{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:44:09Z","timestamp":1740123849068,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T00:00:00Z","timestamp":1557187200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61701059"],"award-info":[{"award-number":["61701059"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s11276-019-01996-7","type":"journal-article","created":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T17:04:55Z","timestamp":1557248695000},"page":"2817-2829","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A game theoretical distributed approach for opportunistic caching strategy"],"prefix":"10.1007","volume":"25","author":[{"given":"Qilie","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yanyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Liqiang","family":"Zhuge","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Hongmei","family":"Xue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,7]]},"reference":[{"key":"1996_CR1","unstructured":"Cisio. (2017). Cisco visual networking index: Global mobile DataTraffic forecast. Retrieved February 18, 2017, from \n                    https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/mobile-white-paper-c11-520862.html\n                    \n                  ."},{"issue":"3","key":"1996_CR2","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1109\/TNSM.2016.2597295","volume":"13","author":"M Richart","year":"2016","unstructured":"Richart, M., Baliosian, J., Serrat, J., & Gorricho, J. (2016). Resource slicing in virtual wireless networks: A survey. IEEE Transactions on Network and Service Management, 13(3), 462\u2013476.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"3","key":"1996_CR3","doi-asserted-by":"publisher","first-page":"1603","DOI":"10.1109\/COMST.2017.2704899","volume":"19","author":"J Van de Belt","year":"2017","unstructured":"Van de Belt, J., Ahmadi, H., & Doyle, L. E. (2017). Defining and surveying wireless link virtualization and wireless network virtualization. IEEE Communications Surveys & Tutorials, 19(3), 1603\u20131627.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1996_CR4","doi-asserted-by":"crossref","unstructured":"Wang, X., Chen, Q., & Qiu, H. (2017). A effective two-step strategy of multi-domain virtual network embedding in 5G network slicing. In 3rd IEEE international conference on computer and communications\n                           (ICCC) (pp. 1174\u20131179).","DOI":"10.1109\/CompComm.2017.8322728"},{"issue":"3","key":"1996_CR5","doi-asserted-by":"publisher","first-page":"2473","DOI":"10.1109\/JSYST.2017.2673828","volume":"12","author":"W Hou","year":"2018","unstructured":"Hou, W., Ning, Z., Guo, L., Chen, Z., & Obaidat, M. S. (2018). Novel framework of risk-aware virtual network embedding in optical data center networks. IEEE Systems Journal, 12(3), 2473\u20132482.","journal-title":"IEEE Systems Journal"},{"issue":"1","key":"1996_CR6","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/TNET.2011.2159308","volume":"20","author":"M Chowdhury","year":"2012","unstructured":"Chowdhury, M., Rahman, M. R., & Boutaba, R. (2012). ViNEYard: Virtual network embedding algorithms with coordinated node and link mapping. IEEE\/ACM Transactions on Networking, 20(1), 206\u2013219.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"3","key":"1996_CR7","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/TNSM.2015.2459073","volume":"12","author":"R Mijumbi","year":"2015","unstructured":"Mijumbi, R., Serrat, J., Gorricho, J., & Boutaba, R. (2015). A path generation approach to embedding of virtual networks. IEEE Transactions on Network and Service Management, 12(3), 334\u2013348.","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"1996_CR8","doi-asserted-by":"publisher","first-page":"47815","DOI":"10.1109\/ACCESS.2018.2867562","volume":"6","author":"H Cao","year":"2018","unstructured":"Cao, H., Guo, Y., Qu, Z., Wu, S., Zhu, H., & Yang, L. (2018). ER-VNE: A joint energy and revenue embedding algorithm for embedding virtual networks. IEEE Access, 6, 47815\u201347827.","journal-title":"IEEE Access"},{"key":"1996_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Su, S., Zhang, J., Shuang, K., & Xu, P. (2015). Energy aware virtual network embedding with dynamic demands. In IEEE international conference on communications\n                           (ICC) (pp. 