2020
DOI: 10.1109/tccn.2020.3005921
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Optimization of Availability and Communication Cost in Satellite-UAV Mobile Edge Caching System With Fault-Tolerant Codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(13 citation statements)
references
References 33 publications
0
13
0
Order By: Relevance
“…Caching is a promising method in satellite-UAVassisted networks. For instance, Gu et al [30] consider a system, where the UAV is responsible for collecting data from the TNs, and the LEO satellite is used to broadcast data.…”
Section: Hybrid Satellite-uav-assisted Edge-centric Iot Networkmentioning
confidence: 99%
“…Caching is a promising method in satellite-UAVassisted networks. For instance, Gu et al [30] consider a system, where the UAV is responsible for collecting data from the TNs, and the LEO satellite is used to broadcast data.…”
Section: Hybrid Satellite-uav-assisted Edge-centric Iot Networkmentioning
confidence: 99%
“…In [17], the authors consider a space-air-ground integrated mobile edge caching IoT system composed of satellite and unmanned aerial vehicles (UAVs), where LEO satellite broadcasts data, and UAVs collect the data from decentralized ground sensors. Since the sensors' low-power property leads data loss, fault-tolerant codes are employed for availability protection.…”
Section: Related Workmentioning
confidence: 99%
“…Since the sensors' low-power property leads data loss, fault-tolerant codes are employed for availability protection. This paper is different from [17] because this paper utilizes LEO satellites to provide computation offloading service.…”
Section: Related Workmentioning
confidence: 99%
“…Availability. This functionality refers to the capacity of the system to keep itself accessible for every authorized party and not having any significant issues when transferring information from one side to another [47]. In the context of a Cyber-Physical System it becomes even more important, as the data flow among the nodes of the system must be guaranteed so as to keep the deployment working as planned.…”
Section: Proposed Frameworkmentioning
confidence: 99%