-
1
-
-
33645311516
-
Reality mining: Sensing complex social systems
-
N. Eagle and A. Pentland, "Reality Mining: Sensing Complex Social Systems", Personal and Ubiquitous Computing, vol. 10, no. 4, pp. 255-268, 2006.
-
(2006)
Personal and Ubiquitous Computing
, vol.10
, Issue.4
, pp. 255-268
-
-
Eagle, N.1
Pentland, A.2
-
2
-
-
65049089233
-
Eigenbehaviors: Identifying structure in routine
-
Nathan Eagle and Alex Sandy Pentland, "Eigenbehaviors: identifying structure in routine", Behavioral Ecology and Sociobiology, vol. 63, pp. 1057-1066, 2009.
-
(2009)
Behavioral Ecology and Sociobiology
, vol.63
, pp. 1057-1066
-
-
Eagle, N.1
Pentland, A.S.2
-
3
-
-
44849122540
-
Understanding individual human mobility patterns
-
M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi, "Understanding individual human mobility patterns", Nature, vol. 453, pp. 479-482, 2008.
-
(2008)
Nature
, vol.453
, pp. 479-482
-
-
Gonzalez, M.C.1
Hidalgo, C.A.2
Barabasi, A.-L.3
-
4
-
-
74349098093
-
Discovering spatiotemporal mobility profiles of cellphone users
-
M. A. Bayir, M. Demirbas, N. Eagle. "Discovering spatiotemporal mobility profiles of cellphone users", In Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops, 2009, pp. 1-9.
-
(2009)
Proceedings of IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks & Workshops
, pp. 1-9
-
-
Bayir, M.A.1
Demirbas, M.2
Eagle, N.3
-
5
-
-
33749679764
-
Mobile landscapes: Using location data from cell phones for urban analysis
-
DOI 10.1068/b32047
-
C. Ratti, R. M. Pulselli, S. Williams, and D. Frenchman, "Mobile Landscapes: Using Location Data from Cell Phones for Urban Analysis", Environment and Planning B, vol. 33, no. 5, pp. 727-748, 2006. (Pubitemid 44550298)
-
(2006)
Environment and Planning B: Planning and Design
, vol.33
, Issue.5
, pp. 727-748
-
-
Ratti, C.1
Frenchman, D.2
Pulselli, R.M.3
Williams, S.4
-
6
-
-
44449169915
-
Uncovering individual and collective human dynamics from mobile phone records
-
J. Candia, M. C. Gonzalez, P. Wang, T. Schoenharl, G. Madey, and A.-L. Barabasi, "Uncovering individual and collective human dynamics from mobile phone records", Journal of Physics A: Mathematical and Theoretical, vol. 41, 224015, 2008.
-
(2008)
Journal of Physics A: Mathematical and Theoretical
, vol.41
, pp. 224015
-
-
Candia, J.1
Gonzalez, M.C.2
Wang, P.3
Schoenharl, T.4
Madey, G.5
Barabasi, A.-L.6
-
7
-
-
79953074332
-
Detection of abnormal crowd distribution
-
Zhenmei Liao, Su Yang, and Jianning Liang, "Detection of Abnormal Crowd Distribution", In Proceedings of the 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing, 2010, pp. 600-604.
-
(2010)
Proceedings of the 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing
, pp. 600-604
-
-
Liao, Z.1
Yang, S.2
Liang, J.3
-
9
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
L. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition", Proceedings of the IEEE, vol. 77, no. 2, pp. 257-286, 1989.
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.1
-
10
-
-
43949140866
-
An unsupervised anomaly detection approach using subtractive clustering and hidden markov model
-
Chun Yang, Feiqi Deng, Haidong Yang, "An Unsupervised Anomaly Detection Approach using Subtractive Clustering and Hidden Markov Model", In Proceedings of the Second International Conference on Communications and Networking in China, 2007, pages 313-316.
-
(2007)
Proceedings of the Second International Conference on Communications and Networking in China
, pp. 313-316
-
-
Yang, C.1
Deng, F.2
Yang, H.3
-
11
-
-
68949196337
-
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
-
Xuan Dau Hoang, Jiankun Hu, and Peter Bertok, "A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference", Journal of Network and Computer Applications, vol. 32, pp. 1219-1228, 2009.
-
(2009)
Journal of Network and Computer Applications
, vol.32
, pp. 1219-1228
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
|