Reality Commons
brought to you by the MIT Human Dynamics Lab
Reality Mining Dataset - Publications and Findings
Reality mining: sensing complex social systems, Nathan Eagle, Alex (Sandy) Pentland, Journal
Personal and Ubiquitous Computing
Volume 10 Issue 4, March 2006
Pages 255 - 268
Eagle and collaborators showed that the decision of individuals to identify another as friend was significantly correlated with whether he was with the other person after work hours and during weekends or within the two weeks before the friendship survey, as captured by cell phone. They also demonstrated the periodicity of an individual's personal behavior, identified by individual whereabouts with cell phones, and the individual's interaction with other individuals, also captured by cell phones, which periodicity they called "eigen-behavior". The Reality Mining data set has generated more than 1000 citations.
2012
- Alex Pentland (2012), Society's Nervous System: Building Effective Government, Energy, and Public Health Systems. IEEE Computer 45(1): 31-38 (2012)
2010
- N. Eagle (2010), "Mobile Phones as Social Sensors", The Handbook of Emergent Technologies in Social Research, Oxford University Press (in press). PDF
- N. Eagle, A. Clauset, A. Pentland, and D. Lazer (2010), "Multi-dimensional edge inference", Proceedings of the National Academy of Sciences (PNAS) Vol 107(9), pp. E31. PDF HTML
- J. Toole, N. Eagle, and J. Plotkin (2010), "Quantifying Crime Waves", AAAI Spring Symposium 2010 on Artifical Intelligence for Development (AI-D) (in press). PDF
- A. Wesolowski and N. Eagle (2010), "Parameterizing the Dynamics of Slums", AAAI Spring Symposium 2010 on Artifical Intelligence for Development (AI-D) (in press). PDF
- J. Blumenstock, D. Gillick, and N. Eagle (2010), "Who's Calling? Demographics of Mobile Phone Use in Rwanda", AAAI Spring Symposium 2010 on Artifical Intelligence for Development (AI-D) (in press). PDF
2009
- N. Eagle, A. Pentland, and D. Lazer (2009), "Inferring Social Network Structure using Mobile Phone Data", Proceedings of the National Academy of Sciences (PNAS) Vol 106(36), pp. 15274-15278. PDF SOM HTML
- N. Eagle and A. Pentland (2009), "Eigenbehaviors: Identifying Structure in Routine", Behavioral Ecology and Sociobiology 63:7, 1057-1066. PDF
- N. Eagle, Y. de Montjoye, and L. Bettencourt (2009), "Community Computing: Comparisons between Rural and Urban Societies using Mobile Phone Data", IEEE Social Computing, 144-150. PDF HTML
- N. Eagle (2009), "Engineering a Common Good", IEEE Engaging Data, Boston, MA 2009. PDF
- N. Eagle (2009), "txteagle: Mobile Crowdsourcing", Internationalization, Design and Global Development, LNCS 5623, 447-456. PDF HTML
- M.A. Bayir, M. Demirbas, N. Eagle (2009), "Discovering spatiotemporal mobility profiles of cellphone users", WoWMoM 2009, 1-9. PDF
- N. Eagle, A. Clauset, J. Quinn (2009), "Cellular Tower Data for Anticipatory Computing", AAAI '09. PDF
- N. Eagle, A. Clauset, J. Quinn (2009), "Methodologies for Continuous Cellular Tower Data Analysis", Pervasive '09. PDF
- M. Raento, A. Oulasvirta, N. Eagle (2009), "Smartphones: An Emerging Tool for Social Scientists", Sociological Methods Research 37:3, 426-454. PDF
2008
- N. Eagle (2008), "Behavioral Inference Across Cultures: Using Telephones as a Cultural Lens", IEEE Intelligent Systems 23:4, 62-64. PDF
- P Hui and J. Crowcroft (2008), "Human mobility models and opportunistic communications system design ", Proc. Royal Society A 366:1872 2005-2016. PDF
- B. Gallagher et al. (2008), "Using Ghost Edges for Classification in Sparsely Labeled Networks", Proc. of the 14th ACM SIGKDD Conf. on Knowledge Discovery and Data Mining. PDF
