|
[1] NDN project. [Online]. Available: http://named-data.net/
[2] L. Zhang, A. Afanasyev, J. Burke, V. Jacobson, K. claffy, P. Crowley, C. Papadopoulos, L. Wang, and B. Zhang, “Named data networking,” ACM SIGCOMM Computer Communication Review, Vol.44, Issue 3, pp. 66-73, July. 2014.
[3] V. Jacobson, D. K. Smetters, J. D. Thornton, M. Plass, N. Briggs, and R. Braynard, “Networking Named Content,” in Proc. 5th international conference on Emerging networking experiments and technologies, pp. 1-12, 2009.
[4] B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman, “A Survey of Information-Centric Networking,” IEEE Trans. Communications Magazine, Vol. 50, no. 7, pp. 26-36, 2012.
[5] M.F. Bari, S. Chowdhury, R. Ahmed, R. Boutaba, and B. Mathieu, “A Survey of Naming and Routing in Information-Centric Networks,” IEEE Trans. Communications Magazine, Vol. 50, no. 12, pp. 44-53, 2012.
[6] H. Xu, Z. Chen, R. Chen, and J. Cao, “Live Streaming with Content Centric Networking,” in Proc. 3rd International Conference on Networking and Distributed Computing, pp. 1-5, 2012.
[7] D. Kulinski, J. Burke, and L. Zhang, “Video Streaming over Named Data Networking,” IEEE COMSOC MMTC E-Letter, Vol. 8, No. 4, pp. 6-9, July. 2013.
[8] J.M. Hsu, H.Y. Chiou, and Y.S. Ye, “A Partial Cache for Multimedia Content in Named Data Networking,” IEEE Trans. International Conference on Platform Technology and Service (PlatCon), pp. 37-38, Jan. 2015.
[9] Triangular Number. [Online]. Available: http://en.wikipedia.org/wiki/Triangular_number.
[10] Trapezoid. [Online]. Available: http://en.wikipedia.org/wiki/Trapezoid
[11] X. Hu and J. Gong, “Distributed in-network cooperative caching,” IEEE Trans. 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS), Vol. 02, pp. 735-740, Nov. 2012.
[12] A. Afanasyev, P. Mahadevan, I. Moiseenko, E. Uzun, and L. Zhang, “Interest flooding attack and countermeasures in Named Data Networking,” IEEE Trans. IFIP Networking Conference, pp. 1-9, May. 2013.
[13] A. Compagno, M. Conti, P. Gasti, and G. Tsudik, “Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking,” IEEE Trans. 38th Conference on Local Computer Networks (LCN), pp. 630-638, Oct. 2013.
[14] S. DiBenedetto, C. Papadopoulos, and D. Massey, “Routing Policies in Named Data Networking,” in Proc. ACM SIGCOMM workshop on Information-centric networking, pp. 38-43, 2011.
[15] J.J. Garcia-Luna-Aceves, “Name-Based Content Routing in Information Centric Networks Using Distance Information,” in Proc. 1st ACM Conference on Information-Centric Networking (ICN-2014), Sep. 2014.
[16] C. Tsilopoulos and G. Xylomenos, “Supporting diverse traffic types in information centric networks,” in Proc. ACM SIGCOMM workshop on Information-centric networking, pp. 13-18, 2011.
[17] ccnSim.[Online].Available: http://www.infres.enst.fr/~drossi/index.php?n=Software.ccnSim
[18] A.A. Barakabitze and T. Xiaoheng, “Caching and data routing in Information Centric Networking (ICN): the Future Internet Perspective,” IJARCSSE Trans. Vol. 4, Issue. 11, Nov. 2014.
[19] W. K. Chai, D. He, I. Psaras, and G. Pavlou, “Cache “Less for More” in Information-centric Networks,” in Proc. 11th international IFIP TC 6 conference on Networking - Volume Part I, pp. 27-40, 2012.
[20] J. Li, H. Wu, B. Liu, J. Lu, Y. Wang, X. Wang, Y. Zhang, and L. Dong, “Popularity-driven Coordinated Caching in Named Data Networking,” in Proc. 8th ACM/IEEE symposium on Architectures for networking and communications systems, pp. 15-26, 2012.
[21] J.M. Wang and B. Bensaou, “Progressive Caching in CCN,” IEEE Trans. Global Communications Conference (GLOBECOM), pp. 2727-2732, Dec. 2012.
[22] L. Saino, I. Psaras, and G. Pavlou, “Icarus: a Caching Simulator for Information Centric Networking (ICN),” in Proc. 7th International ICST Conference on Simulation Tools and Techniques, pp. 66-75, 2014.
[23] T. LI and Y. LI, “A Content Popularity Based Cache Replacement Algorithm for NDN,” Available: http://www.paper.edu.cn/html/releasepaper/2012/12/897/
[24] Y. Wang, Z. Li, G. Tyson, S. Uhlig, and G. Xie, “Optimal Cache Allocation for Content-Centric Networking,” IEEE Trans. 21st International Conference on Network Protocols (ICNP), pp. 1-10, Oct. 2013.
[25] C. LI and K. Okamura, “Cluster-based In-networking Caching for Content-Centric Networking,” IJCSNS International Journal of Computer Science and Network Security, Vol. 14 No. 11, Nov. 2014.
[26] T. Le, Y. Lu, and M. Gerla, “Social Caching and Content Retrieval in Disruption Tolerant Networks (DTNs),” IEEE Trans. International Conference on Computing, Networking and Communications (ICNC), pp. 905-910, Feb. 2015.
[27] S.K. Fayazbakhsh, Y. Lin, A. Tootoonchian, A. Ghodsi, T. Koponen, B. Maggs, K.C. Ng, V. Sekar, and S. Shenker, “Less Pain, Most of the Gain: Incrementally Deployable ICN,” in Proc. ACM SIGCOMM conference on SIGCOMM, pp. 147-158, 2013.
[28] A. Dan and D. Towsley, “An approximate analysis of the lru and fifo buffer replacement schemes”, in Proc. ACM SIGMETRICS conference on Measurement and modeling of computer systems, pp. 143-152, 1990.
|