{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T04:04:21Z","timestamp":1774152261919,"version":"3.50.1"},"reference-count":205,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T00:00:00Z","timestamp":1568332800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006469","name":"Macao Science and Technology Development Fund","doi-asserted-by":"crossref","award":["0026\/2018\/A1"],"award-info":[{"award-number":["0026\/2018\/A1"]}],"id":[{"id":"10.13039\/501100006469","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2020,9,30]]},"abstract":"<jats:p>The wide proliferation of various wireless communication systems and wireless devices has led to the arrival of big data era in large-scale wireless networks. Big data of large-scale wireless networks has the key features of wide variety, high volume, real-time velocity, and huge value leading to the unique research challenges that are different from existing computing systems. In this article, we present a survey of the state-of-art big data analytics (BDA) approaches for large-scale wireless networks. In particular, we categorize the life cycle of BDA into four consecutive stages: Data Acquisition, Data Preprocessing, Data Storage, and Data Analytics. We then present a detailed survey of the technical solutions to the challenges in BDA for large-scale wireless networks according to each stage in the life cycle of BDA. Moreover, we discuss the open research issues and outline the future directions in this promising area.<\/jats:p>","DOI":"10.1145\/3337065","type":"journal-article","created":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T12:28:56Z","timestamp":1568377736000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":112,"title":["Big Data Analytics for Large-scale Wireless Networks"],"prefix":"10.1145","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6165-4196","authenticated-orcid":false,"given":"Hong-Ning","family":"Dai","sequence":"first","affiliation":[{"name":"Macau University of Science and Technology, Avenida Wai Long, Taipa, Macau"}]},{"given":"Raymond Chi-Wing","family":"Wong","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology (HKUST), Clear Water Bay, Kowloon, Hong Kong"}]},{"given":"Hao","family":"Wang","sequence":"additional","affiliation":[{"name":"Norwegian University of Science and Technology, Norway"}]},{"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, P. R. China"}]},{"given":"Athanasios V.","family":"Vasilakos","sequence":"additional","affiliation":[{"name":"Lulea University of Technology, Lulea, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2019,9,13]]},"reference":[{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/wics.101"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2665663"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-017-0110-7"},{"key":"e_1_2_1_5_1","volume-title":"Data Streams: Models and Algorithms (Advances in Database Systems)","author":"Aggarwal Charu C.","year":"2006","unstructured":"Charu C. Aggarwal . 2006 . Data Streams: Models and Algorithms (Advances in Database Systems) . Springer , Secaucus, NJ . Charu C. Aggarwal. 2006. Data Streams: Models and Algorithms (Advances in Database Systems). Springer, Secaucus, NJ."},{"key":"e_1_2_1_6_1","volume-title":"Aggarwal and Tarek Abdelzaher","author":"Charu","year":"2011","unstructured":"Charu C. Aggarwal and Tarek Abdelzaher . 2011 . Integrating Sensors and Social Networks. Springer . Charu C. Aggarwal and Tarek Abdelzaher. 2011. Integrating Sensors and Social Networks. Springer."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.04.006"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.02.004"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the International Conference on Computing, Networking and Communications (ICNC\u201918)","author":"Alem\u00e1n C. S.","unstructured":"C. S. Alem\u00e1n , N. Pissinou , S. Alemany , K. Boroojeni , J. Miller , and Z. Ding . 2018. Context-aware data cleaning for mobile wireless sensor networks: A diversified trust approach . In Proceedings of the International Conference on Computing, Networking and Communications (ICNC\u201918) . IEEE, 226--230. C. S. Alem\u00e1n, N. Pissinou, S. Alemany, K. Boroojeni, J. Miller, and Z. Ding. 2018. Context-aware data cleaning for mobile wireless sensor networks: A diversified trust approach. In Proceedings of the International Conference on Computing, Networking and Communications (ICNC\u201918). IEEE, 226--230."