- L. Del Prete and L. Capra (2008), "Reliable Discovery and Selection of Composite Services in Mobile Environments", Proceedings of the 2008 12th International IEEE Enterprise Distributed Object Computing Conference, 171-180. PDF
- Z. Shen and K. Ma (2008), "MobiVis: A Visualization System for Exploring Mobile Data", IEEE PacificVIS '08, 175-182. PDF
- E. Yoneki (2008), "Visualizing communities and centralities from encounter traces", Proceedings of the 3rd ACM workshop on Challenged networks, 129-132. PDF
- P. Hui et al. (2008), "Bubble rap: social-based forwarding in delay tolerant networks", Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, 241-250. PDF
- A. Heinemann (2008), "Opportunistic Data Dissemination Using Real-World User Mobility Traces", Advanced Information Networking and Applications-Workshops, 2008. AINAW 2008, 1715-1720. PDF
- H. Husna et al. (2008), "Quantifying presence using calling patterns", IEEE COMSWARE '08, 184-187. PDF
- Y. De Mulder et al. (2008), "Identification via location-profiling in GSM networks", 7th ACM Conference on Computer and Communications Security, 23-32. PDF
- N. Ravi et al. (2008), "Context-aware Battery Management for Mobile Phones", IEEE PerCom '08, 224-233. PDF
- K. Farrahi and D. Gatica-Perez (2008), "What did you do today?: discovering daily routines from large-scale mobile data", Proceeding of the 16th ACM international conference on Multimedia849-852. PDF
- H. Tong et al. (2008), "Fast mining of complex time-stamped events", 17th ACM conference on Information and knowledge management759-768. PDF
- L. Del Prete and L. Capra (2008), "MoSCA: service composition in mobile environments", ACM/IFIP/USENIX Middleware '0887-89. PDF
- H. Liu et al. (2008), "Behavioral Entropy of a Cellular Phone User", Social Computing, Behavioral Modeling, and PredictionSpringer 160-167. PDF
- E. Yoneki et al. (2008), "Wireless Epidemic Spread in Dynamic Human Networks", Bio-Inspired Computing and Communication, LNCS 5151. PDF
- H. Zhang and R. Dantu (2008), "Quantifying the Presence of Phone Users", IEEE CCNC 08, 883-887. PDF
2007
- A. Clauset and N. Eagle (2007), "Persistence and periodicity in a dynamic proximity network", DIMACS Workshop on Computational Methods for Dynamic Interaction Networks. PDF
- A. Chaintreau et al. (2007), " Impact of Human Mobility on Opportunistic Forwarding Algorithms", IEEE Transactions on Mobile Computing, Vol 6 (6), 606-620. PDF
- L. Hossain et al. (2007), "Exploring Temporal Communication Through Social Networks", Human-Computer Interaction - INTERACT 2007, Springer-Verlag Lecture Notes in Computer Science 4662, 19-30. PDF
- V. Tseng and K. Lin (2007), "Energy efficient strategies for object tracking in sensor networks: A data mining approach", Journal of Systems and Software, Vol 80, #10, 1678-1698. PDF
- P. Koutsourelakis. (2007), "Unsupervised Group Discovery and Link Prediction in Relational Datasets: a nonparametric Bayesian approach", Technical Report UCRL-TR-230743, Lawrence Livermore National Laboratory (LLNL). PDF
- E. Yoneki et al. (2007), "A socio-aware overlay for publish/subscribe communication in delay tolerant networks", Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems, 225-234. PDF
- I. Carreras et al. (2007), "Eigenvector Centrality in Highly Partitioned Mobile Networks: Principles and Applications", Advances in Biologically Inspired Information Systems, Vol 69, 123-145. PDF
- L. Wang et al. (2007), "Instant Message Clustering Based on Extended Vector Space Model", Advances in Computation and Intelligence, Springer-Verlag Lecture Notes in Computer Science 4683, 435-443. PDF
- T. Lodge and M. Radenkovic (2007), "Towards mass scale environmental monitoring by the public", ACM IASTED 07 , 69-74.
