-
1
-
-
84906748448
-
Fundamental limits of caching with secure delivery
-
Jun.
-
A. Sengupta, R. Tandon, and T. C. Clancy, "Fundamental limits of caching with secure delivery," in Proc. Wireless Phys. Layer Secur. Workshop, IEEE Int. Conf. Commun. (ICC), Jun. 2014, pp. 771-776.
-
(2014)
Proc. Wireless Phys. Layer Secur. Workshop, IEEE Int. Conf. Commun. (ICC)
, pp. 771-776
-
-
Sengupta, A.1
Tandon, R.2
Clancy, T.C.3
-
2
-
-
84906561171
-
Decentralized caching with secure delivery
-
Jun./Jul.
-
A. Sengupta, R. Tandon, and T. C. Clancy, "Decentralized caching with secure delivery," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun./Jul. 2014, pp. 41-45.
-
(2014)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 41-45
-
-
Sengupta, A.1
Tandon, R.2
Clancy, T.C.3
-
3
-
-
0020141865
-
Comparative models of the file assignment problem
-
Jun
-
L. W. Dowdy and D. V. Foster, "Comparative models of the file assignment problem," ACM Comput. Surv., vol. 14, no. 2, pp. 287-313, Jun. 1982.
-
(1982)
ACM Comput. Surv.
, vol.14
, Issue.2
, pp. 287-313
-
-
Dowdy, L.W.1
Foster, D.V.2
-
4
-
-
0030216807
-
The use of multicast delivery to provide a scalable and interactive video-on-demand service
-
Aug
-
K. C. Almeroth and M. H. Ammar, "The use of multicast delivery to provide a scalable and interactive video-on-demand service," IEEE J. Sel. Areas Commun., vol. 14, no. 6, pp. 1110-1122, Aug. 1996.
-
(1996)
IEEE J. Sel. Areas Commun.
, vol.14
, Issue.6
, pp. 1110-1122
-
-
Almeroth, K.C.1
Ammar, M.H.2
-
5
-
-
0038425785
-
Placement algorithms for hierarchical cooperative caching
-
M. R. Korupolu, C. G. Plaxton, and R. Rajaraman, "Placement algorithms for hierarchical cooperative caching," J. Algorithms, vol. 38, no. 1, pp. 260-302, 2001.
-
(2001)
J. Algorithms
, vol.38
, Issue.1
, pp. 260-302
-
-
Korupolu, M.R.1
Plaxton, C.G.2
Rajaraman, R.3
-
6
-
-
55249124781
-
Approximation algorithms for data placement problems
-
Aug
-
I. Baev, R. Rajaraman, and C. Swamy, "Approximation algorithms for data placement problems," SIAM J. Comput., vol. 38, no. 4, pp. 1411-1429, Aug. 2008.
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.4
, pp. 1411-1429
-
-
Baev, I.1
Rajaraman, R.2
Swamy, C.3
-
7
-
-
84899645734
-
Fundamental limits of caching
-
May
-
M. A. Maddah-Ali and U. Niesen, "Fundamental limits of caching," IEEE Trans. Inf. Theory, vol. 60, no. 5, pp. 2856-2867, May 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.5
, pp. 2856-2867
-
-
Maddah-Ali, M.A.1
Niesen, U.2
-
8
-
-
85027907954
-
Decentralized coded caching attains order-optimal memory-rate tradeoff
-
to be published
-
M. A. Maddah-Ali and U. Niesen, "Decentralized coded caching attains order-optimal memory-rate tradeoff," IEEE/ACM Trans. Netw., to be published.
-
IEEE/ACM Trans. Netw.
-
-
Maddah-Ali, M.A.1
Niesen, U.2
-
10
-
-
84906998209
-
Online coded caching
-
Jun.
-
R. Pedarsani, M. A. Maddah-Ali, and U. Niesen, "Online coded caching," in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2014, pp. 1878-1883.
-
(2014)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 1878-1883
-
-
Pedarsani, R.1
Maddah-Ali, M.A.2
Niesen, U.3
-
12
-
-
84906569143
-
Hierarchical coded caching
-
Jun./Jul.
-
N. Karamchandani, U. Niesen, M. Maddah-Ali, and S. Diggavi, "Hierarchical coded caching," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun./Jul. 2014, pp. 2142-2146.
-
(2014)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 2142-2146
-
-
Karamchandani, N.1
Niesen, U.2
Maddah-Ali, M.3
Diggavi, S.4
-
13
-
-
0032670943
-
Web caching and Zipf-like distributions: Evidence and implications
-
Mar.
