Advanced
Mobile User Behavior Pattern Analysis by Associated Tree in Web Service Environment
Mobile User Behavior Pattern Analysis by Associated Tree in Web Service Environment
Journal of Information Science Theory and Practice. 2014. Jun, 2(2): 33-47
Copyright © 2014, Korea Institute of Science and Technology Information
All JISTaP content is Open Access, meaning it is accessible online to everyone, without fee and authors’ permission. All JISTaP content is published and distributed under the terms of the Creative Commons Attribution License (http:/ creativecommons.org/licenses/by/3.0/). Under this license, authors reserve the copyright for their content; however, they permit anyone to unrestrictedly use, distribute, and reproduce the content in any medium as far as the original authors and source are cited. For any reuse, redistribution, or reproduction of a work, users must clarify the license terms under which the work was produced.
  • Received : April 04, 2014
  • Accepted : September 09, 2014
  • Published : June 30, 2014
Download
PDF
e-PUB
PubReader
PPT
Export by style
Share
Article
Author
Metrics
Cited by
TagCloud
About the Authors
Krishna K. Mohbey
kmohbey@gmail.com
G. S. Thakur
Abstract
Mobile devices are the most important equipment for accessing various kinds of services. These services are accessed using wireless signals, the same used for mobile calls. Today mobile services provide a fast and excellent way to access all kinds of information via mobile phones. Mobile service providers are interested to know the access behavior pattern of the users from different locations at different timings. In this paper, we have introduced an associated tree for analyzing user behavior patterns while moving from one location to another. We have used four different parameters, namely user, location, dwell time, and services. These parameters provide stronger frequent accessing patterns by matching joins. These generated patterns are valuable for improving web services, recommending new services, and predicting useful services for individuals or groups of users. In addition, an experimental evaluation has been conducted on simulated data. Finally, performance of the proposed approach has been measured in terms of efficiency and scalability. The proposed approach produces excellent results.
Keywords
1. INTRODUCTION
Mobile devices are very popular for communication and accessing mobile services. Mobile services can be accessed anywhere via information service providers (Chen et al., 2012) . By the development of wireless communication techniques and high feature mobile devices, mobile commerce has become easier and fast. Today most of the mobile devices have high features and support for internet and web services (Kiukkonen et al., 2010) . These devices are capable of sending requests for some transactions and services (Perez et al., 2010 ; Gao et al., 2013) . They are also capable of transferring information between multiple users. Services may include selling, purchasing, online information accessing, or using social networking sites, etc. These various kinds of services are accessed by mobile devices and accessed information is stored in the transaction log files (Kiukkonen et al., 2010) . Transactions mainly store user information, location information, and time information during which the user accesses any service, and finally the details of services are stored. For fast response from the system for any requested service, data mining operations can be applied to this stored information. These operations may be the mining of similar kinds of services, finding similar habits of users, and preparing groups according to services, etc. By applying such kinds of data mining operations we can restructure the web service environment and take advantage of providing recommendations and predictions for interested users. These are also helpful for business peoples for enhancing their business strategies in web environments.
PPT Slide
Lager Image
Different users movement in various locations
Traditional mobile services are inadequate in handling user movement pattern analysis without the use of location, time of the service, and service request details (Lee, 2007) . Over the past years some studies have employed various data mining techniques to provide interesting patterns in mobile service environments (Liu & Keselj, 2007 ; Pabarskaite & Raudys, 2007) . Association rules are used to find unknown frequent patterns between parameters (Agrawal & Srikant, 1994) . Apriori is the pioneer for mining frequent itemsets from transaction databases. FP-Growth, which is based on a pattern growth method was afterward proposed to achieve a better performance than Apriori-based methods. FP-Growth improves efficiency of frequent items because it only scans databases twice. Some studies have also focused on the uses of large databases (Cheng et al., 2004) . Some recent studies are going to mine the moving path on service request log mines (Agrawal & Srikant, 1994). Researchers have also studied the problem of location tracking (Yavas et al., 2005 ; Tsai et al., 2007 ; Tseng & Lu, 2009) and resource allocation (Huang & Lin, 2008 ; Huang et al., 2003 ; Peng & Chen, 2005 ; Peng & Chen, 2003) . Bipartite graph matching is also used to find mobile user movement behavior (Ilyas et al., 2004 ; Fayyazi et al., 2004 ; Monnot & Toulouse, 2007) . Currently, different approaches are in progress to find interesting patterns of mobile users (Lee et al., 2007 ; Lancieri & Durand, 2006 ; Tseng et al., 2007 ; Terziyan & Vitko, 2003 ; Huang et al., 2003 ). In mobile e-commerce environments interesting user behaviors can also be predicted, based on accessed services sequences. In this paper, we analyze the behavior of the mobile user movement and find the interesting patterns. Here we have used an associated tree method for joining multiple parameters of mobile access environments. These generated patterns are helpful to business people for launching new services and for providing quick responses to existing ones. figure 1 shows the simple scenario in which different locations are randomly visited by users. Here l1 , l2 , l3 ... ln shows the different locations and u 1 ,u 2 ,u 3 ...u n represents different mobile users. In this proposed associated tree based pattern mining approach we have used a predefined minimum support value using those interesting patterns which are extracted from the generated candidate records. An acsociated tree based record represents the relationship between four predefined parameters, and its numeric value represents the degree of matching relation of a particular record.
