參考文獻 |
[1] 3GPP, “3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Requirements for Evolved UTRA (E-UTRA) and Evolved UTRAN (E-UTRAN),” 2009, technical Report 3GPP TS 25.913 Version 9.0.0 (2009-12).
[2] Cisco, “Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2013-2018,” 2014.
[3] D. York, “What is an Over-The-Top (OTT) Application or Service? - A Brief Explanation,” http://www.disruptivetelephony.com/2012/07/
what-is-an-over-the-top-ott-application-or-service-a-brief-explanation.html.
[4] C. Janssen, “Over-the-Top Application (OTT),” http://www.techopedia.com/
definition/29145/over-the-top-application-ott.
[5] Napatech, “Building Intelligent Mobile Data Services using Deep Packet Inspection,”2011.
[6] 3GPP, “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study on Application Based Charging (ABC),” 2013, technical Report 3GPP TR 23.800 Version 12.0.0 (2013-03).
[7] K. Kimbler and M. Taylor, “Value added mobile broadband services Innovation driven transformation of the ‘smart pipe’,” IEEE International Conference on Intelligence in Next Generation Networks, pp. 30–34, 2012.
[8] M. Olsson and C. Mulligan, EPC and 4G Packet Networks, Second Edition: Driving the Mobile Broadband Revolution. Academic Press, 2012.
[9] 3GPP, “3rd Generation Partnership Project; Technical Specification Group Service and System Aspects; Policy and charging control architecture,” 2012, technical Specification 3GPP TS 23.203 V12.1.0 (2013-06).
[10] A. Goldner, “3GPP Traffic Detection Functionality,” IEEE International Conference on Communications, pp. 6993–6998, 2012.
[11] L. Luna, “TDF in LTE: The Next-Generation Pricing Model Are Here,” 2013, current Analysis.
[12] Allot communication, “Advantages of Pure-play versus Embedded TDF for LTE Networks,” 2013.
[13] Allot communication, “Digging Deeper Into Deep Packet Inspection (DPI),” 2007.
[14] Y.-B. Lin and S.-I. Sou, Charging for Mobile All-IP Telecommunications, Wireless Communications and Mobile Computing. Wiley, 2008. [Online].
Available: http://books.google.com.tw/books?id=niploL8lJFIC
[15] G. Camarillo and M. A. Garcia-Martin, The 3G IP Multimedia Subsystem (IMS): Merging the Internet and the Cellular Worlds. Wiley, 2008.
[16] T. Grgic and M. Matijasevic, ““Smarter” Online Charging for Over-The-Top Services by Introducing User Context,” IEEE 2012 5th Joint IFIP Wireless and Mobile Networking Conference (WMNC), pp. 81–87, 2012.
[17] A. Nucci and K. Papagiannaki, Design, Measurement and Management of Large-Scale IP Networks: Bridging the Gap Between Theory and Practice. Cambridge University Press, 2008.
[18] C.-S. Yang, M.-Y. Liao, M.-Y. Luo, S.-M. Wang, and C.-E. Yeh, “A Network Management System Based on DPI,” IEEE International Conference on Network-Based Information Systems (NBiS), pp. 385–388, 2010.
[19] G. Finnie, “The New DPI: Challenges & Opportunities In The LTE Era,” 2011, heavy Reading.
[20] Napatech, “Scaling Policy Enforcement and Deep Packet Inspection,” 2011.
[21] 3GPP, “3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; End-to-end Quality of Service (QoS) concept and architecture,” 2005, technical Specification 3GPP TS 23.207 Version 5.10.0 (2005-09).
[22] P.-C. Lin, Y.-D. Lin, Y.-C. Lai, and T.-H. Lee, “Using String Matching for Deep Packet Inspection,” IEEE Computer Society, pp. 23–28, 2008.
[23] J. E. Hopcroft, J. D. Ullman, and R. Motwani, Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, 2006.
[24] G. Navarro and M. Raffinot, “New Techniques for Regular Expression Searching,” Springer-Verlag Algorithmica, vol. 41, no. 2, pp. 89–116, 2005.
[25] T. AbuHmed, A. Mohaisen, and D. Nyang, “A Survey on Deep Packet Inspection for Intrusion Detection Systems,” Magazine of Korea Telecommunication Society, vol. 24, no. 11, pp. 25–36, 2007.
[26] S. Dharmapurikar, P. Krishnamurthy, and J. Lockwood, “Deep packet inspection using parallel bloom filters,” IEEE Micro, vol. 24, no. 1, pp. 52–61, 2004.
[27] S.-I. Sou and C.-S. Lin, “SPR proxy mechanism for 3GPP policy and charging control system,” Computer Network, vol. 55, no. 17, pp. 3487–3862, 2011.
[28] S.-I. Sou, “Mobile Data Offloading With Policy and Charging Control in 3GPP Core Network,” IEEE Transactions on Vehicular Technology, vol. 62, no. 7, pp. 3481–3486, 2013.
[29] S.-I. Sou, J.-Y. Jeng, and P. Lin, “Improving session continuity through user mobility tracking for EPS inter-serving gateway handover,” Wireless Communications and Mobile Computing, vol. 12, no. 12, pp. 1077–1090, 2012.
[30] H.-F. Ho, S.-I. Sou, and J.-Y. Jeng, “Credit allocation schemes for quality-class-oriented
services in next generation networks,” IEEE International Computer Symposium (ICS), pp. 626–631, 2010.
[31] T. Taleb and A. Ksentini, “Impact of emerging social media applications on mobile networks,” IEEE International Conference on Communications (ICC), pp. 5934–5938, 2013.
[32] M. Lott, J. Karppinen, and J. Kross, “Service differentiation for enhanced consumer experiences,” IEEE International Conference on Intelligence in Next Generation Networks (ICIN), pp. 58–63, 2011.
[33] Inside 硬塞的網路趨勢觀察, “傳統語音資費的末路?中華電信宣佈mpro 用戶免費用line,” http://www.inside.com.tw/2013/11/26/mpro-50-all-you-can-line.
|