{"id":"https://openalex.org/W2106248279","doi":"https://doi.org/10.1109/tit.2014.2306938","title":"Fundamental Limits of Caching","display_name":"Fundamental Limits of Caching","publication_year":2014,"publication_date":"2014-03-11","ids":{"openalex":"https://openalex.org/W2106248279","doi":"https://doi.org/10.1109/tit.2014.2306938","mag":"2106248279"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2014.2306938","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2014.2306938","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113662214","display_name":"Mohammad Ali Maddah-Ali","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mohammad Ali Maddah-Ali","raw_affiliation_strings":["Bell Labs, Alcatel-Lucent, Holmdel, NJ, USA","Bell Laboratories\u2014Alcatel-Lucent, Holmdel, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Bell Labs, Alcatel-Lucent, Holmdel, NJ, USA","institution_ids":[]},{"raw_affiliation_string":"Bell Laboratories\u2014Alcatel-Lucent, Holmdel, NJ, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069438536","display_name":"Urs Niesen","orcid":"https://orcid.org/0000-0002-2938-228X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Urs Niesen","raw_affiliation_strings":["Bell Labs, Alcatel-Lucent, Holmdel, NJ, USA","Bell Laboratories\u2014Alcatel-Lucent, Holmdel, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Bell Labs, Alcatel-Lucent, Holmdel, NJ, USA","institution_ids":[]},{"raw_affiliation_string":"Bell Laboratories\u2014Alcatel-Lucent, Holmdel, NJ, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5113662214"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":197.8602,"has_fulltext":false,"cited_by_count":1820,"citation_normalized_percentile":{"value":0.99993964,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"60","issue":"5","first_page":"2856","last_page":"2867"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9829999804496765,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8398550748825073},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.8353627920150757},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7848957180976868},{"id":"https://openalex.org/keywords/false-sharing","display_name":"False sharing","score":0.613280177116394},{"id":"https://openalex.org/keywords/cpu-cache","display_name":"CPU cache","score":0.4996755123138428},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4875730872154236},{"id":"https://openalex.org/keywords/aggregate","display_name":"Aggregate (composite)","score":0.47937992215156555},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46936753392219543},{"id":"https://openalex.org/keywords/information-gain","display_name":"Information gain","score":0.42824041843414307},{"id":"https://openalex.org/keywords/information-centric-networking","display_name":"Information-centric networking","score":0.4151579439640045},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3796478807926178},{"id":"https://openalex.org/keywords/cache-algorithms","display_name":"Cache algorithms","score":0.35618945956230164},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.08127161860466003}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8398550748825073},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.8353627920150757},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7848957180976868},{"id":"https://openalex.org/C5165142","wikidata":"https://www.wikidata.org/wiki/Q5432732","display_name":"False sharing","level":5,"score":0.613280177116394},{"id":"https://openalex.org/C189783530","wikidata":"https://www.wikidata.org/wiki/Q352090","display_name":"CPU cache","level":3,"score":0.4996755123138428},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4875730872154236},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.47937992215156555},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46936753392219543},{"id":"https://openalex.org/C2983203078","wikidata":"https://www.wikidata.org/wiki/Q255166","display_name":"Information gain","level":2,"score":0.42824041843414307},{"id":"https://openalex.org/C2777455782","wikidata":"https://www.wikidata.org/wiki/Q18208068","display_name":"Information-centric