期刊文献+

基于用户偏好与副本阈值的端到端缓存算法 被引量:4

Device-to-device caching algorithm based on user preference and replica threshold
下载PDF
导出
摘要 在端到端(D2D)缓存网络中存在大量多媒体内容,而移动终端中缓存空间却相对有限。为了实现移动终端中缓存空间的高效利用,提出了一种基于用户偏好与副本阈值的D2D缓存部署算法。首先,基于用户偏好,设计缓存收益函数,用于判断各文件的缓存价值;然后,以系统缓存命中率最大化为目标,利用凸规划理论设计缓存副本阈值,用于部署系统中文件的副本数量;最后,联合缓存收益函数与副本阈值,提出一种启发式算法实现了文件的缓存部署。与现有缓存部署算法相比,该算法可显著提升缓存命中率及卸载增益,降低服务时延。 In the Device-to-Device (D2D) cache network,the cache space in the mobile terminal is relatively small with many multimedia contents. In order to realize the efficient use of cache space in mobile terminals,a D2D cache deployment algorithm based on user preference and replica threshold was proposed. Firstly,based on the user preference,a cache revenue function to determine the cache value of caching each file was designed. Then,with the goal of maximizing the cache hit ratio of system,the cache replica threshold was designed based on convex programming theory to deploy replica number of the files in the system. Finally,combining the cache revenue function with the replica threshold,a heuristic algorithm was proposed to implement file cache deployment. Compared with the existing cache deployment algorithm,the proposed algorithm can significantly improve the cache hit rate and the offload gain with the reduction of service delay.
作者 文凯 谭笑 WEN Kai;TAN Xiao(School of Telecommunication and Information Engineering,Chongqing University of Posts and Telecommunications,Chongqing 400065,China;Research Center of New Telecommunication Technology Applications,Chongqing University of Posts and Telecommunications,Chongqing 400065,China;Chongqing Chongyou Information Technology Designing Company Limited,Chongqing 401121,China)
出处 《计算机应用》 CSCD 北大核心 2019年第7期2051-2055,共5页 journal of Computer Applications
关键词 端到端 内容缓存 用户偏好 副本 凸规划 Device-to-Device (D2D) content caching user preference replica convex programming
  • 相关文献

参考文献2

二级参考文献82

  • 1Hull B, Bychkovsky V, Zhang Y, Chen K, Goraczko M, Miu A, Shih E, Balakrishnan H, Madden S. CarTel: A distributed mobile sensor computing system. In: Proc. of the 4th Int'l Conf. on Embedded Networked Sensor Systems. Boulder: ACM, 2006. 125-138.
  • 2Pan H, Chaintreau A, Scott J, Gass R, Crowcroft J, Diot C. Pocket switched networks and human mobility in conference environments. In: Proc. of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. Philadelphia: ACM. 2005. 244-251.
  • 3Juang P, Oki H, Wang Y, Martonosi M, Peh LS, Rubenstein D. Energy-Efficient computing for wildlife tracking: Design tradeoffs and early experiences with ZebraNet. In: Proc. of the 10th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems. New York: ACM, 2002.96-107. DO1=http://doi.acm.org/10.1145/605397.605408
  • 4Pelusi L, Passarella A, Conti M. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. Communications Magazine, 2006,44(11): 134-141.
  • 5Conti M, Giordano S. Multihop ad hoe networking: The reality. Communications Magazine, 2007,45(4):88-95.
  • 6Fall K. A delay-tolerant network architecture for challenged Internets. In: Proc. of the 2003 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications. Karlsruhe: ACM, 2003.27-34.
  • 7Akyildiz IF, Akan B, Chert C, Fang J, Su W. InterPlaNetary Intemet: State-of-the-Art and research challenges. Computer Networks, 2003,43(2):75-112.
  • 8Gupta P, Kumar P. The capacity of wireless networks. IEEE Trans. on Information Theory, 2000,46(2):388-404.
  • 9Grossglauser M, Tse DNC. Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Trans. on Networking, 2002, 10(4):477-486.
  • 10Small T, Haas ZJ. The shared wireless infostation model: A new ad hoc networking paradigm (or where there is a whale, there is a way). In: Proc. of the 4th ACM Int'l Symp. on Mobile Ad Hoc Networking. Annapolis: ACM, 2003. 233-244.

共引文献439

同被引文献36

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部