IEEE INFOCOM 2017 - IEEE Conference on Computer Communications 2017
DOI: 10.1109/infocom.2017.8057029
|View full text |Cite
|
Sign up to set email alerts
|

Proactive retention aware caching

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(14 citation statements)
references
References 17 publications
0
14
0
Order By: Relevance
“…For the simulation setup, we set T = 24 where each time slot has a length of one hour [38], [39]. Similar to the works in [17], [22], we set U = 600 and F = 200 where the sizes of contents are uniformly generated within interval [1,10].…”
Section: A Simulation Setupmentioning
confidence: 99%
“…For the simulation setup, we set T = 24 where each time slot has a length of one hour [38], [39]. Similar to the works in [17], [22], we set U = 600 and F = 200 where the sizes of contents are uniformly generated within interval [1,10].…”
Section: A Simulation Setupmentioning
confidence: 99%
“…Therefore, an appropriate frequency should be determined to balance the tradeoff between the performance improvement and the overhead, which is one of our future works. 4 After receiving the policy table, SCs decide which contents are cached in their storages and whether to sleep or not by following the distributed policy table. To obtain the optimal policy table, we formulate MDP which will be elaborated in Section 5.…”
Section: Energy-efficient Proactive Edge Caching With Sleep Schedulinmentioning
confidence: 99%
“…1 Proactive content caching is demonstrated to further boost the caching efficiency compared to reactive data caching [2][3][4]. 2 We assume that contents are cached in only SCs (not cached in MC) to maximize the effectiveness of edge caching.…”
Section: Endnotesmentioning
confidence: 99%
See 1 more Smart Citation
“…e ← e − b * (k, e) 21: return x * We use a Zipf distribution with shape parameter γ to characterize the content request probability for any requester. Thus, w rc = c −γ k∈C k −γ , r ∈ R. Same as [8], the time period is set to 24 hours, and the duration of each time slot (δ) is 1 hour. The storage cost is simulated using f (t) = t 2 .…”
Section: Performance Evaluationmentioning
confidence: 99%