2019
DOI: 10.1007/s11276-019-01974-z
|View full text |Cite
|
Sign up to set email alerts
|

Optimal ThrowBoxes assignment for big data multicast in VDTNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 24 publications
0
13
0
Order By: Relevance
“…Additionally, the non-negativity of each individual variable is guaranteed with constraint (14). Here, we consider the case that the above two constraints (12) and (13) are linearly independent, i.e., E Z P…”
Section: Problem Formulation and Algorithm Designmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, the non-negativity of each individual variable is guaranteed with constraint (14). Here, we consider the case that the above two constraints (12) and (13) are linearly independent, i.e., E Z P…”
Section: Problem Formulation and Algorithm Designmentioning
confidence: 99%
“…Particularly, AoI measures the time elapsed since the latest received update packet was generated, while PAoI provides information about the maximum value of AoI for each update and captures the extent to which the update information is stale. Unlike many conventional metrics, e.g., delay or throughput [10]- [12], AoI and PAoI are affected not only by the transmission delay but also by the update generation rate, and hence they are more essential and comprehensive for information freshness evaluation [13].…”
Section: Introductionmentioning
confidence: 99%
“…Figure 4 illustrates the system architecture of the privacy-preserving matching scheme, which is composed of five entities: the requestor, the intermediate platform, the space provider, the server, and the CA. These entities use modern networking technologies to communicate with each other, such as wireless area network, wide area network, cellular network, and vehicular ad-hoc network [30]. Each entity is explained in detail below.…”
Section: Privacy-preserving Matching Schemementioning
confidence: 99%
“…Placing popular contents as close as possible to users at the edge nodes can greatly reduce duplicate data transmission and service latency. As the cache capacity of edge nodes is limited compared to a huge number of contents [3], the effective utilization of the available cache capacity has a profound effect on the service performance.…”
Section: Introductionmentioning
confidence: 99%