Pub Date : 2012-12-11DOI: 10.1109/icin.2012.6376029
G. Ibrahim, Y. Chadli, D. Kofman, A. Ansiaux
In the recent years the following two trends have been accelerated: on the one hand, as Content Services became at the center of Internet usages, OTTs strengthen their position. On the other hand, in several cases, Telcos are seeing their role shrinking to “dumb pipes” providers. This paper introduces advanced Telcos' positioning in future content distribution services. In particular, it focuses on the “value” that Telcos can bring to CDN providers and Content providers and analyses the required evolutions of the involved systems' architectures (network and content delivery). Value is assessed with respect to both users' trends and content ecosystem evolution. We show that existing Telcos' assets could indeed be leveraged to make the proposed move, bringing to Telcos a major differentiator in this arena. For that, an open and efficient control infrastructure is necessary, the paper presents the core required functionalities and architectural framework, as well as related challenges.
{"title":"Toward a new Telco role in future content distribution services","authors":"G. Ibrahim, Y. Chadli, D. Kofman, A. Ansiaux","doi":"10.1109/icin.2012.6376029","DOIUrl":"https://doi.org/10.1109/icin.2012.6376029","url":null,"abstract":"In the recent years the following two trends have been accelerated: on the one hand, as Content Services became at the center of Internet usages, OTTs strengthen their position. On the other hand, in several cases, Telcos are seeing their role shrinking to “dumb pipes” providers. This paper introduces advanced Telcos' positioning in future content distribution services. In particular, it focuses on the “value” that Telcos can bring to CDN providers and Content providers and analyses the required evolutions of the involved systems' architectures (network and content delivery). Value is assessed with respect to both users' trends and content ecosystem evolution. We show that existing Telcos' assets could indeed be leveraged to make the proposed move, bringing to Telcos a major differentiator in this arena. For that, an open and efficient control infrastructure is necessary, the paper presents the core required functionalities and architectural framework, as well as related challenges.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116624436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-11DOI: 10.1109/ICIN.2012.6376017
Kouichirou Amemiya, Ken-ichi Abiru, T. Ishihara
Complex Event Processing (CEP) is a key technology for processing of data, the use of which has increased rapidly in recent years. Network service providers are expected to offer new services through network connectivity between distributed devices as data source, data processing systems like CEP and users of the final results. Reduction of the peak traffic is one of the important issues for the network service providers. Because the amount of the capital investment for the network equipments is proportional to the amount of the peak traffic in network. We developed Application-Aware Traffic Control (AATC) for network based data processing services. AATC controls traffic for data processing services based on requirements of users of data processing results and reduces the peak traffic. We will also show the effectiveness of AATC with simulated systems.
{"title":"Application-Aware Traffic Control for network-based data processing services","authors":"Kouichirou Amemiya, Ken-ichi Abiru, T. Ishihara","doi":"10.1109/ICIN.2012.6376017","DOIUrl":"https://doi.org/10.1109/ICIN.2012.6376017","url":null,"abstract":"Complex Event Processing (CEP) is a key technology for processing of data, the use of which has increased rapidly in recent years. Network service providers are expected to offer new services through network connectivity between distributed devices as data source, data processing systems like CEP and users of the final results. Reduction of the peak traffic is one of the important issues for the network service providers. Because the amount of the capital investment for the network equipments is proportional to the amount of the peak traffic in network. We developed Application-Aware Traffic Control (AATC) for network based data processing services. AATC controls traffic for data processing services based on requirements of users of data processing results and reduces the peak traffic. We will also show the effectiveness of AATC with simulated systems.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128781818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-11DOI: 10.1109/ICIN.2012.6376019
Juuso Karikoski, O. Mäkinen
We introduce a term called mobile social phonebook, which refers to the integration of traditional mobile phone contacts with contacts from mobile Internet communication services that is happening in the mobile device's phonebook. First, mobile phone user perceptions towards mobile social phonebooks are studied by means of semi-structured interviews. The results of the interviews are combined with related work and discussed from a mobile operator perspective. We claim that mobile social phonebooks will have an effect on the interrelationships of mobile communication services and discuss implications related to providers, privacy and future of mobile social phonebooks. Moreover, we claim that the future analysis on interrelationships needs to happen on a more detailed level, than what has been achieved so far. This paper contributes to the research fields of mobile platforms and mobile communication services and is valuable both for practitioners and academics.
