{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T13:14:26Z","timestamp":1773926066884,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/icc.2013.6654913","type":"proceedings-article","created":{"date-parts":[[2013,11,11]],"date-time":"2013-11-11T22:22:26Z","timestamp":1384208546000},"page":"2524-2528","source":"Crossref","is-referenced-by-count":15,"title":["Holt-Winters statistical forecasting and ACO metaheuristic for traffic characterization"],"prefix":"10.1109","author":[{"given":"Marcos V. O.","family":"de Assis","sequence":"first","affiliation":[]},{"given":"Luiz F.","family":"Carvalho","sequence":"additional","affiliation":[]},{"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[]},{"given":"Mario Lemes","family":"Proenca","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/0377-0427(87)90125-7","article-title":"Silhouettes: A graphical aid to the interpretation andvalidation of cluster analysis","volume":"20","author":"rousseeuw","year":"1987","journal-title":"Journal of Computational and AppliedMathematics"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/0305-0483(86)90013-7"},{"key":"11","first-page":"1","article-title":"Empirical studies on application of genetic algorithms and ant colonyoptimization for data clustering","author":"colanzi","year":"2010","journal-title":"Chilean Computer Science Society(SCCC) XXIX International Conference of the"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637210"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502463"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2009.5188884"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5198721"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2004.10.004"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963476"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028813"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1352664.1352675"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199196"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2006.329691"},{"key":"8","first-page":"139","article-title":"Aberrant behavior detection in time series for network monitoring","author":"brutlag","year":"2000","journal-title":"Proceedings of 2000 LISA XIV Systems Administration Conference"}],"event":{"name":"ICC 2013 - 2013 IEEE International Conference on Communications","location":"Budapest, Hungary","start":{"date-parts":[[2013,6,9]]},"end":{"date-parts":[[2013,6,13]]}},"container-title":["2013 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6637584\/6654691\/06654913.pdf?arnumber=6654913","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:46:15Z","timestamp":1498095975000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6654913\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icc.2013.6654913","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}