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600737"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320099"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14778\/2733085.2733096"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755937"},{"key":"e_1_2_1_14_1","volume-title":"CouchDB: The Definitive Guide Time to Relax","author":"Anderson J. Chris","unstructured":"J. Chris Anderson , Jan Lehnardt , and Noah Slater . 2010. CouchDB: The Definitive Guide Time to Relax ( 1 st ed.). O\u2019Reilly Media, Inc. J. Chris Anderson, Jan Lehnardt, and Noah Slater. 2010. CouchDB: The Definitive Guide Time to Relax (1st ed.). O\u2019Reilly Media, Inc.","edition":"1"},{"key":"e_1_2_1_15_1","unstructured":"Apache. 2014. Hadoop mapreduce. Retrieved from https:\/\/hadoop.apache.org\/.  Apache. 2014. Hadoop mapreduce. Retrieved from https:\/\/hadoop.apache.org\/."},{"key":"e_1_2_1_16_1","unstructured":"Apache. 2016. Apache HBase. Retrieved from https:\/\/hbase.apache.org\/.  Apache. 2016. Apache HBase. Retrieved from https:\/\/hbase.apache.org\/."},{"key":"e_1_2_1_17_1","volume-title":"Arpaci-Dusseau","author":"Arpaci-Dusseau Remzi H.","year":"2015","unstructured":"Remzi H. Arpaci-Dusseau and Andrea C . Arpaci-Dusseau . 2015 . Operating Systems : Three Easy Pieces (0.91 ed.). Arpaci-Dusseau Books . Remzi H. Arpaci-Dusseau and Andrea C. Arpaci-Dusseau. 2015. Operating Systems: Three Easy Pieces (0.91 ed.). Arpaci-Dusseau Books."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.06.021"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3124104.3124108"},{"key":"e_1_2_1_20_1","volume-title":"Forster","author":"Bandyopadhyay Prasanta S.","year":"2011","unstructured":"Prasanta S. Bandyopadhyay and Malcolm R . Forster . 2011 . Philosophy of Statistics. Elsevier . Prasanta S. Bandyopadhyay and Malcolm R. Forster. 2011. Philosophy of Statistics. Elsevier."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807148"},{"key":"e_1_2_1_22_1","volume-title":"Applications and Techniques in Information Security","author":"Bazai Sibghat Ullah","unstructured":"Sibghat Ullah Bazai , Julian Jang-Jaccard , and Xuyun Zhang . 2017. A privacy preserving platform for mapreduce . In Applications and Techniques in Information Security . Springer , Singapore , 88--99. Sibghat Ullah Bazai, Julian Jang-Jaccard, and Xuyun Zhang. 2017. A privacy preserving platform for mapreduce. In Applications and Techniques in Information Security. Springer, Singapore, 88--99."},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201910)","author":"Beaver Doug","year":"2010","unstructured":"Doug Beaver , Sanjeev Kumar , Harry C. Li , Jason Sobel , and Peter Vajgel . 2010 . Finding a needle in haystack: Facebook\u2019s photo storage . In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201910) . USENIX Associatation. Doug Beaver, Sanjeev Kumar, Harry C. Li, Jason Sobel, and Peter Vajgel. 2010. Finding a needle in haystack: Facebook\u2019s photo storage. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201910). USENIX Associatation."},{"key":"e_1_2_1_24_1","volume-title":"Time series data analysis of wireless sensor network measurements of temperature. Sensors 17, 6","author":"Bhandari Siddhartha","year":"2017","unstructured":"Siddhartha Bhandari , Neil Bergmann , Raja Jurdak , and Branislav Kusy . 2017. Time series data analysis of wireless sensor network measurements of temperature. Sensors 17, 6 ( 2017 ). Siddhartha Bhandari, Neil Bergmann, Raja Jurdak, and Branislav Kusy. 2017. Time series data analysis of wireless sensor network measurements of temperature. Sensors 17, 6 (2017)."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348561"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081084"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7295483"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2015.02.001"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2991315.2991382"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920881"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3398"},{"key":"e_1_2_1_33_1","volume-title":"Amazon SimpleDB Developer Guide","author":"Chaganti Prabhakar","unstructured":"Prabhakar Chaganti and Rich Helms . 2010. Amazon SimpleDB Developer Guide ( 1 st ed.). Packt Publishing . Prabhakar Chaganti and Rich Helms. 