In this paper mobile users, visited locations, dwell time, and services are used to construct the associated tree. Associated trees are used to find the frequent patterns. A Maxflow database is used to represent the relation between these four parameters and joining operations performed between them. This proposed approach is compared with the Apriori candidate generation algorithm. The remainder of this paper is organized as follows. Section 2 defines the basics of the user movement on different locations. Section 3 shows the proposed approach for mobile user behavior analysis by joining associated trees. The experiments conducted and results obtained are explained in section 4. Finally the conclusion is presented in section 5.
2. PRELIMINARIES AND PROBLEM DEFINITION
Mobile e-commerce is an emerging field for recommendation and user behavior analysis. For predicting mobile user behavior, data mining techniques are used. Various parameters are responsible for user behavior prediction. The main parameters are user, visited locations, timestamp, and services (Chen et al., 2012 ; Mohbey & Thakur, 2013) . By these parameters, we can mine various patterns for users. According to these generated patterns, prediction and recommendations are easier. In this paper, we have generated patterns using an associated tree method and the above discussed parameters. Based on generated patterns business people are entitled to launch new services, design appropriate strategies, and so on. The following terminologies are used in this paper.
Definition 1 (Mobile User). U ={u 1 , u 2 , u 3 ,...u n }is the set of mobile users. Each mobile user represents a physical person who carries a mobile device that has the capability of receiving services from the mobile environment (Chen et al., 2012 ; Mohbey & Thakur, 2013) .
Definition 2 (Visited Location). L ={l 1 ,l 2 ,l 3 ,...l n }is the set of locations at which users visit and stay for some time (Mohbey & Thakur, 2013) .
Definition 3 (Timestamp). T ={T 1 ,T 2 ,T 3 ,...T n } is the set of time durations where mobile users spend time for using requested services. The timestamp T n , as defined in Table 2 , is assumed to have an equal period and a uniform unit. The maximum duration is considered 30 minutes in general (Chen et al., 2012) .
Definition 4 (Mobile Services). S ={s 1 ,s 2 ,s 3 ,...sn} is the set of mobile services requested by the mobile users.
Definition 5 (Support of a Relation). The support of a relation r, such as user→location, user→time, user→ service, location→time etc, is denoted as sup(r) and defined as the number of tuples that contain r in the maxflow database. For example in Table 3 , the support of the relation u 1 →l 1 is 3.
Definition 6 (Matching Join). If M⊆U⋈L⋈T⋈S. this M is a match join of U,L,T,S (Chen et al., 2012 ; Mohbey & Thakur, 2013) .
Table 1 shows the mobile user movement database in which (l i ,Time); l i identifies the Location and Time in HH:MM:SS format. This table is derived from figure 1 . Here 3 users visited different locations at different times.
Database for Mobile User Movement
PPT Slide
Lager Image
Database for Mobile User Movement
Table 2 shows the predefined timeslots. Maximum duration taken is 30 minutes. According to this, we divide a whole day into 48 time slots of 30 minutes each. These time slots are identified as T 1 ,T 2 ,T 3 ...T 48 . Each time slot indicates a particular time when a particular user accesses a service from some location.
Predefine Time Slots for a day
PPT Slide
Lager Image
Predefine Time Slots for a day
Table 3 shows the maxflow database in which each record represents the user-location-time-service relation. This relation is used to prepare frequent n-trees.
3. FREQUENT ASSOCIATED TREE PATTERN MINING
Associated trees are used to extract the interesting frequent patterns from the various relationships of the user-location-time-service values. Frequent tree patterns are extracted by applying loops. Then we get n-tree candidate patterns. To find the interesting frequent patterns, we firstly scan the maxflow database and generate frequent 1-tree candidate patterns. If the extracted candidate pattern is less than the predefined minimum support value then this pattern is pruned.
