|
[1]M.Agiwal, A.Roy, andN.Saxena, “Next generation 5G wireless networks: A comprehensive survey, IEEE Communications Surveys and Tutorials, vol. 18, no. 3. pp. 1617–1655, 2016. [2]B. K.Wiederhold, G.Riva, andG.Graffigna, “Cisco Visual Networking Index: Forecast and Trends, 2017–2022, Annual Review of CyberTherapy and Telemedicine. 2013. [3]D.Xu et al., “A Survey of Opportunistic Offloading, IEEE Commun. Surv. Tutorials, vol. 20, no. 3, pp. 2198–2236, 2018. [4]I. U.Din, S.Hassan, M. K.Khan, M.Guizani, O.Ghazali, andA.Habbal, “Caching in Information-Centric Networking: Strategies, Challenges, and Future Research Directions, IEEE Commun. Surv. Tutorials, vol. 20, no. 2, pp. 1443–1474, 2018. [5]G.Paschos, E.Bastug, I.Land, G.Caire, andM.Debbah, “Wireless caching: technical misconceptions and business barriers, IEEE Commun. Mag., vol. 54, no. 8, pp. 16–22, Aug.2016. [6]R. S.Sutton andA. G.Barto, Reinforcement learning: An introduction. MIT press, 2018. [7]N.Laoutaris, H.Che, andI.Stavrakakis, “The LCD interconnection of LRU caches and its analysis, Perform. Eval., vol. 63, no. 7, pp. 609–634, Jul.2006. [8]Hao Che, Ye Tung, andZhijun Wang, “Hierarchical Web caching systems: modeling, design and experimental results, IEEE J. Sel. Areas Commun., vol. 20, no. 7, pp. 1305–1314, Sep.2002. [9]S.Eum, K.Nakauchi, Y.Shoji, N.Nishinaga, andM.Murata, “CATT: Cache aware target identification for ICN, IEEE Commun. Mag., vol. 50, no. 12, pp. 60–67, Dec.2012. [10]W. K.Chai, D.He, I.Psaras, andG.Pavlou, “Cache ‘less for more’ in information-centric networks (extended version), Comput. Commun., vol. 36, no. 7, pp. 758–770, Apr.2013. [11]S.Podlipnig andL.Böszörmenyi, “A survey of Web cache replacement strategies, ACM Comput. Surv., vol. 35, no. 4, pp. 374–398, Dec.2003. [12]M.Abrams, C. R.Standridge, G.Abdulla, S.Williams, andE. A.Fox, “Caching Proxies: Limitations and Potentials. Virginia Polytechnic Institute & State University, 1995. [13]J. E.Pitkow andM.Recker, “A Simple Yet Robust Caching Algorithm Based on Dynamic Access Patterns, 1994. [14]M.Abrams et al., “Removal policies in network caches for World-Wide Web documents, in Conference proceedings on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM ’96, 1996, vol. 26, no. 4, pp. 293–305. [15]M.Arlitt, L.Cherkasova, J.Dilley, R.Friedrich, andT.Jin, “Evaluating content management techniques for Web proxy caches, ACM SIGMETRICS Perform. Eval. Rev., vol. 27, no. 4, pp. 3–11, Mar.2007. [16]D.Lee et al., “On the existence of a spectrum of policies that subsumes the least recently used (LRU) and least frequently used (LFU) policies, in Proceedings of the 1999 ACM SIGMETRICS international conference on Measurement and modeling of computer systems - SIGMETRICS ’99, 1999, vol. 27, no. 1, pp. 134–143. [17]D. S.Berger, R. K.Sitaraman, andM.Harchol-Balter, “AdaptSize: Orchestrating the Hot Object Memory Cache in a Content Delivery Network. pp. 483–498, 2017. [18]T.Saemundsson, H.Bjornsson, G.Chockler, andY.Vigfusson, “Dynamic Performance Profiling of Cloud Caches, in Proceedings of the ACM Symposium on Cloud Computing - SOCC ’14, 2014, pp. 1–14. [19]S.Mullender andR.Cox, “Semaphores in Plan 9, in 3rd International Workshop on Plan 9, 2008, pp. 53–61. [20]K.Shanmugam, N.Golrezaei, A. G.Dimakis, A. F.Molisch, andG.Caire, “FemtoCaching: Wireless content delivery through distributed caching helpers, IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8402–8413, Dec.2013. [21]N.Zhang, K.Zheng, andM.Tao, “Using Grouped Linear Prediction and Accelerated Reinforcement Learning for Online Content Caching, Mar.2018. [22]M.Ahmed, S.Traverso, M.Garetto, P.Giaccone, E.Leonardi, andS.Niccolini, “Temporal Locality in Today’s Content Caching: Why it Matters and How to Model it, May2013. [23]E. G. (Edward G.Coffman andP. J.Denning, Operating systems theory. Prentice-Hall, 1973. [24]F. M.Harper andJ. A.Konstan, “The MovieLens Datasets, ACM Trans. Interact. Intell. Syst., vol. 5, no. 4, pp. 1–19, Dec.2015. [25]S.Muller, O.Atan, M.Van DerSchaar, andA.Klein, “Context-Aware Proactive Content Caching with Service Differentiation in Wireless Networks, in IEEE Transactions on Wireless Communications, 2017, vol. 16, no. 2, pp. 1024–1036. [26]S.Li, J.Xu, M.Van DerSchaar, andW.Li, “Popularity-driven content caching, in Proceedings - IEEE INFOCOM, 2016, vol. 2016-July, pp. 1–9. [27]I.Althamary, C.-W.Huang, P.Lin, S.-R.Yang, andC.-W.Cheng, “Popularity-Based Cache Placement for Fog Networks, in 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), 2018, pp. 800–804. [28]F.Bonomi, R.Milito, J.Zhu, andS.Addepalli, “Fog computing and its role in the internet of things, in Proceedings of the first edition of the MCC workshop on Mobile cloud computing - MCC ’12, 2012, p. 13. [29]M. A.Maddah-Ali andU.Niesen, “Fundamental Limits of Caching, Sep.2012. [30]“Human behavior and the principle of least effort. - PsycNET. [Online]. Available: https://psycnet.apa.org/record/1950-00412-000. [Accessed: 08-May-2019]. [31]L.Breslau, Pei Cao, Li Fan, G.Phillips, andS.Shenker, “Web caching and Zipf-like distributions: evidence and implications, in IEEE INFOCOM ’99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320), 1999, pp. 126–134 vol.1.
|