2010. Amazon SimpleDB Developer Guide (1st ed.). Packt Publishing.","edition":"1"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454166"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1365815.1365816"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2355255"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2326169"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2456027"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-013-0489-0"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2014.2350451"},{"key":"e_1_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Zhuangbin Chen Anfeng Liu Zhetao Li Young-June Choi Hiroo Sekiya and Jie Li. 2017. Energy-efficient broadcasting scheme for smart industrial wireless sensor networks. Mobile Info. Syst. (2017) 1--17.  Zhuangbin Chen Anfeng Liu Zhetao Li Young-June Choi Hiroo Sekiya and Jie Li. 2017. Energy-efficient broadcasting scheme for smart industrial wireless sensor networks. Mobile Info. Syst. (2017) 1--17.","DOI":"10.1155\/2017\/7538190"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749246.2749252"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2765695"},{"key":"e_1_2_1_44_1","volume-title":"MongoDB: The Definitive Guide","author":"Chodorow Kristina","unstructured":"Kristina Chodorow and Michael Dirolf . 2010. MongoDB: The Definitive Guide ( 1 st ed.). O\u2019Reilly Media, Inc. Kristina Chodorow and Michael Dirolf. 2010. MongoDB: The Definitive Guide (1st ed.). O\u2019Reilly Media, Inc.","edition":"1"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491245"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7389832"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.09.168"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294281"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2017.1394596"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.207"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.160"},{"key":"e_1_2_1_53_1","first-page":"11","article-title":"RFID-Enabled physical object tracking in process flow based on an enhanced graphical deduction modeling method","volume":"47","author":"Ding K.","year":"2017","unstructured":"K. Ding , P. Jiang , P. Sun , and C. Wang . 2017 . RFID-Enabled physical object tracking in process flow based on an enhanced graphical deduction modeling method . IEEE Trans. Syst., Man, Cybernet.: Syst. 47 , 11 (Nov. 2017), 3006--3018. K. Ding, P. Jiang, P. Sun, and C. Wang. 2017. RFID-Enabled physical object tracking in process flow based on an enhanced graphical deduction modeling method. IEEE Trans. Syst., Man, Cybernet.: Syst. 47, 11 (Nov. 2017), 3006--3018.","journal-title":"IEEE Trans. Syst., Man, Cybernet.: Syst."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851476.1851593"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-008-0129-y"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2011.21"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2016.2557762"},{"key":"e_1_2_1_58_1","volume-title":"Proceedings of the Conference on Innovative Data System Research (CIDR\u201911)","author":"Jason","unstructured":"Jason Baker et al. 2011. Megastore: Providing scalable, highly available storage for interactive services . In Proceedings of the Conference on Innovative Data System Research (CIDR\u201911) . Retrieved from www.cidrdb.org. Jason Baker et al. 2011. Megastore: Providing scalable, highly available storage for interactive services. In Proceedings of the Conference on Innovative Data System Research (CIDR\u201911). Retrieved from www.cidrdb.org."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2707140"},{"key":"e_1_2_1_60_1","volume-title":"Applications, Experimentation and Analysis","author":"Ahmad Fahmy Hossam Mahmoud","unstructured":"Hossam Mahmoud Ahmad Fahmy . 2016. Wireless Sensor Networks: Concepts , Applications, Experimentation and Analysis . Springer . Hossam Mahmoud Ahmad Fahmy. 2016. Wireless Sensor Networks: Concepts, Applications, Experimentation and Analysis. Springer."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7389824"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2489657"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185677.2185739"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.35"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1224"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559926"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.3390\/pr3030664"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945450"},{"key":"e_1_2_1_69_1","volume-title":"Proc. IEEE 100 (May","author":"Goda K.","year":"2012","unstructured":"K. Goda and M. Kitsuregawa . 2012. The history of storage systems . Proc. IEEE 100 (May 2012 ), 1433--1440. K. Goda and M. Kitsuregawa. 