2018
DOI: 10.1109/tcomm.2018.2863367
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Performance of Random Caching in Large-Scale Heterogeneous Wireless Networks With Random Discontinuous Transmission

Abstract: To make better use of file diversity provided by random caching and improve the successful transmission probability (STP) of a file, we consider retransmissions with random discontinuous transmission (DTX) in a large-scale cache-enabled heterogeneous wireless network (HetNet) employing random caching. We analyze and optimize the STP in two mobility scenarios, i.e., the high mobility scenario and the static scenario. First, in each scenario, by using tools from stochastic geometry, we obtain a closed-form expre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 24 publications
(17 citation statements)
references
References 35 publications
0
16
1
Order By: Relevance
“…From the figure, we can see that, when the cache size is large enough, the baselines may not be feasible, while our proposed scheme can still be feasible, but at the cost of the average RTP decrement. This observation indicates that increasing the cache sizes at the BSs does not always increase the average RTP, which is significantly different from the observations in the existing works without considering the secrecy constraints, e.g., [10]- [13]. This can be explained as follows.…”
Section: B Performance Comparisons Between Proposed Scheme and Baselcontrasting
confidence: 56%
See 3 more Smart Citations
“…From the figure, we can see that, when the cache size is large enough, the baselines may not be feasible, while our proposed scheme can still be feasible, but at the cost of the average RTP decrement. This observation indicates that increasing the cache sizes at the BSs does not always increase the average RTP, which is significantly different from the observations in the existing works without considering the secrecy constraints, e.g., [10]- [13]. This can be explained as follows.…”
Section: B Performance Comparisons Between Proposed Scheme and Baselcontrasting
confidence: 56%
“…We consider that there exist N files, denoted by the set N {1, 2, · · · , N }, to be cached in the considered HetNet. All the files have the same size (as in [7]- [13]) and each file n ∈ N has its own popularity (i.e., the probability that file n is requested by a user), denoted by a n ∈ [0, 1], where n∈N a n = 1. Without loss of generality (w.l.o.g.…”
Section: Rementioning
confidence: 99%
See 2 more Smart Citations
“…For instance, in the initial stage of some k-anonymity or spatial cloaking methods, the locations of users are transmitted to a trusted third party [10], which provides the chance for the attacker to eavesdrop users' locations through the wireless channel. Furthermore, it is expected that the development of caching technology will result in more distributed LBS/OSN servers or location verifiers [11,12], e.g., the AP. In conclusion, the privacy protection of locations in the wireless channel is essential for the pervasive public networks.…”
Section: Introductionmentioning
confidence: 99%