Abstract: In this present paper, one new species in the genus Saxetophilus Umnov from Qinghai Province, Saxetophilus qinghaiensis sp. nov., is described. This new species is allied to Saxetophilus gansuensis Wang et ...Abstract: In this present paper, one new species in the genus Saxetophilus Umnov from Qinghai Province, Saxetophilus qinghaiensis sp. nov., is described. This new species is allied to Saxetophilus gansuensis Wang et al., 2006 and Saxetophilus mistshenkoi Naumovitsh, 1988. It differs from both of them in: l) widest between lateral keels of pronotum by 3.30-3.75 times (~) or 3.00-3.60 times (~) length of median keel in metazona; and 2) interspace of mesosternal lobes wider than that of lateral lobes. Type specimens are at the Institute of Zoology, Shaanxi Normal University.展开更多
The classical supply chain network(SCN)design problem is extended,where the candidate facilities are subject to failure and the products are prone to elapsed time deteriorion.First,the reliable SCN design problem is d...The classical supply chain network(SCN)design problem is extended,where the candidate facilities are subject to failure and the products are prone to elapsed time deteriorion.First,the reliable SCN design problem is defined by introducing the probability that a facility may be prone to inactivity based on the analysis of perishable product characteristics.The perishable product SCN design problem is formulated as a 0-1 integer programming model.The objective is to minimize the weighted sum of the operating cost(the fixed plus transportation cost)and the expected failure cost.And then,the perishable product SCN design model is discussed and solved using the genetic algorithm(GA).The results show how to generate the tradeoff curve between the operating costs and the expected failure costs.And these tradeoff curves demonstrate empirically that substantial improvements in reliability are often possible with minimal increase in the operating costs.展开更多
Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is ...Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is analyzed with the CK (Canetti-Krawczyk) model and the BAN (Burrows-Abadi- Needham) logic. Results show that it can achieve the alleged authentication and key negotiation goals. Besides those alleged, further analyses indicate that the authentication access process can satisfy other security requirements, such as mutual identity authentication, mutual key control, key confirmation, message integrity check, etc. If the used elliptic curve encryption algorithm and the hash algorithm are secure enough, the protocol can efficiently realize mutual authentication between STAs (station) and APs (access point). Therefore, WAPI can be applied to replace the security mechanism used in the original WLAN international standard to enhance its security.展开更多
With the new characteristics of global cooperation in supply chains being synthetically considered,a hybrid model to the cooperative negotiation process for the order distribution in supply chain is mainly studied.Aft...With the new characteristics of global cooperation in supply chains being synthetically considered,a hybrid model to the cooperative negotiation process for the order distribution in supply chain is mainly studied.After reviewing and analyzing some main domestic and overseas processes in cooperative negotiation modeling in supply chain,some problems are subsequently pointed out.For example,the traditional simple multi-agent system(MAS)frameworks which have some limitations,are not suitable for solving modeling complex systems.To solve these problems,thinking with the aid of the multi-agent structure and complex system modeling,the manufacturing supply chain is taken as an example,and a time Petri net production model is adopted to decompose the materials.And then a cooperative negotiation model for the order distribution in supply chain is constructed based on combining multi-agent techniques with time Petri net modeling.The simulation results reveal that the above model helps solve the problems of cooperative negotiation in supply chains.展开更多
Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made availabl...Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided.展开更多
Online shopping has already become the new mode that a lot of customers try to adopt. At the same time, the online shopping could not be successfully completed without logistics service. Logistics service quality (LSQ...Online shopping has already become the new mode that a lot of customers try to adopt. At the same time, the online shopping could not be successfully completed without logistics service. Logistics service quality (LSQ) has significant impact on revenue and profitability. This paper presents the issue from the perspective of the customer, and explores the initial factors of LSQ based on the online shopping through in-depth interview and the Delphi method. The survey uses a standard 7-point Likert-type scale to measure the LSQ. Empirical research results are shown in detail to confirm seven LSQ dimensions with Chinese characteristics, including timeliness quality, personal contact quality, order quality, order discrepancy handling, order condition and convenience. Statistical analyses of the investigation were conducted to test the reliability and validity of the LSQ evaluation model.展开更多