Maxflow Database of Mobile user-location-time-service relations
PPT Slide
Lager Image
Maxflow Database of Mobile user-location-time-service relations
Now, a matching join operation is applied to generate a frequent 2-tree pattern. Again if the extracted candidate pattern support is less than the predefined minimum support then infrequent patterns are pruned. Similarly we extract the 3-tree candidate pattern and then the n+1 tree candidate frequent pattern. This process continues until the tree is empty or no more candidates are generated.
After getting each n-tree candidate frequent pattern set we prepare a associated sub tree of the relation record and count the nodes on it. Here maximum node count of a sub tree represents the strong frequent tree pattern. Algorithm 1 show the complete process of frequent associated tree pattern mining (Chen et al., 2012) .
PPT Slide
Lager Image
This whole process of finding frequent candidate patterns is illustrated in the example below.
4. ILLUSTRATIVE EXAMPLE
The complete procedure of associated tree pattern mining is shown here. For this illustration we have taken 15 records in the maxflow database which is shown in table 3. Matching join operation is performed between four parameters to generate candidate sets. These candidate sets are
PPT Slide
Lager Image
and frequent item sets are L 1 , L 2 , L 3 , L 4 ... L n .
- 4.1. Generating Candidate Set
The proposed approach firstly generates the candidate set
PPT Slide
Lager Image
for user, location, dwell time, and services. These generated candidate sets are shown in Table 4 , Table 5 , Table 6 , and Table 7 respectively.
Candidate set for user
PPT Slide
Lager Image
Candidate set for user
Candidate set for location
PPT Slide
Lager Image
Candidate set for location
Candidate set for dwell time
PPT Slide
Lager Image
Candidate set for dwell time
Candidate set for service
PPT Slide
Lager Image
Candidate set for service
- 4.2. Generating Candidate Set
Now we apply a matching join operation between
PPT Slide
Lager Image
and frequent itemset L 1 , then we found candidate set
PPT Slide
Lager Image
and L 2 . These sets are U i ⋈L j , U i ⋈T k , U i ⋈S m , L j ⋈T k , L j ⋈S m and T k ⋈S m . These matching joins are represented in Table 8 to Table 13 and corresponding frequent 2-tree candidate patterns in Figures 2 to 7 respectively.
Table 8 represents the matching join of U i ⋈L j . It is prepared by counting the relation of U i ⋈L j as
u 1 →l 1 =3,
u 1 →l 2 =1,
u 1 →l 4 =1,
u 2 →l 1 =0,
u 2 →l 2 =1,
u 2 →l 4 =2,
u 3 →l 1 =1,
u 3 →l 2 =3,
u 3 →l 4 =2
We prune the relations which have lesser count from the predefined minimum support. In this example we have set minimum count=2; so that the relation u 1 →l 1 , u 2 →l 4 , u 3 →l 2 , u 3 →l 4 follows the matching join condition. These relations are denoted in Table 8 and the corresponding frequent 2-tree candidate pattern is shown in Figure 2 . Associated Trees prepared by various cases of the matching join U i ⋈L j , are presented in Table 8 . By joining all these cases we find the final frequent candidate tree of 13 nodes.
Matching joins for Ui⋈Lj
PPT Slide
Lager Image
Matching joins for Ui⋈Lj
PPT Slide
Lager Image
Associated tree for Ui⋈Lj of Table 8
Similarly, different
PPT Slide
Lager Image
4 candidate sets are shown in Table 9 , Table 10 , Table 11 , Table 12 , and Table 13 . Its frequent 2-Tree is shown in Figure 3 , Figure 4 , Figure 5 , Figure 6 , and Figure 7 respectively.