- E. Daly and M Haahr (2007), "Social network analysis for routing in disconnected delay-tolerant MANETs", MobiHoc '07, ACM Press, 32-40. PDF
- A. Miklas et al. (2007), "Exploiting Social Interactions in Mobile Systems", UbiComp 2007: Ubiquitous Computing, Springer-Verlag Lecture Notes in Computer Science 4717, 409-4288. PDF
- S. Akoush and A. Sameh (2007), "Mobile User Movement Prediction Using Bayesian Learning for Neural Networks", Proceedings of the 2007 International Conference on Wireless Communications and Mobile Computing (ACM IWCMC), 191-196. PDF
- A. Chaintreau et al. (2007), "The diameter of opportunistic mobile networks", Proceedings of the 2007 ACM CoNEXT conference. PDF
- P. Hui et al. (2007), "Distributed Community Detection in Delay Tolerant Networks", MobiArch’07, ACM Press. PDF
- D. Heinemann (2007), "Collaboration in Opportunistic Networks", Ph.D. Thesis, TU Darmstadt. PDF
- E. Yoneki et al. (2007), "Visualizing community detection in opportunistic networks", CHANTS '07, ACM Press, 93-96. PDF
- T. Karagiannis et al. (2007), "Power law and exponential decay of inter contact times between mobile devices", Proceedings of the 13th annual ACM international conference on Mobile computing and networking, 183-194. PDF
- B. Congleton and S. Nainwal (2007), "Mining the Mine: Network Analysis of the Reality Mining Dataset", CSCS 535 Networks: Theory and Application, Advisor: L. Adamic. PDF
- R. Honicky et al. (2007), "A Message Oriented Phone System for Low Cost Connectivity", Working Paper, CS Berkeley / Intel Research. PDF
2006
- N. Eagle and A. Pentland (2006), "Reality Mining: Sensing Complex Social Systems", Personal and Ubiquitous Computing, Vol 10, #4, 255-268. PDF
- K. Phanse and J. Nykvist (2006), "Opportunistic Wireless Access Networks", AcessNets '06, ACM Press, 11. PDF
- J. Lawrence et al. (2006), "Co-Presence Communities: Using Pervasive Computing to Support Weak Social Networks", WETICE '06, IEEE Press, 149-156. PDF
- A. Lindgren et al. (2006), "Impact of Communication Infrastructure on Forwarding in Pocket Switched Networks ", SIGCOMM '06, ACM Press, 261-268. PDF
- T. Mielikainen et al. (2006), "Aggregating time partitions", SIGKDD '06, ACM Press, 347 - 356. PDF
- A. Pentland (2006), "Automatic mapping and modeling of human networks", Physica A: Statistical Mechanics and its Applications, Vol 378, #41 2006. PDF
- J. Su et al. (2006), "A preliminary investigation of worm infections in a bluetooth environment", Conference on Computer and Communications Security, Proceedings of the 4th ACM workshop on Recurring malcode, 9-16. PDF
- N. Ravi (2006), "Context-aware Battery Management for Mobile Phones: A Feasibility Study", Microsoft Research Tech Report, 2006. PDF
- E. Terzi (2006), "Problems and Algorithms for Sequence Segmentations ", Ph.D. Thesis, Computer Science, University of Helsinki, 2006. PDF
2005
- N. Eagle (2005), "Machine Perception and Learning of Complex Social Systems", Ph.D. Thesis, Program in Media Arts and Sciences, Massachusetts Institute of Technology, June. PDF
- N. Eagle and A. Pentland (2005), "Social Serendipity: Mobilizing Social Software", IEEE Pervasive Computing, 4 (2): 28-34, 2005. PDF
- N. Eagle (2005), "Using Mobile Phones to Model Complex Social Systems", O'Reilly Network, June. HTML
- M. Lambert (2005), "Visualizing and analyzing human-centered data streams", Masters Thesis, Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. PDF
- M. Sung et al. (2005), "Mobile-IT Education (MIT. EDU): m-learning applications for classroom settings", Journal of Computer Assisted Learning, 21 (3), 229–237. PDF
- N. Eagle and A. Pentland (2005), "Organizational rhythms - the search for the patterns of the aggregate", Vodaphone Receiver, Number 14, December 2005. HTML PDF
2004
- N. Eagle (2004), "Can Serendipity Be Planned?", MIT Sloan Management Review, Vol. 46, No. 1, 10-14. Abstract (email for link to full article)
- Pentland, A. "Reality Mining the Organization." Technology Review (2004).
HTML
2003
- N. Eagle and A. Pentland (2003), "The Organization Life Log", Proceedings of the Seventh IEEE International
Symposium on Wearable Computing (ISWC), 256-257.
- N Eagle and A. Pentland (2003), "Social Network Computing", Ubicomp 2003: Ubiquitous Computing, Springer-Verlag Lecture Notes in Computer Science 2864, 289-296.
Patents Pending
- Nathan Eagle and Alex Pentland, "Combined short range radio network and cellular telephone network for interpersonal communications." U.S. Patent Application Serial No. 60/568,482. Filed May 6, 2004. MIT ID: 10705T. Assignee: Massachusetts Institute of Technology.