Due to e-business' s variety of customers with different navigational patterns and demands, multiclass queuing network is a natural performance model for it. The open multi-class queuing network(QN) models are bas...Due to e-business' s variety of customers with different navigational patterns and demands, multiclass queuing network is a natural performance model for it. The open multi-class queuing network(QN) models are based on the assumption that no service center is saturated as a result of the combined loads of all the classes. Several formulas are used to calculate performance measures, including throughput, residence time, queue length, response time and the average number of requests. The solution technique of closed multi-class QN models is an approximate mean value analysis algorithm (MVA) based on three key equations, because the exact algorithm needs huge time and space requirement. As mixed multi-class QN models, include some open and some closed classes, the open classes should be eliminated to create a closed multi-class QN so that the closed model algorithm can be applied. Some corresponding examples are given to show how to apply the algorithms mentioned in this article. These examples indicate that multi-class QN is a reasonably accurate model of e-business and can be solved efficiently.展开更多
Automated negotiation is the key techniques for reaching agreements in agent-mediated electronic commerce. Current automated negotiation models assume that users know the value of the product or service they want to b...Automated negotiation is the key techniques for reaching agreements in agent-mediated electronic commerce. Current automated negotiation models assume that users know the value of the product or service they want to buy and provide their agents with a reservation price, and the agents make offers and reach agreements with other agents according to this reservation price. However, in real world electronic marketplaces users probably do not know the exact value of the item, which is in terms of price, and the reservation price they set to their agents only means the maximum price they are willing to pay for the item. In this paper, we propose a negotiation model to deal with the valuation problem. The shopping agent in our model can deliberate the market price and the seller agent’s reservation price from public available information and the seller agent’s proposals. Also in order to conform with the real world negotiation conditions, we introduce negotiation features of real world human shopping such as multiple sellers, valuation, ultimatum, and learning from available information, etc. into our model.展开更多
This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed ...This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed by cloud services providers,such as wireless network access points(APs),to improve the performance of mobile cloud servicesand be different from traditional mobile operator mode.Then based on this new architecture.we improve our previous(Attribute-basedencryption) ABE access control scheme on cloud for mobile cloud,which is proposed to offload the main amount of computations to the cloudlet as the function of cloud.Simulationresults demonstratethe new access control scheme takes into consideration response time constraints and network statusof access task execution,while satisfying certain network security for mobile cloud.展开更多
City networks have been a critical topic in the fields of urban geography and regional economics. Numerous studies have explored city networks, focusing mainly on infrastructure and industrial networks. Unlike traditi...City networks have been a critical topic in the fields of urban geography and regional economics. Numerous studies have explored city networks, focusing mainly on infrastructure and industrial networks. Unlike traditional urban network of which the major measuring indexes are population sizes and entity industries, online commodity service networks could reflect well the influencing of emerging economies, especially the Internet economy, on city networks. This study analyzes and reveals structural features of China's city networks through online commodity services, providing the internet economic approach on city networks. Results indicate that the core cities of online commodity service networks are mainly concentrated in eastern coastal areas. In addition, spatial polarization and layer structure of network connections are obvious, descending from the centers in eastern China to peripheral cities in central and western China. Online commodity services of different cities show apparent differences and uncertainties in terms of specialization rates of international connection, which presents a tendency toward diversification. Online commodity service networks are not only associated with goods production, supply, and consumption in physical space but also reflect virtual information, capital, and technology flows, thus providing a new empirical approach for understanding city networks in information and internet economic age.展开更多
The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, l...The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, loV promises huge commercial interest and research value, thereby attracting a large number of companies and researchers. This paper proposes an abstract network model of the IoV, discusses the technologies required to create the IoV, presents different applications based on certain currently existing technologies, provides several open research challenges and describes essential future research in the area of loV.展开更多