2012. The history of storage systems. Proc. IEEE 100 (May 2012), 1433--1440."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.230"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.5555\/1960475.1960495"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.414.0578"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.08.046"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600658CM"},{"key":"e_1_2_1_76_1","volume-title":"Data Mining: Concepts and Techniques","author":"Han Jiawei","year":"2012","unstructured":"Jiawei Han , Micheline Kamber , and Jian Pei . 2012 . Data Mining: Concepts and Techniques ( 3 rd ed.). Morgan Kaufmann, Boston , MA. Jiawei Han, Micheline Kamber, and Jian Pei. 2012. Data Mining: Concepts and Techniques (3rd ed.). Morgan Kaufmann, Boston, MA.","edition":"3"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2433294"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2540520"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1111\/dpr.12142"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2332453"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2659478"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2778185"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2698457"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.5555\/1455696.1455702"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2472395"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6963801"},{"key":"e_1_2_1_87_1","volume-title":"Proceedings of the IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC\u201918)","author":"Iqbal N.","unstructured":"N. Iqbal , S. Al-Dharrab , A. Muqaibel , W. Mesbah , and G. St\u00fcber . 2018. Analysis of wireless seismic data acquisition networks using Markov chain models . In Proceedings of the IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC\u201918) . IEEE, 1--5. N. Iqbal, S. Al-Dharrab, A. Muqaibel, W. Mesbah, and G. St\u00fcber. 2018. Analysis of wireless seismic data acquisition networks using Markov chain models. In Proceedings of the IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC\u201918). IEEE, 1--5."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272998.1273005"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1500356WC"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2778939"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2017.11.002"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2594776"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2898996"},{"key":"e_1_2_1_95_1","first-page":"1","article-title":"Intrusion detection system using deep neural network for in-vehicle network security","volume":"11","author":"Kang Min-Joo","year":"2016","unstructured":"Min-Joo Kang and Je-Won Kang . 2016 . Intrusion detection system using deep neural network for in-vehicle network security . PloS One 11 , 6 (2016), 1 -- 17 . Min-Joo Kang and Je-Won Kang. 2016. Intrusion detection system using deep neural network for in-vehicle network security. PloS One 11, 6 (2016), 1--17.","journal-title":"PloS One"},{"key":"e_1_2_1_96_1","volume-title":"Proceedings of the IEEE International Conference on Big Data (BigData\u201917)","author":"Kennedy T. F.","unstructured":"T. F. Kennedy , R. S. Provence , J. L. Broyan , P. W. Fink , P. H. Ngo , and L. D. Rodriguez . 2017. Topic models for RFID data modeling and localization . In Proceedings of the IEEE International Conference on Big Data (BigData\u201917) . IEEE, 1438--1446. T. F. Kennedy, R. S. Provence, J. L. Broyan, P. W. Fink, P. H. Ngo, and L. D. Rodriguez. 2017. Topic models for RFID data modeling and localization. In Proceedings of the IEEE International Conference on Big Data (BigData\u201917). IEEE, 1438--1446."},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7378435"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2837692"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2727878"},{"key":"e_1_2_1_100_1","volume-title":"3D Markov process for traffic flow prediction in real-time. Sensors 16, 2","author":"Ko Eunjeong","year":"2016","unstructured":"Eunjeong Ko , Jinyoung Ahn , and Eun Yi Kim . 2016. 3D Markov process for traffic flow prediction in real-time. Sensors 16, 2 ( 2016 ). Eunjeong Ko, Jinyoung Ahn, and Eun Yi Kim. 2016. 3D Markov process for traffic flow prediction in real-time. Sensors 16, 2 (2016)."