Journal of Computer Applications ›› 2018, Vol. 38 ›› Issue (12): 3509-3513.DOI: 10.11772/j.issn.1001-9081.2018051057
Previous Articles Next Articles
XIONG Lian1, LI Pengming1,2, CHEN Xiang2, ZHU Hongmei2
Received:
2018-05-22
Revised:
2018-08-02
Online:
2018-12-15
Published:
2018-12-10
Contact:
李朋明
Supported by:
熊炼1, 李朋明1,2, 陈翔2, 朱红梅2
通讯作者:
李朋明
作者简介:
熊炼(1968-),男,重庆人,高级工程师,硕士,主要研究方向:移动通信技术、未来网络;李朋明(1989-),男,河南鹤壁人,硕士研究生,主要研究方向:未来网络、缓存技术;陈翔(1994-),女,重庆人,硕士研究生,主要研究方向:未来网络、路由转发;朱红梅(1994-),女,重庆人,硕士研究生,主要研究方向:未来网络、网络安全。
基金资助:
CLC Number:
XIONG Lian, LI Pengming, CHEN Xiang, ZHU Hongmei. Cooperative caching strategy based on user preference for content-centric network[J]. Journal of Computer Applications, 2018, 38(12): 3509-3513.
熊炼, 李朋明, 陈翔, 朱红梅. 内容中心网络中基于用户偏好的协作缓存策略[J]. 计算机应用, 2018, 38(12): 3509-3513.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2018051057
[1] Cisco Systems, Inc. Cisco global cloud index:forecast and methodology, 2016-2021 white paper[EB/OL].[2018-03-06]. http://www.cisco.com/c/en/us/solutions/collateral/service-provider/global-cloud-index-gci/Cloud_Index_White_Paper.html. [2] JACOBSON V, SMETTERS D K, THORNTON J D, et al. Networking named content[C]//Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies. New York:ACM, 2009:1-12. [3] LAOUTARIS N, CHE H, STAVRAKAKIS I. The LCD intercomnection of LRU caches and its analysis[J]. Performance Evaluation, 2006, 63(7):609-634. [4] PSARAS I, CHAI W K, PAVLOU G. Probabilistic in-network caching for information centric networks[C]//Proceedings of the 2012 Second Edition of the ICN Workshop on Information-Centric Networking. New York:ACM, 2012:55-60. [5] 霍如,刘江,黄韬,等.基于相关性概率的信息中心网络协作缓存策略[J].北京邮电大学学报,2015,38(1):16-20.(HUO R, LIU J, HUANG T, et al. Cooperative caching strategy based on correlation probability in information centric networking[J]. Journal of Beijing University of Posts and Telecommunications, 2015, 38(1):16-20.) [6] ZHANG R, LIU J, HUANG T, et al. Popularity based probabilistic caching strategy design for named data networking[C]//Proceedings of the 2017 IEEE Conference on Computer Communications Workshops. Piscataway, NJ:IEEE, 2017:476-481. [7] ZHOU X, YE Z H. Popularity and age based cache scheme for content centric network[C]//Proceedings of the 20173rd International Conference on Information Management. Piscataway, NJ:IEEE, 2017:322-326. [8] CHAI W K, HE D L, PSARAS I, et al. Cache "less for more" in information-centric networks (extended version)[J]. Computer Communications, 2013, 36(7):758-770. [9] FAYAZBAKHSH S K, LIN Y, TOOTOONCHIAN A, et al. Less pain, most of the gain:Incrementally deployable ICN[C]//Proceedings of the 2013 ACM Conference on SIGCOMM. New York:ACM, 2013:147-158. [10] 智江,李俊,吴海博,等.基于边缘优先的ICN缓存协作策略[J].通信学报,2017,38(3):53-64.(ZHI J, LI J, WU H B, et al. Edge-first-based cooperative caching strategy in information centric networking[J]. Journal on Communications, 2017, 38(3):53-64.) [11] KITSUWAN N, TAHARA H, OKI E. Heuristic approach to determining cache node locations in content-centric networks[J]. IEEE Access, 2018, 6:1542-1549. [12] LI Y, ZHANG T K, XU X G, et al. Content popularity and node level matched based probability caching for content centric networks[C]//Proceedings of the 2016 IEEE/CIC International Conference on Communications in China. Piscataway, NJ:IEEE, 2016:1-6. [13] 蔡岳平,刘军,樊欣唯.基于节点中心性度量的内容中心网络缓存机制[J].通信学报,2017,38(6):10-18.