Plastic bags, though commonly used for packaging of goods, are highly durable and non- biodegradable. Plastic bag litter serves as a negative environmental externality detrimental to animal health and natural beauty o...Plastic bags, though commonly used for packaging of goods, are highly durable and non- biodegradable. Plastic bag litter serves as a negative environmental externality detrimental to animal health and natural beauty of the environment. In an effort to curtail the excessive use of plastic bags in Botswana, the government introduced a plastic levy targeted at consumers at retail points. This study uses primary data collected from 367 respondents randomly selected from six geospatially and purposively selected shopping malls to determine the consumers' willingness to pay (WTP) for continued plastic bag usage and their willingness to accept (WTA) to shift to eco-friendly alternatives. The results of the study revealed that open dumping and burning of plastic litter are more common in Maun than in Gaborone, It also showed that there is a significant relationship between the level of education and W'FP. Further, there is a significant variation in income and education in respect to environmental awareness. The government should improve its efforts of sensitizing the public about the improper disposal of plastic bags.展开更多
The advent of the Intemet has witnessed a revolution in the business world. One typical example is the emergence of the B2B website. The present paper looks at the B2B website, a conventionalized digital text, in term...The advent of the Intemet has witnessed a revolution in the business world. One typical example is the emergence of the B2B website. The present paper looks at the B2B website, a conventionalized digital text, in terms of its communicative purposes, move features as well as linguistic specialties, with the aim of presenting the generic structure of the B2B website and its principal linguistic features contributing to the realization of its communicative purposes. It is demonstrated that the B2B website is one instance of the promotional genres and it has a lot in common with advertisement English and "netsneak" in the aspect of lexico-grammatical features.展开更多
The Internet is becoming increasingly more valuable in the field ofarchitectural design so that what we conventionally called CAD might soon be changed to Internetaided design (iAD). In order to have a clear vision of...The Internet is becoming increasingly more valuable in the field ofarchitectural design so that what we conventionally called CAD might soon be changed to Internetaided design (iAD). In order to have a clear vision of what IAD will be or could be, we should firstexamine what is currently available. This research focuses on an investigation of selected Webvendors, which are typical and most influential in providing Internet related services for the AECindustry. By comparing and analyzing their functionality, services provided, business models,technology and financial situation, we have seen that Internet application in the AEC industry isstill in early stage, especially in the area of on-line engineering consulting for architects.展开更多
Starting with a discussion of development concepts which were applied in practice and which followed the developmentalist paradigm the expansion of traffic infrastructure in colonial and post-colonial periods is prese...Starting with a discussion of development concepts which were applied in practice and which followed the developmentalist paradigm the expansion of traffic infrastructure in colonial and post-colonial periods is presented for the High Asian mountain rim. Selective railways and roads are the major feature of this development, which aimed first on serving the convenience of hill station visitors and followed strategic considerations later on. This bias between regional planning and implementation remains a characteristic feature. At the same time traffic infrastructure without asphalt roads is important for the mountain areas, thus breaking up the strong correlation between development and asphalt roads.展开更多
Understanding the dynamic traffic and usage characteristics of data services in cellular networks is important for optimising network resources and improving user experience.Recent studies have illustrated traffic cha...Understanding the dynamic traffic and usage characteristics of data services in cellular networks is important for optimising network resources and improving user experience.Recent studies have illustrated traffic characteristics from specific perspectives,such as user behaviour,device type,and applications.In this paper,we present the results of our study from a different perspective,namely service providers,to reveal the traffic characteristics of cellular data networks.Our study is based on traffic data collected over a five-day period from a leading mobile operator's core network in China.We propose a Zipf-like model to characterise the distributions of the traffic volume,subscribers,and requests among service providers.Nine distinct diurnal traffic patterns of service providers are identified by formulating and solving a time series clustering problem.Our work differs from previous related works in that we perform measurements on a large quantity of data covering 2.2 billion traffic records,and we first explore the traffic patterns of thousands of service providers.Results of our study present mobile Internet participants with a better understanding of the traffic and usage characteristics of service providers,which play a critical role in the mobile Internet era.展开更多
文摘Abstract: In this present paper, one new species in the genus Saxetophilus Umnov from Qinghai Province, Saxetophilus qinghaiensis sp. nov., is described. This new species is allied to Saxetophilus gansuensis Wang et al., 2006 and Saxetophilus mistshenkoi Naumovitsh, 1988. It differs from both of them in: l) widest between lateral keels of pronotum by 3.30-3.75 times (~) or 3.00-3.60 times (~) length of median keel in metazona; and 2) interspace of mesosternal lobes wider than that of lateral lobes. Type specimens are at the Institute of Zoology, Shaanxi Normal University.