-
L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, "Web caching and Zipf-like distributions: Evidence and implications," in Proc. IEEE INFOCOM, vol. 1. Mar. 1999, pp. 126-134.
-
(1999)
Proc. IEEE INFOCOM
, vol.1
, pp. 126-134
-
-
Breslau, L.1
Cao, P.2
Fan, L.3
Phillips, G.4
Shenker, S.5
-
14
-
-
84911965874
-
On the average performance of caching and coded multicasting with random demands
-
M. Ji, A. M. Tulino, J. Llorca, and G. Caire, "On the average performance of caching and coded multicasting with random demands," in Proc. 11th Int. Symp. Wireless Commun. Syst. (ISWCS), 2014, pp. 922-926.
-
(2014)
Proc. 11th Int. Symp. Wireless Commun. Syst. (ISWCS)
, pp. 922-926
-
-
Ji, M.1
Tulino, A.M.2
Llorca, J.3
Caire, G.4
-
15
-
-
84890409786
-
Optimal throughput-outage tradeoff in wireless one-hop caching networks
-
Jul.
-
M. Ji, G. Caire, and A. F. Molisch, "Optimal throughput-outage tradeoff in wireless one-hop caching networks," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2013, pp. 1461-1465.
-
(2013)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 1461-1465
-
-
Ji, M.1
Caire, G.2
Molisch, A.F.3
-
16
-
-
84867507360
-
Wireless device-todevice communications with distributed caching
-
Jul.
-
N. Golrezaei, A. G. Dimakis, and A. F. Molisch, "Wireless device-todevice communications with distributed caching," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2012, pp. 2781-2785.
-
(2012)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 2781-2785
-
-
Golrezaei, N.1
Dimakis, A.G.2
Molisch, A.F.3
-
17
-
-
84893218567
-
Fundamental limits of distributed caching in D2D wireless networks
-
Sep.
-
M. Ji, G. Caire, and A. Molisch, "Fundamental limits of distributed caching in D2D wireless networks," in Proc. IEEE Inf. Theory Workshop (ITW), Sep. 2013, pp. 1-5.
-
(2013)
Proc. IEEE Inf. Theory Workshop (ITW)
, pp. 1-5
-
-
Ji, M.1
Caire, G.2
Molisch, A.3
-
19
-
-
84889592646
-
FemtoCaching: Wireless video content delivery through distributed caching helpers
-
Dec
-
N. Golrezaei, K. Shanmugam, A. G. Dimakis, A. F. Molisch, and G. Caire, "FemtoCaching: Wireless video content delivery through distributed caching helpers," IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8402-8413, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.12
, pp. 8402-8413
-
-
Golrezaei, N.1
Shanmugam, K.2
Dimakis, A.G.3
Molisch, A.F.4
Caire, G.5
-
20
-
-
84906544072
-
Learning-based optimization of cache content in a small cell base station
-
Jun.
-
P. Blasco and D. Gündüz, "Learning-based optimization of cache content in a small cell base station," in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2014, pp. 1897-1903.
-
(2014)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 1897-1903
-
-
Blasco, P.1
Gündüz, D.2
-
21
-
-
84906546045
-
Multi-armed bandit optimization of cache content in wireless infostation networks
-
Jun.
-
P. Blasco and D. Gündüz, "Multi-armed bandit optimization of cache content in wireless infostation networks," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2014, pp. 51-55.
-
(2014)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 51-55
-
-
Blasco, P.1
Gündüz, D.2
-
22
-
-
84911965953
-
Learning distributed caching strategies in small cell networks
-
Aug.
-
A. Sengupta, S. Amuru, R. Tandon, R. M. Buehrer, and T. C. Clancy, "Learning distributed caching strategies in small cell networks," in Proc. 11th Int. Symp. Wireless Commun. Syst. (ISWCS), Aug. 2014, pp. 917-921.
-
(2014)
Proc. 11th Int. Symp. Wireless Commun. Syst. (ISWCS)
, pp. 917-921
-
-
Sengupta, A.1
Amuru, S.2
Tandon, R.3
Buehrer, R.M.4
Clancy, T.C.5
-
23
-
-
84890522850
-
Communication theory of secrecy systems
-
Sep
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Sep. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
25
-
-
84911886300
-
Secure caching with nonuniform demands
-
May
-
A. Sengupta, R. Tandon, and T. C. Clancy, "Secure caching with nonuniform demands," in Proc. IEEE Global Wireless Summit (GWS), May 2014, pp. 1-5.
-
(2014)
Proc. IEEE Global Wireless Summit (GWS)
, pp. 1-5
-
-
Sengupta, A.1
Tandon, R.2
Clancy, T.C.3
|