{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T06:48:06Z","timestamp":1726469286194},"reference-count":41,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1016\/j.comnet.2016.10.016","type":"journal-article","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T04:16:28Z","timestamp":1478232988000},"page":"176-193","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":22,"special_numbering":"C","title":["Mobile data traffic modeling: Revealing temporal facets"],"prefix":"10.1016","volume":"112","author":[{"given":"Eduardo","family":"Mucelli Rezende Oliveira","sequence":"first","affiliation":[]},{"given":"Aline","family":"Carneiro Viana","sequence":"additional","affiliation":[]},{"given":"K.P.","family":"Naveen","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Sarraute","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2016.10.016_bib0001","unstructured":"Cisco, Cisco visual networking index: global mobile data traffic forecast update, 2013\u20132018, 2013."},{"article-title":"From routine to network deployment for data offloading in metropolitan areas","year":"2014","series-title":"Proc. of IEEE SECON","author":"Oliveira","key":"10.1016\/j.comnet.2016.10.016_bib0002"},{"key":"10.1016\/j.comnet.2016.10.016_bib0003","doi-asserted-by":"crossref","DOI":"10.1088\/1751-8113\/41\/22\/224015","article-title":"Uncovering individual and collective human dynamics from mobile phone records","volume":"41","author":"Candia","year":"2008","journal-title":"J. Phys. A"},{"issue":"4","key":"10.1016\/j.comnet.2016.10.016_bib0004","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MPRV.2011.44","article-title":"A tale of one city: using cellular network data for urban planning","volume":"10","author":"Becker","year":"2011","journal-title":"IEEE Pervasive Comput."},{"journal-title":"N.Y. Times","article-title":"Cellphones now used more for data than for calls","year":"2010","author":"Wortham","key":"10.1016\/j.comnet.2016.10.016_bib0005"},{"article-title":"Classifying call profiles in large-scale mobile traffic datasets","year":"2014","series-title":"Proc. of IEEE Infocom","author":"Naboulsi","key":"10.1016\/j.comnet.2016.10.016_bib0006"},{"issue":"4","key":"10.1016\/j.comnet.2016.10.016_bib0007","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s10588-007-9018-7","article-title":"Anomaly detection in a mobile communication network","volume":"13","author":"Pawling","year":"2007","journal-title":"Comput. Math. Organ. Theory"},{"article-title":"Content consumption cartography of the paris urban region using cellular probe data","year":"2012","series-title":"Proc. of the 1st Workshop on Urban Networking (ACM UrbaNe)","author":"Hoteit","key":"10.1016\/j.comnet.2016.10.016_bib0008"},{"article-title":"A self organizing maps model for outlier detection in call data from mobile telecommunication networks","year":"2004","series-title":"Proc. of the Southern Africa Telecommunication Networks and Applications Conference (SATNAC)","author":"Abidogun","key":"10.1016\/j.comnet.2016.10.016_bib0009"},{"article-title":"Clustering anonymized mobile call detail records to find usage groups","year":"2011","series-title":"Workshop on Pervasive and Urban Applications (PURBA)","author":"Becker","key":"10.1016\/j.comnet.2016.10.016_bib0010"},{"article-title":"Age, gender and communication networks","year":"2010","series-title":"NetMob 2010 Workshop on the Analysis of Mobile Phone Networks","author":"Stoica","key":"10.1016\/j.comnet.2016.10.016_bib0011"},{"key":"10.1016\/j.comnet.2016.10.016_bib0012","series-title":"Proceedings of the Fifth International Conference on Information and Communication Technologies and Development, ICTD \u201912","first-page":"297","article-title":"Differences in phone use between men and women: quantitative evidence from rwanda","author":"Mehrotra","year":"2012"},{"issue":"2","key":"10.1016\/j.comnet.2016.10.016_bib0013","doi-asserted-by":"crossref","first-page":"536","DOI":"10.1109\/TNET.2012.2218122","article-title":"Mobile data offloading: how much can wifi deliver?","volume":"21","author":"Lee","year":"2013","journal-title":"Netw. IEEE\/ACM Trans."},{"article-title":"Profiling users in a 3g network using hourglass co-clustering","year":"2010","series-title":"Proc. of ACM MobiCom","author":"Keralapura","key":"10.1016\/j.comnet.2016.10.016_bib0014"},{"article-title":"A holistic framework for the study of urban traces and the profiling of urban processes and dynamics","year":"2009","series-title":"Proc. of Int. IEEE Conf. on Intelligent Transportation Systems (ITSC)","author":"Vaccari","key":"10.1016\/j.comnet.2016.10.016_bib0015"},{"article-title":"Identification and characterization of human behavior patterns from mobile phone data","year":"2013","series-title":"Proc. of NetMob","author":"Paraskevopoulos","key":"10.1016\/j.comnet.2016.10.016_bib0016"},{"key":"10.1016\/j.comnet.2016.10.016_bib0017","article-title":"Computing urban mobile landscapes through monitoring population density based on cellphone chatting","volume":"3","author":"Pulselli","year":"2008","journal-title":"Int. J. Des. Nat. Ecodynamics"},{"article-title":"Towards estimating the presence of visitors from the aggragate mobile phone network activity they generate","year":"2009","series-title":"Proc. of Intl. Conference on Computers in Urban Planning and Urban Management","author":"Girardin","key":"10.1016\/j.comnet.2016.10.016_bib0018"},{"key":"10.1016\/j.comnet.2016.10.016_bib0019","series-title":"Communications of the IIMA","article-title":"Mobile customer clustering analysis based on call detail records","volume":"7","author":"Lin","year":"2007"},{"key":"10.1016\/j.comnet.2016.10.016_bib0020","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/ACCESS.2013.2297736","article-title":"Parsimonious network traffic modeling by transformed arma models","volume":"2","author":"Laner","year":"2014","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2016.10.016_bib0021","unstructured":"Alcatel-Lucent, Alcatel-lucent 9900 wireless network guardian, 2012, (White Paper)."