基金The National Key Technology R&D Program of China during the 11th Five-Year Plan Period(No.2006BAH02A06)
文摘The classical supply chain network(SCN)design problem is extended,where the candidate facilities are subject to failure and the products are prone to elapsed time deteriorion.First,the reliable SCN design problem is defined by introducing the probability that a facility may be prone to inactivity based on the analysis of perishable product characteristics.The perishable product SCN design problem is formulated as a 0-1 integer programming model.The objective is to minimize the weighted sum of the operating cost(the fixed plus transportation cost)and the expected failure cost.And then,the perishable product SCN design model is discussed and solved using the genetic algorithm(GA).The results show how to generate the tradeoff curve between the operating costs and the expected failure costs.And these tradeoff curves demonstrate empirically that substantial improvements in reliability are often possible with minimal increase in the operating costs.
基金The National Basic Research Program of China(973Program) (No.G1999035805)the Natural Science Foundation of ShannxiProvince (No.2007F37)China Postdoctoral Science Foundation (No.20060401008,20070410376).
文摘Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is analyzed with the CK (Canetti-Krawczyk) model and the BAN (Burrows-Abadi- Needham) logic. Results show that it can achieve the alleged authentication and key negotiation goals. Besides those alleged, further analyses indicate that the authentication access process can satisfy other security requirements, such as mutual identity authentication, mutual key control, key confirmation, message integrity check, etc. If the used elliptic curve encryption algorithm and the hash algorithm are secure enough, the protocol can efficiently realize mutual authentication between STAs (station) and APs (access point). Therefore, WAPI can be applied to replace the security mechanism used in the original WLAN international standard to enhance its security.
基金The National Natural Science Foundation of China(No.70401013)the National Key Technology R&D Program of China during the 11th Five-Year Plan Period(No.2006BAH02A06)
文摘With the new characteristics of global cooperation in supply chains being synthetically considered,a hybrid model to the cooperative negotiation process for the order distribution in supply chain is mainly studied.After reviewing and analyzing some main domestic and overseas processes in cooperative negotiation modeling in supply chain,some problems are subsequently pointed out.For example,the traditional simple multi-agent system(MAS)frameworks which have some limitations,are not suitable for solving modeling complex systems.To solve these problems,thinking with the aid of the multi-agent structure and complex system modeling,the manufacturing supply chain is taken as an example,and a time Petri net production model is adopted to decompose the materials.And then a cooperative negotiation model for the order distribution in supply chain is constructed based on combining multi-agent techniques with time Petri net modeling.The simulation results reveal that the above model helps solve the problems of cooperative negotiation in supply chains.
文摘Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided.
