{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:41:14Z","timestamp":1740148874982,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T00:00:00Z","timestamp":1588550400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T00:00:00Z","timestamp":1588550400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100005046","name":"Natural Science Foundation of Heilongjiang Province","doi-asserted-by":"crossref","award":["No. F2016028"],"award-info":[{"award-number":["No. F2016028"]}],"id":[{"id":"10.13039\/501100005046","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Fundamental Research Fund for the Central Universities in China","award":["No. HEUCF180602","No.HEUCF M180604"],"award-info":[{"award-number":["No. HEUCF180602","No.HEUCF M180604"]}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No. 61872104"],"award-info":[{"award-number":["No. 61872104"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s12083-020-00872-y","type":"journal-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T14:03:57Z","timestamp":1588601037000},"page":"1799-1813","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A near-optimal content placement in D2D underlaid cellular networks"],"prefix":"10.1007","volume":"13","author":[{"given":"Guangsheng","family":"Feng","sequence":"first","affiliation":[]},{"given":"Yue","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7192-1622","authenticated-orcid":false,"given":"Bingyang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yafei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hongwu","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Chengbo","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zihan","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Huiqiang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,4]]},"reference":[{"key":"872_CR1","unstructured":"Cisco Predicts More IP Traffic in the Next Five Years Than in the History of the Internet, https:\/\/newsroom.cisco.com\/press-release-content?type=webcontent&articleId=1955935"},{"issue":"6","key":"872_CR2","doi-asserted-by":"publisher","first-page":"1718","DOI":"10.1109\/TMC.2016.2603152","volume":"16","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, He S, Chen J (2017) Near Optimal Data Gathering in Rechargeable Sensor Networks with a Mobile Sink. IEEE Trans Mob Comput 16(6):1718\u20131729","journal-title":"IEEE Trans Mob Comput"},{"issue":"2","key":"872_CR3","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1109\/JIOT.2019.2894257","volume":"6","author":"X Liu","year":"2019","unstructured":"Liu X, Liu Y, Zhang N, Wu W, Liu A (2019) Optimizing trajectory of unmanned aerial vehicles for efficient data acquisition: A matrix completion approach. IEEE Internet Things J 6(2):1829\u20131840","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"872_CR4","doi-asserted-by":"publisher","first-page":"1632","DOI":"10.1109\/TNET.2015.2425146","volume":"24","author":"Y Zhang","year":"2016","unstructured":"Zhang Y, He S, Chen J (2016) Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks. IEEE\/ACM Trans Netw 24(3):1632\u20131646","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"4","key":"872_CR5","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1109\/LWC.2018.2799935","volume":"7","author":"D Zhang","year":"2018","unstructured":"Zhang D, Shen R, Ren J, Zhang Y (2018) Delay-optimal proactive service framework for block-stream as a service. IEEE Wirel Commun Lett 7(4):598\u2013601","journal-title":"IEEE Wirel Commun Lett"},{"issue":"6","key":"872_CR6","doi-asserted-by":"publisher","first-page":"3096","DOI":"10.1109\/TCOMM.2013.050613.121698","volume":"12","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, He S, Chen J, Sun Y, Shen X S (2013) Distributed sampling rate control