{"id":"https://openalex.org/W2977651175","doi":"https://doi.org/10.1109/iccchina.2019.8855843","title":"Learning-Based Content Caching with Update Strategy for Fog Radio Access Networks","display_name":"Learning-Based Content Caching with Update Strategy for Fog Radio Access Networks","publication_year":2019,"publication_date":"2019-08-01","ids":{"openalex":"https://openalex.org/W2977651175","doi":"https://doi.org/10.1109/iccchina.2019.8855843","mag":"2977651175"},"language":"en","primary_location":{"id":"doi:10.1109/iccchina.2019.8855843","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccchina.2019.8855843","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/CIC International Conference on Communications in China (ICCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085386121","display_name":"Fan Jiang","orcid":"https://orcid.org/0000-0002-8968-5178"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fan Jiang","raw_affiliation_strings":["Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi\u2019an, China","Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi'an, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100617491","display_name":"Zeng Yuan","orcid":"https://orcid.org/0000-0001-6886-7864"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zeng Yuan","raw_affiliation_strings":["Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi\u2019an, China","Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi'an, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101632943","display_name":"Changyin Sun","orcid":"https://orcid.org/0000-0002-4822-1326"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changyin Sun","raw_affiliation_strings":["Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi\u2019an, China","Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi'an, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043282231","display_name":"Yuan Ren","orcid":"https://orcid.org/0000-0003-2520-8388"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Ren","raw_affiliation_strings":["Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi\u2019an, China","Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi'an, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025530726","display_name":"Junxuan Wang","orcid":"https://orcid.org/0000-0002-5386-9012"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junxuan Wang","raw_affiliation_strings":["Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi\u2019an, China","Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"Shaanxi Key Laboratory of Information Communication Network and Security, Xi'an University of Posts and Telecommunications, Xi'an, China","institution_ids":["https://openalex.org/I4210136859"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5085386121"],"corresponding_institution_ids":["https://openalex.org/I4210136859"],"apc_list":null,"apc_paid":null,"fwci":0.3537,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.63682459,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"484","last_page":"489"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9714999794960022,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8558084964752197},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.5947006940841675},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5334159731864929},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4856816232204437},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.481145977973938},{"id":"https://openalex.org/keywords/optimization-problem","display_name":"Optimization problem","score":0.4694518446922302},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.42866405844688416},{"id":"https://openalex.org/keywords/content","display_name":"Content (measure theory)","score":0.42505279183387756},{"id":"https://openalex.org/keywords/selfishness","display_name":"Selfishness","score":0.42009860277175903},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2288239300251007},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17483815550804138}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8558084964752197},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.5947006940841675},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5334159731864929},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4856816232204437},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.481145977973938},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.4694518446922302},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.42866405844688416},{"id":"https://openalex.org/C2778152352","wikidata":"https://www.wikidata.org/wiki/Q5165061","display_name":"Content (measure theory)","level":2,"score":0.42505279183387756},{"id":"https://openalex.org/C2778841147","wikidata":"https://www.wikidata.org/wiki/Q36381317","display_name":"Selfishness","level":2,"score":0.42009860277175903},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2288239300251007},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17483815550804138},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccchina.2019.8855843","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccchina.2019.8855843","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/CIC International Conference on Communications in China (ICCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2081646413","https://openalex.org/W2537728760","https://openalex.org/W2548120918","https://openalex.org/W2560522919","https://openalex.org/W2583927890","https://openalex.org/W2593548754","https://openalex.org/W2605868208","https://openalex.org/W2612386806","https://openalex.org/W2738177285","https://openalex.org/W2783387359","https://openalex.org/W2787059271","https://openalex.org/W2794673877","https://openalex.org/W2900490252","https://openalex.org/W2964138847"],"related_works":["https://openalex.org/W2039301641","https://openalex.org/W4376854896","https://openalex.org/W2583941345","https://openalex.org/W2375025128","https://openalex.org/W2368605798","https://openalex.org/W839810482","https://openalex.org/W1581165554","https://openalex.org/W3208171178","https://openalex.org/W3011329127","https://openalex.org/W2519139425"],"abstract_inverted_index":{"Aiming":[0],"at":[1],"improving":[2],"the":[3,8,32,44,49,72,82,88,105,110,123],"edge":[4],"caching":[5,20,50,76,85,128],"efficiency":[6],"of":[7,37,112],"fog":[9],"radio":[10],"access":[11],"network":[12],"(F-RAN),":[13],"this":[14],"paper":[15],"proposes":[16],"a":[17,99,116],"distributed":[18],"content":[19,28,63,75,84,93,100],"scheme":[21],"based":[22,74],"on":[23],"user":[24,39,60,90],"preference":[25,61,91],"prediction":[26],"and":[27,62,92],"popularity":[29,64,114],"prediction.":[30],"Under":[31],"constraint":[33],"that":[34,104,122],"storage":[35],"capacity":[36],"each":[38],"is":[40,78],"limited,":[41],"we":[42,96],"formulate":[43],"optimization":[45],"problem":[46],"to":[47,80],"maximize":[48],"hit":[51,129],"rate.":[52],"Then,":[53],"by":[54],"taking":[55],"users'":[56],"selfishness":[57],"into":[58],"consideration,":[59],"are":[65],"predicted":[66,89],"through":[67],"popular":[68],"topic":[69],"models.":[70],"Finally,":[71],"Q-learning":[73],"algorithm":[77,107,125],"applied":[79],"get":[81],"optimal":[83],"matrix":[86],"with":[87,132],"popularity.":[94],"Moreover,":[95],"also":[97],"propose":[98],"update":[101],"policy,":[102],"so":[103],"proposed":[106,124],"can":[108],"track":[109],"variations":[111],"contents":[113],"in":[115],"timely":[117],"manner.":[118],"Simulation":[119],"results":[120],"demonstrate":[121],"achieves":[126],"better":[127],"rate":[130],"compared":[131],"existing":[133],"algorithms.":[134]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
