5Tim O'Reilly. What Is Web 2.0:Design Patterns and Business Models for the Next Generation of Software[EB/OL].[2010-05-20]. http.//www, oreillynet, com/lpt/a/6228.
2Gabriel C. DoCoMo DEMANDS Google' s Help with Signaling Storm [Z ]. 2012.
3Qian Feng, Wang Zhaoguang, Gao Yudong, et al. Periodic Transfers in Mobile Applications:Network-wide Origin, Impact, and Optimization [ C ]//Proceedings of International Conference on World Wide Web. New York, USA : ACM Press, 2012 : 51-60.
4Li Qian,Chan E W W, Lee P C, et al. Characterization of 3G Control-plane Signaling Overhead from a Data- plane Perspective[C]//Proceedings of ACM Inter- national Conference on Modeling. New York, USA: ACM Press ,2012:325-332.
5Parimala M,Lopez D, Senthilkumar N C. A Survey on Density Based Clustering Algorithms for Mining LargeSpatial Databases [J].International Journal of Advanced Science and Technology,2011,31 (1) :59-66.
6Erman J, Gerber A, Hajiaghayi M T, et al. Network- aware Forward Caching [ C ]//Proceedings of Inter- national Conference on World Wide Web. New York, USA : ACM Press, 2009 : 291-300.
7Racic R, Ma D, Chert Hao. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone' s Battery [ C ]//Proceedings of Securecomm & Workshops. Washington D. C. ,USA :IEEE Press ,2006 : 1-10.
8Qian Feng, Wang Zhaoguang, Gerber A, et al. TOP : Tail Optimization Protocol for Cellular Radio Resource Alloca- tion [ C ]//Proceedings of ICNP' 10. Washington D. C. , USA: IEEE Press ,2010:285-294.
9Shafiq M Z, Ji Lusheng,Liu A X, et al. A First Look at Cellular Network Performance During Crowded Events[ J]. ACM SIGMETRICS Performance Evaluation Review ,2013,41 ( 1 ) : 17-28.
10Ricciato F, Hasenleithner E, Svoboda P, et al. On the Impact of Unwanted Traffic onto a 3G Network[ C ]// Proceedings of International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing. New York, USA : ACM Press ,2006:49-56.