2018
DOI: 10.1109/tvt.2018.2824345
|View full text |Cite
|
Sign up to set email alerts
|

An Edge Caching Scheme to Distribute Content in Vehicular Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
60
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 160 publications
(60 citation statements)
references
References 46 publications
0
60
0
Order By: Relevance
“…In the proposed work, we assume that vehicles download interesting contents from a given library scriptF=false{1,,Ffalse}, where all contents are of equal size of L ( f ) bits and differing popularities.The probability content − f ( f =1,…, F ) being downloaded is denoted by P i ( f ) and i ( i = l , r ); different sides of the highway have different popularities. In fact, the popularity of downloaded contents follows Zipf's distribution, which can be expressed as alignleftalign-1Pi(f)align-2=Ωifαi,align-1whereΩialign-2=jF1jαi1. Parameter α in (7) describes the steepness of the distribution. As the distribution of contents in the content delivery network servers and the data traffic dynamics of the mobile terminal, this type of power law is used to characterize many real‐world phenomena .…”
Section: System Modelmentioning
confidence: 99%
“…In the proposed work, we assume that vehicles download interesting contents from a given library scriptF=false{1,,Ffalse}, where all contents are of equal size of L ( f ) bits and differing popularities.The probability content − f ( f =1,…, F ) being downloaded is denoted by P i ( f ) and i ( i = l , r ); different sides of the highway have different popularities. In fact, the popularity of downloaded contents follows Zipf's distribution, which can be expressed as alignleftalign-1Pi(f)align-2=Ωifαi,align-1whereΩialign-2=jF1jαi1. Parameter α in (7) describes the steepness of the distribution. As the distribution of contents in the content delivery network servers and the data traffic dynamics of the mobile terminal, this type of power law is used to characterize many real‐world phenomena .…”
Section: System Modelmentioning
confidence: 99%
“…This should be appropriately determined by an optimization tool, such as geometric programming optimization, etc. A caching [ 19 , 20 , 21 ] based UAV relay will be investigated where queuing theory should be employed to analyze the performance of the WSN system. …”
Section: Research Direction and Conclusionmentioning
confidence: 99%
“…Hui et al 5 proposed a fog computing-based resolution framework to efficiently resolve the individuals identity. Su et al 6 developed an edge caching scheme in vehicular networks based on edge computing. Tang et al 7 designed a hierarchical distributed fog computing architecture to support data-intensive analysis in future smart cities.…”
Section: Introductionmentioning
confidence: 99%