{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:34:26Z","timestamp":1766136866026,"version":"3.37.3"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Hong Kong Research Grant Council","award":["610113"],"award-info":[{"award-number":["610113"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Wireless Commun."],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/twc.2017.2705038","type":"journal-article","created":{"date-parts":[[2017,5,22]],"date-time":"2017-05-22T21:11:44Z","timestamp":1495487504000},"page":"5001-5015","source":"Crossref","is-referenced-by-count":137,"title":["Mobility-Aware Caching in D2D Networks"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0183-1212","authenticated-orcid":false,"given":"Rui","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5222-1898","authenticated-orcid":false,"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"S. H.","family":"Song","sequence":"additional","affiliation":[]},{"given":"Khaled B.","family":"Letaief","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","volume":"1","author":"cooper","year":"1981","journal-title":"Introduction to Dynamic Programming"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.213"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1049\/ip-com:20050237"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1080139.1080142"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080604"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7537180"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1060"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20798-3_23"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248843"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2294111"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2654455"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2316817"},{"key":"ref29","first-page":"1","article-title":"Device-to-device offloading with proactive caching in mobile cellular networks","author":"lan","year":"2015","journal-title":"Proc IEEE Global Commun Conf (GLOBECOM)"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"2809","DOI":"10.1109\/TWC.2014.040214.131770","article-title":"Group sparse beamforming for green cloud-RAN","volume":"13","author":"shi","year":"2014","journal-title":"IEEE Trans Wireless Commun"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2328098"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620380"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2455500"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510807"},{"journal-title":"Resource Management for Device-to-Device Underlay Communication","year":"2013","author":"song","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2367473"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2306938"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.101613.122076"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2317316"},{"key":"ref11","first-page":"1","article-title":"Cache-enabled small cell networks: Modeling and tradeoffs","volume":"41","author":"ba?tu?","year":"2015","journal-title":"EURASIP J Wireless Commun Netw"},{"journal-title":"Submodular Functions and Optimization","year":"2005","author":"fujishige","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2281606"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195469"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364526"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2319312"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620469"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2490226"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2504556"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916631"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4623708"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7143330"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736753"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6495773"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2452672"},{"key":"ref7","first-page":"1","article-title":"Backhaul-aware caching placement for wireless networks","author":"peng","year":"2015","journal-title":"Proc IEEE Global Commun Conf (GLOBECOM)"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-005-6615-6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511288"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1233531"},{"journal-title":"CRAWDAD Dataset Cambridge\/Haggle","year":"2009","author":"scott","key":"ref45"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061995"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1162654.1162657"},{"journal-title":"Combinatorial Optimization Polyhedra and Efficiency","year":"2003","author":"schrijver","key":"ref42"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/BF01588971","article-title":"An analysis of approximations for maximizing submodular set functions&#x2014;I","volume":"14","author":"fisher","year":"1978","journal-title":"Math Program"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2048502"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1137\/080733991"}],"container-title":["IEEE Transactions on Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7693\/8007359\/07932468.pdf?arnumber=7932468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T17:01:23Z","timestamp":1642006883000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7932468\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":49,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/twc.2017.2705038","relation":{},"ISSN":["1536-1276"],"issn-type":[{"type":"print","value":"1536-1276"}],"subject":[],"published":{"date-parts":[[2017,8]]}}}