Matching joins for Ui⋈Tk
PPT Slide
Lager Image
Matching joins for Ui⋈Tk
PPT Slide
Lager Image
Associated tree for Ui⋈Tk of Table 9
Matching joins for Ui⋈Sm
PPT Slide
Lager Image
Matching joins for Ui⋈Sm
PPT Slide
Lager Image
Associated tree for Ui⋈Sm of Table 10
Matching joins for Lj⋈Tk
PPT Slide
Lager Image
Matching joins for Lj⋈Tk
PPT Slide
Lager Image
Associated tree for Lj⋈Tk of Table 11
Matching joins for Lj⋈Sm
PPT Slide
Lager Image
Matching joins for Lj⋈Sm
PPT Slide
Lager Image
Associated tree for Lj⋈Sm of Table 12
Matching joins for Tk⋈Sn
PPT Slide
Lager Image
Matching joins for Tk⋈Sn
PPT Slide
Lager Image
Associated tree for Tk⋈Sm of Table 13
In all candidate sets of
PPT Slide
Lager Image
4 we have counted nodes by associated tree as
No. of nodes in U i ⋈L j = 13
No. of nodes in U i ⋈T k = 14
No. of nodes in U i ⋈S m = 10
No. of nodes in L j ⋈T k = 11
No. of nodes in L j ⋈S m = 8
No. of nodes in T k ⋈S m = 13
By these matching joins we identified that the relation U i ⋈T k has the maximum node from all
PPT Slide
Lager Image
candidate sets, which is depicted in Figure 3 Thus it is clear that the relation Ui Tk is stronger than the other matching relations of the candidate sets of
PPT Slide
Lager Image
.
- 4.3. Generating Candidate Set
Now we find the candidate sets of
PPT Slide
Lager Image
and frequent itemset L 3 . These are prepared by the relation U i ⋈L j ⋈ T k , U i ⋈L j ⋈S m , U i ⋈T k ⋈S m and L j ⋈T k ⋈S m .
PPT Slide
Lager Image
candidate sets are illustrated in Tables 14 to 17 and the correspondent associated 3-Tree is shown in Figures 8 to 11 respectively.
Matching joins for Ui⋈Lj⋈Tk
PPT Slide
Lager Image
Matching joins for Ui⋈Lj⋈Tk
PPT Slide
Lager Image
Associated tree for Ui⋈Lj⋈Tk of Table 14
Matching joins for Ui⋈Lj⋈Sm
PPT Slide
Lager Image
Matching joins for Ui⋈Lj⋈Sm
PPT Slide
Lager Image
Associated tree for Ui⋈Lj⋈Sm of Table 15
Matching joins for Ui⋈Tk⋈Sm
PPT Slide
Lager Image
Matching joins for Ui⋈Tk⋈Sm
PPT Slide
Lager Image
Associated tree for Ui⋈Tk⋈Sm of Table 16
Matching joins for Lj⋈Tk⋈Sm
PPT Slide
Lager Image
Matching joins for Lj⋈Tk⋈Sm
PPT Slide
Lager Image
Associated tree for Lj⋈Tk⋈Sm of Table 17
U i ⋈L j ⋈T k are constructed by the counting of relations as
u 1 →l 1 →T 13 =2,
u 1 →l 1 →T 38 =1,
u 2 →l 4 →T 25 =1,
u 2 →l 4 →T 38 =1,
u 3 →l 2 →T 13 =2,
u 3 →l 2 →T 25 =1,
u 3 →l 4 →T 13 =1,
u 3 →l 4 →T 25 =1.
In all these counted relations we prune the relations which have less count (<2) from the predefined minimum support so that u 1 →l 1 →T 13 =2 and u 3 →l 2 →T 13 =2 satisfy the minimum support. These relations are denoted in Table 14 with the corresponding frequent 3-Tree in Figure 8 . Similarly different
PPT Slide
Lager Image
candidate sets and associated trees are prepared. After preparing all associated sub trees the following nodes are counted:
No. of nodes in U i ⋈L j ⋈T k =7
No. of nodes in U i ⋈L j ⋈S m =2
No. of nodes in U i ⋈T k ⋈S m =9
No. of nodes in L j ⋈T k ⋈S m =8
It is observed that the relation Ui Tk Sm has the maximum node count, thus this relation is stronger than other relations of the candidate set
PPT Slide
Lager Image
.
- 4.4. Generating Candidate Set
In the next step we generate the candidate set
PPT Slide
Lager Image
for relation U i ⋈L j ⋈T k ⋈S m . It is shown in Table 18. Here we observed that the count of this relation is less than the predefined minimum support (1<2). Thus the process is terminated and the frequent item set and 4-tree candidate pattern are not prepared. Hence this relation is neglected.
Matching joins for Ui⋈Lj⋈Tk⋈Sm
PPT Slide
Lager Image
Matching joins for Ui⋈Lj⋈Tk⋈Sm
By the illustrated example we have found a strong associated tree among sets
PPT Slide
Lager Image
Here relation Ui Tk and Ui Tk Sm are the stronger relations among all the relations. These relations show that these mobile accessing patterns are the most frequent relations. By these obtained relations one can predict that, if we know the user id and time, then services can be easily identified. According to this illustration the location parameter is less important for service prediction. These mined patterns are also helpful for future prediction and recommendation of services.
