References
- C. Lynch, "Big data: How do your data grow?," Nature, vol. 455, no. 7209, pp. 28-29, 2008. https://doi.org/10.1038/455028a
- E. Bastug, M. Bennis, and M. Debbah, "Living on the Edge: The role of proactive caching in 5G wireless networks," IEEE Commun. Mag., vol. 52, pp. 82-89, Aug. 2014.
- F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the internet of things," in Proc. ACM MCC workshop on Mobile cloud computing, 2012, pp. 13-16.
- T. H. Luan, L. Gao, Z. Li, Y. Xiang, and L. Sun, "Fog computing: Focusing on mobile users at the edge," [Online] arXiv:1502.01815, 2015.
- H. Hu, Y. Wen, T.-S. Chua, and X. Li, "Toward scalable systems for big data analytics: A technology tutorial," IEEE Access, vol. 2, pp. 652-687, 2014. https://doi.org/10.1109/ACCESS.2014.2332453
- J. Andrews et al., "What will 5G be?," IEEE J. Sel. Areas Commun., vol. 32, pp. 1065-1082, June 2014. https://doi.org/10.1109/JSAC.2014.2328098
- J. K. Laurila et al., "The mobile data challenge: Big data for mobile computing research," Pervasive Comput., 2012.
- E. Bastug, J.-L. Guenego, and M. Debbah, "Proactive small cell networks," in Proc. ICT, Casablanca, Morocco, May 2013.
- N. Golrezaei et al., "Femtocaching and device-to-device collaboration: A new architecture for wireless video distribution," IEEE Commun. Mag., vol. 51, no. 4, pp. 142-149, 2013. https://doi.org/10.1109/MCOM.2013.6495773
- E. Bastug et al., "Cache-enabled small cell networks: Modeling and tradeoffs," EURASIP J. Wireless Commun. Netw., pp. 41, Feb. 2015.
- K. Hamidouche, W. Saad, and M. Debbah, "Many-to-many matching games for proactive social-caching in wireless small cell networks," in Proc. WiOpt, May 2014, pp. 569-574.
- K. Poularakis, G. Iosifidis, and L. Tassiulas, "Approximation algorithms for mobile data caching in small cell networks," IEEE Trans. Commun., vol. 62, pp. 3665-3677, Oct. 2014. https://doi.org/10.1109/TCOMM.2014.2351796
- B. Zhou, Y. Cui, and M. Tao, "Optimal dynamic multicast scheduling for cache-enabled content-centric wireless networks," [Online] arXiv:1504.04428, 2015.
- B. B. Nagaraja and K. G. Nagananda, "Caching with unknown popularity profiles in small cell networks," [Online] arXiv:1504.03632, 2015.
- E. Bastug, M. Bennis, and M. Debbah, Proactive Caching in 5G Small Cell Networks. Wiley, [In Minor Revision] 2015.
- K. Poularakis et al., "Multicast-aware caching for small cell networks," in Proc. IEEE WCNC, 2014, pp. 2300-2305.
- L. Breslau et al., "Web caching and zipf-like distributions: Evidence and implications," in Proc. IEEE INFOCOM, vol. 1, 1999, pp. 126-134.
- M. Z. Shafiq et al., "Characterizing and modeling internet traffic dynamics of cellular devices," in Proc. The ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, ACM, 2011, pp. 305-316.
- J. Tadrous, A. Eryilmaz, and H. E. Gamal, "Proactive data download and user demand shaping for data networks," IEEE Trans. Inf. Theory [Online] arXiv: 1304.5745, 2014.
- Google, Recommended upload encoding settings (Advanced)., [Online] Available: https://goo.gl/KJXfhh.
- M. A. Maddah-Ali and U. Niesen, "Fundamental limits of caching," IEEE Trans. Inf. Theory, vol. 60, pp. 2856-2867, May 2014. https://doi.org/10.1109/TIT.2014.2306938
- Y. Koren, R. Bell, and C. Volinsky, "Matrix factorization techniques for recommender systems," Computer, pp. 30-37, Aug. 2009.
- J. Lee, M. Sun, and G. Lebanon, "A comparative study of collaborative filtering algorithms," [Online] arXiv: 1205.3193, 2012.
- Apache Hadoop., [Online] Available: http://hadoop.apache.org/.
- Cloudera., [Online] Available: http://www.cloudera.com/content/cloudera/en/documentation.html.
- The Wireshark Network Analyzer 1.12.2. [Online] Available: https://www.wireshark.org/docs/man-pages/tshark.html.
- Apache Hive TM., [Online] Available: https://hive.apache.org/.
- Apache, HttpClient API Tutorial., [Online] Available: https://hc.apache.org/httpcomponents-client-ga/tutorial/pdf/httpclient-tutorial.pdf .
- Y. Dong et al., "Teledata: data mining, social network analysis and statistics analysis system based on cloud computing in telecommunication industry," in Proc. ACM CloudDB, 2011, pp. 41-48.
- H.-D. J. Jeong,W. Hyun, J. Lim, and I. You, "Anomaly teletraffic intrusion detection systems on hadoop-based platforms: A survey of some problems and solutions," in Proc. IEEE NBiS, 2012, pp. 766-770.
- J. Magnusson and T. Kvernvik, "Subscriber classification within telecom networks utilizing big data technologies and machine learning," in Proc. BigMine, ACM, 2012, pp. 77-84.
- W. Indyk et al., "Mapreduce approach to collective classification for networks," in Artificial Intelligence and Soft Computing, Springer, pp. 656-663, 2012.
- O. F. Celebi et al., "On use of big data for enhancing network coverage analysis," in Proc. ICT, Casablanca, Morocco, May 2013.
- I. A. Karatepe and E. Zeydan, "Anomaly detection in cellular network data using big data analytics," in Proc. European Wireless, VDE, 2014, pp. 1-5.
- M. Cha et al., "I tube, you tube, everybody tubes: Analyzing the world's largest user generated content video system," in Proc. SIGCOMM, ACM, 2007, pp. 1-14.
- D. Rossi, G. Rossini, et al., "On sizing ccn content stores by exploiting topological information.," in Proc. IEEE INFOCOM WKSHPS, 2012, pp. 280-285.
- M. Zink et al., "Characteristics of youtube network traffic at a campus network-measurements, models, and implications," Computer Networks, vol. 53, no. 4, pp. 501-514, 2009. https://doi.org/10.1016/j.comnet.2008.09.022
- E. M. R. Oliveira et al. "Measurement-driven mobile data traffic modeling in a large metropolitan area," Research Report RR-8613, INRIA, Oct. 2014.
- A. Paterek, "Improving regularized singular value decomposition for collaborative filtering," in Proc. KDD cup and workshop, vol. 2007, 2007, pp. 5-8.