5386\u20135391).","DOI":"10.1109\/ICC.2015.7249180"},{"issue":"3","key":"1996_CR10","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/MWC.2017.1500384WC","volume":"24","author":"K Wang","year":"2017","unstructured":"Wang, K., Yu, F. R., Li, H., & Li, Z. (2017). Information-centric wireless networks with virtualization and D2D communications. IEEE Wireless Communications, 24(3), 104\u2013111.","journal-title":"IEEE Wireless Communications"},{"key":"1996_CR11","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.dcan.2016.04.002","volume":"3","author":"Niemah Izzeldin Osman","year":"2017","unstructured":"Osman, Niemah Izzeldin. (2017). Will video caching remain energy efficient in future core optical networks? Digital Communications and Networks, 3, 39\u201346.","journal-title":"Digital Communications and Networks"},{"issue":"2","key":"1996_CR12","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/MCOM.2014.6736753","volume":"52","author":"X Wang","year":"2014","unstructured":"Wang, X., Chen, M., Taleb, T., Ksentini, A., & Leung, V. C. M. (2014). Cache in the air: Exploiting content caching and delivery techniques for 5G systems. IEEE Communications Magazine, 52(2), 131\u2013139.","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"1996_CR13","doi-asserted-by":"publisher","first-page":"1473","DOI":"10.1109\/COMST.2015.2420097","volume":"17","author":"M Zhang","year":"2015","unstructured":"Zhang, M., Luo, H., & Zhang, H. (2015). A survey of caching mechanisms in information-centric networking. IEEE Communications Surveys & Tutorials, 17(3), 1473\u20131499.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1996_CR14","doi-asserted-by":"crossref","unstructured":"Jacobson, V., Smetters, D. K., James, F. P., Michael, B., Nicholas, B., & Rebecca, B. (2009). Networking named content. In 5th ACM international conference on emerging networking experiments and technologies\n                           (CoNEXT) (pp. 1\u201312).","DOI":"10.1145\/1658939.1658941"},{"key":"1996_CR15","doi-asserted-by":"crossref","unstructured":"Arianfar, S., Nikander, P., & Ott, J. (2010). On content-centric router design and implications. In 6th ACM international conference on emerging networking experiments and technologies\n                           (CoNEXT).","DOI":"10.1145\/1921233.1921240"},{"key":"1996_CR16","doi-asserted-by":"crossref","unstructured":"Wu, H., Li, J., & Zhi, J. (2015). MBP: A max-benefit probability-based caching strategy in information-centric networking. In 2015 IEEE international conference on communications\n                           (ICC) (pp. 5646\u20135651).","DOI":"10.1109\/ICC.2015.7249222"},{"key":"1996_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, R., Liu, J., Huang, T., & Xie, R. (2017). Popularity based probabilistic caching strategy design for named data networking. In IEEE conference on computer communications workshops\n                           (INFOCOM WKSHPS) (pp. 476\u2013481).","DOI":"10.1109\/INFCOMW.2017.8116423"},{"key":"1996_CR18","doi-asserted-by":"crossref","unstructured":"Ndikumana, A., Ullah, S., LeAnh, T., Tran, N. H., & Hong, C. S. (2017). Collaborative cache allocation and computation offloading in mobile edge computing. In 19th Asia-Pacific network operations and management symposium\n                           (APNOMS) (pp. 366-369).","DOI":"10.1109\/APNOMS.2017.8094149"},{"issue":"8","key":"1996_CR19","doi-asserted-by":"publisher","first-page":"1791","DOI":"10.1109\/TMC.2017.2780834","volume":"17","author":"S Zhang","year":"2018","unstructured":"Zhang, S., He, P., Suto, K., Yang, P., Zhao, L., & Shen, X. (2018). Cooperative edge caching in user-centric clustered mobile networks. IEEE Transactions on Mobile Computing, 17(8), 1791\u20131805.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"8","key":"1996_CR20","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MCOM.2016.7537175","volume":"54","author":"Z Hu","year":"2016","unstructured":"Hu, Z., Zheng, Z., Wang, T., Song, L., & Li, X. (2016). Game theoretic approaches for wireless proactive caching. IEEE Communications Magazine, 54(8), 37\u201343.","journal-title":"IEEE Communications Magazine"},{"issue":"12","key":"1996_CR21","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1631\/FITEE.1500497","volume":"17","author":"J Xie","year":"2016","unstructured":"Xie, J., Xie, R., Huang, T., Liu, J., Yu, F. R., & Liu, Y. (2016). Caching resource sharing in radio access networks: A game