5. EXPERIMENTAL EVALUATION
We evaluate the performance of the proposed algorithm in this section. The experiments were performed on a 3.0 GHz processor with 2 GB of memory and the operating system Microsoft Windows 7. The algorithms are implemented in Java. The experiment was conducted on various parameters which are shown in Table 19 .
Parameter settings
PPT Slide
Lager Image
Parameter settings
PPT Slide
Lager Image
No. of Nodes with different minimum support when maxflow Database=5000
PPT Slide
Lager Image
No. of Nodes with different minimum support when maxflow Database=10000
- 5.1. Analysis Case 1-Different Node Counts
In this experiment, the number of mobile access patterns was set to 5,000 and 10,000. Here the different node counts are found with respect to different minimum support values. Figures 12 and 13 show that while the minimum support value increased from 0.1% to 1%, the number of nodes also decreased. Figures 12 and 13 also show that
PPT Slide
Lager Image
has the highest number of associated sub tree patterns.
PPT Slide
Lager Image
had the lowest number of associated sub tree patterns.
- 5.2. Analysis Case 2-Different Item Counts
In this experiment, the number of mobile access patterns was again set to 5,000 and 10,000. Figures 14 and 15 show the performance result with respect to different minimum support values. Figures 14 and 15 show that as the minimum support value varied from 0.1% to 1% the number of items decreases.
PPT Slide
Lager Image
No. of Items with different minimum support when maxflow Database=5000
PPT Slide
Lager Image
No. of Items with different minimum support when maxflow Database=10000
- 5.3. Analysis Case 3-Different Mobile Access Patterns
In this analysis, we have compared the number of nodes in associated tree patterns and the number of mobile access patterns with respect to different minimum support values. Figures 16 to 18 show these comparison results. Figure 16 shows the number of nodes and mobile access patterns with respect to min support=0.2%. Figure 16 shows that the number of nodes increased, while the number of mobile access patterns increased. The variation also shows between number of nodes and mobile access patterns while minimum support is 0.5% and 0.8% respectively. This variation is shown in Figures 17 and 18 respectively.
PPT Slide
Lager Image
Nodes and mobile access patterns with respect to 0.2% minimum support
PPT Slide
Lager Image
Nodes and mobile access patterns with respect to 0.5% minimum support
PPT Slide
Lager Image
Nodes and mobile access patterns with respect to 0.8% minimum support
- 5.4. Discussion
In this subsection experimental inferences are discussed. By the above experiments, the proposed associated tree based approach is shown to outperform the state-of-the-art approach Apriori process. The experimental results show that the proposed approach takes less time as compared to a basic association rule generation Apriori process. Execution time comparisons are shown in Figure 19 . Table 20 shows the number of generated patterns with both approaches. Thus, the performance of the associated tree based approach is the best among the compared approaches. The proposed approach is also better in comparison with memory utilization.
Number of patterns with compared approaches
PPT Slide
Lager Image
Number of patterns with compared approaches
PPT Slide
Lager Image
Execution time in response to change in different minimum support
6. CONCLUSIONS AND FUTURE WORK
In this paper, we proposed an approach to generate strong frequent patterns between different mobile accessing parameters including user, location, dwell time, and web services. These patterns are generated by the matching joins and presented as associated trees. The proposed approach generates a k-tree frequent pattern in the maxflow database according to defined support values. By the experimental results under the various simulated data, the proposed approach is valuable for recommending and predicting services for different users. The proposed approach is also helpful in business and e-commerce environments where web services are important. The comparison of this approach is done with standard Apriori algorithm, in which we find that the results of the proposed approach are excellent.
For future work, we plan to explore more efficient mobile pattern generation algorithms, and design more efficient frameworks to predict mobile services. In addition, we plan to apply some specific constraints in mining processes to achieve efficient behavior of mobile users. It is also planned to find service patterns according to utility or importance bases.
Acknowledgements
The authors would like to thank editors and referees for their helpful comments.
