2017
DOI: 10.1016/j.comnet.2015.05.009
|View full text |Cite
|
Sign up to set email alerts
|

Information-centric networking with built-in network coding to achieve multisource transmission at network-layer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
19
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 34 publications
(19 citation statements)
references
References 29 publications
0
19
0
Order By: Relevance
“…Meanwhile, MF are sensitive to delays, particularly for user‐facing applications (eg, web searches, social networks, or recommendation systems). Therefore, the objective for MF is to maximize the fraction of flows that achieves their deadlines: the deadline meet rate (DMR) …”
Section: Introductionmentioning
confidence: 98%
See 1 more Smart Citation
“…Meanwhile, MF are sensitive to delays, particularly for user‐facing applications (eg, web searches, social networks, or recommendation systems). Therefore, the objective for MF is to maximize the fraction of flows that achieves their deadlines: the deadline meet rate (DMR) …”
Section: Introductionmentioning
confidence: 98%
“…Therefore, the objective for MF is to maximize the fraction of flows that achieves their deadlines: the deadline meet rate (DMR). 7 Some early flow-scheduling methods for data center network (DCN), such as, Equal-Cost Multipath Routing (ECMP), create a risk of load imbalance: some paths could become congested owing to a concentration of EF1/EF2 whereas others remain underutilized. This arises, in part, because the size of mice/elephant flows varies significantly and the time that they occupy a path varies considerably.…”
Section: Introductionmentioning
confidence: 99%
“…The number of vectors received at each node is distributed randomly across the network. We solved the MIP model using CPlex 7 . The evaluation benchmarks are generated using HElib library for homomorphic encryption [12] which implements an optimized version of the BGV (Brakerski-Gentry-Vaikuntanathan) fully homomorphic encryption scheme.…”
Section: A Scenario and Parameters Settingmentioning
confidence: 99%
“…In [6], the authors investigate the required architectural changes that arise from the semantic difference between naming. In [7], the authors propose a novel signature scheme compatible with network coding, they propose also a forwarding plane to observe the network state, such as network failure, link transmission performance and distribution of coded packets. In [8], the authors design a special Interest coding and forwarding strategies for getting linearly independant coded blocks simultaneously from multiple nodes.…”
Section: Introductionmentioning
confidence: 99%
“…[14][15][16][17][18][19][20][21][22][23][24] However, a coded block may be cached by multiple content routers on its way to consumers, and it may be sent to the same consumer in future requests. [14][15][16][17][18][19][20][21][22][23][24] However, a coded block may be cached by multiple content routers on its way to consumers, and it may be sent to the same consumer in future requests.…”
mentioning
confidence: 99%