Page 177 - Proceedings of the 2017 ITU Kaleidoscope
P. 177

Challenges for a data-driven society




                                                             [8] C. Liang, F. Yu, H. Yao, Z. Han, “Virtual resource allo-
                                                                 cation in information-centric wireless networks with vir-
                                                                 tualization,” in IEEE Transactions on Vehicular Tech-
                                                                 nology, vol. 65, no. 12, pp. 9902-9914, Dec. 2016.
                                                             [9] R. Jia, Z. Liu, X. Wang, X. Gan, X. Wang, J. Xu, “Mod-
                                                                 eling dynamic adaptive streaming over information-
                                                                 centric netowking,” in IEEE Access, vol. 4, pp. 8362-
                                                                 8374, Nov. 2016.
                                                             [10] D. Le, T. Le, N. Thai, P. Vo, “The performance of
                                                                 caching strategies in content centirc networking,” in
                                                                 IEEE ICOIN, Chiang Mai, Thailand, pp. 628-632, Jan.
                                                                 2017.
                                                             [11] M. Hajimirsadeghi, N. Mandayam, A. Reznik,“Joint
                                                                 caching and pricing strategies for popular content in in-
          Fig. 2. The comparison of the utilities for operator with three
                                                                 formation centirc networks” in IEEE Journal on Select-
          schemes
                                                                 ed Areas in Communications, vol. 35, pp. 654-667, Feb.
                                                                 2017.
          out to prove the reliability and effectiveness of our proposal.
                                                             [12] Z. Su, D. Fang, B. Han, “Caching algorithm with a nov-
          For the future work, we will further study the content cache
                                                                 el cost model to deliver content and its interest over con-
          scheme in different communities .
                                                                 tent centric networks,” in China Communications, vol.
                                                                 12, pp. 23-30, July 2015.
                           7. REFERENCES
                                                             [13] S. Guo, H. Xie, G. Shi, “Collaborative forwarding and
                                                                 caching in content centric networks,” in Springer Berlin
          [1] B. Li, M. Ma, X. Yang, “Advanced perceptive forward-
                                                                 Heidelberg, pp. 41-55, 2012.
              ing in content-centric networks,” in IEEE ACCESS, vol.
              5, PP. 4595-4605, Mar. 2017.                   [14] M. Zhang, J. Tang, Y. Rao, H. Luo, H. Zhang, “Degree-
                                                                 based probabilistic caching in content-centric network-
          [2] G. Zhang, J. Liu, J. Ren, L. Wang, J. Zhang, “Capaci-
                                                                 ing,” in China Communications, vol. 14, pp. 158-168,
              ty of content-centric bybird wireless networks,” in IEEE
                                                                 Apr. 2017.
              ACCESS, vol. 5, pp. 1449-1459, Feb. 2017.
                                                             [15] L. Ramaswamy, A. Lyengar, J. Chen, “Cooperative da-
          [3] C. Fang, F. Yu, T. Huang, J. Liu, Y. Liu, “Distribut-  ta placement and replication in edge cache networks,”
              ed energy consumption management in green content-  in Collaborative Computing: Networking, Applications
              centric networks via dual decomposition,” in IEEE Sys-  and Worksharing, 2006., Nov. 2006.
              tems Journal, vol. 11, pp. 625-636, Apr. 2016.
                                                             [16] X. Wang, S. Leng, K. Yang, “Social-aware edge
          [4] R. Huo, R. Xie, H. Zhang, T. Huang, Y. Liu, “What  caching in fog radio access networks,” in IEEE Access,
              to cache: differentiated caching resource allocation and  vol. PP, pp. 1-1, Apr. 2017.
              management in information-centric networking,” in Chi-
                                                             [17] S. Wang, X. Zhang, Y. Zhang, L. Wang, J. Yang, W.
              na Communications, pp. 261-276, Dec. 2016.
                                                                 Wang, “A survey on mobile edge networks: convergence
          [5] M. Mangili, F. Martignon, S. Paris, A. Capone, “Band-  of conputing, caching and communications,” in IEEE
              width and cache leasing in wireless information-centric  Access, vol. PP, pp. 1-1, Mar. 2017.
              networks: a game-theoretic study,” in IEEE Transac-
                                                             [18] W. Wang, R. Lan, J. Gu, A. Huang, H. Shan, Z. Zhang,
              tions on Vehicular Technology, vol. 66, no. 1, pp. 679-
                                                                 “Edge caching at base stations with device-to-device of-
              695, Jan. 2017.
                                                                 floading,” in IEEE Access, vol. PP, pp. 1-1, Mar. 2017.
          [6] B. Azimdoost, C. Westphal, H, Sadjadpour, “Fundamen-
                                                             [19] H. Kikuchi, K. Takahashi, “Zipf distribution model for
              tal limits on throughput capacity in information-centric
                                                                 quantifying risk of reidentification from trajectory data,”
              networks,” in IEEE Transactions on Communications,
                                                                 in Privacy, Security and Trust (PST), Izmir, Turkey, pp.
              vol. 64, no. 12, pp. 5037-5049, Oct. 2016.
                                                                 15-21, July, 2015.
          [7] K. Wang, H. Li, F. Yu, W. Wei, “Virtual resource alloca-  [20] C. Cheng, J. Li, Y. Wang, “An energy-saving task
              tion in software-defined information-centric cellular net-  scheduling strategy based on vacation queuing theory in
              works with device-to-device communications and imper-  cloud computing,” in Tsinghua Science and Technology,
              fect CSI,” in IEEE Transactions on Vehicular Technolo-  vol. 20, pp. 28-39, Feb. 2015.
              gy, vol. 65, no. 12, pp. 10011-10021, Dec. 2016.



                                                          – 161 –
   172   173   174   175   176   177   178   179   180   181   182