networking","level":3,"score":0.4151579439640045},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3796478807926178},{"id":"https://openalex.org/C38556500","wikidata":"https://www.wikidata.org/wiki/Q13404475","display_name":"Cache algorithms","level":4,"score":0.35618945956230164},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08127161860466003},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.2014.2306938","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2014.2306938","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1973643917","https://openalex.org/W1993553863","https://openalex.org/W2018682510","https://openalex.org/W2026102701","https://openalex.org/W2038228267","https://openalex.org/W2039036996","https://openalex.org/W2041645394","https://openalex.org/W2047066090","https://openalex.org/W2064107965","https://openalex.org/W2081008934","https://openalex.org/W2083766832","https://openalex.org/W2099111195","https://openalex.org/W2104750217","https://openalex.org/W2105406958","https://openalex.org/W2105831729","https://openalex.org/W2112912183","https://openalex.org/W2130507035","https://openalex.org/W2962981229","https://openalex.org/W6666453220"],"related_works":["https://openalex.org/W3034036068","https://openalex.org/W2946455313","https://openalex.org/W1986244461","https://openalex.org/W2469267785","https://openalex.org/W2566764843","https://openalex.org/W2195298275","https://openalex.org/W4301359577","https://openalex.org/W2158556800","https://openalex.org/W2950361119","https://openalex.org/W1584412374"],"abstract_inverted_index":{"Caching":[0],"is":[1,104,191],"a":[2,31,73,136,151,193],"technique":[3],"to":[4,24,150],"reduce":[5],"peak":[6,156],"traffic":[7],"rates":[8],"by":[9,43,80],"prefetching":[10],"popular":[11],"content":[12,27],"into":[13],"memories":[14,21],"at":[15,62,98],"the":[16,38,54,59,88,94,108,123,155,165,170,173,178,185,188,197,204],"end":[17],"users.":[18,109],"Conventionally,":[19],"these":[20,114],"are":[22],"used":[23],"deliver":[25],"requested":[26],"in":[28,154,177],"part":[29],"from":[30],"locally":[32],"cached":[33],"copy":[34],"rather":[35],"than":[36],"through":[37],"network.":[39,179],"The":[40],"gain":[41,77,85],"offered":[42],"this":[44,67,132],"approach,":[45],"which":[46],"we":[47,69,117,134,182],"term":[48],"local":[49,55,144],"caching":[50,76,82,124,139,147],"gain,":[51],"depends":[52,86],"on":[53,87,127,169],"cache":[56,91],"size":[57,92],"(i.e.,":[58,93],"memory":[60,96],"available":[61,97],"each":[63],"individual":[64],"user).":[65],"In":[66,163,180],"paper,":[68],"introduce":[70,118],"and":[71,112,145],"exploit":[72],"second,":[74],"global,":[75],"not":[78],"utilized":[79],"conventional":[81],"schemes.":[83,162],"This":[84],"aggregate":[89],"global":[90,146],"cumulative":[95],"all":[99,201],"users),":[100],"even":[101],"though":[102],"there":[103],"no":[105],"cooperation":[106],"among":[107],"To":[110],"evaluate":[111],"isolate":[113],"two":[115],"gains,":[116,148],"an":[119],"information-theoretic":[120,198],"formulation":[121],"of":[122,172,175,187,196,203],"problem":[125,205],"focusing":[126],"its":[128],"basic":[129],"structure.":[130],"For":[131],"setting,":[133],"propose":[135],"novel":[137],"coded":[138],"scheme":[140,190],"that":[141,184],"exploits":[142],"both":[143],"leading":[149],"multiplicative":[152],"improvement":[153,166],"rate":[157],"compared":[158],"with":[159],"previously":[160],"known":[161],"particular,":[164],"can":[167],"be":[168],"order":[171],"number":[174],"users":[176],"addition,":[181],"argue":[183],"performance":[186],"proposed":[189],"within":[192],"constant":[194],"factor":[195],"optimum":[199],"for":[200],"values":[202],"parameters.":[206]},"counts_by_year":[{"year":2026,"cited_by_count":9},{"year":2025,"cited_by_count":61},{"year":2024,"cited_by_count":84},{"year":2023,"cited_by_count":104},{"year":2022,"cited_by_count":114},{"year":2021,"cited_by_count":177},{"year":2020,"cited_by_count":202},{"year":2019,"cited_by_count":258},{"year":2018,"cited_by_count":257},{"year":2017,"cited_by_count":261},{"year":2016,"cited_by_count":188},{"year":2015,"cited_by_count":80},{"year":2014,"cited_by_count":21},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-23T09:07:50.710637","created_date":"2025-10-10T00:00:00"}