{"title":"Mobile social phonebooks Mobile phone user perceptions and practical implications for mobile operators","authors":"Juuso Karikoski, O. Mäkinen","doi":"10.1109/ICIN.2012.6376019","DOIUrl":"https://doi.org/10.1109/ICIN.2012.6376019","url":null,"abstract":"We introduce a term called mobile social phonebook, which refers to the integration of traditional mobile phone contacts with contacts from mobile Internet communication services that is happening in the mobile device's phonebook. First, mobile phone user perceptions towards mobile social phonebooks are studied by means of semi-structured interviews. The results of the interviews are combined with related work and discussed from a mobile operator perspective. We claim that mobile social phonebooks will have an effect on the interrelationships of mobile communication services and discuss implications related to providers, privacy and future of mobile social phonebooks. Moreover, we claim that the future analysis on interrelationships needs to happen on a more detailed level, than what has been achieved so far. This paper contributes to the research fields of mobile platforms and mobile communication services and is valuable both for practitioners and academics.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133261757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-11DOI: 10.1109/ICIN.2012.6376034
Harald Bender, Gerald Lehmann
The fast growing market for wireless Machine-to-Machine (M2M) communication services is facing specific challenges which do not exist comparably in the traditional cellular subscriber market. The challenges are emerging around the changed ecosystem and value chain and dealing with different traffic and load profiles in the network. The significantly reduced ARPDs (average revenue per device) are calling for increased operational efficiency and flexibility and tangible cost reductions. With regard to the requirements arising in this context this paper focuses on new concepts for SIM management (SIM: Subscriber Identity Module) in the M2M domain from a subscription management perspective in order to develop an economic MCIM provisioning process (MCIM: M2M communication identity module). Three technical concepts were addressed and described with a look on the critical features. Essential items are the circle of trust, the grade of flexibility, the complexity of the solution and the impact on security. A further evolution of the Embedded UICC (Universal Integrated Circuit Card) proposal currently handled in standardization is presented and discussed, which gives the device owner and the M2M service provider a more active role and responsibility in the process. This approach enables full flexibility for change of operator and subscription and requires less administrative effort from MNOs (Mobile Network Operators), in particular for devices currently not requiring an active subscription. The respective business processes for MCIM management are presented as blueprints and discussed with regard to the lifecycle phases. There is a need for an increased grade of automation and integration of these workflows going beyond the boundaries of a particular stakeholder participating in the value net.
{"title":"Evolution of SIM provisioning towards a flexible MCIM provisioning in M2M vertical industries","authors":"Harald Bender, Gerald Lehmann","doi":"10.1109/ICIN.2012.6376034","DOIUrl":"https://doi.org/10.1109/ICIN.2012.6376034","url":null,"abstract":"The fast growing market for wireless Machine-to-Machine (M2M) communication services is facing specific challenges which do not exist comparably in the traditional cellular subscriber market. The challenges are emerging around the changed ecosystem and value chain and dealing with different traffic and load profiles in the network. The significantly reduced ARPDs (average revenue per device) are calling for increased operational efficiency and flexibility and tangible cost reductions. With regard to the requirements arising in this context this paper focuses on new concepts for SIM management (SIM: Subscriber Identity Module) in the M2M domain from a subscription management perspective in order to develop an economic MCIM provisioning process (MCIM: M2M communication identity module). Three technical concepts were addressed and described with a look on the critical features. Essential items are the circle of trust, the grade of flexibility, the complexity of the solution and the impact on security. A further evolution of the Embedded UICC (Universal Integrated Circuit Card) proposal currently handled in standardization is presented and discussed, which gives the device owner and the M2M service provider a more active role and responsibility in the process. This approach enables full flexibility for change of operator and subscription and requires less administrative effort from MNOs (Mobile Network Operators), in particular for devices currently not requiring an active subscription. The respective business processes for MCIM management are presented as blueprints and discussed with regard to the lifecycle phases. There is a need for an increased grade of automation and integration of these workflows going beyond the boundaries of a particular stakeholder participating in the value net.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124628553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-11DOI: 10.1109/ICIN.2012.6376013
Haruno Kataoka, Daichi Namikawa, Hiroya Minami, Michio Shimomura, N. Uchida
The purpose of this study is to construct a framework for enhancing telecom operators' network services. To achieve this, we propose “SightFinder,” an enhanced videophone service in which the media is processed on the network by multiple pattern recognition engines working in parallel. This service alerts users when they cannot see information and explains the information when they cannot understand it.
