2016
DOI: 10.1109/access.2016.2633485
|View full text |Cite
|
Sign up to set email alerts
|

Challenges of Mobile Social Device Caching

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(21 citation statements)
references
References 26 publications
0
19
0
Order By: Relevance
“…Another topic of interest in socially aware networking is content caching. Caching has been getting increased attention as a technology to reduce network traffic and realize efficient content delivery [202,203].…”
Section: Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Another topic of interest in socially aware networking is content caching. Caching has been getting increased attention as a technology to reduce network traffic and realize efficient content delivery [202,203].…”
Section: Overviewmentioning
confidence: 99%
“…Content-caching technologies can be categorized into those that cache in the end device and those that cache in the network. Caching in the network is key in content delivery networks (CDNs) [204] and content centric networking (CCN) or named data networking (NDN) [205], and it has been widely studied [202,203,206]. More recently, caching in mobile edges (i.e., small-base stations), also called femtocaching [207], has been getting attention as a key technology in 5G wireless networks [203,[208][209][210].…”
Section: Overviewmentioning
confidence: 99%
“…Lee et al analyzed human mobility from traces of location-based social networks to develop a method to deliver video data by moving people to static kiosks [23]. Authors in [24] exploited the human mobility patterns and social tie for caching contents in the mobile devices for distribution through device-to-device communication. Chen et al proposed a machine-learning algorithm on both content request and human mobility for proactive caching at BBUs and RRHs [25].…”
Section: Related Workmentioning
confidence: 99%
“…In fact, social characteristics such as the external influence for users' relationships and ties have played a crucial role in information propagation over the Internet and will continue to shape the way information is accessed [22]. To exploit the correlation between users' social relations, centrality can be used to identify the most influential users, who may act as a conduit for information diffusion [23,24]. In this paper, centrality is considered weightily to estimate g values.…”
Section: Cache Placement Algorithm In Dynamic Stackelbergmentioning
confidence: 99%