for rechargeable sensor nodes with limited battery capacity. IEEE Trans Wirel Commun 12(6):3096\u20133106","journal-title":"IEEE Trans Wirel Commun"},{"key":"872_CR7","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1016\/j.future.2019.04.043","volume":"100","author":"Y Liu","year":"2019","unstructured":"Liu Y, Liu A, Wang T, Liu X, Xiong N (2019) An intelligent incentive mechanism for coverage of data collection in cognitive internet of things. Futur Gener Comput Syst 100:701\u2013714","journal-title":"Futur Gener Comput Syst"},{"key":"872_CR8","doi-asserted-by":"crossref","unstructured":"Golrezaei N, Shanmugam K, Dimakis A G, Molisch A F, Caire G (2012) FemtoCaching: Wireless video content delivery through distributed caching helpers. 2012 Proceedings IEEE INFOCOM","DOI":"10.1109\/INFCOM.2012.6195469"},{"issue":"12","key":"872_CR9","doi-asserted-by":"publisher","first-page":"8402","DOI":"10.1109\/TIT.2013.2281606","volume":"59","author":"N Golrezaei","year":"2013","unstructured":"Golrezaei N, Shanmugam K, Dimakis A G, Molisch A F, Caire G (2013) FemtoCaching: Wireless video content delivery through distributed caching helpers. IEEE Trans Inf Theory 59(12):8402\u20138413","journal-title":"IEEE Trans Inf Theory"},{"key":"872_CR10","unstructured":"Global Cloud Index Projects Cloud Traffic to Represent 95 Percent of Total Data Center Traffic by 2021, https:\/\/newsroom.cisco.com\/press-release-content?type=webcontent&articleId=1908858"},{"issue":"1","key":"872_CR11","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/TNSM.2016.2521352","volume":"13","author":"K Poularakis","year":"2016","unstructured":"Poularakis K, Iosifidis G, Pefkianakis I, Tassiulas L, May M (2016) Mobile data offloading through caching in residential 802.11 wireless networks. IEEE Trans Netw Service Manag 13(1):71\u201384","journal-title":"IEEE Trans Netw Service Manag"},{"issue":"7","key":"872_CR12","doi-asserted-by":"publisher","first-page":"1624","DOI":"10.1109\/TMC.2017.2773087","volume":"17","author":"X Zhang","year":"2017","unstructured":"Zhang X, Guo L, Ming L, Fang Y (2017) Motivating human-enabled mobile participation for data offloading. IEEE Trans Mob Comput 17(7):1624\u20131637","journal-title":"IEEE Trans Mob Comput"},{"key":"872_CR13","doi-asserted-by":"crossref","unstructured":"Zhang D, Tan L, Ren J, Awad M K, Zhang S, Zhang Y, Wan P (2019) Near-optimal and truthful online auction for computation offloading in green edge-computing systems. IEEE Transactions on Mobile Computing","DOI":"10.1109\/TMC.2019.2901474"},{"issue":"6","key":"872_CR14","doi-asserted-by":"publisher","first-page":"1658","DOI":"10.1109\/TMC.2016.2604260","volume":"16","author":"Z Wang","year":"2017","unstructured":"Wang Z, Shah-Mansouri H, Wong V W S (2017) How to download more data from neighbors? a metric for d2d data offloading opportunity. IEEE Trans Mob Comput 16(6):1658\u20131675","journal-title":"IEEE Trans Mob Comput"},{"key":"872_CR15","doi-asserted-by":"crossref","unstructured":"Duan S, Zhang D, Wang Y, Li L, Zhang Y, JointRec (2019) A Deep Learning-based Joint Cloud Video Recommendation Framework for Mobile IoTs. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2019.2944889"},{"key":"872_CR16","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.jnca.2018.04.017","volume":"115","author":"S Sheng","year":"2018","unstructured":"Sheng S, Min L, Jiao Z, Xiao P, Shuang C (2018) User-centric content sharing via cache-enabled device-to-device communication. J Netw Comput Appl 115:103\u2013115","journal-title":"J Netw Comput Appl"},{"issue":"3","key":"872_CR17","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1109\/TMM.2018.2889934","volume":"21","author":"W Tang","year":"2018","unstructured":"Tang W, Ren J, Zhang Y (2018) Enabling