{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:54:04Z","timestamp":1740174844707,"version":"3.37.3"},"reference-count":13,"publisher":"Wiley","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001868","name":"National Science Council of Taiwan","doi-asserted-by":"crossref","award":["NSC 102-2221-E-004-013","MOST 103-2221-E-004-015"],"award-info":[{"award-number":["NSC 102-2221-E-004-013","MOST 103-2221-E-004-015"]}],"id":[{"id":"10.13039\/501100001868","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology of Taiwan","doi-asserted-by":"crossref","award":["NSC 102-2221-E-004-013","MOST 103-2221-E-004-015"],"award-info":[{"award-number":["NSC 102-2221-E-004-013","MOST 103-2221-E-004-015"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Chengchi University","award":["NSC 102-2221-E-004-013","MOST 103-2221-E-004-015"],"award-info":[{"award-number":["NSC 102-2221-E-004-013","MOST 103-2221-E-004-015"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2017]]},"abstract":"<jats:p>Today, we have the freedom to install and use all kinds of applications on smartphones, thanks to the development of mobile communication and computing technologies. Undoubtedly, the system and application developers are eager to know how we use the applications on our smartphones in our daily life and so are the researchers. In this paper, we present our work on developing a pattern mining algorithm and applying it to smartphone application usage log collected from tens of smartphone users for several years. Our goal is to mine the sequential patterns each of which presents a series of application uses and satisfies a constraint on the maximum time interval between two application uses. However, we cannot mine such patterns by general algorithms and will miss some patterns by using the widely used implementation of the advanced algorithm specifically designed for time-constrained sequential pattern mining. We not only present an algorithm that can efficiently and effectively mine the patterns in which we are interested but also discuss and visualize the mined patterns. Our work could potentially support the related studies.<\/jats:p>","DOI":"10.1155\/2017\/3689309","type":"journal-article","created":{"date-parts":[[2017,1,17]],"date-time":"2017-01-17T17:05:50Z","timestamp":1484672750000},"page":"1-18","source":"Crossref","is-referenced-by-count":4,"title":["Efficiently and Effectively Mining Time-Constrained Sequential Patterns of Smartphone Application Usage"],"prefix":"10.1155","volume":"2017","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3496-5439","authenticated-orcid":true,"given":"Kuo-Wei","family":"Hsu","sequence":"first","affiliation":[{"name":"Department of Computer Science, National Chengchi University, No. 64, Sec. 2, Zhi Nan Rd., Wen Shan District, Taipei 11605, Taiwan"}]}],"member":"311","reference":[{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1824795.1824798"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846188"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.77"},{"key":"7","first-page":"3389","volume":"15, article a28","year":"2014","journal-title":"Journal of Machine Learning Research"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-006-0006-z"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0046-3"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74581-5_48"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-013-0640-8"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.08.003"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2013.07.014"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2013.07.003"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44472-6_17"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.7763\/ijcee.2014.v6.812"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/3689309.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/3689309.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/3689309.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,17]],"date-time":"2017-01-17T17:05:55Z","timestamp":1484672755000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2017\/3689309\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":13,"alternative-id":["3689309","3689309"],"URL":"https:\/\/doi.org\/10.1155\/2017\/3689309","relation":{},"ISSN":["1574-017X","1875-905X"],"issn-type":[{"type":"print","value":"1574-017X"},{"type":"electronic","value":"1875-905X"}],"subject":[],"published":{"date-parts":[[2017]]}}}