DMCA
Transfer Learning Approach for Cache-Enabled Wireless Networks
Citations: | 1 - 1 self |
Citations
1091 | Web caching and Zipf-like distributions: evidence and implications
- Breslau, Cao, et al.
- 1999
(Show Context)
Citation Context ... . , Ftar}, where each content f has a size of L(f) and a bitrate requirement of B(f). Moreover, we suppose that users’ content requests follow a Zipf-like distribution PFtar (f),∀f ∈ Ftar defined as =-=[15]-=-: PFtar (f) = Ω fα (1) where Ω = (∑Ftar i=1 1 iα )−1 and α characterizes the steepness of the distribution, reflecting different content popularities. Having such a content popularity in the ordered c... |
456 | A Survey on Transfer Learning.
- Pan, Yang
- 2010
(Show Context)
Citation Context ...3]. Given the fact that data sparsity and cold-start problems degrade the performance of proactive caching, we leverage the framework of transfer learning (TL) and recent advances in machine learning =-=[14]-=-. TL is motivated by the fact that in many real-world applications, it is hard or even impossible to collect and label training data to build suitable prediction models. Exploiting available data from... |
64 | FemtoCaching: Wireless video content delivery through distributed caching helpers,” - Golrezaei, Shanmugam, et al. - 2013 |
61 | The Indian Buffet Process: An Introduction and Review.
- Griffiths, Ghahramani
- 2011
(Show Context)
Citation Context ...rred as the source domain in the sequel. Specifically, this source domain contains the behaviour of users’ interactions within their social communities, modelled as a Chinese restaurant process (CRP) =-=[16]-=-. This constitutes the prior information used in the transfer learning procedure. In the CRP with parameter β, every customer selects an occupied table with a probability proportional to the number of... |
44 | Five disruptive technology directions for 5G,”
- Boccardi, Heath, et al.
- 2014
(Show Context)
Citation Context ...ng, transfer learning, collaborative filtering, data sparsity, cold-start problem, 5G I. INTRODUCTION Caching at the network edge is one of the five most promising innovations in 5G wireless networks =-=[1]-=-. Recently, it was shown that caching can significantly offload different segments of the infrastructure including radio access network (RAN) and core network (CN), by intelligently storing contents c... |
19 | Fundamental limits of caching,”
- Maddah-Ali, Niesen
- 2014
(Show Context)
Citation Context ...ny-to-many matching [8] and joint contentaware user clustering and content caching [11]. Other works include information-theoretic studies looking at fundamentals of local and global caching gains in =-=[9]-=-, facility location based approximation in [7], as well as multiple-input multiple-output (MIMO) caching in [12], and coded caching in [10]. In [2], by exploiting spatio-social caching coupled with D2... |
17 | A Comparative Study of Collaborative Filtering Algorithms. ArXiv e-prints
- Lee, Sun, et al.
- 2012
(Show Context)
Citation Context ...rtheless, the content popularity matrix remains typically large and sparse with very few users ratings, rendering CF learning methods inefficient mainly due to data sparseness and cold-start problems =-=[13]-=-. Given the fact that data sparsity and cold-start problems degrade the performance of proactive caching, we leverage the framework of transfer learning (TL) and recent advances in machine learning [1... |
12 |
Living on the Edge: The role of proactive caching in 5G wireless networks,”
- Bastug, Bennis, et al.
- 2014
(Show Context)
Citation Context ...tents closer to the users. As opposed to pushing contents on a besteffort basis ignoring end-users’ behavior and interactions, we are witnessing an era of truly context-aware and proactive networking =-=[2]-=-. Undoubtedly, edge caching has taken recent 5G research activities by storm as evidenced by the recent literature in both academia and industry [2]–[12] (to cite a few). Although caching has been wel... |
10 | Cache-enabled small cell networks: Modeling and tradeoffs,”
- Bastug, Bennis, et al.
