{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:22:46Z","timestamp":1765887766544,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,7]],"date-time":"2015-09-07T00:00:00Z","timestamp":1441584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,7]]},"DOI":"10.1145\/2750858.2805834","type":"proceedings-article","created":{"date-parts":[[2016,2,25]],"date-time":"2016-02-25T14:18:09Z","timestamp":1456409889000},"page":"529-533","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Towards a mobile and wearable system for predicting panic attacks"],"prefix":"10.1145","author":[{"given":"Jonathan","family":"Rubin","sequence":"first","affiliation":[{"name":"Palo Alto Research Center, Inc., California"}]},{"given":"Hoda","family":"Eldardiry","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, Inc., California"}]},{"given":"Rui","family":"Abreu","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, Inc., California"}]},{"given":"Shane","family":"Ahern","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, Inc., California"}]},{"given":"Honglu","family":"Du","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, Inc., California"}]},{"given":"Ashish","family":"Pattekar","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, Inc., California"}]},{"given":"Daniel G.","family":"Bobrow","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center, Inc., California"}]}],"member":"320","published-online":{"date-parts":[[2015,9,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1214\/09-SS054"},{"key":"e_1_3_2_1_2_1","volume-title":"Diagnostic and statistical manual of mental disorders: DSM-IV","author":"American Psychiatric Association","unstructured":"American Psychiatric Association . 1994. Diagnostic and statistical manual of mental disorders: DSM-IV ( 4 th ed. ed.). American Psychiatric Association Washington , DC. xxvii, 886 p.; pages. American Psychiatric Association. 1994. Diagnostic and statistical manual of mental disorders: DSM-IV (4th ed. ed.). American Psychiatric Association Washington, DC. xxvii, 886 p.; pages.","edition":"4"},{"key":"e_1_3_2_1_3_1","unstructured":"Zephyr Technology Corporation. 2015. (2015). http:\/\/www.zephyranywhere.com.  Zephyr Technology Corporation. 2015. (2015). http:\/\/www.zephyranywhere.com."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1001\/archpsyc.1993.01820160050006"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.288.6413.263"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-3999(70)90004-8"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1001\/archpsyc.1984.01790190038004"},{"volume-title":"Introduction to information retrieval","author":"Manning Christopher D","key":"e_1_3_2_1_8_1","unstructured":"Christopher D Manning , Prabhakar Raghavan , and Hinrich Sch\u00fctze . 2008. Introduction to information retrieval . Vol. 1 . Cambridge university press Cambridge . Christopher D Manning, Prabhakar Raghavan, and Hinrich Sch\u00fctze. 2008. Introduction to information retrieval. Vol. 1. Cambridge university press Cambridge."},{"key":"e_1_3_2_1_9_1","volume-title":"Roth","author":"Meuret Alicia E.","year":"2011","unstructured":"Alicia E. Meuret , David Rosenfield , Frank H. Wilhelm , Enlu Zhou , Ansgar Conrad , Thomas Ritz , and Walton T . Roth . 2011 . Do unexpected panic attacks occur spontaneously? Biological psychiatry 70, 10 (2011), 985--991. Alicia E. Meuret, David Rosenfield, Frank H. Wilhelm, Enlu Zhou, Ansgar Conrad, Thomas Ritz, and Walton T. Roth. 2011. Do unexpected panic attacks occur spontaneously? Biological psychiatry 70, 10 (2011), 985--991."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/0145445501254006"},{"key":"e_1_3_2_1_11_1","volume-title":"Panic disorder and control of breathing. Respiratory physiology & neurobiology 167, 1","author":"Nardi Antonio E","year":"2009","unstructured":"Antonio E Nardi , Rafael C Freire , and Walter A Zin . 2009. Panic disorder and control of breathing. Respiratory physiology & neurobiology 167, 1 ( 2009 ), 133--143. Antonio E Nardi, Rafael C Freire, and Walter A Zin. 2009. Panic disorder and control of breathing. Respiratory physiology & neurobiology 167, 1 (2009), 133--143."},{"key":"e_1_3_2_1_12_1","unstructured":"National Institute of Mental Health. 2015. Panic Disorder. (2015). http:\/\/www.nimh.nih.gov\/health\/topics\/panic-disorder\/index.shtml.  National Institute of Mental Health. 2015. Panic Disorder. (2015). http:\/\/www.nimh.nih.gov\/health\/topics\/panic-disorder\/index.shtml."},{"key":"e_1_3_2_1_13_1","volume-title":"On problems in which a change in a parameter occurs at an unknown point. Biometrika","author":"Page E. S.","year":"1957","unstructured":"E. S. Page . 1957. On problems in which a change in a parameter occurs at an unknown point. Biometrika ( 1957 ), 248--252. E. S. Page. 1957. On problems in which a change in a parameter occurs at an unknown point. Biometrika (1957), 248--252."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2010","author":"Robertson William K.","year":"2010","unstructured":"William K. Robertson , Federico Maggi , Christopher Kruegel , and Giovanni Vigna . 2010 . Effective Anomaly Detection with Scarce Training Data . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2010 , San Diego, California, USA, 28th February - 3rd March 2010. http:\/\/www.isoc.org\/isoc\/conferences\/ndss\/10\/pdf\/07.pdf William K. Robertson, Federico Maggi, Christopher Kruegel, and Giovanni Vigna. 2010. Effective Anomaly Detection with Scarce Training Data. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2010, San Diego, California, USA, 28th February - 3rd March 2010. http:\/\/www.isoc.org\/isoc\/conferences\/ndss\/10\/pdf\/07.pdf"},{"key":"e_1_3_2_1_15_1","volume-title":"Meuret","author":"Rosenfield David","year":"2010","unstructured":"David Rosenfield , Enlu Zhou , Frank H. Wilhelm , Ansgar Conrad , Walton T. Roth , and Alicia E . Meuret . 2010 . Change point analysis for longitudinal physiological data: detection of cardio-respiratory changes preceding panic attacks. Biological psychology 84, 1 (2010), 112--120. David Rosenfield, Enlu Zhou, Frank H. Wilhelm, Ansgar Conrad, Walton T. Roth, and Alicia E. Meuret. 2010. Change point analysis for longitudinal physiological data: detection of cardio-respiratory changes preceding panic attacks. Biological psychology 84, 1 (2010), 112--120."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1176\/ajp.154.11.1571"},{"key":"e_1_3_2_1_17_1","unstructured":"Zephyr Technology. 2013. Zephyr BioHarness 3 Data Sheet. (2013).  Zephyr Technology. 2013. Zephyr BioHarness 3 Data Sheet. (2013)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1001\/archpsyc.55.6.511"}],"event":{"name":"UbiComp '15: The 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing","sponsor":["Yahoo! Japan Yahoo! Japan","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","FX Palo Alto Laboratory, Inc. FX Palo Alto Laboratory, Inc.","Google Inc.","ACM Association for Computing Machinery","Rakuten Institute of Technology Rakuten Institute of Technology","Microsoft Microsoft","Bell Labs Bell Laboratories","SIGCHI ACM Special Interest Group on Computer-Human Interaction","KDDI"],"location":"Osaka Japan","acronym":"UbiComp '15"},"container-title":["Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2750858.2805834","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2750858.2805834","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:40Z","timestamp":1750223260000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2750858.2805834"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,7]]},"references-count":18,"alternative-id":["10.1145\/2750858.2805834","10.1145\/2750858"],"URL":"https:\/\/doi.org\/10.1145\/2750858.2805834","relation":{},"subject":[],"published":{"date-parts":[[2015,9,7]]},"assertion":[{"value":"2015-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}