2016
DOI: 10.1109/mnet.2016.7389830
|View full text |Cite
|
Sign up to set email alerts
|

Big data-driven optimization for mobile networks toward 5G

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
134
0
2

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 266 publications
(145 citation statements)
references
References 15 publications
0
134
0
2
Order By: Relevance
“…In terms of caching solutions, several approaches are being considered, such as in [17], [82], [85], [86], [189], [246].…”
Section: B Cachingmentioning
confidence: 99%
See 2 more Smart Citations
“…In terms of caching solutions, several approaches are being considered, such as in [17], [82], [85], [86], [189], [246].…”
Section: B Cachingmentioning
confidence: 99%
“…In [17], the authors explore various ways of integrating big data analytic with network resource optimization and caching deployment. The authors propose a big data-driven framework, which involves the collection, storage and analysis of the data and apply it to two different case studies.…”
Section: B Cachingmentioning
confidence: 99%
See 1 more Smart Citation
“…Among these latencies, some are deterministic processing latency, some are latencies related to signal detection, and others are random access latencies related to business activity [22]. Most projects of current research focus on computing of mean value and variance for random access latency; there are few projects of research that focus on probability density function (PDF) [23][24][25] of random access latency [26][27][28]. With quantity of waiting users and channel busy/idle as state variables, the moment generating function (MGF) for PDF of random access latency is deduced based on Markov process in [25,29,30].…”
Section: Related Workmentioning
confidence: 99%
“…Anonymized user mobility traces are increasingly collected by Internet Service Providers (ISP) to assist various applications, ranging from network optimization [42] to user population estimation and urban planning [11]. Meanwhile, detailed location traces contain sensitive information about individual users (e.g., home and work location, personal habits).…”
Section: Introductionmentioning
confidence: 99%