{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:35:23Z","timestamp":1774161323657,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T00:00:00Z","timestamp":1618963200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T00:00:00Z","timestamp":1618963200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100008725","name":"Agencia Nacional de Investigaci\u00f3n e Innovaci\u00f3n","doi-asserted-by":"publisher","award":["FMV 3 2018 1 148149"],"award-info":[{"award-number":["FMV 3 2018 1 148149"]}],"id":[{"id":"10.13039\/100008725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s11277-021-08535-8","type":"journal-article","created":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T20:03:34Z","timestamp":1619035414000},"page":"1791-1819","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Large-Scale 802.11 Wireless Networks Data Analysis Based on Graph Clustering"],"prefix":"10.1007","volume":"120","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3975-2168","authenticated-orcid":false,"given":"Germ\u00e1n","family":"Capdehourat","sequence":"first","affiliation":[]},{"given":"Paola","family":"Bermolen","sequence":"additional","affiliation":[]},{"given":"Marcelo","family":"Fiori","sequence":"additional","affiliation":[]},{"given":"Nicol\u00e1s","family":"Frevenza","sequence":"additional","affiliation":[]},{"given":"Federico","family":"Larroca","sequence":"additional","affiliation":[]},{"given":"Gast\u00f3n","family":"Morales","sequence":"additional","affiliation":[]},{"given":"Claudina","family":"Rattaro","sequence":"additional","affiliation":[]},{"given":"Gianina","family":"Zunino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,21]]},"reference":[{"key":"8535_CR1","unstructured":"Sherlock, I., et al. (2020). Wi-Fi Alliance 2019 Annual Report (Published)"},{"key":"8535_CR2","unstructured":"JP Vasseur: AI for Networking: Separating the Hype from Reality. Cisco Blogs, Networking (2020). https:\/\/blogs.cisco.com\/networking\/ai-for-networking-separating-the-hype-from-reality. Accessed from 8 Mar 2021."},{"issue":"6","key":"8535_CR3","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MCOM.001.1900664","volume":"58","author":"U Challita","year":"2020","unstructured":"Challita, U., Ryden, H., & Tullberg, H. (2020). When Machine Learning Meets Wireless Cellular Networks: Deployment, Challenges, and Applications. IEEE Communications Magazine, 58(6), 12\u201318.","journal-title":"IEEE Communications Magazine"},{"issue":"10","key":"8535_CR4","doi-asserted-by":"publisher","first-page":"7331","DOI":"10.1109\/TCOMM.2019.2924010","volume":"67","author":"A Zappone","year":"2019","unstructured":"Zappone, A., Di Renzo, M., & Debbah, M. (2019). Wireless networks design in the Era of deep learning: Model-based, AI-based, or both? IEEE Transactions on Communications, 67(10), 7331\u20137376.","journal-title":"IEEE Transactions on Communications"},{"issue":"3","key":"8535_CR5","doi-asserted-by":"publisher","first-page":"2224","DOI":"10.1109\/COMST.2019.2904897","volume":"21","author":"C Zhang","year":"2019","unstructured":"Zhang, C., Patras, P., & Haddadi, H. (2019). Deep learning in mobile and wireless networking: A survey. IEEE Communications Surveys Tutorials, 21(3), 2224\u20132287.","journal-title":"IEEE Communications Surveys Tutorials"},{"key":"8535_CR6","unstructured":"Capdehourat, G., Larroca, F., & Morales, G. (2020). A nation-wide Wi-Fi RSSI dataset: Statistical analysis and resulting insights. In: 2020 IFIP Networking Conference, Networking 2020, Paris, France, June 22\u201326, 2020, IEEE 370\u2013378."},{"key":"8535_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-88146-1","volume-title":"Statistical analysis of network data: Methods and models","author":"ED Kolaczyk","year":"2009","unstructured":"Kolaczyk, E. D. (2009). Statistical analysis of network data: Methods and models (1st ed.). Berlin: Incorporated: Springer Publishing Company.","edition":"1"},{"issue":"7","key":"8535_CR8","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1109\/JSAC.2009.090902","volume":"27","author":"M Haenggi","year":"2009","unstructured":"Haenggi, M., Andrews, J. G., Baccelli, F., Dousse, O., & Franceschetti, M. (2009). Stochastic geometry and random graphs for the analysis and design of wireless networks. IEEE Journal on Selected Areas in Communications, 27(7), 1029\u20131046.