The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
[1]
TR 21.905: "Vocabulary for 3GPP Specifications".
[2]
"Apple App Store Tops 300,000 Apps," internet source: http://www.pcmag.com/article2/0,2817,2373169,00.asp
[3]
"Crossing the 100,000 Applications Mark," internet source: http://blog.androlib.com/
[4]
"Smartphones and a 3G Network,": Signals Research Group.
[5]
"Diversity in Smartphone Usage,": H. Falaki, R. Mahajan, S. Kandula, D. Lymberopoulos, R. Govindan, and D. Estrin, MobiSys'10, June 2010.
[6]
"A First Look at Traffic on Smartphones,": H. Falaki, D. Lymberopoulos, R. Mahajan, S. Kandula, and D. Estrin, IMC November 2010.
[7]
"An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol,": S. Baset and H. Schulzrinne, IEEE Infocom 2006.
[8]
"Find*Me," internet source: https://market.android.com/details?id=com.gpsshare.ads
[9]
http://www.caida.org/data/passive/trace_stats/sanjose-B/2010/equinix-sanjose.2010-0415.dirB.df.xml
[10]
http://www.caida.org/data/passive/trace_stats/sanjose-A/2010/equinix-sanjose.2010-09.dirA.df.xml
[11]
http://www.caida.org/data/passive/trace_stats/sanjose-B/2010/equinix-sanjose.2010-09.dirB.df.xml
[12]
http://www.caida.org/data/passive/trace_stats/chicago-B/2009/equinix-chicago.2009-04.dirB.df.xml
[13]
C. Na, J. K. Chen, and T. S. Rappaport, "Measured Traffic Statistics and Throughput of IEEE 802.11b Public WLAN Hotspots with Three Different Applications,": IEEE Transactions On Wireless Communications, Nov. 2006.
[14]
F. Wamser, R. Pries, D. Staehle, K. Heck, and P. Tran-Gia, "Traffic characterization of a residential wireless Internet access,": Special Issue of the Telecommunication Systems (TS) Journal, 48: 1-2, 2010.
[15]
http://www.youtube.com/live
[16]
http://www.tuaw.com/2011/01/05/comcast-to-offer-3-000-hours-of-live-streaming-content-to-ipad/
[17]
http://www.omaha.com/article/20101205/MONEY/712059914
[18]
TS 26.346: "Multimedia Broadcast/
Multicast Service (MBMS); Protocols and codecs".
[19]
http://www.kaspersky.com/news?id=207576158
[20]
http://www.appedia.com/news/2148.html
[21]
http://www.androidpolice.com/2011/03/01/the-mother-of-all-android-malware-has-arrived-stolen-apps-released-to-the-market-that-root-your-phone-steal-your-data-and-open-backdoor
[22]
X. Geng and A.B. Whinston, "Defeating Distributed Denial of Service Attacks,": IEEE Journal of IT Professional, Volume 2, Issue 4, Jul. 2000.