- 2015
(Show Context)
Citation Context ...pported by the ERC Starting Grant 305123 MORE (Advanced Mathematical Tools for Complex Network Engineering), the SHARING project under the Finland grant 128010 and the project BESTCOM. are studied in =-=[4]-=-, characterizing the outage probability and average delivery rate. A stochastic-geometry based caching framework for device-to-device (D2D) communications is examined in [5] where mathematical express... |
9 | Many-to-many matching games for proactive social caching in small cell networks,” in
- Hamodouche, Saad, et al.
- 2014
(Show Context)
Citation Context ...ns of served content requests are given. From a game theoretic standpoint, various approaches have been studied such as multi-armed bandits under unknown content popularity [6], many-to-many matching =-=[8]-=- and joint contentaware user clustering and content caching [11]. Other works include information-theoretic studies looking at fundamentals of local and global caching gains in [9], facility location ... |
6 | Learning-based optimization of cache content in a small cell base station,” arXiv preprint arXiv:1402.3247,
- Blasco, Gunduz
- 2014
(Show Context)
Citation Context ...of local and global fractions of served content requests are given. From a game theoretic standpoint, various approaches have been studied such as multi-armed bandits under unknown content popularity =-=[6]-=-, many-to-many matching [8] and joint contentaware user clustering and content caching [11]. Other works include information-theoretic studies looking at fundamentals of local and global caching gains... |
6 |
Device-to-device data storage for mobile cellular systems,” in
- Paakkonen, Hollanti, et al.
- 2013
(Show Context)
Citation Context ... looking at fundamentals of local and global caching gains in [9], facility location based approximation in [7], as well as multiple-input multiple-output (MIMO) caching in [12], and coded caching in =-=[10]-=-. In [2], by exploiting spatio-social caching coupled with D2D communication, we proposed a novel proactive networking paradigm in which SBSs and user terminals (UTs) proactively cache contents at the... |
6 | Cache-enabled opportunistic cooperative mimo for video streaming in wireless systems,”
- Liu, Lau
- 2014
(Show Context)
Citation Context ...of truly context-aware and proactive networking [2]. Undoubtedly, edge caching has taken recent 5G research activities by storm as evidenced by the recent literature in both academia and industry [2]–=-=[12]-=- (to cite a few). Although caching has been well-studied in wired networks, caching over wireless remains in its infancy. The idea of femtocaching is proposed in [3], in which small base stations (SBS... |
5 |
On fundamental trade-offs of device-to-device communications in large wireless networks,” arXiv preprint arXiv:1405.2295,
- Altieri, Piantanida, et al.
- 2014
(Show Context)
Citation Context ...ct BESTCOM. are studied in [4], characterizing the outage probability and average delivery rate. A stochastic-geometry based caching framework for device-to-device (D2D) communications is examined in =-=[5]-=- where mathematical expressions of local and global fractions of served content requests are given. From a game theoretic standpoint, various approaches have been studied such as multi-armed bandits u... |
5 |
Approximation algorithms for mobile data caching in small cell networks,” to appear in
- Poularakis, Iosifidis, et al.
- 2014
(Show Context)
Citation Context ... user clustering and content caching [11]. Other works include information-theoretic studies looking at fundamentals of local and global caching gains in [9], facility location based approximation in =-=[7]-=-, as well as multiple-input multiple-output (MIMO) caching in [12], and coded caching in [10]. In [2], by exploiting spatio-social caching coupled with D2D communication, we proposed a novel proactive... |
4 | Content-aware user clustering and caching in wireless small cell networks,”
- ElBamby, Bennis, et al.
- 2014
(Show Context)
Citation Context ...standpoint, various approaches have been studied such as multi-armed bandits under unknown content popularity [6], many-to-many matching [8] and joint contentaware user clustering and content caching =-=[11]-=-. Other works include information-theoretic studies looking at fundamentals of local and global caching gains in [9], facility location based approximation in [7], as well as multiple-input multiple-o... |