References
Agrawal R. , Srikant R. (1994) Fast algorithms for mining association rules in large databases. In Proceedings of the 20th International Conference of Very Large Databases 487 - 499
Chen T. S. , Chou Y. S. , Chen T. C. (2012) Mining user movement behavior patterns in a mobile service environment. IEEE Transactions on system, man, and Cybernetics Part–A Syst. Humans 42 (1) 87 - 101
Cheng H. , Yan X. , Han J. (2004) IncSpan: Incremental mining of sequential patterns in a large database. In Proceedings of the 10th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining Seattle, WA 527 - 532
Fayyazi M. , Kaeli D. , Meleis W. (2004) Parallel maximum weight bipartite matching algorithms for scheduling in input-queued switches. In Proceedings of the 18th IPDPS Santa Fe, NM 4 - 11
Gao H. , Tang J. , Hu X. , Liu H. (2013) Modeling temporal effects of human mobile behavior on location-based social networks. The 22nd ACM International Conference on Information and Knowledge Management CIKM 2013 San Francisco, USA
Huang Y. F. , Lin K.H. (2008) Global data allocation based on user behaviors in mobile computing environments. Comput. Commun. 31 (10) 2420 - 2427
Huang J. L. , Chen M. S. , Peng W.C. (2003) Exploring group mobility for replica data allocation in a mobile environment. In Proceedings of the ACM Int. Conf. Inf. Knowl. Manage. New Orleans, LA 161 - 168
Ilyas I. F. , Aref W. G. , Elmagarmid A. K. (2004) Supporting top-k join queries in relational databases. J. Very Large Databases 13 (3) 207 - 221
Kiukkonen N. , Blom J. , Dousse O. , Laurila J. K. (2010) Towards rich mobile phone datasets: Lausanne data collection campaign. ICPS 2010: The 7th International Conference on Pervasive Services Berlin
Lancieri L. , Durand N. (2006) Internet user behavior: Compared study of the access traces and application to the discovery of communities. IEEE Trans. Syst., Man, Cybern. A, Syst., Humans 36 (1) 208 - 219
Lee S-C. , Paik J. , Ok J. , Song I. , Kim U-M. (2007) Efficient mining of user behaviors by temporal mobile access patterns. Int. J. Comput. Sci. Security 7 (2) 285 - 291
Lee W-P. (2007) Deploying personalized mobile services in an agent based environment. Expert Syst. Appl. 32 (4) 1194 - 1207
Liu H. , Keselj V. (2007) Combined mining of web serve logs and web contents for classifying user navigation patterns and predicting users future requests. Data Knowl. Eng. 61 (2) 304 - 330
Mohbey K. K. , Thakur G. S. (2013) User movement behavior analysis in mobile service environment. British Journal of Mathematics & Computer Science 3 (4) 822 - 834
Monnot J. , Toulouse S. (2007) The path partition problem and related problems in bipartite graphs. Oper. Res. Lett. 35 (5) 677 - 684
Pabarskaite Z. , Raudys A. (2007) A process of knowledge discovery from web log data: Systematization and critical review. J. Intell. Inf. Syst. 28 (1) 79 - 104
Peng W. C. , Chen M. S. (2005) Shared data allocation in a mobile computing system: Exploring local and global optimization. IEEE Trans. Parallel Distributed System 16 (4) 374 - 384
Peng W. C. , Chen M. S. (2003) Developing data allocation schemes by incremental mining of user moving patterns in a mobile computing system. IEEE Trans. Knowl. Data Eng. 15 (1) 70 - 85
Perez I. J. , Cabrerizo F. J. , Viedma E. H. (2010) A mobile decision support system for dynamic group decision making problem. IEEE Trans. system, management cybernetics, A, System Humans 40 (6) 1244 - 1256
Terziyan V. , Vitko O. (2003) Bayesian metanetworks for modelling user preferences in mobile environment. In KI 2003: Advances in artificial intelligence. Springer-Verlag Berlin, Germany 370 - 384
Tsai H. W. , Chu C. P. , Chen T. S. (2007) Mobile object tracking in wireless sensor networks. Comput. Commun. 30 (8) 1811 - 1825
Tseng V. S. , Lu R. H. C. , Huang C. H. (2007) Mining temporal mobile sequential patterns in location-based service environments. In Proceedings of the 13th ICPADS Hsinchu, Taiwan 1 1 - 8
Tseng V. S. , Lu E. H. C. (2009) Energy-efficient real-time object tracking in multi-level sensor networks by mining and predicting movement patterns. Journal of System & Software 82 (4) 697 - 706
Yavas G. , Katsaros D. , Ulusoy O. , Manolopoulos Y. (2005) A data mining approach for location prediction in mobile environments. Data Knowl. Eng. 54 (2) 121 - 146