메뉴 건너뛰기




Volumn 10, Issue 2, 2015, Pages 355-370

Fundamental limits of caching with secure delivery

Author keywords

Caching; information theoretic security; multicast delivery

Indexed keywords

INFORMATION THEORY;

EID: 84921326513     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2014.2375553     Document Type: Article
Times cited : (158)

References (27)
  • 3
    • 0020141865 scopus 로고
    • Comparative models of the file assignment problem
    • Jun
    • L. W. Dowdy and D. V. Foster, "Comparative models of the file assignment problem," ACM Comput. Surv., vol. 14, no. 2, pp. 287-313, Jun. 1982.
    • (1982) ACM Comput. Surv. , vol.14 , Issue.2 , pp. 287-313
    • Dowdy, L.W.1    Foster, D.V.2
  • 4
    • 0030216807 scopus 로고    scopus 로고
    • The use of multicast delivery to provide a scalable and interactive video-on-demand service
    • Aug
    • K. C. Almeroth and M. H. Ammar, "The use of multicast delivery to provide a scalable and interactive video-on-demand service," IEEE J. Sel. Areas Commun., vol. 14, no. 6, pp. 1110-1122, Aug. 1996.
    • (1996) IEEE J. Sel. Areas Commun. , vol.14 , Issue.6 , pp. 1110-1122
    • Almeroth, K.C.1    Ammar, M.H.2
  • 5
    • 0038425785 scopus 로고    scopus 로고
    • Placement algorithms for hierarchical cooperative caching
    • M. R. Korupolu, C. G. Plaxton, and R. Rajaraman, "Placement algorithms for hierarchical cooperative caching," J. Algorithms, vol. 38, no. 1, pp. 260-302, 2001.
    • (2001) J. Algorithms , vol.38 , Issue.1 , pp. 260-302
    • Korupolu, M.R.1    Plaxton, C.G.2    Rajaraman, R.3
  • 6
    • 55249124781 scopus 로고    scopus 로고
    • Approximation algorithms for data placement problems
    • Aug
    • I. Baev, R. Rajaraman, and C. Swamy, "Approximation algorithms for data placement problems," SIAM J. Comput., vol. 38, no. 4, pp. 1411-1429, Aug. 2008.
    • (2008) SIAM J. Comput. , vol.38 , Issue.4 , pp. 1411-1429
    • Baev, I.1    Rajaraman, R.2    Swamy, C.3
  • 7
    • 84899645734 scopus 로고    scopus 로고
    • Fundamental limits of caching
    • May
    • M. A. Maddah-Ali and U. Niesen, "Fundamental limits of caching," IEEE Trans. Inf. Theory, vol. 60, no. 5, pp. 2856-2867, May 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.5 , pp. 2856-2867
    • Maddah-Ali, M.A.1    Niesen, U.2
  • 8
    • 85027907954 scopus 로고    scopus 로고
    • Decentralized coded caching attains order-optimal memory-rate tradeoff
    • to be published
    • M. A. Maddah-Ali and U. Niesen, "Decentralized coded caching attains order-optimal memory-rate tradeoff," IEEE/ACM Trans. Netw., to be published.
    • IEEE/ACM Trans. Netw.
    • Maddah-Ali, M.A.1    Niesen, U.2
  • 13
    • 0032670943 scopus 로고    scopus 로고
    • Web caching and Zipf-like distributions: Evidence and implications
    • Mar.
    • L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, "Web caching and Zipf-like distributions: Evidence and implications," in Proc. IEEE INFOCOM, vol. 1. Mar. 1999, pp. 126-134.
    • (1999) Proc. IEEE INFOCOM , vol.1 , pp. 126-134
    • Breslau, L.1    Cao, P.2    Fan, L.3    Phillips, G.4    Shenker, S.5
  • 15
    • 84890409786 scopus 로고    scopus 로고
    • Optimal throughput-outage tradeoff in wireless one-hop caching networks
    • Jul.
    • M. Ji, G. Caire, and A. F. Molisch, "Optimal throughput-outage tradeoff in wireless one-hop caching networks," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2013, pp. 1461-1465.
    • (2013) Proc. IEEE Int. Symp. Inf. Theory (ISIT) , pp. 1461-1465
    • Ji, M.1    Caire, G.2    Molisch, A.F.3
  • 17
    • 84893218567 scopus 로고    scopus 로고
    • Fundamental limits of distributed caching in D2D wireless networks
    • Sep.
    • M. Ji, G. Caire, and A. Molisch, "Fundamental limits of distributed caching in D2D wireless networks," in Proc. IEEE Inf. Theory Workshop (ITW), Sep. 2013, pp. 1-5.
    • (2013) Proc. IEEE Inf. Theory Workshop (ITW) , pp. 1-5
    • Ji, M.1    Caire, G.2    Molisch, A.3
  • 19
    • 84889592646 scopus 로고    scopus 로고
    • FemtoCaching: Wireless video content delivery through distributed caching helpers
    • Dec
    • N. Golrezaei, K. Shanmugam, A. G. Dimakis, A. F. Molisch, and G. Caire, "FemtoCaching: Wireless video content delivery through distributed caching helpers," IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8402-8413, Dec. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.12 , pp. 8402-8413
    • Golrezaei, N.1    Shanmugam, K.2    Dimakis, A.G.3    Molisch, A.F.4    Caire, G.5
  • 20
    • 84906544072 scopus 로고    scopus 로고
    • Learning-based optimization of cache content in a small cell base station
    • Jun.
    • P. Blasco and D. Gündüz, "Learning-based optimization of cache content in a small cell base station," in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2014, pp. 1897-1903.
    • (2014) Proc. IEEE Int. Conf. Commun. (ICC) , pp. 1897-1903
    • Blasco, P.1    Gündüz, D.2
  • 21
    • 84906546045 scopus 로고    scopus 로고
    • Multi-armed bandit optimization of cache content in wireless infostation networks
    • Jun.
    • P. Blasco and D. Gündüz, "Multi-armed bandit optimization of cache content in wireless infostation networks," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2014, pp. 51-55.
    • (2014) Proc. IEEE Int. Symp. Inf. Theory (ISIT) , pp. 51-55
    • Blasco, P.1    Gündüz, D.2
  • 23
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Sep
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Sep. 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.