theoretic approach. Frontiers of Information Technology & Electronic Engineering, 17(12), 1253\u20131265.","journal-title":"Frontiers of Information Technology & Electronic Engineering"},{"issue":"7","key":"1996_CR22","doi-asserted-by":"publisher","first-page":"3108","DOI":"10.1109\/TCOMM.2018.2807445","volume":"66","author":"Y Cui","year":"2018","unstructured":"Cui, Y., Wang, Z., Yang, Y., Yang, F., Ding, L., & Qian, L. (2018). Joint and competitive caching designs in large-scale multi-tier wireless multicasting networks. IEEE Transactions on Communications, 66(7), 3108\u20133121.","journal-title":"IEEE Transactions on Communications"},{"key":"1996_CR23","unstructured":"Yang, F., Wang, Z., Chen, J., & Liu, Y. (2010). VLB-VNE: A regionalized valiant load-balancing algorithm in virtual network mapping. In IEEE international conference on wireless communications, networking and information security (pp. 432\u2013436)."},{"key":"1996_CR24","doi-asserted-by":"crossref","unstructured":"Gong, L., Wen, Y., Zhu, Z., & Lee, T. (2014). Toward profit-seeking virtual network embedding algorithm via global resource capacity. In IEEE INFOCOM 2014-IEEE conference on computer communications (pp. 1\u20139).","DOI":"10.1109\/INFOCOM.2014.6847918"},{"key":"1996_CR25","doi-asserted-by":"crossref","unstructured":"Li, Z., Zheng, X., Zhang Y., & Xue, Q. (2017). Multi-objective virtual network embedding algorithm based on global resource capacity. In IEEE international conference on computational science and engineering and IEEE international conference on embedded and ubiquitous computing\n                           (CSE & EUC) (pp. 647\u2013650).","DOI":"10.1109\/CSE-EUC.2017.121"},{"key":"1996_CR26","doi-asserted-by":"crossref","unstructured":"Feng, M., Liao, J., Wang, J., Qing, S., & Qi, Q. (2014). Topology-aware virtual network embedding based on multiple characteristics. In IEEE international conference on communications\n                           (ICC) (pp. 2956\u20132962).","DOI":"10.1109\/ICC.2014.6883774"},{"key":"1996_CR27","doi-asserted-by":"crossref","unstructured":"Baumgartner, A., Reddy, V. S., & Bauschert, T. (2015). Mobile core network virtualization: A model for combined virtual core network function placement and topology optimization. In 1st IEEE conference on network softwarization\n                           (NetSoft) (pp. 1\u20139).","DOI":"10.1109\/NETSOFT.2015.7116162"},{"key":"1996_CR28","doi-asserted-by":"crossref","unstructured":"Breslau, L., Cao, P., Fan, L., Phillips, G., & Shenker, S. (1999). Web caching and Zipf-like distributions: Evidence and implications. In Eighteenth annual joint conference of the IEEE computer and communications societies. The future is now (Cat. No. 99CH36320) (pp. 126\u2013134).","DOI":"10.1109\/INFCOM.1999.749260"},{"issue":"1","key":"1996_CR29","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1006\/game.1996.0044","volume":"14","author":"D Monderer","year":"1996","unstructured":"Monderer, D., & Shapley, L. S. (1996). Potential games. Games and Economic Behavior, 14(1), 124\u2013143.","journal-title":"Games and Economic Behavior"},{"key":"1996_CR30","doi-asserted-by":"crossref","unstructured":"MacKenzie, A. B., & DaSilva, L. A. (2006). Game theory for wireless engineers. Morgan & Claypool.","DOI":"10.2200\/S00014ED1V01Y200508COM001"},{"issue":"7","key":"1996_CR31","doi-asserted-by":"publisher","first-page":"619","DOI":"10.4169\/amer.math.monthly.122.7.619","volume":"122","author":"MR Sundstr\u00f6m","year":"2010","unstructured":"Sundstr\u00f6m, M. R. (2010). A pedagogical history of compactness. The American Mathematical Monthly, 122(7), 619\u2013635.","journal-title":"The American Mathematical Monthly"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-019-01996-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-019-01996-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-019-01996-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,5]],"date-time":"2020-05-05T23:24:24Z","timestamp":1588721064000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-019-01996-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,7]]},"references-count":31,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["1996"],"URL":"https:\/\/doi.org\/10.1007\/s11276-019-01996-7","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2019,5,7]]},"assertion":[{"value":"7 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}