Author of the publication

By their apps you shall understand them: mining large-scale patterns of mobile phone usage.

, and . MUM, page 27. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fast Method for Training Linear SVM in the Primal., and . ECML/PKDD (1), volume 5211 of Lecture Notes in Computer Science, page 272-287. Springer, (2008)Joint Optimization of Hidden Conditional Random Fields and Non Linear Feature Extraction., , and . ICDAR, page 513-517. IEEE Computer Society, (2011)From Foursquare to My Square: Learning Check-in Behavior from Multiple Sources., , and . ICWSM, The AAAI Press, (2013)Inferring social activities with mobile sensor networks., , , , and . ICMI, page 405-412. ACM, (2013)Regularized bundle methods for convex and non-convex risks., and . J. Mach. Learn. Res., (2012)Large margin training for hidden Markov models with partially observed states., and . ICML, volume 382 of ACM International Conference Proceeding Series, page 265-272. ACM, (2009)By their apps you shall understand them: mining large-scale patterns of mobile phone usage., and . MUM, page 27. ACM, (2010)Checking in or checked in: comparing large-scale manual and automatic location disclosure patterns., , and . MUM, page 26. ACM, (2012)Vlogging Over Time: Longitudinal Impressions and Behavior in YouTube., , , , and . MUM, page 37-46. ACM, (2018)Neural conditional random fields., and . AISTATS, volume 9 of JMLR Proceedings, page 177-184. JMLR.org, (2010)