},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-016-0394-1"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2402161"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674026.2674028"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1002\/wics.194"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7389828"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2016.11.191"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2692"},{"key":"e_1_2_1_108_1","volume-title":"Deep learning on FPGAs: Past, present, and future. CoRR abs\/1602.04283","author":"Lacey Griffin","year":"2016","unstructured":"Griffin Lacey , Graham W. Taylor , and Shawki Areibi . 2016. Deep learning on FPGAs: Past, present, and future. CoRR abs\/1602.04283 ( 2016 ). http:\/\/arxiv.org\/abs\/1602.04283 Griffin Lacey, Graham W. Taylor, and Shawki Areibi. 2016. Deep learning on FPGAs: Past, present, and future. CoRR abs\/1602.04283 (2016). http:\/\/arxiv.org\/abs\/1602.04283"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/374391"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/1583991.1584009"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1109\/MP.2005.1549751"},{"key":"e_1_2_1_112_1","volume-title":"Proceedings of the Association for the Advancement of Artificial Intelligence (AAAI\u201918)","author":"Leng Cong","year":"2018","unstructured":"Cong Leng , Hao Li , Shenghuo Zhu , and Rong Jin . 2018 . Extremely low bit neural network: Squeeze the last bit out with ADMM . In Proceedings of the Association for the Advancement of Artificial Intelligence (AAAI\u201918) . AAAI Press. Cong Leng, Hao Li, Shenghuo Zhu, and Rong Jin. 2018. Extremely low bit neural network: Squeeze the last bit out with ADMM. In Proceedings of the Association for the Advancement of Artificial Intelligence (AAAI\u201918). AAAI Press."},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/543613.543644"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/2898361"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.2006818"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/2700312"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"e_1_2_1_118_1","volume-title":"Proceedings of the International Conference on Learning Representations (ICLR\u201918)","author":"Lin Yujun","unstructured":"Yujun Lin , Song Han , Huizi Mao , Yu Wang , and William J. Dally . 2018. Deep gradient compression: Reducing the communication bandwidth for distributed training . In Proceedings of the International Conference on Learning Representations (ICLR\u201918) . Yujun Lin, Song Han, Huizi Mao, Yu Wang, and William J. Dally. 2018. Deep gradient compression: Reducing the communication bandwidth for distributed training. In Proceedings of the International Conference on Learning Representations (ICLR\u201918)."},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2654119"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2577022"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.14778\/2212351.2212354"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6863131"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.5555\/3170713.3170770"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2682318"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807184"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-2000-z"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594204.1594206"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2557799"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663165.2663331"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2017.12.005"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2706947"},{"key":"e_1_2_1_133_1","unstructured":"Amin Mohajer Morteza Barari and Houman Zarrabi. 2017. Big data-based self-optimization networking: A novel approach beyond cognition. Intell. Autom. Soft Comput. (2017) 1--7.  Amin Mohajer Morteza Barari and Houman Zarrabi. 2017. Big data-based self-optimization networking: A novel approach beyond cognition. Intell. Autom. Soft Comput. (2017) 1--7."},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/2431211.2431218"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996890.3007867"},{"key":"e_1_2_1_136_1","volume-title":"Hennessy","author":"Patterson David A.","year":"2013","unstructured":"David A. Patterson and John L . Hennessy . 2013 . Computer Organization and Design: The Hardware\/Software Interface (5th ed.). Morgan Kaufmann . David A. Patterson and John L. Hennessy. 2013. Computer Organization and Design: The Hardware\/Software Interface (5th ed.). Morgan Kaufmann."