trusted and privacy-preserving healthcare services in social media health networks. IEEE Trans Multimed 21(3):579\u2013590","journal-title":"IEEE Trans Multimed"},{"issue":"6","key":"872_CR18","first-page":"68","volume":"10","author":"W Tang","year":"2019","unstructured":"Tang W, Ren J, Zhang K, Zhang D, Zhang Y, Shen X S (2019) Efficient and Privacy-preserving Fog-assisted Health Data Sharing Scheme. ACM Trans Intell Syst Technol (TIST) 10(6):68","journal-title":"ACM Trans Intell Syst Technol (TIST)"},{"issue":"11","key":"872_CR19","doi-asserted-by":"publisher","first-page":"4147","DOI":"10.1109\/TCOMM.2014.2363849","volume":"62","author":"H Elsawy","year":"2014","unstructured":"Elsawy H, Hossain E, Alouini M (2014) Analytical Modeling of Mode Selection and Power Control for Underlay D2D Communication in Cellular Networks. IEEE Trans Commun 62(11):4147\u20134161","journal-title":"IEEE Trans Commun"},{"issue":"1","key":"872_CR20","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1109\/JIOT.2018.2842766","volume":"6","author":"D Zhang","year":"2018","unstructured":"Zhang D, Qiao Y, She L, Shen R, Ren J, Zhang Y (2018) Two time-scale resource management for green Internet of Things networks. IEEE Internet Things J 6(1):545\u2013556","journal-title":"IEEE Internet Things J"},{"key":"872_CR21","doi-asserted-by":"crossref","unstructured":"Zhang Y, Wang C Y, Wei H Y (2016) Incentive compatible mode selection and spectrum partitioning in overlay D2D-enabled network. Globecom Workshops","DOI":"10.1109\/GLOCOMW.2015.7414221"},{"key":"872_CR22","doi-asserted-by":"crossref","unstructured":"Wang Y, Feng G, Lin J, Lv H, Sun J, Wang H, Gao Z (2019) Optimal content caching policy considering mode selection and user preference under overlay d2d communications. 2018 14th international conference on mobile ad-hoc and sensor networks (MSN)","DOI":"10.1109\/MSN.2018.00035"},{"key":"872_CR23","doi-asserted-by":"crossref","unstructured":"Ji M, Caire G, Molisch A F (2013) Optimal throughput-outage trade-off in wireless one-hop caching networks. IEEE international symposium on information theory","DOI":"10.1109\/ISIT.2013.6620469"},{"key":"872_CR24","doi-asserted-by":"crossref","unstructured":"Ba\u015ftug\u030c E., Bennis M, Debbah M (2014) Social and spatial proactive caching for mobile data offloading. IEEE international conference on communications workshops","DOI":"10.1109\/ICCW.2014.6881261"},{"issue":"3","key":"872_CR25","first-page":"584","volume":"21","author":"C Zheng","year":"2016","unstructured":"Zheng C, Pappas N, Kountouris M (2016) Probabilistic caching in wireless D2D networks: Cache hit optimal versus throughput optimal. IEEE Commun Lett 21(3):584\u2013587","journal-title":"IEEE Commun Lett"},{"issue":"9","key":"872_CR26","doi-asserted-by":"publisher","first-page":"2025","DOI":"10.1109\/JSAC.2017.2720818","volume":"35","author":"N Giatsoglou","year":"2017","unstructured":"Giatsoglou N, Ntontin K, Kartsakli E, Antonopoulos A, Verikoukis C (2017) D2D-aware device caching in MmWave-cellular networks. IEEE J Select Areas Commun 35(9):2025\u20132037","journal-title":"IEEE J Select Areas Commun"},{"key":"872_CR27","doi-asserted-by":"crossref","unstructured":"Chen B, Yang C (2017) Caching policy optimization for D2D communications by learning user preference. 