{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T00:31:06Z","timestamp":1673656266147},"reference-count":13,"publisher":"Allerton Press","issue":"3","license":[{"start":{"date-parts":[[2013,5,1]],"date-time":"2013-05-01T00:00:00Z","timestamp":1367366400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.3103\/s014641161303005x","type":"journal-article","created":{"date-parts":[[2013,7,2]],"date-time":"2013-07-02T08:42:56Z","timestamp":1372754576000},"page":"147-155","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of trajectories in mobile networks based on data about the network proximity"],"prefix":"10.3103","volume":"47","author":[{"given":"D.","family":"Namiot","sequence":"first","affiliation":[]},{"given":"M.","family":"Shneps-Shneppe","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2013,7,3]]},"reference":[{"key":"6248_CR1","doi-asserted-by":"crossref","first-page":"1068","DOI":"10.14778\/1453856.1453971","volume":"1","author":"H Jeung","year":"2008","unstructured":"Jeung, H., Yiu, M., Zhou, X., Jensen, C., and Shen, H., Discovery of convoys in trajectory databases, J. Proc. VLDB Endowment, 2008, vol. 1, pp. 1068\u20131080.","journal-title":"J. Proc. VLDB Endowment"},{"key":"6248_CR2","first-page":"226","volume-title":"Proc. 2nd Conf. on Knowledge Discovery and Data of Association for Computing Machinery\u2019s Special Interest Group on Knowledge Discovery and Data Mining","author":"N Ester","year":"1996","unstructured":"Ester, N., Kriegel, H.-P., Sander, J., and Xu, X., A density-based algorithm for discovering clusters in large spatial databases with noise, Proc. 2nd Conf. on Knowledge Discovery and Data of Association for Computing Machinery\u2019s Special Interest Group on Knowledge Discovery and Data Mining, 1996, pp. 226\u2013231."},{"key":"6248_CR3","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1007\/11535331_21","volume-title":"Proc. Symp. Spat. Temp. Databases","author":"P Kalnis","year":"2005","unstructured":"Kalnis, P., Mamoulis, N., and Bakiras, S., On discovering moving clusters in spatio-temporal data, Proc. Symp. Spat. Temp. Databases, 2005, pp. 364\u2013381."},{"key":"6248_CR4","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/978-3-642-13818-8_16","volume":"6187\/2010","author":"H Aung","year":"2010","unstructured":"Aung, H. and Tan, K.-L., Discovery of evolving convoys, scientific and statistical database management, Lect. Notes Comp. Sci., 2010, vol. 6187\/2010, pp. 196\u2013213. DOI:10.1007\/978-3-642-13818-8-16","journal-title":"Lect. Notes Comp. Sci."},{"key":"6248_CR5","first-page":"14","volume-title":"Proc. Int. Conf. Exhib. on Next Generation Mobile Applications, Services and Technologies (NGMAST)","author":"D Namiot","year":"2011","unstructured":"Namiot, D. and Schneps-Schneppe, M., About location-aware mobile messages, Proc. Int. Conf. Exhib. on Next Generation Mobile Applications, Services and Technologies (NGMAST), 2011, pp. 14\u201316. DOI:10.1109\/NGMAST.2011.19."},{"key":"6248_CR6","doi-asserted-by":"crossref","DOI":"10.1109\/ICDE.2012.33","volume-title":"On discovery of traveling companions from streaming trajectories","author":"L Tang","year":"2012","unstructured":"Tang, L., Zheng, Y., Yuan, J. Han, J., Leung, A., Hung, C., and Peng, W., On discovery of traveling companions from streaming trajectories. http:\/\/research.microsoft.com\/pubs\/156047\/On%20Discovery%20of%20Traveling%20Companions%20from%20Streaming%20Trajectories.pdf . Retrieved: Aug, 2012."},{"issue":"2","key":"6248_CR7","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1023\/A:1009745219419","volume":"2","author":"J Sander","year":"1998","unstructured":"Sander, J., Ester, M., Kriegel, H. P., and Xu, X. Density-based clustering in spatial databases: The algorithm gdbscan and its applications. Data Mining and Knowledge Discovery, 1998, vol. 2, no. 2, pp. 169\u2013194.","journal-title":"Data Mining and Knowledge Discovery"},{"key":"6248_CR8","first-page":"199","volume-title":"Proc. 2nd Baltic Congress on Future Internet Communications (BCFIC)","author":"D Namiot","year":"2012","unstructured":"Namiot, D. and Sneps-Sneppe, M., Proximity as a service, Proc. 2nd Baltic Congress on Future Internet Communications (BCFIC), 2012, pp. 199\u2013205."},{"issue":"3","key":"6248_CR9","doi-asserted-by":"crossref","first-page":"13","DOI":"10.3991\/ijim.v6i3.2053","volume":"6","author":"Y Daradkeh","year":"2012","unstructured":"Daradkeh, Y., Namiot, D., and Sneps-Sneppe, M., Context-aware browsing for hyper-local news data, Int. J. Interactive Mobile Technol. (iJIM), 2012, vol. 6, no. 3, pp. 13\u201317. DOI: 10.3991\/ijim.v6i2.2053.","journal-title":"Int. J. Interactive Mobile Technol. (iJIM)"},{"key":"6248_CR10","first-page":"18","volume-title":"Proc. 6th Int. Conf. on Next Generation mobile Applications, services and technologies (NGMAST)","author":"D Namiot","year":"2012","unstructured":"Namiot, D., Context-aware browsing a practical approach, Proc. 6th Int. Conf. on Next Generation mobile Applications, services and technologies (NGMAST), 2012, pp. 18\u201323. DOI: 10.1109\/NGMAST.2012.13."},{"key":"6248_CR11","volume-title":"Jess in Action: Rule-Based Systems in Java","author":"E Friedman-Hill","year":"2003","unstructured":"Friedman-Hill, E., Jess in Action: Rule-Based Systems in Java, Greenwich, CT: Manning, 2003."},{"key":"6248_CR12","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1016\/j.patrec.2004.08.012","volume":"26","author":"A Pentland","year":"2004","unstructured":"Pentland, A., Choudhury, T., Eagle, N., and Singh, P., Human dynamics: computation for organizations, Pattern Recogn. Lett., 2004, vol. 26, pp. 503\u2013511.","journal-title":"Pattern Recogn. Lett."},{"key":"6248_CR13","unstructured":"Funf Open Sensing Framework. http:\/\/funf.media.mit.edu"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641161303005X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.3103\/S014641161303005X\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641161303005X","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,27]],"date-time":"2022-02-27T00:47:59Z","timestamp":1645922879000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.3103\/S014641161303005X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":13,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,5]]}},"alternative-id":["6248"],"URL":"https:\/\/doi.org\/10.3103\/s014641161303005x","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5]]}}}