{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T07:10:07Z","timestamp":1746861007932,"version":"3.40.5"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T00:00:00Z","timestamp":1742774400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T00:00:00Z","timestamp":1742774400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,24]]},"DOI":"10.1109\/wcnc61545.2025.10978535","type":"proceedings-article","created":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T17:53:33Z","timestamp":1746813213000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["IceCache: Recommendation-Based Edge Caching for Life Cycle of Video"],"prefix":"10.1109","author":[{"given":"Shaohua","family":"Cao","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, China University of Petroleum (East China),Qingdao,China"}]},{"given":"Wanli","family":"Xing","sequence":"additional","affiliation":[{"name":"School of Science and Engineering, The Chinese University of Hong Kong,Shenzhen,China"}]},{"given":"Quancheng","family":"Zheng","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, China University of Petroleum (East China),Qingdao,China"}]},{"given":"Huaqi","family":"Lv","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, China University of Petroleum (East China),Qingdao,China"}]},{"given":"Xuyang","family":"Yuan","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, China University of Petroleum (East China),Qingdao,China"}]},{"given":"Zijun","family":"Zhan","sequence":"additional","affiliation":[{"name":"University of Houston,Electrical and Computer Engineering Department,Houston,TX,USA"}]},{"given":"Kai","family":"Fang","sequence":"additional","affiliation":[{"name":"College of Mathematics and Computer Science, Zhejiang A&#x0026;F University,Hangzhou,China"}]},{"given":"Mohammad Kamrul","family":"Hasan","sequence":"additional","affiliation":[{"name":"Universiti Kebangsaan Malaysia,Center for Cyber Security,Bangi,Selangor,Malaysia"}]},{"given":"Weishan","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, China University of Petroleum (East China),Qingdao,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.26599\/BDMA.2023.9020010"},{"volume-title":"Ericsson","key":"ref2","article-title":"Ericsson mobility report november 2024"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2022157"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3124091"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2014.7014135"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCAN53069.2021.9526410"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2294111"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7565183"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2831690"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2022.3205482"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3338231"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2844983"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3323464"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2986803"},{"key":"ref16","first-page":"483","article-title":"AdaptSize: Orchestrating the hot object memory cache in a content delivery network","author":"Berger","year":"2017","journal-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). USENIX Association"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3341216.3342214"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3006388"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.11.015"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2281542"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3600006.3613147"}],"event":{"name":"2025 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2025,3,24]]},"location":"Milan, Italy","end":{"date-parts":[[2025,3,27]]}},"container-title":["2025 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10978109\/10978116\/10978535.pdf?arnumber=10978535","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T06:47:46Z","timestamp":1746859666000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10978535\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,24]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/wcnc61545.2025.10978535","relation":{},"subject":[],"published":{"date-parts":[[2025,3,24]]}}}