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1\u20132","key":"8535_CR9","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/s11036-008-0026-8","volume":"13","author":"K Ramachandran","year":"2008","unstructured":"Ramachandran, K., Sheriff, I., Belding, E. M., & Almeroth, K. C. (2008). A multi-radio 802.11 mesh network architecture. Mobile Networks and Applications, 13(1\u20132), 132\u2013146.","journal-title":"Mobile Networks and Applications"},{"issue":"5","key":"8535_CR10","doi-asserted-by":"publisher","first-page":"966","DOI":"10.1016\/j.adhoc.2010.11.007","volume":"9","author":"B Jarupan","year":"2011","unstructured":"Jarupan, B., & Ekici, E. (2011). A survey of cross-layer design for VANETs. Ad Hoc Networks, 9(5), 966\u2013983.","journal-title":"Ad Hoc Networks"},{"issue":"3","key":"8535_CR11","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/98.511762","volume":"3","author":"I Katzela","year":"1996","unstructured":"Katzela, I., & Naghshineh, M. (1996). Channel assignment schemes for cellular mobile telecommunication systems: A comprehensive survey. IEEE Personal Communications, 3(3), 10\u201331.","journal-title":"IEEE Personal Communications"},{"key":"8535_CR12","doi-asserted-by":"crossref","unstructured":"de\u00a0Oliveira, C.T., Theoleyre, F., & Duda, A. (2012). Channel assignment strategies for optimal network capacity of IEEE 802.11s. In: Proceedings of the 9th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, Paphos, Cyprus p. 53-60.","DOI":"10.1145\/2387027.2387037"},{"issue":"2","key":"8535_CR13","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.comnet.2009.05.015","volume":"54","author":"MK Marina","year":"2010","unstructured":"Marina, M. K., Das, S. R., & Subramanian, A. P. (2010). A topology control approach for utilizing multiple channels in multi-radio wireless mesh networks. Computer Networks, 54(2), 241\u2013256.","journal-title":"Computer Networks"},{"key":"8535_CR14","doi-asserted-by":"crossref","unstructured":"Ramachandran, K.N., Belding, E.M., Almeroth, K.C., & Buddhikot, M.M. (2006). Interference-aware channel assignment in multi-radio wireless mesh networks. In: Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, pp. 1\u201312","DOI":"10.1109\/INFOCOM.2006.177"},{"key":"8535_CR15","doi-asserted-by":"crossref","unstructured":"Plummer, A., Wu, T., & Biswas, S. (2007). A cognitive spectrum assignment protocol using distributed conflict graph construction. In: MILCOM 2007 - IEEE Military Communications Conference, pp. 1\u20137.","DOI":"10.1109\/MILCOM.2007.4455299"},{"key":"8535_CR16","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1007\/s11276-015-1002-4","volume":"22","author":"S Kala","year":"2016","unstructured":"Kala, S., Reddy, M., Musham, R., & Tamma, B. (2016). Interference mitigation in wireless mesh networks through radio co-location aware conflict graphs. Wireless Networks, 22, 679\u2013702.","journal-title":"Wireless Networks"},{"key":"8535_CR17","doi-asserted-by":"crossref","unstructured":"Cui, Y., Li, W., & Cheng, X. (2011). Partially overlapping channel assignment based on \u201cnode orthogonality\u201d for 802.11 wireless networks. In: 2011 Proceedings IEEE INFOCOM, pp. 361\u2013365.","DOI":"10.1109\/INFCOM.2011.5935182"},{"issue":"1","key":"8535_CR18","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.adhoc.2011.06.001","volume":"10","author":"SH Kim","year":"2012","unstructured":"Kim, S. H., Kim, D. W., & Suh, Y. J. (2012). A group-based channel assignment protocol for rate separation in IEEE 802.11-based multi-radio multi-rate ad hoc networks. Ad Hoc Networks, 10(1), 95\u2013110.","journal-title":"Ad Hoc Networks"},{"key":"8535_CR19","unstructured":"Jeunen, O., Bosch, P., Herwegen, M.V., Doorselaer, K.V., Godman, N., & Latr\u00e9, S. (2018). A machine learning approach for IEEE 802.11 channel allocation. In: 14th International Conference on Network and Service Management (CNSM), pp. 28\u201336."