Optimizing Telecom Networks with Graph Theory: A Comprehensive Review of Approaches and Benefits
Abstract
Keywords
References
Ageyev, D., Ignatenko, A., & Wehbe, F. (2013). Design of information and telecommunication systems with the usage of the multi-layer graph model. 2013 12th International Conference on the Experience of Designing and Application of CAD Systems in Microelectronics (CADSM), 1–4.
Bondy, J. A., & Murty, U. S. R. (2008). Graph theory. Springer Publishing Company, Incorporated.
Chaparro, C., & Eberle, W. (2015). Detecting anomalies in mobile telecommunication networks using a graph based approach. The Twenty-Eighth International Flairs Conference.
Daas, M. J., Jubran, M., & Hussein, M. (2019). Energy management framework for 5G ultra-dense networks using graph theory. IEEE Access, 7, 175313–175323.
Dasgupta, K., Singh, R., Viswanathan, B., Chakraborty, D., Mukherjea, S., Nanavati, A. A., & Joshi, A. (2008). Social ties and their relevance to churn in mobile telecom networks. Proceedings of the 11th International Conference on Extending Database Technology: Advances in Database Technology, 668–677.
Donetti, L., Hurtado, P. I., & Munoz, M. A. (2005). Entangled networks, synchronization, and optimal network topology. Physical Review Letters, 95(18), 188701.
Duran, K., Karanlik, B., & Canberk, B. (2021). Graph theoretical approach for automated IP lifecycle management in telco networks. International Journal of Network Management, 31(4), e2138.
Hu, X., Chen, H., Liu, S., Jiang, H., Chu, G., & Li, R. (2022). BTG: A Bridge to Graph machine learning in telecommunications fraud detection. Future Generation Computer Systems, 137, 274–287.
Krinkin, K., Kulikov, I., Vodyaho, A., & Zhukova, N. (2020). Architecture of a telecommunications network monitoring system based on a knowledge graph. 2020 26th Conference of Open Innovations Association (FRUCT), 231–239.
Marburger, A., & Westfechtel, B. (2010). Graph-based structural analysis for telecommunication systems. Graph Transformations and Model-Driven Engineering: Essays Dedicated to Manfred Nagl on the Occasion of His 65th Birthday, 363–392.
Nanavati, A. A., Singh, R., Chakraborty, D., Dasgupta, K., Mukherjea, S., Das, G., Gurumurthy, S., & Joshi, A. (2008). Analyzing the structure and evolution of massive telecom graphs. IEEE Transactions on Knowledge and Data Engineering, 20(5), 703–718.
Nedić, A., Olshevsky, A., & Rabbat, M. G. (2018). Network topology and communication-computation tradeoffs in decentralized optimization. Proceedings of the IEEE, 106(5), 953–976.
Patel, K. J., & Dzalilov, Z. (2004). Dynamic Reconfiguration and Graph Theory Approaches to Failures in IT based Telecommunication Networks. Publications of the 4th IASTED International Conference on Modelling, Simulation, and Optimization (MSO), Kauai, Hawaii, USA.
Rai, S., & Soh, S. (1991). A computer approach for reliability evaluation of telecommunication networks with heterogeneous link-capacities. IEEE Transactions on Reliability, 40(4), 441–451.
Rusek, K., Suárez-Varela, J., Almasan, P., Barlet-Ros, P., & Cabellos-Aparicio, A. (2020). Routenet: Leveraging graph neural networks for network modeling and optimization in sdn. IEEE Journal on Selected Areas in Communications, 38(10), 2260–2270.
Saravanan, M., & Vijay Raajaa, G. (2012). A graph-based churn prediction model for mobile telecom networks. Advanced Data Mining and Applications: 8th International Conference, ADMA 2012, Nanjing, China, December 15-18, 2012. Proceedings 8, 367–382.
Spulber, D. F., & Yoo, C. S. (2004). On the regulation of networks as complex systems: A graph theory approach. Nw. UL Rev., 99, 1687.
Tizghadam, A., & Leon-Garcia, A. (2010). Betweenness centrality and resistance distance in communication networks. IEEE Network, 24(6), 10–16.
Tseng, V. S., Ying, J.-C., Huang, C.-W., Kao, Y., & Chen, K.-T. (2015). Fraudetector: A graph-mining-based framework for fraudulent phone call detection. Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2157–2166.
Uykan, Z., & Jäntti, R. (2015). Transmission-order optimization for bidirectional Device-To-Device (D2D) communications underlaying cellular TDD networks—A graph theoretic approach. IEEE Journal on Selected Areas in Communications, 34(1), 1–14.
Verbeke, W., Dejaeger, K., Martens, D., Hur, J., & Baesens, B. (2012). New insights into churn prediction in the telecommunication sector: A profit driven data mining approach. European Journal of Operational Research, 218(1), 211–229.
Volinsky, C. (2010). Mining massive graphs for telecommunication applications. Eighth Workshop on Mining and Learning with Graphs.
Zavlanos, M. M., Egerstedt, M. B., & Pappas, G. J. (2011). Graph-theoretic connectivity control of mobile robot networks. Proceedings of the IEEE, 99(9), 1525–1540.
Zhang, K., Kalander, M., Zhou, M., Zhang, X., & Ye, J. (2020). An influence-based approach for root cause alarm discovery in telecom networks. International Conference on Service-Oriented Computing, 124–136.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.