{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:27:58Z","timestamp":1729621678561,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/dyspan.2014.6817782","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:27:41Z","timestamp":1401474461000},"page":"82-91","source":"Crossref","is-referenced-by-count":9,"title":["Learning probabilistic models of cellular network traffic with applications to resource management"],"prefix":"10.1109","author":[{"given":"Utpal","family":"Paul","sequence":"first","affiliation":[]},{"given":"Luis","family":"Ortiz","sequence":"additional","affiliation":[]},{"given":"Samir R.","family":"Das","sequence":"additional","affiliation":[]},{"given":"Giordano","family":"Fusco","sequence":"additional","affiliation":[]},{"given":"Milind Madhav","family":"Buddhikot","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1155\/JBB.2005.147"},{"key":"35","article-title":"Tracking curved regularized optimization solution paths","author":"rosset","year":"2004","journal-title":"NIPS"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1093\/biostatistics\/kxm045"},{"key":"36","doi-asserted-by":"crossref","DOI":"10.1201\/9780203492024","volume":"104","author":"rue","year":"2005","journal-title":"Gaussian Markov Random Fields Theory and Applications"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2011.5936255"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307649"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1145\/347059.347555","article-title":"Trajectory sampling for direct traffic observation","author":"duffield","year":"2000","journal-title":"Proc SIGCOMM"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879159"},{"key":"16","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1145\/859716.859719","volume":"21","author":"estan","year":"2003","journal-title":"ACM Transactions on Computer Systems"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0258(19970228)16:4<385::AID-SIM380>3.0.CO;2-3"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505232"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.846400"},{"key":"37","article-title":"Lassopatternsearch algorithm with application to ophthalmology and genomic data","author":"shi","year":"2008","journal-title":"Statistics and Its Interface"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012088469-8\/50053-X"},{"key":"38","article-title":"Regression shrinkage and selection via the lasso","volume":"58","author":"tibshirani","year":"1996","journal-title":"Journal of the Royal Statistical Society"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1214\/088342304000000206"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.1997.617318"},{"key":"20","article-title":"Network functions virtualisation: An introduction, benefits, enablers, challenges and call for action: Introductory white paper","author":"guerzoni","year":"2012","journal-title":"SDN and OpenFlow World Congress"},{"key":"43","article-title":"Sampling and filtering techniques for ip packet selection","author":"zseby","year":"0","journal-title":"RFC5475"},{"key":"42","doi-asserted-by":"crossref","DOI":"10.21236\/ADA473146","author":"zhao","year":"2004","journal-title":"Boosted LASSO"},{"key":"41","article-title":"The evaluation of poisson packet sampling measurement techniques","author":"zhang","year":"2004","journal-title":"Proc APCC"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2008.48"},{"key":"22","article-title":"The elements of statistical learning: Data mining","author":"hastie","year":"2009","journal-title":"Inference and Prediction"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948235"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934875"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860034"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330119"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1214\/009053606000000281"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.2307\/1390657"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2012.6478157"},{"journal-title":"Jarque-Bera Test","year":"0","key":"3"},{"volume":"2014","journal-title":"Cisco Visual Networking Index Global Mobile Data Traffic Forecast Update","year":"2009","key":"2"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-98135-2","author":"clarke","year":"2009","journal-title":"Principles and Theory for Data Mining and Machine Learning"},{"journal-title":"Cisco Netflow","year":"0","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935313"},{"journal-title":"Pattern Recognition and Machine Learning (Information Science and Statistics","year":"2006","author":"bishop","key":"7"},{"journal-title":"The Lasso","year":"0","key":"6"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/90.649563"},{"journal-title":"Multivariate Normal Gaussian","year":"0","key":"5"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2012.6193499"},{"journal-title":"Likelihood Function","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-006-9023-z"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/511365.511376"}],"event":{"name":"2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)","start":{"date-parts":[[2014,4,1]]},"location":"McLean, VA, USA","end":{"date-parts":[[2014,4,4]]}},"container-title":["2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6811233\/6817768\/06817782.pdf?arnumber=6817782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,11]],"date-time":"2019-08-11T04:39:06Z","timestamp":1565498346000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6817782\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/dyspan.2014.6817782","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}