(CAI Y P, LIU J, FAN X W. Node centrality metric based caching mechanism in content-centric network[J]. Journal on Communications, 2017, 38(6):10-18.) [14] AN Y, LUO X. An in-network caching scheme based on energy efficiency for content-centric networks[J]. IEEE Access, 2018, 6:20184-20194. [15] ALEXANDER A, SPYRIDON M, ILYA M, et al. NS-3 based Named Data Networking (NDN) simulator[EB/OL].[2018-03-06]. http://ndnsim.net/current/intro.html. [16] AFANASYEV A, MOISEENKO I, ZHANG L X. ndnSIM:NDN simulator for NS-3:NDN-0005[R]. Oakland, CA:University of California, 2012. |
[1] | Ming ZHANG, Le FU, Haifeng WANG. Relay control model for concurrent data flow in edge computing [J]. Journal of Computer Applications, 2024, 44(12): 3876-3883. |
[2] | . Survey of DNS tunneling detection technology research [J]. Journal of Computer Applications, 0, (): 0-0. |
[3] | . Large scale IoT binary component identification based on named entity recognition [J]. Journal of Computer Applications, 0, (): 0-0. |
[4] | Yixi LIU, Jun HE, Bo WU, Bingtong LIU, Ziyu LI. Survey of software security testing techniques in DevSecOps [J]. Journal of Computer Applications, 2024, 44(11): 3470-3478. |
[5] | Chuanlin PANG, Rui TANG, Ruizhi ZHANG, Chuan LIU, Jia LIU, Shibo YUE. Distributed power allocation algorithm based on graph convolutional network for D2D communication systems [J]. Journal of Computer Applications, 2024, 44(9): 2855-2862. |
[6] | Jiepo FANG, Chongben TAO. Hybrid internet of vehicles intrusion detection system for zero-day attacks [J]. Journal of Computer Applications, 2024, 44(9): 2763-2769. |
[7] | ZHANG Yiming, CAO Tengfei. Federated Learning Optimization Algorithm based on Local Drift and Diversity Computing Power [J]. Journal of Computer Applications, 0, (): 0-0. |
[8] | Hang XU, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU. Coverage-guided fuzzing based on adaptive sensitive region mutation [J]. Journal of Computer Applications, 2024, 44(8): 2528-2535. |
[9] | Hong CHEN, Bing QI, Haibo JIN, Cong WU, Li’ang ZHANG. Class-imbalanced traffic abnormal detection based on 1D-CNN and BiGRU [J]. Journal of Computer Applications, 2024, 44(8): 2493-2499. |
[10] |
GENG Haijun, DONG Yun, HU Zhiguo, CHI Haotian, YANG Jing, YIN Xia.
Encrypted traffic classification method based on Attention-1DCNN-CE#br#
#br#
[J]. Journal of Computer Applications, 0, (): 0-0.
|
[11] | . Summary of network intrusion detection systems based on deep learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[12] | CHEN Ruilong, HU Tao, BU Youjun, YI Peng, HU Xianjun, QIAO Wei. Stacking ensemble adversarial defense method for encrypted malicious traffic detection model [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | Zhongdai WU, Dezhi HAN, Haibao JIANG, Cheng FENG, Bing HAN, Chongqing CHEN. Review of marine ship communication cybersecurity [J]. Journal of Computer Applications, 2024, 44(7): 2123-2136. |
[14] | Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI. Multi-object cache side-channel attack detection model based on machine learning [J]. Journal of Computer Applications, 2024, 44(6): 1862-1871. |
[15] | Rui TANG, Chuanlin PANG, Ruizhi ZHANG, Chuan LIU, Shibo YUE. DDPG-based resource allocation in D2D communication-empowered cellular network [J]. Journal of Computer Applications, 2024, 44(5): 1562-1569. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||