2017 IEEE 85th Vehicular Technology Conference","DOI":"10.1109\/VTCSpring.2017.8108572"},{"issue":"4","key":"872_CR28","first-page":"978","volume":"35","author":"Y Pan","year":"2017","unstructured":"Pan Y, Pan C, Zhu H, Ahmed Q Z, Ming C, Wang J (2017) On consideration of content preference and sharing willingness in D2D assisted offloading. IEEE J Select Areas Commun 35(4):978\u2013993","journal-title":"IEEE J Select Areas Commun"},{"issue":"1","key":"872_CR29","first-page":"444","volume":"65","author":"Y Guo","year":"2017","unstructured":"Guo Y, Duan L, Rui Z (2017) Cooperative local caching under heterogeneous file preferences. IEEE Trans Commun 65(1):444\u2013457","journal-title":"IEEE Trans Commun"},{"issue":"1","key":"872_CR30","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/JSYST.2017.2773580","volume":"13","author":"T Zhang","year":"2017","unstructured":"Zhang T, Fan H, Loo J, Liu D (2017) User preference aware caching deployment for device-to-device caching networks. IEEE Syst J 13(1):226\u2013237","journal-title":"IEEE Syst J"},{"key":"872_CR31","doi-asserted-by":"crossref","unstructured":"Lee M C, Molisch A F (2019) Individual preference aware caching policy design in wireless D2D networks. IEEE transactions on wireless communications","DOI":"10.1109\/ICC40277.2020.9149007"},{"issue":"11","key":"872_CR32","doi-asserted-by":"publisher","first-page":"3122","DOI":"10.1109\/TCOMM.2011.100411.100541","volume":"59","author":"JG Andrews","year":"2011","unstructured":"Andrews J G, Baccelli F, Ganti R K (2011) A tractable approach to coverage and rate in cellular networks. IEEE Trans Commun 59(11):3122\u20133134","journal-title":"IEEE Trans Commun"},{"key":"872_CR33","doi-asserted-by":"crossref","unstructured":"Leconte M, Paschos G, Gkatzikis L, Draief M, Vassilaras S, Chouvardas S (2016) Placing dynamic content in caches with small population. IEEE INFOCOM","DOI":"10.1109\/INFOCOM.2016.7524380"},{"issue":"4","key":"872_CR34","first-page":"974","volume":"26","author":"C Xu","year":"2014","unstructured":"Xu C (2014) Decentralized computation offloading game for mobile cloud computing. IEEE Trans Parall Distr Syst 26(4):974\u2013983","journal-title":"IEEE Trans Parall Distr Syst"},{"key":"872_CR35","doi-asserted-by":"crossref","unstructured":"Krause A, Golovin D (2014) Submodular function maximization","DOI":"10.1017\/CBO9781139177801.004"},{"key":"872_CR36","unstructured":"Rajaraman N, Vaze R (2018) Submodular maximization under a matroid constraint: Asking more from an old friend the Greedy Algorithm"},{"issue":"1","key":"872_CR37","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/BF01588971","volume":"14","author":"GL Nemhauser","year":"1978","unstructured":"Nemhauser G L, Wolsey L A, Fisher M L (1978) An analysis of approximations for maximizing submodular set functions\u2013I. Math Program 14(1):265\u2013294","journal-title":"Math Program"},{"issue":"3","key":"872_CR38","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0166-218X(84)90003-9","volume":"7","author":"M Conforti","year":"1984","unstructured":"Conforti M, Cornu\u00e9jols G (1984) Submodular set functions, matroids and the greedy algorithm: Tight worst-case bounds and some generalizations of the Rado-Edmonds theorem. Discret Appl Math 7(3):251\u2013274","journal-title":"Discret Appl Math"},{"key":"872_CR39","unstructured":"Nguyen H V, Bai L (2010) Cosine similarity metric learning for face verification. Asian Conference on Computer Vision"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00872-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-020-00872-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00872-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,23]],"date-time":"2022-10-23T00:25:27Z","timestamp":1666484727000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-020-00872-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,4]]},"references-count":39,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["872"],"URL":"https:\/\/doi.org\/10.1007\/s12083-020-00872-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2020,5,4]]},"assertion":[{"value":"1 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 May 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}