},{"key":"e_1_2_1_137_1","first-page":"146","article-title":"Social influence modeling using information theory in mobile social networks. Info","volume":"379","author":"Peng Sancheng","year":"2017","unstructured":"Sancheng Peng , Aimin Yang , Lihong Cao , Shui Yu , and Dongqing Xie . 2017 . Social influence modeling using information theory in mobile social networks. Info . Sci. 379 (2017), 146 -- 159 . Sancheng Peng, Aimin Yang, Lihong Cao, Shui Yu, and Dongqing Xie. 2017. Social influence modeling using information theory in mobile social networks. Info. Sci. 379 (2017), 146--159.","journal-title":"Sci."},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1372-2"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2017.085720"},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2017.02.024"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3110067"},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41650-017-0001-2"},{"key":"e_1_2_1_144_1","first-page":"1","article-title":"A survey of machine learning for big data processing","volume":"2016","author":"Qiu Junfei","year":"2016","unstructured":"Junfei Qiu , Qihui Wu , Guoru Ding , Yuhua Xu , and Shuo Feng . 2016 . A survey of machine learning for big data processing . EURASIP J. Adv. Signal Process. 2016 , 1 (2016), 1 -- 16 . Junfei Qiu, Qihui Wu, Guoru Ding, Yuhua Xu, and Shuo Feng. 2016. A survey of machine learning for big data processing. EURASIP J. Adv. Signal Process. 2016, 1 (2016), 1--16.","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"e_1_2_1_145_1","volume-title":"Haug","author":"Rahimi Saeed K.","year":"2010","unstructured":"Saeed K. Rahimi and Frank S . Haug . 2010 . Distributed Database Management Systems: A Practical Approach. John Wiley 8 Sons. Saeed K. Rahimi and Frank S. Haug. 2010. Distributed Database Management Systems: A Practical Approach. John Wiley 8 Sons."},{"key":"e_1_2_1_146_1","article-title":"Privacy preservation techniques in big data analytics: A survey","volume":"5","author":"Rao P. Ram Mohan","year":"2018","unstructured":"P. Ram Mohan Rao , S. Murali Krishna , and A. P. Siva Kumar . 2018 . Privacy preservation techniques in big data analytics: A survey . J. Big Data 5 , 1 (22 Sep. 2018), 33. P. Ram Mohan Rao, S. Murali Krishna, and A. P. Siva Kumar. 2018. Privacy preservation techniques in big data analytics: A survey. J. Big Data 5, 1 (22 Sep. 2018), 33.","journal-title":"J. Big Data"},{"key":"e_1_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-014-0011-7"},{"key":"e_1_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"e_1_2_1_149_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-016-5582-8"},{"key":"e_1_2_1_150_1","volume-title":"Artificial Intelligence: A Modern Approach","author":"Russell Stuart","year":"2009","unstructured":"Stuart Russell and Peter Norvig . 2009 . Artificial Intelligence: A Modern Approach ( 3 rd ed.). Prentice Hall . Stuart Russell and Peter Norvig. 2009. Artificial Intelligence: A Modern Approach (3rd ed.). Prentice Hall.","edition":"3"},{"key":"e_1_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942"},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4961-1"},{"key":"e_1_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2650991"},{"key":"e_1_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7389827"},{"key":"e_1_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.77"},{"key":"e_1_2_1_156_1","volume-title":"Proceedings of the IEEE 27th International Workshop on Machine Learning for Signal Processing (MLSP\u201917)","author":"Scalabrin M.","unstructured":"M. Scalabrin , M. Gadaleta , R. Bonetto , and M. Rossi . 2017. A Bayesian forecasting and anomaly detection framework for vehicular monitoring networks . In Proceedings of the IEEE 27th International Workshop on Machine Learning for Signal Processing (MLSP\u201917) . IEEE, 1--6. M. Scalabrin, M. Gadaleta, R. Bonetto, and M. Rossi. 2017. A Bayesian forecasting and anomaly detection framework for vehicular monitoring networks. In Proceedings of the IEEE 27th International Workshop on Machine Learning for Signal Processing (MLSP\u201917). IEEE, 1--6."},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2682640"},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2010.5496972"},{"key":"e_1_2_1_159_1","doi-asserted-by":"publisher","DOI":"10.1145\/2421648.2421656"},{"key":"e_1_2_1_160_1","first-page":"6","article-title":"Content distribution over content centric mobile social networks in 5G","volume":"53","author":"Su Z.","year":"2015","unstructured":"Z. Su and Q. Xu . 