基金Project (Nos. 50505044 and 70472061) supported by the National Natural Science Foundation of China
文摘Online shopping has already become the new mode that a lot of customers try to adopt. At the same time, the online shopping could not be successfully completed without logistics service. Logistics service quality (LSQ) has significant impact on revenue and profitability. This paper presents the issue from the perspective of the customer, and explores the initial factors of LSQ based on the online shopping through in-depth interview and the Delphi method. The survey uses a standard 7-point Likert-type scale to measure the LSQ. Empirical research results are shown in detail to confirm seven LSQ dimensions with Chinese characteristics, including timeliness quality, personal contact quality, order quality, order discrepancy handling, order condition and convenience. Statistical analyses of the investigation were conducted to test the reliability and validity of the LSQ evaluation model.
文摘Due to e-business' s variety of customers with different navigational patterns and demands, multiclass queuing network is a natural performance model for it. The open multi-class queuing network(QN) models are based on the assumption that no service center is saturated as a result of the combined loads of all the classes. Several formulas are used to calculate performance measures, including throughput, residence time, queue length, response time and the average number of requests. The solution technique of closed multi-class QN models is an approximate mean value analysis algorithm (MVA) based on three key equations, because the exact algorithm needs huge time and space requirement. As mixed multi-class QN models, include some open and some closed classes, the open classes should be eliminated to create a closed multi-class QN so that the closed model algorithm can be applied. Some corresponding examples are given to show how to apply the algorithms mentioned in this article. These examples indicate that multi-class QN is a reasonably accurate model of e-business and can be solved efficiently.
文摘Automated negotiation is the key techniques for reaching agreements in agent-mediated electronic commerce. Current automated negotiation models assume that users know the value of the product or service they want to buy and provide their agents with a reservation price, and the agents make offers and reach agreements with other agents according to this reservation price. However, in real world electronic marketplaces users probably do not know the exact value of the item, which is in terms of price, and the reservation price they set to their agents only means the maximum price they are willing to pay for the item. In this paper, we propose a negotiation model to deal with the valuation problem. The shopping agent in our model can deliberate the market price and the seller agent’s reservation price from public available information and the seller agent’s proposals. Also in order to conform with the real world negotiation conditions, we introduce negotiation features of real world human shopping such as multiple sellers, valuation, ultimatum, and learning from available information, etc. into our model.
基金supported by National Natural Science Foundation of China(No.U 1405254, 61472092)China Postdoctoral Science Foundation(No.2015M581101)National Science and Technology SupportingFoundation of China(No.2014BAH41B00)
文摘This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed by cloud services providers,such as wireless network access points(APs),to improve the performance of mobile cloud servicesand be different from traditional mobile operator mode.Then based on this new architecture.we improve our previous(Attribute-basedencryption) ABE access control scheme on cloud for mobile cloud,which is proposed to offload the main amount of computations to the cloudlet as the function of cloud.Simulationresults demonstratethe new access control scheme takes into consideration response time constraints and network statusof access task execution,while satisfying certain network security for mobile cloud.
基金Under the auspices of National Natural Science Foundation of China(No.41571146,41701178)China Postdoctoral Science Foundation(No.2016M600393)Natural Science Foundation of Jiangsu Province(No.BK20170639)
文摘City networks have been a critical topic in the fields of urban geography and regional economics. Numerous studies have explored city networks, focusing mainly on infrastructure and industrial networks. Unlike traditional urban network of which the major measuring indexes are population sizes and entity industries, online commodity service networks could reflect well the influencing of emerging economies, especially the Internet economy, on city networks. This study analyzes and reveals structural features of China's city networks through online commodity services, providing the internet economic approach on city networks. Results indicate that the core cities of online commodity service networks are mainly concentrated in eastern coastal areas. In addition, spatial polarization and layer structure of network connections are obvious, descending from the centers in eastern China to peripheral cities in central and western China. Online commodity services of different cities show apparent differences and uncertainties in terms of specialization rates of international connection, which presents a tendency toward diversification. Online commodity service networks are not only associated with goods production, supply, and consumption in physical space but also reflect virtual information, capital, and technology flows, thus providing a new empirical approach for understanding city networks in information and internet economic age.
