{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:25:57Z","timestamp":1740173157061,"version":"3.37.3"},"reference-count":28,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/jiot.2018.2860681","type":"journal-article","created":{"date-parts":[[2018,7,27]],"date-time":"2018-07-27T15:04:32Z","timestamp":1532703872000},"page":"4342-4350","source":"Crossref","is-referenced-by-count":6,"title":["An Unsupervised and Noninvasive Model for Predicting Network Resource Demands"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9818-0999","authenticated-orcid":false,"given":"Fulvio","family":"Corno","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7647-6652","authenticated-orcid":false,"given":"Luigi","family":"De Russis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1441-5798","authenticated-orcid":false,"given":"Andrea","family":"Marcelli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1750-8268","authenticated-orcid":false,"given":"Teodoro","family":"Montanaro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/2638728.2641309"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-642-37456-2_14"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/BF01908075"},{"year":"2014","author":"karlin","journal-title":"A First Course in Stochastic Processes","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.21105\/joss.00205"},{"key":"ref15","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/331499.331504"},{"key":"ref17","first-page":"410","article-title":"V-measure: A conditional entropy-based external cluster evaluation measure","volume":"7","author":"rosenberg","year":"2007","journal-title":"Proc EMNLP"},{"key":"ref18","article-title":"Detecting meaningful places and predicting locations using varied k-means and hidden Markov model","author":"pant","year":"2017","journal-title":"Proc 17th SIAM Int Conf Data Min (SDM) 3rd Int Workshop Mach Learn Methods Recommender Syst"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ISWC.2002.1167224"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1007\/978-3-642-21726-5_9"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/FMEC.2017.7946403"},{"key":"ref27","first-page":"1","article-title":"Lightweight clustering of cell IDS into meaningful neighbourhoods","author":"marios","year":"2013","journal-title":"Proc 7th Int IFIP Working Conf Perform Security Model Eval Cooperative Heterogeneous Netw (HET-NETs)"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1017\/9781316771655.005"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/JIOT.2017.2688925"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/JIOT.2017.2709814"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/JIOT.2017.2714189"},{"key":"ref7","first-page":"1","article-title":"Identifying meaningful locations","author":"nurmi","year":"2006","journal-title":"Proc 3rd Annu Int Conf Mobile Ubiquitous Syst"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/2342509.2342513"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/MNET.2017.1500295NM"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/JIOT.2017.2701408"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/s00779-003-0240-0"},{"key":"ref22","first-page":"1","article-title":"An energy efficient user context collection method for smartphones","author":"han","year":"2013","journal-title":"Proc 15th Asia&#x2013;Pacific Netw Oper Manage Symp (APNOMS)"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2676552.2676557"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/MC.2011.349"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/978-3-642-21219-2_58"},{"key":"ref26","first-page":"276","article-title":"Discovering people&#x2019;s life patterns from anonymized WiFi scanlists","author":"zhao","year":"2014","journal-title":"Proc IEEE 11th Int Conf Ubiquitous Intell Comput \/IEEE 11th Int Conf Auton Trusted Comput \/IEEE 14th Int Conf Scalable Comput Commun Assoc Workshops"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/2677972.2677997"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8614370\/08421577.pdf?arnumber=8421577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:50:37Z","timestamp":1641988237000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8421577\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":28,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2018.2860681","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2018,12]]}}}