{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T04:50:35Z","timestamp":1730263835418,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/ifipnetworking.2016.7497245","type":"proceedings-article","created":{"date-parts":[[2016,6,25]],"date-time":"2016-06-25T11:39:03Z","timestamp":1466854743000},"page":"341-349","source":"Crossref","is-referenced-by-count":11,"title":["Enhanced caching strategies at the edge of LTE mobile networks"],"prefix":"10.1109","author":[{"given":"Andre","family":"Gomes","sequence":"first","affiliation":[]},{"given":"Torsten","family":"Braun","sequence":"additional","affiliation":[]},{"given":"Edmundo","family":"Monteiro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1007\/0-387-27727-7_1"},{"year":"2015","author":"afanasyev","article-title":"NS-3 based Named Data Networking (NDN) simulator","key":"ref33"},{"year":"2015","article-title":"ns-3: LTE Module","key":"ref32"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/RFM.2013.6757228"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/TMC.2005.74"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1007\/s11042-009-0309-5"},{"year":"2009","article-title":"Half of youtube videos get fewer than 500 views","key":"ref36"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/icc.2011.5962732"},{"key":"ref34","article-title":"Caching performance of content centric networks under multi-path routing (and more)","author":"rossi","year":"2011","journal-title":"Technical Report Telecom Paris-tech"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/INFOCOM.2014.6848179"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/1921168.1921201"},{"key":"ref12","article-title":"birds of a feather&#x201D;: Does user homophily impact information diffusion in social media?","volume":"abs 1006 1702","author":"choudhury","year":"2010","journal-title":"CoRR"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/VTCFall.2012.6398888"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ICON.2002.1033316"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/PerCom.2012.6199868"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICCW.2013.6649331"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/MNET.2013.6616110"},{"key":"ref18","first-page":"1291","article-title":"An analytical model for follow me cloud","author":"ksentini","year":"2013","journal-title":"Global Communications Conference (GLOBECOM) 2013 IEEE"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ICC.2014.6883509"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1016\/S0377-2217(99)00265-9"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1002\/bltj.21596"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1016\/0377-2217(90)90057-I"},{"year":"2013","journal-title":"Next Generation Mobile Networks Alliancen Tech Rep","article-title":"Suggestions on Potential Solutions to C-RAN by NGMN Alliance","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/2486001.2486023"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1007\/s00779-005-0046-3"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/1658939.1658941"},{"key":"ref8","article-title":"Securing network content","author":"smetters","year":"2009","journal-title":"PARC Tech Rep"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/2342488.2342492"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/MVT.2013.2269187"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/2695664.2695790"},{"year":"2015","article-title":"Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2014&#x2013;2019","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/CCNC.2011.5766485"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/2342488.2342502"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/LCN.2015.7366284"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1007\/s10479-011-0945-9"},{"year":"2010","journal-title":"PARC Tech Rep","article-title":"Named Data Networking (NDN) project","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1016\/0270-0255(87)90473-8"},{"year":"1980","author":"saaty","journal-title":"The Analytic Hierarchy Process Planning Priority Setting Resource Allocation","key":"ref25"}],"event":{"name":"2016 IFIP Networking Conference (IFIP Networking) and Workshops","start":{"date-parts":[[2016,5,17]]},"location":"Vienna","end":{"date-parts":[[2016,5,19]]}},"container-title":["2016 IFIP Networking Conference (IFIP Networking) and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7493812\/7497194\/07497245.pdf?arnumber=7497245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T23:36:19Z","timestamp":1580945779000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7497245\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/ifipnetworking.2016.7497245","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}