2021
DOI: 10.32604/cmc.2021.014635
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Algorithms for Cache-Throughput Analysis in Cellular-D2D 5G Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…The growing demand for videos on mobile devices is a huge challenge to current network architecture. To address this challenge, Wu et al [45] proposed a D2D caching based video transmission mechanism, which allows end users to cache and share videos cooperatively, aimed at improving mobile users' QoE. In response to the same demand, Anjum et al [46] suggested a two-tier D2D caching approach aimed at reducing the delay experienced by Video-on-Demand (VoD) mobile users.…”
Section: Caching At End Devicesmentioning
confidence: 99%
See 1 more Smart Citation
“…The growing demand for videos on mobile devices is a huge challenge to current network architecture. To address this challenge, Wu et al [45] proposed a D2D caching based video transmission mechanism, which allows end users to cache and share videos cooperatively, aimed at improving mobile users' QoE. In response to the same demand, Anjum et al [46] suggested a two-tier D2D caching approach aimed at reducing the delay experienced by Video-on-Demand (VoD) mobile users.…”
Section: Caching At End Devicesmentioning
confidence: 99%
“…Moreover, in Ref. [45], Wu et al designed a usercentric video transmission mechanism based on D2D communications allowing user video caching and sharing. The proposed mechanism considered various factors jointly, such as user relevance, user sharing willingness, etc.…”
Section: Hanwen LI Et Al: a Survey Of Edge Caching: Key Issues And Ch...mentioning
confidence: 99%
“…In our proposed CBAS architecture, the de-registration process occurs when a Host-Node is not performing any activity in the network or when a Host-Node willingly wants to leave a cluster. In a case, if a Host-Node is not active for a long-time duration 4 , its registration information will be removed from both Binging-Table and MAG-Table . In a case, a Host-Node willingly wants to leave the cluster, following steps will be performed. The De-registration procedure is shown in Fig.…”
Section: De-registration Procedures Of a Host-node With Mag Through T...mentioning
confidence: 99%
“…According to [1], the number of IoT devices worldwide are predicted to reach more than 25.4 billion in 2030. However, this results in limitations for the devices connected via the wireless communication links such as high cost, low battery power, high energy consumption, limited communication distance, limited IP addresses, and weak security [2][3][4].…”
Section: Introductionmentioning
confidence: 99%
“…With the rapid development of cloud services [1], heterogeneous networks [2], 5G networks [3], mobile payments [4], and other network services, a certain correlation can be observed between various services [5]. Cloud computing [6] employs the Internet as a carrier to provide users fast, reliable, and quality of service (QoS) guaranteed data processing services.…”
Section: Introductionmentioning
confidence: 99%