2018 IEEE International Symposium on Information Theory (ISIT) 2018
DOI: 10.1109/isit.2018.8437577
|View full text |Cite
|
Sign up to set email alerts
|

Content Based Status Updates

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(31 citation statements)
references
References 9 publications
0
31
0
Order By: Relevance
“…Our analysis pertains a point-to-point link serving a single flow of data. The following are natural generalizations: (i) a pointto-point link serving multiple independent flows of information, possibly with different reliability, freshness, and latency requirements or priorities as in [37], [38]; (ii) a broadcast scenario with common information to be sent to all receivers; (iii) a broadcast scenario where independent information flows are to be sent to different receivers; (iv) the multiple-access case, where multiple sensors send information to a common destination; (v) the multihop setting where the objective is to maintain low end-to-end latency and high end-to-end data freshness.…”
Section: B Beyond the Point-to-point Setupmentioning
confidence: 99%
“…Our analysis pertains a point-to-point link serving a single flow of data. The following are natural generalizations: (i) a pointto-point link serving multiple independent flows of information, possibly with different reliability, freshness, and latency requirements or priorities as in [37], [38]; (ii) a broadcast scenario with common information to be sent to all receivers; (iii) a broadcast scenario where independent information flows are to be sent to different receivers; (iv) the multiple-access case, where multiple sensors send information to a common destination; (v) the multihop setting where the objective is to maintain low end-to-end latency and high end-to-end data freshness.…”
Section: B Beyond the Point-to-point Setupmentioning
confidence: 99%
“…Having defined Y c in (30), we proceed to derive the MGF MYc (s) = E[e sYc ]. Let K c , Kc , and K c denote the random variables representing the numbers of occurrences of random variables η c , ηc , and η c , respectively.…”
Section: A Mgfs Of Aoi and Peak Aoi Under The Source-aware Preemptive...mentioning
confidence: 99%
“…Let K c , Kc , and K c denote the random variables representing the numbers of occurrences of random variables η c , ηc , and η c , respectively. Then, using (30), the MGF of Y c is calculated as…”
Section: A Mgfs Of Aoi and Peak Aoi Under The Source-aware Preemptive...mentioning
confidence: 99%
See 1 more Smart Citation
“…They also show that the AoI obtained in their policies is a multiplicative factor away from the optimal value. In [8] the authors study the problem of giving pre-emptive priority to one flow over another, in a single queue system, and obtain closed-form expressions for average age and peak age. In works such as [9], [10], the problem of optimal sampling in order to minimize age is addressed, in the context of single hop transmission.…”
Section: Introductionmentioning
confidence: 99%