2011
DOI: 10.1109/tits.2010.2074196
|View full text |Cite
|
Sign up to set email alerts
|

Real-Time Urban Monitoring Using Cell Phones: A Case Study in Rome

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

3
332
0
4

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 559 publications
(339 citation statements)
references
References 8 publications
3
332
0
4
Order By: Relevance
“…More recent papers has been published by Calabrese et al [17,18]. In [17], they describe the use of the Enhanced Cell-ID with Timing Advance (TA) algorithm to localize mobile phones and to compute behavioural mobility patterns of the monitored users in Rome.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…More recent papers has been published by Calabrese et al [17,18]. In [17], they describe the use of the Enhanced Cell-ID with Timing Advance (TA) algorithm to localize mobile phones and to compute behavioural mobility patterns of the monitored users in Rome.…”
Section: Related Workmentioning
confidence: 99%
“…In [17], they describe the use of the Enhanced Cell-ID with Timing Advance (TA) algorithm to localize mobile phones and to compute behavioural mobility patterns of the monitored users in Rome. In our approach, we use different cellular network data (probed by the A 2G and Iu-CS 3G interfaces) to predict traffic situations in order to overcome the limits of solutions based on TA algorithms (i.e.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…These indices have proved to be of great value in the analysis and understanding of the roles played by networks like social networks [12,23,24], citation networks [17], computer networks [6,16], urban networks [8,9,25], and others.…”
Section: Introductionmentioning
confidence: 99%
“…Similar approaches have been applied for cellular technologies in [1], [2], [3]. The way how a mobile device searches for nearby APs, with WiFi probes, or how beacons related to Bluetooth device discovery procedure are transmitted (explored in [4]), can be exploited to estimate the number of active devices in a certain area.…”
mentioning
confidence: 99%