2015
DOI: 10.1007/s11277-015-2492-1
|View full text |Cite
|
Sign up to set email alerts
|

Offloading Multiple Mobile Data Contents Through Opportunistic Device-to-Device Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0
1

Year Published

2015
2015
2019
2019

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(8 citation statements)
references
References 12 publications
0
7
0
1
Order By: Relevance
“…Offloading over secondary networks has been studied in the following literature, which can be mainly divided into two categories: ISM offloading [29,34,51,53] and white space offloading [17,28,[54][55][56].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Offloading over secondary networks has been studied in the following literature, which can be mainly divided into two categories: ISM offloading [29,34,51,53] and white space offloading [17,28,[54][55][56].…”
Section: Related Workmentioning
confidence: 99%
“…In our research, we take a content-centric approach to selecting distributors and do not rely on the social aspects of offloading. Cheng et al [53] take a content-centric approach to selecting distributors. The authors propose an algorithm to determine the number of distributors based on the popularity of the content and rate of contacts between devices.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed method was compared with the k-most anxious user (k-MAS) method and the push-and-track (PnT) method [24]. In the two contrastive methods, the edge server will directly push the data blocks to the users via the cellular network, if some users fail to receive the required data before the end of their respectively time window or the remaining time is insufficient to transmit the data via the cellular network.…”
Section: Algorithm 2 Seed Selectionmentioning
confidence: 99%
“…Very lately, a new opportunistic network approach named Opportunistic device-to-device (D2D) [10,4] communication has caught the attention of the research community. In opportunistic D2D, different devices communicate with each other in an autonomous way without having any centralised infrastructure.…”
Section: Device-to-device Opportunistic Networkmentioning
confidence: 99%