{"id":"https://openalex.org/W2077819625","doi":"https://doi.org/10.1109/allerton.2011.6120161","title":"Opportunistic transport for stored video delivery over wireless networks: Optimal anticipative and causal approximations","display_name":"Opportunistic transport for stored video delivery over wireless networks: Optimal anticipative and causal approximations","publication_year":2011,"publication_date":"2011-09-01","ids":{"openalex":"https://openalex.org/W2077819625","doi":"https://doi.org/10.1109/allerton.2011.6120161","mag":"2077819625"},"language":"en","primary_location":{"id":"doi:10.1109/allerton.2011.6120161","is_oa":false,"landing_page_url":"https://doi.org/10.1109/allerton.2011.6120161","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101702517","display_name":"Zheng Lu","orcid":"https://orcid.org/0000-0001-6612-7360"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zheng Lu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Texas at Austin, USA","[Department of Electrical and Computer Engineering, University of Texas at Austin.]"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Texas at Austin, USA","institution_ids":["https://openalex.org/I86519309"]},{"raw_affiliation_string":"[Department of Electrical and Computer Engineering, University of Texas at Austin.]","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008917819","display_name":"Gustavo de Veciana","orcid":"https://orcid.org/0000-0002-1498-494X"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gustavo de Veciana","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Texas at Austin, USA","[Department of Electrical and Computer Engineering, University of Texas at Austin.]"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Texas at Austin, USA","institution_ids":["https://openalex.org/I86519309"]},{"raw_affiliation_string":"[Department of Electrical and Computer Engineering, University of Texas at Austin.]","institution_ids":["https://openalex.org/I86519309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101702517"],"corresponding_institution_ids":["https://openalex.org/I86519309"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.15708139,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"327","issue":null,"first_page":"143","last_page":"150"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11409","display_name":"Advanced Wireless Network Optimization","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8360623717308044},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8126949071884155},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.7360010743141174},{"id":"https://openalex.org/keywords/piecewise","display_name":"Piecewise","score":0.5485044121742249},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.5289623141288757},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5136870741844177},{"id":"https://openalex.org/keywords/thresholding","display_name":"Thresholding","score":0.4977398216724396},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4934329092502594},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4701440632343292},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4190841317176819},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3710783123970032},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.21810239553451538},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11439654231071472},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08449772000312805},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08346539735794067}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8360623717308044},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8126949071884155},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.7360010743141174},{"id":"https://openalex.org/C164660894","wikidata":"https://www.wikidata.org/wiki/Q2037833","display_name":"Piecewise","level":2,"score":0.5485044121742249},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.5289623141288757},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5136870741844177},{"id":"https://openalex.org/C191178318","wikidata":"https://www.wikidata.org/wiki/Q2256906","display_name":"Thresholding","level":3,"score":0.4977398216724396},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4934329092502594},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4701440632343292},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4190841317176819},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3710783123970032},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.21810239553451538},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11439654231071472},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08449772000312805},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08346539735794067},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/allerton.2011.6120161","is_oa":false,"landing_page_url":"https://doi.org/10.1109/allerton.2011.6120161","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.8100000023841858,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320307791","display_name":"Cisco Systems","ror":"https://ror.org/03yt1ez60"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1870186487","https://openalex.org/W1987228002","https://openalex.org/W1988265167","https://openalex.org/W2002638395","https://openalex.org/W2009343025","https://openalex.org/W2079947402","https://openalex.org/W2102005235","https://openalex.org/W2118210991","https://openalex.org/W2138052608","https://openalex.org/W2145173180"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703"],"abstract_inverted_index":{"This":[0,127],"paper":[1],"considers":[2],"the":[3,35,57,73,76,98,120,135,154,172,181,191,195,223,234],"design":[4],"of":[5,75],"application-layer":[6],"opportunistic":[7,67,210],"transport":[8,212],"mechanisms":[9],"for":[10,134],"stored":[11],"video":[12,30,83,211],"over":[13],"a":[14,42,111,132,166,207,215],"slowly":[15],"time-varying":[16],"wireless":[17],"channel.":[18],"We":[19,85,95,169],"focus":[20],"on":[21,163],"two":[22],"simple":[23],"key":[24],"ideas.":[25],"The":[26],"first":[27],"is":[28,38,116,149,198],"that":[29,110,222],"should":[31,69],"be":[32,70,142,159,203],"transmitted":[33],"when":[34],"channel":[36,53,104,156,197],"capacity":[37,157],"high,":[39],"e.g.,":[40,161],"exceeds":[41],"threshold;":[43],"by":[44],"doing":[45],"so":[46],"one":[47,137,176],"can":[48,138,177,226],"exploit":[49,178],"temporal":[50,183],"diversity":[51],"in":[52,92,144,233],"variations":[54,105],"to":[55,80,88,158,230],"reduce":[56],"system":[58,121,235],"utilization":[59,122],"as":[60,62],"well":[61],"energy":[63],"expenditures.":[64],"Second,":[65],"such":[66,90],"transmissions":[68],"coupled":[71],"with":[72,97],"status":[74],"user's":[77],"playback":[78,124],"buffer":[79,125],"ensure":[81],"uninterrupted":[82],"playback.":[84],"explore":[86],"how":[87],"optimize":[89],"systems":[91],"several":[93],"scenarios.":[94],"start":[96],"single-user":[99],"anticipative":[100],"case":[101,128],"(i.e.":[102],"future":[103,155,182,196],"are":[106],"known)":[107],"and":[108,205],"show":[109,221],"piecewise":[112],"constant":[113],"thresholding":[114],"scheme":[115],"optimal,":[117],"i.e.,":[118],"minimizes":[119],"without":[123],"starvation.":[126],"not":[129,179],"only":[130,180],"provides":[131],"baseline":[133],"best":[136],"do,":[139],"but":[140,184,200],"may":[141],"applicable":[143],"cases":[145],"where":[146,175],"users'":[147],"mobility":[148],"known":[150],"or":[151,165],"predictable,":[152],"allowing":[153],"anticipated,":[160],"based":[162],"history":[164],"navigation":[167],"system.":[168],"then":[170],"study":[171],"multiuser":[173,186,192],"case,":[174],"also":[185],"diversity.":[187],"Finally,":[188],"we":[189],"consider":[190],"causal":[193],"scenario(where":[194],"unknown,":[199],"statistics":[201],"might":[202],"inferred)":[204],"develop":[206],"receiver-oriented":[208],"adaptive":[209],"mechanism":[213],"using":[214],"stochastic":[216],"approximation":[217],"approach.":[218],"Our":[219],"simulations":[220],"proposed":[224],"schemes":[225],"achieve":[227],"an":[228],"up":[229],"70%":[231],"reduction":[232],"utilization.":[236]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