},{"key":"10.1016\/j.comnet.2016.10.016_bib0022","series-title":"Proc of. IEEE WCNC","first-page":"897","article-title":"Impacts of inactivity timer values on umts system capacity","volume":"2","author":"Chuah","year":"2002"},{"article-title":"Understanding traffic dynamics in cellular data networks","year":"2011","series-title":"Proc. of IEEE Infocom","author":"Paul","key":"10.1016\/j.comnet.2016.10.016_bib0023"},{"key":"10.1016\/j.comnet.2016.10.016_bib0024","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1559\/152304092783721231","article-title":"Hexagon mosaic maps for displaying univariate and bivariate geographical data","volume":"19","author":"Carr","year":"1992","journal-title":"Cartography Geog. Inf. Syst."},{"issue":"6","key":"10.1016\/j.comnet.2016.10.016_bib0025","doi-asserted-by":"crossref","first-page":"1960","DOI":"10.1109\/TNET.2013.2256431","article-title":"Large-scale measurement and characterization of cellular machine-to-machine traffic","volume":"21","author":"Shafiq","year":"2013","journal-title":"Netw. IEEE\/ACM Trans."},{"article-title":"Harnessing mobile phone social network topology to infer users demographic attributes","year":"2014","series-title":"Proceedings of the 8th Workshop on Social Network Mining and Analysis, SNAKDD\u201914","author":"Brea","key":"10.1016\/j.comnet.2016.10.016_bib0026"},{"article-title":"Frozen in time: Gender pay gap unchanged for 10 years","year":"2012","series-title":"Technical Report","author":"International Trade Union Confederation","key":"10.1016\/j.comnet.2016.10.016_bib0027"},{"issue":"2\u20133","key":"10.1016\/j.comnet.2016.10.016_bib0028","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1023\/A:1012801612483","article-title":"On clustering validation techniques","volume":"17","author":"Halkidi","year":"2001","journal-title":"J. Intell. Inf. Syst."},{"key":"10.1016\/j.comnet.2016.10.016_bib0029","first-page":"1409","article-title":"A statistical method for evaluating systematic relationships","volume":"28","author":"Sokal","year":"1958","journal-title":"Univ. Kansas Sci. Bull."},{"issue":"2","key":"10.1016\/j.comnet.2016.10.016_bib0030","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/BF02294245","article-title":"An examination of procedures for determining the number of clusters in a data set","volume":"50","author":"Milligan","year":"1985","journal-title":"Psychometrika"},{"article-title":"Measurement-driven mobile data traffic modelling in a large metropolitan area","year":"2014","series-title":"Technical Report","author":"Oliveira","key":"10.1016\/j.comnet.2016.10.016_sbref0029"},{"article-title":"Know thy neighbor: towards optimal mapping of contacts to social graphs for DTN routing","year":"2010","series-title":"Proc. of IEEE INFOCOM","author":"Hossmann","key":"10.1016\/j.comnet.2016.10.016_bib0032"},{"volume":"68","year":"1986","series-title":"Goodness-of-Fit-Techniques","author":"D\u2019Agostino","key":"10.1016\/j.comnet.2016.10.016_bib0033"},{"issue":"302","key":"10.1016\/j.comnet.2016.10.016_bib0034","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1080\/14786440009463897","article-title":"X. on the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling","volume":"50","author":"Pearson","year":"1900","journal-title":"Philos. Mag. Ser. 5"},{"key":"10.1016\/j.comnet.2016.10.016_bib0035","unstructured":"E. Mucelli Rezende Oliveira, Synthetic traffic generator, 2015. URL https:\/\/macaco:inria:fr\/software\/."},{"key":"10.1016\/j.comnet.2016.10.016_bib0036","first-page":"99","article-title":"On a measure of divergence between two statistical populations defined by their probability distributions","volume":"35","author":"Bhattacharyya","year":"1943","journal-title":"Bull. Calcutta Math. Soc."},{"issue":"5","key":"10.1016\/j.comnet.2016.10.016_bib0037","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1109\/TPAMI.2003.1195991","article-title":"Kernel-based object tracking","volume":"25","author":"Comaniciu","year":"2003","journal-title":"IEEE Trans. on Pattern Anal. Mach.Intell."},{"key":"10.1016\/j.comnet.2016.10.016_bib0038","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1214\/aoms\/1177729694","article-title":"On information and sufficiency","volume":"22","author":"Kullback","year":"1951","journal-title":"Ann. Math. Stat."},{"journal-title":"Pervasive Mob. Comput.","article-title":"On the regularity of human mobility","year":"2016","author":"Oliveira","key":"10.1016\/j.comnet.2016.10.016_bib0039"},{"key":"10.1016\/j.comnet.2016.10.016_bib0040","series-title":"5G for Ubiquitous Connectivity (5GU), 2014 1st International Conference on","first-page":"264","article-title":"A cost-based pricing analysis","author":"Katsigiannis","year":"2014"},{"article-title":"Big Data and Privacy: A Technological Perspective","year":"2014","series-title":"Technical Report","author":"President\u2019s Council of Advisors on Science and Technology","key":"10.1016\/j.comnet.2016.10.016_bib0041"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128616303644?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128616303644?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,11,3]],"date-time":"2019-11-03T05:17:03Z","timestamp":1572758223000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128616303644"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":41,"alternative-id":["S1389128616303644"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2016.10.016","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2017,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Mobile data traffic modeling: Revealing temporal facets","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2016.10.016","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}