2019
DOI: 10.1109/access.2019.2914693
|View full text |Cite
|
Sign up to set email alerts
|

Socially-Aware Caching in Wireless Networks With Random D2D Communications

Abstract: Pushing contents to users with device-to-device (D2D) data sharing is considered as a promising solution to overcome backhaul congestion. However, this model is associated with critical issues which are user selfishness in terms of sharing personal resources and security concern when connecting with strange devices. Therefore, in this paper, we propose the notion of random D2D connection where the probabilities that the devices are connected for receiving or sharing data are manipulated by users themselves. Mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 42 publications
(43 reference statements)
0
7
0
Order By: Relevance
“…However, the proposed work has the ability to predict the popularity of unpublished videos without historical information using supervised learning. The authors extend their work in [137] for socially-aware caching where socialawareness is measured as the frequency of D2D connections.…”
Section: State-of-the-art: Machine Learning Based Cachingmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the proposed work has the ability to predict the popularity of unpublished videos without historical information using supervised learning. The authors extend their work in [137] for socially-aware caching where socialawareness is measured as the frequency of D2D connections.…”
Section: State-of-the-art: Machine Learning Based Cachingmentioning
confidence: 99%
“…Some of the researchers ignore user mobility [137] while others model it as Poisson point process (PPP) [127], [116], random walk model [161], [128], [159], or as Markov process [46]. Bastug et al [140] consider the location of Cache enabled BSs distributed as PPP.…”
Section: Techniquesmentioning
confidence: 99%
“…D2D communication has been employed in several studies for computation offloading to other nearby UEs (while not utilizing any MEC resources), e.g., [109]- [115]. Also, accessing caches at nearby UEs (while not utilizing MEC caches) has been considered in prior studies, e.g., [116]- [123], whereby specifically video file caching at other UEs has been considered in [124], [125].…”
Section: Device-to-device (D2d) Communicationmentioning
confidence: 99%
“…The user status mainly considers the number of active users, D2D clusters, and the D2D users. The comparison of resource reuse includes no-reuse scheme, random scheme [29], heuristic algorithm [30], and the Hungarian algorithm proposed in this paper. The key parameters of the simulation are shown in Table 3.…”
Section: Parameter Settingsmentioning
confidence: 99%