},{"key":"8535_CR20","doi-asserted-by":"publisher","first-page":"31823","DOI":"10.1109\/ACCESS.2020.2973140","volume":"8","author":"K Nakashima","year":"2020","unstructured":"Nakashima, K., Kamiya, S., Ohtsu, K., Yamamoto, K., Nishio, T., & Morikura, M. (2020). Deep reinforcement learning-based channel allocation for wireless lans with graph convolutional networks. IEEE Access, 8, 31823\u201331834.","journal-title":"IEEE Access"},{"key":"8535_CR21","doi-asserted-by":"crossref","unstructured":"Zeng, K., Lou, W., & Zhai, H. (2008). On end-to-end throughput of opportunistic routing in multirate and multihop wireless networks. In: IEEE INFOCOM 2008 - The 27th Conference on Computer Communications, pp. 816\u2013824.","DOI":"10.1109\/INFOCOM.2008.133"},{"key":"8535_CR22","doi-asserted-by":"crossref","unstructured":"Cerd\u00e0-Alabern, L., Neumann, A., & Maccari, L. (2015). Experimental evaluation of bmx6 routing metrics in a 802.11an wireless-community mesh network. In: 2015 3rd International Conference on Future Internet of Things and Cloud, pp. 770\u2013775.","DOI":"10.1109\/FiCloud.2015.28"},{"issue":"2","key":"8535_CR23","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1109\/TVT.2007.891422","volume":"56","author":"K Wang","year":"2007","unstructured":"Wang, K., Yang, F., Zhang, Q., Wu, D. O., & Xu, Y. (2007). Distributed cooperative rate adaptation for energy efficiency in IEEE 802.11-based multihop networks. IEEE Transactions on Vehicular Technology, 56(2), 888\u2013898.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"8","key":"8535_CR24","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1109\/TMC.2008.176","volume":"8","author":"A Chan","year":"2009","unstructured":"Chan, A., & Liew, S. C. (2009). Performance of VoIP over Multiple Co-Located IEEE 802.11 Wireless LANs. IEEE Transactions on Mobile Computing, 8(8), 1063\u20131076.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"8535_CR25","doi-asserted-by":"crossref","unstructured":"Amer, M., Busson, A., & Lassous, I.G. (2018). Association optimization in wi-fi networks based on the channel busy time estimation. In: 2018 IFIP Networking Conference (IFIP Networking) and Workshops, pp. 298\u2013306.","DOI":"10.23919\/IFIPNetworking.2018.8696897"},{"key":"8535_CR26","doi-asserted-by":"crossref","unstructured":"Cheng, X., Mohapatra, P., Lee, S., & Banerjee, S. (2008). MARIA: Interference-aware admission control and QoS routing in wireless mesh networks. In: 2008 IEEE International Conference on Communications, pp. 2865\u20132870.","DOI":"10.1109\/ICC.2008.540"},{"issue":"4","key":"8535_CR27","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.adhoc.2006.01.003","volume":"5","author":"R Gupta","year":"2007","unstructured":"Gupta, R., Musacchio, J., & Walrand, J. (2007). Sufficient rate constraints for qos flows in ad-hoc networks. Ad Hoc Networks, 5(4), 429\u2013443.","journal-title":"Ad Hoc Networks"},{"issue":"14","key":"8535_CR28","doi-asserted-by":"publisher","first-page":"3510","DOI":"10.1016\/j.comcom.2008.06.016","volume":"31","author":"Y Lin","year":"2008","unstructured":"Lin, Y., & Wong, V. W. (2008). An admission control algorithm for multi-hop 802.11e-based wlans. Computer Communications, 31(14), 3510\u20133520.","journal-title":"Computer Communications"},{"issue":"2","key":"8535_CR29","first-page":"1284","volume":"2004","author":"Fang Zuyuan","year":"2004","unstructured":"Zuyuan, Fang, & Bensaou, B. (2004). Fair bandwidth sharing algorithms based on game theory frameworks for wireless ad-hoc networks. IEEE INFOCOM, 2004(2), 1284\u20131295.","journal-title":"IEEE INFOCOM"},{"key":"8535_CR30","doi-asserted-by":"crossref","unstructured":"Niculescu, D. (2007). Interference map for 802.11 networks. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, IMC\u201907, p. 339-350. Association for Computing Machinery, New York, NY, USA.","DOI":"10.1145\/1298306.1298355"},{"key":"8535_CR31","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Li, H., Wan, P., & Wang, X. (2010). Capacity region of a wireless mesh backhaul network over the csma\/ca mac. In: 2010 Proceedings IEEE INFOCOM, pp. 1\u20135.","DOI":"10.1109\/INFCOM.2010.5462273"},{"key":"8535_CR32","doi-asserted-by":"crossref","unstructured":"Margolis, A., Vijayakumar, R., & Roy, S. (2007). Modelling throughput and starvation in 802.11 wireless networks with multiple flows. In: IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference, pp. 