{"title":"SightFinder: Enhanced videophone service utilizing media processing","authors":"Haruno Kataoka, Daichi Namikawa, Hiroya Minami, Michio Shimomura, N. Uchida","doi":"10.1109/ICIN.2012.6376013","DOIUrl":"https://doi.org/10.1109/ICIN.2012.6376013","url":null,"abstract":"The purpose of this study is to construct a framework for enhancing telecom operators' network services. To achieve this, we propose “SightFinder,” an enhanced videophone service in which the media is processed on the network by multiple pattern recognition engines working in parallel. This service alerts users when they cannot see information and explains the information when they cannot understand it.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121322843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-11DOI: 10.1109/ICIN.2012.6376018
T. Stevens, Ian Kegel, Doug Williams, P. Torres, Pablo César, Phil Stenton, Rene Kaiser, M. Ursu, Manolis Falelakis, Nikolaus Färber
While advances in commercial video conferencing and social networking are driving more people to communicate using video, it is still difficult to achieve a sense of co-presence - that is to make the technology transparent to its users - when mediating ad hoc interactions between groups of people in different locations. This paper presents an ambitious plan to define and demonstrate a platform for group communication that allows participants to create a robust video communication session that is centred on a shared activity and to which participants can join or leave in an arbitrary manner using an arbitrary device specification on an arbitrary network. We describe two representative applications in which co-presence is not currently well supported. We then explain the key technical capabilities which we believe must be developed in order to build our platform, highlighting how they extend the state of the art in the dynamic control of video communication systems and the configuration of key components within the network. We conclude by explaining how our novel platform will be implemented and evaluated over the next 3 years.
{"title":"Video communication for networked communities: Challenges and opportunities","authors":"T. Stevens, Ian Kegel, Doug Williams, P. Torres, Pablo César, Phil Stenton, Rene Kaiser, M. Ursu, Manolis Falelakis, Nikolaus Färber","doi":"10.1109/ICIN.2012.6376018","DOIUrl":"https://doi.org/10.1109/ICIN.2012.6376018","url":null,"abstract":"While advances in commercial video conferencing and social networking are driving more people to communicate using video, it is still difficult to achieve a sense of co-presence - that is to make the technology transparent to its users - when mediating ad hoc interactions between groups of people in different locations. This paper presents an ambitious plan to define and demonstrate a platform for group communication that allows participants to create a robust video communication session that is centred on a shared activity and to which participants can join or leave in an arbitrary manner using an arbitrary device specification on an arbitrary network. We describe two representative applications in which co-presence is not currently well supported. We then explain the key technical capabilities which we believe must be developed in order to build our platform, highlighting how they extend the state of the art in the dynamic control of video communication systems and the configuration of key components within the network. We conclude by explaining how our novel platform will be implemented and evaluated over the next 3 years.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133665789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-11DOI: 10.1109/ICIN.2012.6376022
F. Vannieuwenborg, Laurent Mainil, S. Verbrugge, M. Pickavet, D. Colle
Attracted by impressive cash flows and success stories, mobile application developers are trying to penetrate the mobile application market more than ever. Despite this increasing interest, the market configuration is certainly not always clear, let alone how to formulate an optimal business and revenue model from a developer's or provider's viewpoint. Based on case study research, we identified business model characteristics and several revenue models for a mobile application provider. In addition to existing literature on business models, this paper describes two main value network configurations for offering mobile applications: 1) All-in-one mobile application provider, and 2) Outsourcing mobile application provider. Further, we focus on the business model elements of an application developer which can be subdivided in recurrent elements (e.g.: cost structure, key partners, resources, key activities, promotion channels, customer relationships and revenue streams) or unique elements (value proposition and customer segments). This actor specific research allows us to 1) develop a decision chart and 2) to extend existing guidelines in order to determine the most optimal revenue model for a mobile application. The tool and the insights can help new developers to set up their business model or existing mobile application providers to evaluate their current one.
{"title":"Business models for the mobile application market from a developer's viewpoint","authors":"F. Vannieuwenborg, Laurent Mainil, S. Verbrugge, M. Pickavet, D. Colle","doi":"10.1109/ICIN.2012.6376022","DOIUrl":"https://doi.org/10.1109/ICIN.2012.6376022","url":null,"abstract":"Attracted by impressive cash flows and success stories, mobile application developers are trying to penetrate the mobile application market more than ever. Despite this increasing interest, the market configuration is certainly not always clear, let alone how to formulate an optimal business and revenue model from a developer's or provider's viewpoint. Based on case study research, we identified business model characteristics and several revenue models for a mobile application provider. In addition to existing literature on business models, this paper describes two main value network configurations for offering mobile applications: 1) All-in-one mobile application provider, and 2) Outsourcing mobile application provider. Further, we focus on the business model elements of an application developer which can be subdivided in recurrent elements (e.g.: cost structure, key partners, resources, key activities, promotion channels, customer relationships and revenue streams) or unique elements (value proposition and customer segments). This actor specific research allows us to 1) develop a decision chart and 2) to extend existing guidelines in order to determine the most optimal revenue model for a mobile application. The tool and the insights can help new developers to set up their business model or existing mobile application providers to evaluate their current one.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134252772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-11DOI: 10.1109/ICIN.2012.6376014
D. Ludlam
This paper describes users' experiences of both telephony and Internet services and infers some requirements from these experiences. It argues that sender authentication is an essential feature of communications systems and that it is not adequately provided today. Some regulatory decisions and their arbitrary impact on users and companies are discussed. Many of the ideas presented are not innovative: on the contrary much of the content is asking obvious questions and making obvious assertions that are familiar to many in the industry and to the general public, but that have not been dealt with effectively by the combination of market forces, regulators and governments.
