Search results for "content delivery"

showing 2 items of 2 documents

Social Network-Based Content Delivery in Device-to-Device Underlay Cellular Networks Using Matching Theory

2017

With the popularity of social network-based services, the unprecedented growth of mobile date traffic has brought a heavy burden on the traditional cellular networks. Device-to-device (D2D) communication, as a promising solution to overcome wireless spectrum crisis, can enable fast content delivery based on user activities in social networks. In this paper, we address the content delivery problem related to optimization of peer discovery and resource allocation by combining both the social and physical layer information in D2D underlay networks. The social relationship, which is modeled as the probability of selecting similar contents and estimated by using the Bayesian nonparametric models…

Matching (statistics)General Computer ScienceComputer scienceBayesian nonparametric modelsDistributed computing02 engineering and technology0203 mechanical engineeringcontent delivery0202 electrical engineering electronic engineering information engineeringWirelessGeneral Materials ScienceResource managementUnderlaymatching theoryBlossom algorithmta113Social networkta213business.industryQuality of serviceGeneral Engineering020302 automobile design & engineering020206 networking & telecommunicationsdevice-to-device communicationCellular networkResource allocationsocial networklcsh:Electrical engineering. Electronics. Nuclear engineeringbusinesslcsh:TK1-9971IEEE Access
researchProduct

Multicast access control concept for xDSL-customers

2006

Multicast is a tempting possibility for many broad- band services. It makes possible to deliver one data-stream to several receivers simultaneously. IP-Multicast is based on an open group concept. This means that it is possible for all the users to join the group and thus receive the data. The open concept is also the main reason why multicast has not been taken in wider use. There is two different solution to solve this problem, group access control and multicast data encryption. Group access control mechanisms focuses on restricting the group membership at the users edge device. Traffic encryption scheme relies on end-to-end encryption, so a key management architecture is also needed. We …

MulticastEdge deviceProtocol Independent Multicastbusiness.industrycomputer.internet_protocolComputer scienceInter-domainQuality of serviceDistance Vector Multicast Routing ProtocolIPTVContent delivery networkAdmission controlSource-specific multicastInternet Group Management ProtocolReliable multicastMulticast addressIP multicastXcastbusinessKey managementcomputerPragmatic General MulticastComputer networkCCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006.
researchProduct