5123\u20135127","DOI":"10.1109\/GLOCOM.2007.971"},{"key":"8535_CR33","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.peva.2018.11.002","volume":"130","author":"M Stojanova","year":"2019","unstructured":"Stojanova, M., Begin, T., & Busson, A. (2019). Conflict graph-based model for IEEE 802.11 networks: A divide-and-conquer approach. Performance Evaluation, 130, 64\u201385.","journal-title":"Performance Evaluation"},{"issue":"3","key":"8535_CR34","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1109\/TNET.2009.2031971","volume":"18","author":"I Broustis","year":"2010","unstructured":"Broustis, I., Papagiannaki, K., Krishnamurthy, S. V., Faloutsos, M., & Mhatre, V. P. (2010). Measurement-driven guidelines for 802.11 wlan design. IEEE\/ACM Transactions on Networking, 18(3), 722\u2013735.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"3","key":"8535_CR35","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1109\/TNET.2014.2306416","volume":"23","author":"X Zhou","year":"2015","unstructured":"Zhou, X., Zhang, Z., Wang, G., Yu, X., Zhao, B. Y., & Zheng, H. (2015). Practical conflict graphs in the wild. IEEE\/ACM Transactions on Networking, 23(3), 824\u2013835.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"8535_CR36","unstructured":"Cisco: Radio Resource Management White Paper. (2016). https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/wireless\/controller\/technotes\/8-3\/b_RRM_White_Paper.html Accessed from 8 Mar 2021"},{"key":"8535_CR37","doi-asserted-by":"crossref","unstructured":"Li, W., Zhang, J., & Zhao, Y. (2017). Conflict graph embedding for wireless network optimization. In: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, pp. 1\u20139.","DOI":"10.1109\/INFOCOM.2017.8057226"},{"key":"8535_CR38","unstructured":"Plan Ceibal: About Plan Ceibal. https:\/\/www.ceibal.edu.uy\/en\/institucional (2018). Accessed from 8 Mar 2021."},{"issue":"03","key":"8535_CR39","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1142\/S0218001404003228","volume":"18","author":"D Conte","year":"2004","unstructured":"Conte, D., Foggia, P., Sansone, C., & Vento, M. (2004). Thirty years of graph matching in pattern recognition. International Journal of Pattern Recognition and Artificial Intelligence, 18(03), 265\u2013298.","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"8535_CR40","first-page":"1","volume":"1","author":"N Shervashidze","year":"2010","unstructured":"Shervashidze, N., Schweitzer, P., Jan, E., Leeuwen, V., Mehlhorn, K., & Borgwardt, K. (2010). Weisfeiler-lehman graph kernels. Journal of Machine Learning Research, 1, 1\u201348.","journal-title":"Journal of Machine Learning Research"},{"key":"8535_CR41","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001","volume-title":"Networks: An introduction","author":"MEJ Newman","year":"2010","unstructured":"Newman, M. E. J. (2010). Networks: An introduction. Oxford: Oxford University Press."},{"key":"8535_CR42","doi-asserted-by":"crossref","unstructured":"Hagberg, A.A., Schult, D.A., & Swart, P.J. (2008). Exploring network structure, dynamics, and function using networkx. In: G.\u00a0Varoquaux, T.\u00a0Vaught, J.\u00a0Millman (eds.) Proceedings of the 7th Python in Science Conference, Pasadena, CA USA, pp. 11 \u2013 15","DOI":"10.25080\/TCWV9851"},{"key":"8535_CR43","doi-asserted-by":"crossref","unstructured":"Afaqui, M.S., Garcia-Villegas, E., Lopez-Aguilera, E., Smith, G., & Camps, D. (2015). Evaluation of dynamic sensitivity control algorithm for IEEE 802.11ax. In: 2015 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1060\u20131065.","DOI":"10.1109\/WCNC.2015.7127616"},{"key":"8535_CR44","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/BF01994876","volume":"32","author":"R Boppana","year":"1992","unstructured":"Boppana, R., & Halld\u00f3rsson, M. (1992). Approximating maximum independent sets by excluding subgraphs. BIT Numerical Mathematics, 32, 180\u2013196.","journal-title":"BIT Numerical Mathematics"},{"key":"8535_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1090\/conm\/352\/06369","volume":"352","author":"A Kosowski","year":"2004","unstructured":"Kosowski, A., & Manuszewski, K. (2004). Classical coloring of graphs \u201cGraph colorings.