{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T02:47:57Z","timestamp":1769309277403,"version":"3.49.0"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s11036-015-0648-6","type":"journal-article","created":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T22:07:57Z","timestamp":1444687677000},"page":"402-413","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Understanding and Predicting Data Hotspots in Cellular Networks"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2423-769X","authenticated-orcid":false,"given":"Ana","family":"Nika","sequence":"first","affiliation":[]},{"given":"Asad","family":"Ismail","sequence":"additional","affiliation":[]},{"given":"Ben Y.","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Sabrina","family":"Gaito","sequence":"additional","affiliation":[]},{"given":"Gian Paolo","family":"Rossi","sequence":"additional","affiliation":[]},{"given":"Haitao","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"648_CR1","unstructured":"Cisco Visual Networking Index. http:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/white_paper_c11-520862.html"},{"key":"648_CR2","doi-asserted-by":"crossref","unstructured":"Nan E, Chu X, Guo W, Zhang J (2013) User data traffic analysis for 3G cellular networks. In: Proc. of CHINACOM, pp 468\u2013 472","DOI":"10.1109\/ChinaCom.2013.6694641"},{"key":"648_CR3","doi-asserted-by":"crossref","unstructured":"Paul U, Subramanian A, Buddhikot M, Das S (2012) Understanding spatial relationships in resource usage in cellular data networks. In: Proc. of INFOCOM workshops, pp 244\u2013249","DOI":"10.1109\/INFCOMW.2012.6193499"},{"key":"648_CR4","doi-asserted-by":"crossref","unstructured":"Laner M, Svoboda P, Schwarz S, Rupp M (2012) Users in cells: a data traffic analysis. In: Proc. of WCNC, pp 3063\u20133068","DOI":"10.1109\/WCNC.2012.6214330"},{"key":"648_CR5","doi-asserted-by":"crossref","unstructured":"Paul U, Subramanian A, Buddhikot M, Das S (2011) Understanding traffic dynamics in cellular data networks. In: Proc. of INFOCOM, pp 882\u2013890","DOI":"10.1109\/INFCOM.2011.5935313"},{"key":"648_CR6","doi-asserted-by":"crossref","unstructured":"Shafiq M Z, Ji L, Liu A Z, Pang J, Wang J (2012) Characterizing geospatial dynamics of application usage in a 3G cellular data network. In: Proc. of INFOCOM, pp 1341\u20131349","DOI":"10.1109\/INFCOM.2012.6195497"},{"key":"648_CR7","doi-asserted-by":"crossref","unstructured":"Shafiq M Z, Ji L, Liu A X, Wang J (2011) Characterizing and modeling Internet traffic dynamics of cellular devices. In: Proc. of SIGMETRICS, pp 305\u2013316","DOI":"10.1145\/1993744.1993776"},{"key":"648_CR8","doi-asserted-by":"crossref","unstructured":"Zhou X, Zhao Z, Li R, Zhou Y, Zhang H (2012) The predictability of cellular networks traffic. In: Proc. of ISCIT, pp 973\u2013978","DOI":"10.1109\/ISCIT.2012.6381046"},{"key":"648_CR9","unstructured":"Mobile broadband with HSPA and LTE - capacity and cost aspects. http:\/\/www.developingtelecoms.com\/business\/opinion\/123-white-papers-case-studies\/3211-mobile-broadband-with-hspa-and-lte-capacity-and-cost-aspects.html"},{"issue":"2","key":"648_CR10","first-page":"159","volume":"68","author":"RW Sinnott","year":"1984","unstructured":"Sinnott R W (1984) Virtues of the haversine. Sky Telescop 68(2):159","journal-title":"Sky Telescop"},{"issue":"4","key":"648_CR11","first-page":"364","volume":"20","author":"D Defays","year":"1977","unstructured":"Defays D (1977) An efficient algorithm for a complete link method. Comput J (Br Comput Soc) 20(4):364\u2013366","journal-title":"Comput J (Br Comput Soc)"},{"key":"648_CR12","doi-asserted-by":"crossref","unstructured":"Isaacman S, Becker R, C\u00e1ceres R, Kobourov S, Martonosi M, Rowland J, Varshavsky A (2011) Identifying important places in people\u2019s lives from cellular network data. In: Proc. of 9th international conference on pervasive computing, pp 133\u2013 151","DOI":"10.1007\/978-3-642-21726-5_9"},{"issue":"1","key":"648_CR13","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall M, Frank E, Holmes G, Pfahringer B, Reutemann R, Witten I H (2009) The WEKA data mining software: an update. SIGKDD Explor Newsl 11(1):10\u201318","journal-title":"SIGKDD Explor Newsl"},{"issue":"3","key":"648_CR14","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273\u2013297","journal-title":"Mach Learn"},{"issue":"1","key":"648_CR15","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u2013 32","journal-title":"Mach Learn"},{"key":"648_CR16","first-page":"1157","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon I, Elisseeff A (2003) An introduction to variable and feature selection. J Mach Learn Res 3:1157\u20131182","journal-title":"J Mach Learn Res"},{"key":"648_CR17","unstructured":"Mohri M, Rostamizadeh A, Talwalkar A (2012) Foundations of machine learning. The MIT Press"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-015-0648-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-015-0648-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-015-0648-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T23:17:50Z","timestamp":1559344670000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-015-0648-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["648"],"URL":"https:\/\/doi.org\/10.1007\/s11036-015-0648-6","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,12]]}}}