2015 . Content distribution over content centric mobile social networks in 5G . IEEE Commun. Mag. 53 , 6 (June 2015), 66--72. Z. Su and Q. Xu. 2015. Content distribution over content centric mobile social networks in 5G. IEEE Commun. Mag. 53, 6 (June 2015), 66--72.","journal-title":"IEEE Commun. Mag."},{"key":"e_1_2_1_161_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7389831"},{"key":"e_1_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2761740"},{"key":"e_1_2_1_163_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2318177"},{"key":"e_1_2_1_164_1","volume-title":"Proceedings of the 14th IEEE Annual Consumer Communications Networking Conference (CCNC\u201917)","author":"Tasnim S.","unstructured":"S. Tasnim , N. Pissinou , and S. S. Iyengar . 2017. A novel cleaning approach of environmental sensing data streams . In Proceedings of the 14th IEEE Annual Consumer Communications Networking Conference (CCNC\u201917) . IEEE, 632--633. S. Tasnim, N. Pissinou, and S. S. Iyengar. 2017. A novel cleaning approach of environmental sensing data streams. In Proceedings of the 14th IEEE Annual Consumer Communications Networking Conference (CCNC\u201917). IEEE, 632--633."},{"key":"e_1_2_1_165_1","volume-title":"Proceedings of the IEEE 26th International Conference on Data Engineering (ICDE\u201910)","author":"Thusoo A.","unstructured":"A. Thusoo , J. S. Sarma , N. Jain , Z. Shao , P. Chakka , N. Zhang , S. Antony , H. Liu , and R. Murthy . 2010. Hive\u2014A petabyte scale data warehouse using hadoop . In Proceedings of the IEEE 26th International Conference on Data Engineering (ICDE\u201910) . IEEE. A. Thusoo, J. S. Sarma, N. Jain, Z. Shao, P. Chakka, N. Zhang, S. Antony, H. Liu, and R. Murthy. 2010. Hive\u2014A petabyte scale data warehouse using hadoop. In Proceedings of the IEEE 26th International Conference on Data Engineering (ICDE\u201910). IEEE."},{"key":"e_1_2_1_166_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600863"},{"key":"e_1_2_1_167_1","volume-title":"Traffic Flow Dynamics","author":"Treiber Martin","unstructured":"Martin Treiber and Arne Kesting . 2013. Traffic Flow Dynamics . Springer . Martin Treiber and Arne Kesting. 2013. Traffic Flow Dynamics. Springer."},{"key":"e_1_2_1_168_1","volume-title":"Research Methods The Essential Knowledge Base","author":"Trochim William M. K.","unstructured":"William M. K. Trochim , Jim Donnelly , and Kanika Arora . 2016. Research Methods The Essential Knowledge Base ( 2 nd ed.). Cengage Learning . William M. K. Trochim, Jim Donnelly, and Kanika Arora. 2016. Research Methods The Essential Knowledge Base (2nd ed.). Cengage Learning.","edition":"2"},{"key":"e_1_2_1_169_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00038"},{"key":"e_1_2_1_170_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2013.2295611"},{"key":"e_1_2_1_171_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.060710.00066"},{"key":"e_1_2_1_172_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.64"},{"key":"e_1_2_1_173_1","volume-title":"Energy saving techniques in mobile crowd sensing: Current state and future opportunities","author":"Wang Jiangtao","year":"2018","unstructured":"Jiangtao Wang , Yasha Wang , Daqing Zhang , and Sumi Helal . 2018a. Energy saving techniques in mobile crowd sensing: Current state and future opportunities . IEEE Commun. Mag . ( 2018 ), 1--7. Jiangtao Wang, Yasha Wang, Daqing Zhang, and Sumi Helal. 2018a. Energy saving techniques in mobile crowd sensing: Current state and future opportunities. IEEE Commun. Mag. (2018), 1--7."},{"key":"e_1_2_1_174_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2018.00079"},{"key":"e_1_2_1_175_1","volume-title":"Proceedings of the 27th International Conference on Computer Communication and Networks (ICCCN\u201918)","author":"Wang T.","unstructured":"T. Wang , N. S. Nguyen , J. Wang , T. Li , X. Zhang , N. Mi , B. Zhao , and B. Sheng . 2018. RoVEr: Robust and verifiable erasure code for hadoop distributed file systems . In Proceedings of the 27th International Conference on Computer Communication and Networks (ICCCN\u201918) . IEEE, 1--9. T. Wang, N. S. Nguyen, J. Wang, T. Li, X. Zhang, N. Mi, B. Zhao, and B. Sheng. 2018. RoVEr: Robust and verifiable erasure code for hadoop distributed file systems. In Proceedings of the 27th International Conference on Computer Communication and Networks (ICCCN\u201918). IEEE, 1--9."