skip to main content
10.1145/2968219.2971413acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
poster

Mining cell-id trajectory patterns by exploiting handoff features

Published:12 September 2016Publication History

ABSTRACT

Existing trajectory pattern mining techniques work based on the prerequisite that the trajectory data contain explicit location information. However, it is difficult to collect such trajectory data from mobile phone users due to the high cost of continuously pinpointing the mobile phones' explicit locations. In this poster, we propose a method for mining trajectory patterns from cell-id trajectory data without explicit location information by exploiting handoff features. Experiment results based on real datasets have demonstrated the effectiveness of the proposed method.

References

  1. Zheng, Y. Trajectory data mining: An overview. ACM Transactions on Intelligent Systems and Technology 6, 3 (2015). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Yavas, G., Katsaros, D., Ulusoy, Ö., and Manolopoulos, Y. A data mining approach for location prediction in mobile environments. Data & Knowledge Engineering 54, 2 (2005), 121--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Hung, C.C. and Peng, W.C. A regression-based approach for mining user movement patterns from random sample data. Data & Knowledge Engineering 70, 1 (2011), 1--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bayir, M.A., Demirbas, M., and Eagle, N. Mobility profiler: A framework for discovering mobility profiles of cell phone users. Pervasive and Mobile Computing 6, 4 (2010), 435--454. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Chen, L., Lv, M., and Chen, G. A system for destination and future route prediction based on trajectory mining. Pervasive and Mobile Computing 6 (2010), 657--676. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Mining cell-id trajectory patterns by exploiting handoff features

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      UbiComp '16: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct
      September 2016
      1807 pages
      ISBN:9781450344623
      DOI:10.1145/2968219

      Copyright © 2016 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 September 2016

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      Overall Acceptance Rate764of2,912submissions,26%

      Upcoming Conference

    • Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader