2018
DOI: 10.1109/access.2017.2781716
|View full text |Cite
|
Sign up to set email alerts
|

Content Popularity Prediction and Caching for ICN: A Deep Learning Approach With SDN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
56
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 107 publications
(56 citation statements)
references
References 42 publications
0
56
0
Order By: Relevance
“…In the WSNs network, the SDN controller collects the WSN network node to input the user request data to the SSAE network every k time slot. As reported in [6,10], we set the SSAEs deep learning with 3 hidden layers. We compare the time slot k from the set {2, 4, 6, 8, 10}, which means that the input dimensions range from 400 to 2000.…”
Section: Ssaes Architecture Structurementioning
confidence: 99%
See 1 more Smart Citation
“…In the WSNs network, the SDN controller collects the WSN network node to input the user request data to the SSAE network every k time slot. As reported in [6,10], we set the SSAEs deep learning with 3 hidden layers. We compare the time slot k from the set {2, 4, 6, 8, 10}, which means that the input dimensions range from 400 to 2000.…”
Section: Ssaes Architecture Structurementioning
confidence: 99%
“…To address the congestion issue, proactive caching [5,6], which wildly used in ICN, is introduced into the WSNs [7]. Data package caching will improve the performance of WSNs, including reducing packet latency, network traffic, and BER of transmission.…”
Section: Introductionmentioning
confidence: 99%
“…However, in practice, CP profile is time-varying and not known in advance, therefore, it needs to be estimated from the past observations of the content requests. Deep learning based prediction is employed with huge training data in [8], [9]. In [10], auto regressive (AR) prediction cache is used to predict the number of requests in the time series.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, another key challenge is to avoid the excessive allocation of resources for private link sets of one type of flow, and to avoid situations when available resources for another type of flow are insufficient. Essentially, unlike other works (such as References and ), this paper employs DRL to address this challenge.…”
Section: Introductionmentioning
confidence: 99%