Synthetic Smartphone Data Usage Modeling Through User Clustering

Stephan Wirsing, Benjamin Finley

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Abstract

    Mobile network usage models (along with system models) are useful tools for estimating the performance of future and current mobile communication systems. However current mobile network usage models lack either the granularity or flexibility required for assessing advanced concepts (such as cognitive radio and dynamic spectrum access) at academic research levels. Therefore, in this work, we propose a network usage model that is both granular (modeling at the individual device level) and flexible (allowing arbitrary combinations of empirically derived user types and various time scales). We derive the user types through temporal clustering of network usage patterns of around 400 diverse US-based smartphone users. Additionally, the model accounts for the bursty nature and self-similarity of such traffic and we show these characteristics are preserved over several time scales.
    Original languageEnglish
    Title of host publication2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE PIMRC 2018)
    PublisherIEEE
    Number of pages6
    ISBN (Electronic)978-1-5386-6009-6
    DOIs
    Publication statusPublished - Sept 2018
    MoE publication typeA4 Article in a conference publication
    EventIEEE International Symposium on Personal, Indoor and Mobile Radio Communications - Polo Congressuale, Bologna, Italy
    Duration: 9 Sept 201812 Sept 2018
    Conference number: 29
    http://pimrc2018.ieee-pimrc.org/

    Conference

    ConferenceIEEE International Symposium on Personal, Indoor and Mobile Radio Communications
    Abbreviated titleIEEE PIMRC
    Country/TerritoryItaly
    CityBologna
    Period09/09/201812/09/2018
    Internet address

    Fingerprint

    Dive into the research topics of 'Synthetic Smartphone Data Usage Modeling Through User Clustering'. Together they form a unique fingerprint.

    Cite this