_1_3_2_1_7_1","unstructured":"Atote B S , Saini T S , Bedekar M , Inferring emotional state of a user by user profiling[C]\/\/Contemporary Computing and Informatics (IC3I) , 2016 2nd International Conference on. IEEE , 2016: 530--535. Atote B S, Saini T S, Bedekar M, et al. Inferring emotional state of a user by user profiling[C]\/\/Contemporary Computing and Informatics (IC3I), 2016 2nd International Conference on. IEEE, 2016: 530--535."},{"volume-title":"2013 Proceedings IEEE. IEEE","author":"Zhang W","key":"e_1_3_2_1_8_1","unstructured":"Zhang W , Wen Y , Wu D O . Energy-efficient scheduling policy for collaborative execution in mobile cloud computing[C]\/\/INFOCOM , 2013 Proceedings IEEE. IEEE , 2013: 190--194. Zhang W, Wen Y, Wu D O. Energy-efficient scheduling policy for collaborative execution in mobile cloud computing[C]\/\/INFOCOM, 2013 Proceedings IEEE. IEEE, 2013: 190--194."},{"volume-title":"Networking and Communications (WiMob), 2014 IEEE 10th International Conference on. IEEE","author":"Barrameda J","key":"e_1_3_2_1_9_1","unstructured":"Barrameda J , Samaan N. A novel application model and an offloading mechanism for efficient mobile computing[C]\/\/Wireless and Mobile Computing , Networking and Communications (WiMob), 2014 IEEE 10th International Conference on. IEEE , 2014: 419--426. Barrameda J, Samaan N. A novel application model and an offloading mechanism for efficient mobile computing[C]\/\/Wireless and Mobile Computing, Networking and Communications (WiMob), 2014 IEEE 10th International Conference on. IEEE, 2014: 419--426."},{"volume-title":"2011 15th Annual International Symposium on. IEEE","author":"Chittaranjan G","key":"e_1_3_2_1_10_1","unstructured":"Chittaranjan G , Blom J , Gatica-Perez D. Who's who with big-five: Analyzing and classifying personality traits with smartphones[C]\/\/Wearable Computers (ISWC) , 2011 15th Annual International Symposium on. IEEE , 2011: 29--36. Chittaranjan G, Blom J, Gatica-Perez D. Who's who with big-five: Analyzing and classifying personality traits with smartphones[C]\/\/Wearable Computers (ISWC), 2011 15th Annual International Symposium on. IEEE, 2011: 29--36."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0490-1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2742953"},{"key":"e_1_3_2_1_13_1","volume-title":"Understanding individual mobility patterns from urban sensing data: A mobile phone trace example[J]. Transportation research part C: emerging technologies","author":"Calabrese F","year":"2013","unstructured":"Calabrese F , Diao M , Di Lorenzo G , Understanding individual mobility patterns from urban sensing data: A mobile phone trace example[J]. Transportation research part C: emerging technologies , 2013 , 26: 301--313. Calabrese F, Diao M, Di Lorenzo G, et al. Understanding individual mobility patterns from urban sensing data: A mobile phone trace example[J]. Transportation research part C: emerging technologies, 2013, 26: 301--313."},{"volume-title":"2016 International Conference on. IEEE","author":"Faye S","key":"e_1_3_2_1_14_1","unstructured":"Faye S , Engel T. Understanding user daily mobility using mobile and wearable sensing systems[C]\/\/Information and Communication Technology Convergence (ICTC) , 2016 International Conference on. IEEE , 2016: 387--392. Faye S, Engel T. Understanding user daily mobility using mobile and wearable sensing systems[C]\/\/Information and Communication Technology Convergence (ICTC), 2016 International Conference on. IEEE, 2016: 387--392."},{"key":"e_1_3_2_1_15_1","volume-title":"Discovering places of interest in everyday life from smartphone data[J]. Multimedia tools and applications","author":"Montoliu R","year":"2013","unstructured":"Montoliu R , Blom J , Gatica-Perez D. Discovering places of interest in everyday life from smartphone data[J]. Multimedia tools and applications , 2013 , 62(1): 179--207. Montoliu R, Blom J, Gatica-Perez D. Discovering places of interest in everyday life from smartphone data[J]. Multimedia tools and applications, 2013, 62(1): 179--207."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2489657"},{"key":"e_1_3_2_1_17_1","first-page":"173","article-title":"User Profiling through NFC interactions: Mining NFC-based User Information from Mobile Devices and Back-end Systems[C]\/\/Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access","volume":"2016","author":"Andersen A","unstructured":"Andersen A , Karlsen R . User Profiling through NFC interactions: Mining NFC-based User Information from Mobile Devices and Back-end Systems[C]\/\/Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access . ACM , 2016 : 173 -- 176 . Andersen A, Karlsen R. User Profiling through NFC interactions: Mining NFC-based User Information from Mobile Devices and Back-end Systems[C]\/\/Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access. ACM, 2016: 173--176.","journal-title":"ACM"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143402"}],"event":{"name":"ICBDT2019: 2019 2nd International Conference on Big Data Technologies","sponsor":["Shandong Univ. Shandong University"],"location":"Jinan China","acronym":"ICBDT2019"},"container-title":["Proceedings of the 2nd International Conference on Big Data Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3358528.3358554","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3358528.3358554","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:13Z","timestamp":1750202593000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3358528.3358554"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,28]]},"references-count":18,"alternative-id":["10.1145\/3358528.3358554","10.1145\/3358528"],"URL":"https:\/\/doi.org\/10.1145\/3358528.3358554","relation":{},"subject":[],"published":{"date-parts":[[2019,8,28]]},"assertion":[{"value":"2019-08-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}