{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:20:06Z","timestamp":1740169206007,"version":"3.37.3"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3042772","type":"journal-article","created":{"date-parts":[[2020,12,8]],"date-time":"2020-12-08T00:07:39Z","timestamp":1607386059000},"page":"218401-218415","source":"Crossref","is-referenced-by-count":2,"title":["Cached Files Updating Revisited: The Distribution of Popularity-Weighted Average File Age"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0962-2063","authenticated-orcid":false,"given":"Jixiang","family":"Zhang","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2911505"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013924"},{"key":"ref31","article-title":"Average age of information with hybrid ARQ under a resource constraint","author":"tugce ceran","year":"2017","journal-title":"arXiv 1710 04971"},{"key":"ref30","article-title":"A reinforcement learning approach to age of information in multi-user networks","author":"tu?\u00e7e ceran","year":"2018","journal-title":"arXiv 1806 00336"},{"journal-title":"Inequalities","year":"1952","author":"hardy","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148775"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013924"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.07.038"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437927"},{"key":"ref11","article-title":"Age of information aware cache updating with File- and age-dependent update durations","author":"tang","year":"2019","journal-title":"arXiv 1909 05930"},{"key":"ref12","article-title":"Accounting for information freshness in scheduling of content caching","author":"ahani","year":"2019","journal-title":"arXiv 1910 13194"},{"key":"ref13","article-title":"Blockchain and learning-based secure and intelligent task offloading for vehicular fog computing","author":"liao","year":"2020","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref14","article-title":"Learning-based URLLC-aware task offloading for Internet of health things","author":"zhou","year":"2020","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WIOPT.2016.7492912"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511331"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006570"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006590"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2016.7852321"},{"key":"ref28","article-title":"Reinforcement learning to minimize age of information with an energy harvesting sensor with HARQ and sensing cost","author":"tu?\u00e7e ceran","year":"2019","journal-title":"arXiv 1902 09467"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1366919.1366930"},{"key":"ref27","article-title":"Reinforcement learning based scheduling algorithm for optimizing age of information in ultra reliable low latency networks","author":"elgabli","year":"2018","journal-title":"arXiv 1811 06776"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.76"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195689"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2018.8404794"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.63"},{"key":"ref8","article-title":"Age of information: An introduction and survey","author":"yates","year":"2020","journal-title":"arXiv 2007 08564"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2011.5984917"},{"key":"ref2","first-page":"85","article-title":"The age of impatience: Optimal replication schemes for opportunistic networks","author":"joshua","year":"2009","journal-title":"Proc 5th Int Conf Emerg Netw Exp Technol"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006506"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1811039.1811075"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2873606"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761668"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437688"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013567"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2019.8919891"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.23919\/WiOPT47501.2019.9144090"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845145"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09284444.pdf?arnumber=9284444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T00:34:01Z","timestamp":1643157241000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9284444\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3042772","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}