基金supported by the Natural Science Foundation of Beijing under Grant No.4132048,NSFC(61472047),and NSFC(61202435)
文摘The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, loV promises huge commercial interest and research value, thereby attracting a large number of companies and researchers. This paper proposes an abstract network model of the IoV, discusses the technologies required to create the IoV, presents different applications based on certain currently existing technologies, provides several open research challenges and describes essential future research in the area of loV.
文摘Plastic bags, though commonly used for packaging of goods, are highly durable and non- biodegradable. Plastic bag litter serves as a negative environmental externality detrimental to animal health and natural beauty of the environment. In an effort to curtail the excessive use of plastic bags in Botswana, the government introduced a plastic levy targeted at consumers at retail points. This study uses primary data collected from 367 respondents randomly selected from six geospatially and purposively selected shopping malls to determine the consumers' willingness to pay (WTP) for continued plastic bag usage and their willingness to accept (WTA) to shift to eco-friendly alternatives. The results of the study revealed that open dumping and burning of plastic litter are more common in Maun than in Gaborone, It also showed that there is a significant relationship between the level of education and W'FP. Further, there is a significant variation in income and education in respect to environmental awareness. The government should improve its efforts of sensitizing the public about the improper disposal of plastic bags.
文摘The advent of the Intemet has witnessed a revolution in the business world. One typical example is the emergence of the B2B website. The present paper looks at the B2B website, a conventionalized digital text, in terms of its communicative purposes, move features as well as linguistic specialties, with the aim of presenting the generic structure of the B2B website and its principal linguistic features contributing to the realization of its communicative purposes. It is demonstrated that the B2B website is one instance of the promotional genres and it has a lot in common with advertisement English and "netsneak" in the aspect of lexico-grammatical features.
文摘The Internet is becoming increasingly more valuable in the field ofarchitectural design so that what we conventionally called CAD might soon be changed to Internetaided design (iAD). In order to have a clear vision of what IAD will be or could be, we should firstexamine what is currently available. This research focuses on an investigation of selected Webvendors, which are typical and most influential in providing Internet related services for the AECindustry. By comparing and analyzing their functionality, services provided, business models,technology and financial situation, we have seen that Internet application in the AEC industry isstill in early stage, especially in the area of on-line engineering consulting for architects.
文摘Starting with a discussion of development concepts which were applied in practice and which followed the developmentalist paradigm the expansion of traffic infrastructure in colonial and post-colonial periods is presented for the High Asian mountain rim. Selective railways and roads are the major feature of this development, which aimed first on serving the convenience of hill station visitors and followed strategic considerations later on. This bias between regional planning and implementation remains a characteristic feature. At the same time traffic infrastructure without asphalt roads is important for the mountain areas, thus breaking up the strong correlation between development and asphalt roads.
基金supported by the National Natural Science Foundation of China under Grant No.61072061the 111 Project of China under Grant No.B08004the Fundamental Research Funds for the Central Universities under Grant No.2013RC0114
文摘Understanding the dynamic traffic and usage characteristics of data services in cellular networks is important for optimising network resources and improving user experience.Recent studies have illustrated traffic characteristics from specific perspectives,such as user behaviour,device type,and applications.In this paper,we present the results of our study from a different perspective,namely service providers,to reveal the traffic characteristics of cellular data networks.Our study is based on traffic data collected over a five-day period from a leading mobile operator's core network in China.We propose a Zipf-like model to characterise the distributions of the traffic volume,subscribers,and requests among service providers.Nine distinct diurnal traffic patterns of service providers are identified by formulating and solving a time series clustering problem.Our work differs from previous related works in that we perform measurements on a large quantity of data covering 2.2 billion traffic records,and we first explore the traffic patterns of thousands of service providers.Results of our study present mobile Internet participants with a better understanding of the traffic and usage characteristics of service providers,which play a critical role in the mobile Internet era.