},{"key":"e_1_2_1_176_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736753"},{"key":"e_1_2_1_177_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2467174"},{"key":"e_1_2_1_178_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2551619"},{"key":"e_1_2_1_179_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2006.2"},{"key":"e_1_2_1_180_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687814"},{"key":"e_1_2_1_181_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0114-2"},{"key":"e_1_2_1_182_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.109"},{"key":"e_1_2_1_183_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4743-9"},{"key":"e_1_2_1_184_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7474338"},{"key":"e_1_2_1_185_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2783374"},{"key":"e_1_2_1_186_1","unstructured":"W. Xu S. Jha and W. Hu. 2019. LoRa-Key: Secure key generation system for LoRa-based network. IEEE Internet Things J. (2019) 1--10.  W. Xu S. Jha and W. Hu. 2019. LoRa-Key: Secure key generation system for LoRa-based network. IEEE Internet Things J. (2019) 1--10."},{"key":"e_1_2_1_187_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600690CM"},{"key":"e_1_2_1_188_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2595574"},{"key":"e_1_2_1_189_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"e_1_2_1_190_1","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2018.2811185"},{"key":"e_1_2_1_191_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)TE.1943-5436.0000816"},{"key":"e_1_2_1_192_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502562"},{"key":"e_1_2_1_193_1","volume-title":"Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud\u201910)","author":"Zaharia Matei","year":"2010","unstructured":"Matei Zaharia , Mosharaf Chowdhury , Michael J. Franklin , Scott Shenker , and Ion Stoica . 2010 . Spark: Cluster computing with working sets . In Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud\u201910) . USENIX Association. Matei Zaharia, Mosharaf Chowdhury, Michael J. Franklin, Scott Shenker, and Ion Stoica. 2010. Spark: Cluster computing with working sets. In Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing (HotCloud\u201910). USENIX Association."},{"key":"e_1_2_1_194_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684746.2689060"},{"key":"e_1_2_1_195_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2320577"},{"key":"e_1_2_1_196_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134428"},{"key":"e_1_2_1_197_1","doi-asserted-by":"publisher","DOI":"10.1145\/564376.564393"},{"key":"e_1_2_1_198_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-012-9204-9"},{"key":"e_1_2_1_199_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2460747"},{"key":"e_1_2_1_200_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2016.0208"},{"key":"e_1_2_1_201_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7389830"},{"key":"e_1_2_1_202_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772795"},{"key":"e_1_2_1_203_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"e_1_2_1_204_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2785963"},{"key":"e_1_2_1_205_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2360543"},{"key":"e_1_2_1_206_1","volume-title":"Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data","author":"Zikopoulos Paul","unstructured":"Paul Zikopoulos and Chris Eaton . 2011. Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data ( 1 st ed.). McGraw-Hill Osborne Media . Paul Zikopoulos and Chris Eaton. 2011. Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data (1st ed.). McGraw-Hill Osborne Media.","edition":"1"},{"key":"e_1_2_1_207_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJKESDP.2016.075976"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3337065","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3337065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:04Z","timestamp":1750199584000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3337065"}},"subtitle":["Challenges and Opportunities"],"short-title":[],"issued":{"date-parts":[[2019,9,13]]},"references-count":205,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,9,30]]}},"alternative-id":["10.1145\/3337065"],"URL":"https:\/\/doi.org\/10.1145\/3337065","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,13]]},"assertion":[{"value":"2017-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-05-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-09-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}