Computer Science ›› 2020, Vol. 47 ›› Issue (11A): 345-348.doi: 10.11896/jsjkx.200500079
• Computer Network • Previous Articles Next Articles
MENG Li-min1, WANG Kun1 , ZHENG Zeng-qian1, JIANG Wei2
CLC Number:
[1] ASADI A,MANCUSO V.Energy efficient opportunistic uplink packet forwarding in hybrid wireless networks[C]//Proceedings of ACM International Conference on Future Energy Systems.Berkeley,CA,USA,2013:261-262. [2] ASADI A,MANCUSO V.On the compound impact of opportunistic scheduling an D2D communications in cellula networks[C]//Proceedings of ACM International Conference on Mode-ling,Analysis & Simulation of Wireless and Mobile Systems.Berkeley,CA,USA,2013:279-288. [3] ASADI A,MANCUSO V.WiFi Direct and LTE D2D in action[C]//Proceedings of the 2013 IFIP Wireless Days (WD).Valencia,2013:1-8. [4] GOLREZAEI N,MOLISCH A F,DIMAKIS A G.Base-station assisted device-to-device communications for high-throughput wireless video networks[C]//Proceedings of the 2012 IEEE International Conference on Communications (ICC).Ottawa,ON,2012:7077-7081. [5] GOLREZAEI N,DIMAKIS A G,MOLISCH A F.Device-to-device collaboration through distributed storage[C]//Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM).Anaheim,CA,2012:2397-2402. [6] RAO J,FENG H,YANG C C,et al.Optimal caching placement for D2D assisted wireless caching networks[C]//Proceedings of the 2016 IEEE International Conference on Communications (ICC).Kuala Lumpur,2016:1-6. [7] KANG H J,PARK K Y,CHO K M,et al.Mobile caching policies for device-to-device content delivery networking[C]//Proceedings of the 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).Toronto,2014:299-304. [8] LAN R N.Edge caching technology in terminal to cell system[D].Hangzhou:Zhejiang University,2016. [9] BRESLAU L,PEI C,LI F,et al.Web caching and Zipf-like distributions:Evidence and implications[C]//Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communication Societies.New York,USA,1999:126-134. [10] BACCELLI F,BLASZCZYSZYN B.Stochastic geometry andwireless networks:Volume Π applications[J].Foundations and Trends in Networks,2010(4):1-132. [11] WANG Y,QIU F Y,GUO H D.An adaptive inertial weighted binary particle swarm optimization algorithm with mutation operator [J].Journal of Computer Systems,2019,40(4):733-737. [12] ZHAO J X,GAO Y L,CHEN Q L.A particle swarm optimization algorithm for solving nonlinear programming problems [J].Journal of ningxia university (natural science edition),2017,38(1):15-18,22. [13] KONSTANTION S P,BALAJI P.Arandomized Web-cachereplacement scheme[C]//Proceedings of the Twentieth Annual Joint Conference of the IEEE Computer and Communications Society.Anchorage,AK,USA,2001:1407-1415. [14] SONG X S,GENG Y T,MENG X B.Cache-enabled device to device networks with contention-based multimedia delivery[J].IEEE Access,2019,5:3228-3239. [15] MALAK D,AL-SHALASH M.Device-to-Device content distribution:optimal caching strategies and performance bounds[C]//Proceedings of the 2015 IEEE International Conference on Communications Workshop.Piscataway,NJ,2015:664-66. |
[1] | XU Ru-li, HUANG Zhang-can, XIE Qin-qin, LI Hua-feng, ZHAN Hang. Multi-threshold Segmentation for Color Image Based on Pyramid Evolution Strategy [J]. Computer Science, 2022, 49(6): 231-237. |
[2] | PENG Hao and HE Li-fang. Multi-threshold Segmentation for Color Image Based on Improved Tree-seed Algorithm [J]. Computer Science, 2020, 47(6A): 220-225. |
[3] | XIANG Wei, WANG Xin-wei. Imbalance Data Classification Based on Model of Multi-class Neighbourhood Three-way Decision [J]. Computer Science, 2020, 47(5): 103-109. |
[4] | NI Hong-jie, PENG Chun-xiang, ZHOU Xiao-gen, YU Li. Differential Evolution Algorithm with Stage-based Strategy Adaption [J]. Computer Science, 2019, 46(6A): 106-110. |
[5] | ZHANG Hui-juan, ZHANG Da-min, YAN Wei, CHEN Zhong-yun, XIN Zi-yun. Throughput Optimization Based Resource Allocation Mechanism in Heterogeneous Networks [J]. Computer Science, 2019, 46(10): 109-115. |
[6] | CHI Kai-kai, TANG Ze-feng, ZHU Yi-nan, SHAO Qi-ke. Efficient Multicast Schemes for D2D Multicast Cluster in Wireless Cellular Network [J]. Computer Science, 2019, 46(1): 169-174. |
[7] | LENG Qiang, YANG Ying-jie, HU Hao. Self-adaption Adjustment Method for Experts in Risk Assessment [J]. Computer Science, 2018, 45(12): 98-103. |
[8] | BAO Xiao-an, BAO Chao, JIN Yu-ting, CHEN Chun-yu, QIAN Jun-yan, ZHANG Na. Combinatorial Test Case Generation Method Based on Simplified Particle Swarm Optimizationwith Dynamic Adjustment [J]. Computer Science, 2018, 45(11): 199-203. |
[9] | YAN Xue-wen, DONG Chao, QU Yu-ben. Survey of D2D-based Traffic Offloading [J]. Computer Science, 2018, 45(11): 45-51. |
[10] | ZHANG Ai-ling, LI Peng and LIU Sheng. Algorithm of Image Salt and Pepper Noise Elimination Based on Particle Swarm Algorithm [J]. Computer Science, 2017, 44(8): 301-305. |
[11] | JIAO Chong-yang, ZHOU Qing-lei and ZHANG Wen-ning. MPSO and Its Application in Test Data Automatic Generation [J]. Computer Science, 2017, 44(12): 249-254. |
[12] | ZHU Zhi-qiang, ZHAO Zhi-yuan, SUN Lei and YANG Jie. Research on Rootkit Detection System Architecture Based on Functional Separation in Virtualized Environment [J]. Computer Science, 2016, 43(Z6): 348-352. |
[13] | SONG Jing-qi, LIU Hui and ZHANG Cai-ming. Medical Image Super Resolution Reconstruction Based on Adaptive Patch Clustering [J]. Computer Science, 2016, 43(Z11): 210-214. |
[14] | LI Zhang-wei, ZHOU Xiao-gen and ZHANG Gui-jun. Dynamic Adaptive Differential Evolution Algorithm [J]. Computer Science, 2015, 42(Z6): 52-56. |
[15] | ZHANG Cui-ping, GUO Zhen-zhou and GONG Chang-qing. Study on Strategy of Replica Selection in Cloud Storage Environment [J]. Computer Science, 2015, 42(Z11): 408-412. |
|