{"title":"A perspective on regulation and users' experience","authors":"D. Ludlam","doi":"10.1109/ICIN.2012.6376014","DOIUrl":"https://doi.org/10.1109/ICIN.2012.6376014","url":null,"abstract":"This paper describes users' experiences of both telephony and Internet services and infers some requirements from these experiences. It argues that sender authentication is an essential feature of communications systems and that it is not adequately provided today. Some regulatory decisions and their arbitrary impact on users and companies are discussed. Many of the ideas presented are not innovative: on the contrary much of the content is asking obvious questions and making obvious assertions that are familiar to many in the industry and to the general public, but that have not been dealt with effectively by the combination of market forces, regulators and governments.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134331377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-11DOI: 10.1109/ICIN.2012.6376038
M. Scharf, T. Voith, W. D. Roome, Bob Gaglianello, Moritz Steiner, V. Hilt, V. Gurbani
We consider the problem of building tightly coupled network and cloud management systems for “carrier clouds” based on an abstract view of the dynamic network state. Optimized resource placement in distributed clouds requires information about the internal network topology and state, in addition to other data center information. We present a distributed cloud system that accesses such data in an abstract way using the Application Layer Traffic Optimization (ALTO) protocol. The demonstration addresses how dynamic networking information can be gathered, how it can be abstracted and coupled with other data such as data center load, how it can be exposed, and how it can be integrated into a cloud management system. Our distributed cloud solution demonstrates that ALTO is well-suited for infrastructure-to-application information exposure.
{"title":"Monitoring and abstraction for networked clouds","authors":"M. Scharf, T. Voith, W. D. Roome, Bob Gaglianello, Moritz Steiner, V. Hilt, V. Gurbani","doi":"10.1109/ICIN.2012.6376038","DOIUrl":"https://doi.org/10.1109/ICIN.2012.6376038","url":null,"abstract":"We consider the problem of building tightly coupled network and cloud management systems for “carrier clouds” based on an abstract view of the dynamic network state. Optimized resource placement in distributed clouds requires information about the internal network topology and state, in addition to other data center information. We present a distributed cloud system that accesses such data in an abstract way using the Application Layer Traffic Optimization (ALTO) protocol. The demonstration addresses how dynamic networking information can be gathered, how it can be abstracted and coupled with other data such as data center load, how it can be exposed, and how it can be integrated into a cloud management system. Our distributed cloud solution demonstrates that ALTO is well-suited for infrastructure-to-application information exposure.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116814161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-11DOI: 10.1109/ICIN.2012.6376033
Asma Elmangoush, T. Magedanz, Alexander Blotny, N. Blum
The upcoming communication aim will not focus on connecting humans by different kinds of multimedia services, but also connecting machines of different aspects, providing a global smart world. The telecommunication industry is currently moving towards service-oriented infrastructures based on Internet Protocol (IP), Service Oriented Architectures (SOA), and Service Delivery Platforms (SDP). In this paper we introduce the Machine-to-Machine (M2M) trend of communications, which evoked more interest recently, and describe a set of proposed Application Programming Interfaces (APIs) to interact with our new OpenMTC framework at FOKUS.
{"title":"Design of RESTful APIs for M2M services","authors":"Asma Elmangoush, T. Magedanz, Alexander Blotny, N. Blum","doi":"10.1109/ICIN.2012.6376033","DOIUrl":"https://doi.org/10.1109/ICIN.2012.6376033","url":null,"abstract":"The upcoming communication aim will not focus on connecting humans by different kinds of multimedia services, but also connecting machines of different aspects, providing a global smart world. The telecommunication industry is currently moving towards service-oriented infrastructures based on Internet Protocol (IP), Service Oriented Architectures (SOA), and Service Delivery Platforms (SDP). In this paper we introduce the Machine-to-Machine (M2M) trend of communications, which evoked more interest recently, and describe a set of proposed Application Programming Interfaces (APIs) to interact with our new OpenMTC framework at FOKUS.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123774557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}