\u201d Contemporary Mathematics, 352, 1\u201319.","journal-title":"Contemporary Mathematics"},{"key":"8535_CR46","first-page":"1094","volume-title":"Principal component analysis","author":"I Jolliffe","year":"2011","unstructured":"Jolliffe, I. (2011). Principal component analysis (pp. 1094\u20131096). Berlin: Springer."},{"key":"8535_CR47","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., et al. (2011). Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12, 2825\u20132830.","journal-title":"Journal of Machine Learning Research"},{"issue":"1","key":"8535_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0210236","volume":"14","author":"MZ Rodriguez","year":"2019","unstructured":"Rodriguez, M. Z., Comin, C. H., Casanova, D., Bruno, O. M., Amancio, D. R., Costa, Ld. F., & Rodrigues, F. A. (2019). Clustering algorithms: A comparative approach. PLOS One, 14(1), 1\u201334.","journal-title":"PLOS One"},{"key":"8535_CR49","volume-title":"Modern algorithms of cluster analysis, Studies in Big Data","author":"ST Wierzcho\u0144","year":"2018","unstructured":"Wierzcho\u0144, S. T., & Klopotek, M. A. (2018). Modern algorithms of cluster analysis, Studies in Big Data. Cham: Springer."},{"issue":"2","key":"8535_CR50","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1214\/aos\/1031833664","volume":"25","author":"JA Cuesta-Albertos","year":"1997","unstructured":"Cuesta-Albertos, J. A., Gordaliza, A., & Matr\u00e1n, C. (1997). Trimmed $$k$$-means: An attempt to robustify quantizers. Annals of Statistics, 25(2), 553\u2013576.","journal-title":"Annals of Statistics"},{"key":"8535_CR51","unstructured":"Gonzalez, J.D., Yohai, V.J., & Zamar, R.H. (2019). Robust clustering using tau-scales."},{"key":"8535_CR52","unstructured":"R Core Team: R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria (2013). http:\/\/www.R-project.org\/. Accessed from 8 Mar 2021."},{"issue":"4","key":"8535_CR53","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/BF02289263","volume":"18","author":"RL Thorndike","year":"1953","unstructured":"Thorndike, R. L. (1953). Who belongs in the family. Psychometrika, 18(4), 267\u2013276.","journal-title":"Psychometrika"},{"key":"8535_CR54","doi-asserted-by":"crossref","unstructured":"Satopaa, V., Albrecht, J., Irwin, D., Raghavan, B. (2011). Finding a \u201ckneedle\u201d in a haystack: Detecting knee points in system behavior. In: 2011 31st International Conference on Distributed Computing Systems Workshops, pp. 166\u2013171.","DOI":"10.1109\/ICDCSW.2011.20"},{"key":"8535_CR55","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/0377-0427(87)90125-7","volume":"20","author":"PJ Rousseeuw","year":"1987","unstructured":"Rousseeuw, P. J. (1987). Silhouettes: A graphical aid to the interpretation and validation of cluster analysis. Journal of Computational and Applied Mathematics, 20, 53\u201365.","journal-title":"Journal of Computational and Applied Mathematics"},{"issue":"2","key":"8535_CR56","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1111\/1467-9868.00293","volume":"63","author":"R Tibshirani","year":"2001","unstructured":"Tibshirani, R., Walther, G., & Hastie, T. (2001). Estimating the number of clusters in a data set via the gap statistic. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 63(2), 411\u2013423.","journal-title":"Journal of the Royal Statistical Society: Series B (Statistical Methodology)"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08535-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08535-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08535-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T02:53:13Z","timestamp":1744167193000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08535-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,21]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["8535"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08535-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,21]]},"assertion":[{"value":"13 April 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 April 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"All the work done in this article is based on open source libraries as detailed in the manuscript. The code developed for the data analysis will be made public as soon as the data can be published.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}