2020
DOI: 10.1109/tpds.2020.2970702
|View full text |Cite
|
Sign up to set email alerts
|

T-Caching: Enhancing Feasibility of In-Network Caching in ICN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 31 publications
0
13
0
Order By: Relevance
“…Figure 8 shows the traffic for different caching schemes, and it can be seen that RSCB has the lowest transmission volume. Moreover, we can see that as the number of requests increases, RSCB has a higher traffic saving too due to its Interest aggregation scheme which saves on traffic required to deliver n − (n 1 + n 2 ) blocks, as per equation (3).…”
Section: Simulationmentioning
confidence: 98%
See 3 more Smart Citations
“…Figure 8 shows the traffic for different caching schemes, and it can be seen that RSCB has the lowest transmission volume. Moreover, we can see that as the number of requests increases, RSCB has a higher traffic saving too due to its Interest aggregation scheme which saves on traffic required to deliver n − (n 1 + n 2 ) blocks, as per equation (3).…”
Section: Simulationmentioning
confidence: 98%
“…Interests, the subsets (S i , s i ) should be reconstructed based on b(S), and these subsets should then be separated into subsubsets using equation (2). en, new Interests, i.e., ([S 1 , b(S 1 )], s 1 ) and ([S 2 , b(S 2 )], s 2 ) in equation ( 4), are generated by aggregating the sub-subsets using equation (3).…”
Section: If An Interest([s B(s)] S) Is Formed By Merging Multiplementioning
confidence: 99%
See 2 more Smart Citations
“…Several efforts have been devoted to the literature to investigate how to effectively utilize the NDN in WSNs [ 12 ] and how NDN naturally fits the WSNs compared with the conventional address-based model. Most of the schemes advocate the use of NDN for WSNs in terms of routing and forwarding [ 13 ], naming [ 14 ], Data caching [ 15 ], and security [ 16 ] among others. However, these schemes lack in providing a mechanism for potential forwarder selection for efficient content delivery in single radio WSNs.…”
Section: Introductionmentioning
confidence: 99%