2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC) 2013
DOI: 10.1109/iwcmc.2013.6583792
|View full text |Cite
|
Sign up to set email alerts
|

Changing patterns of mobile network (WLAN) Usage: Smart-Phones vs. Laptops

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(20 citation statements)
references
References 6 publications
0
19
1
Order By: Relevance
“…Therefore such analysis must be repeated from time to time with the objective of identifying potential important changes in how the two classes of devices differ [27][28][29][30]. Clearly, this operation calls for automatic methods able to classify traffic flows as belonging to one or the other class.…”
Section: Smartphone/laptop Classificationmentioning
confidence: 99%
See 3 more Smart Citations
“…Therefore such analysis must be repeated from time to time with the objective of identifying potential important changes in how the two classes of devices differ [27][28][29][30]. Clearly, this operation calls for automatic methods able to classify traffic flows as belonging to one or the other class.…”
Section: Smartphone/laptop Classificationmentioning
confidence: 99%
“…Different approaches to perform device classification are available in the literature. A trivial and inexpensive method is to perform device classification by relying solely on the first 3 octets of a MAC address, known as the Organizationally Unique Identifier (OUI), which identifies uniquely the manufacturer of a device [28,29]. The method works for those manufacturers who make only smartphones (e.g., HTC, Rim, Nokia) or laptops (e.g., Asus, Dell).…”
Section: Smartphone/laptop Classificationmentioning
confidence: 99%
See 2 more Smart Citations
“…In this context, the knowledge (or prediction) of what type of traffic (and devices) is actually using the network can be leveraged to optimize the network configuration and/or implement and support several services (e.g., management of wide WiFi networks, smart content caching approaches, etc.) [11,8,3,15,9,10,19,18].…”
Section: Mswim '16 Maltamentioning
confidence: 99%