參考文獻 |
[1] V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard, “Networking named content,” in Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, Dec. 2009, pp. 1–12.
[2] G. Xylomenos, C. N. Ververidis, V. A. Siris, N. Fotiou, C. Tsilopoulos, X. Vasilakos, K. V. Katsaros, and G. C. Polyzos, “A survey of information-centric networking research,” IEEE Communications Surveys Tutorials, pp. 1–26, Jul. 2013.
[3] B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman, “A survey of information-centric networking,” IEEE Communications Magazine, pp. 26–36, Jul. 2012.
[4] “Parc, a xerox company, ” https://www.parc.com/.
[5] R. Chiocchetti, D. Rossi, and G. Rossini, “ccnsim: An highly scalable ccn simulator,” in 2013 IEEE International Conference on Communications, Jun. 2013, pp. 2309–2314.
[6] G. Zhang, Y. Li, and T. Lin, “Caching in information centric networking: A survey,” Computer Networks, pp. 3128–3141, Nov. 2013.
[7] N. Laoutaris, H. Che, and I. Stavrakakis, “The lcd interconnection of lru caches and its analysis,” Performance Evaluation, pp. 609–634, Jan. 2006.
[8] N. Laoutaris, S. Syntila, and I. Stavrakakis, “Meta algorithms for hierarchical web caches,” in IEEE International Conference on Performance, Computing, and Communications, Apr. 2004, pp. 445–452.
[9] V. Jacobson, J. Burke, D. Estrin, L. Zhang, B. Zhang, G. Tsudik, K. Cla?y, D. Krioukov, D. Massey, C. Papadopoulos, P. Ohm, T. Abdelzaher, K. Shilton, L. Wang, E. Yeh, E. Uzun, G. Edens, and P. Crowley, “Named Data Networking (NDN) Project 2012 - 2013 Annual Report,” Tech. Rep., Oct. 2013.
[10] S. Podlipnig and L. B‥osz‥ormenyi, “A survey of web cache replacement strategies,” ACM Comput. Surv, pp. 374–398, Dec. 2003.
[11] C. Yi, A. Afanasyev, L. Wang, B. Zhang, and L. Zhang, “Adaptive forwarding in named data networking,” SIGCOMM Comput. Commun. Rev., pp. 62–67, Jun. 2012.
[12] A. Afanasyev, C. Yi, L. Wang, B. Zhang, and L. Zhang, “Snamp: Secure namespace mapping to scale ndn forwarding,” in 2015 IEEE Conference on Computer Communications Workshops, Apr. 2015, pp. 281–286.
[13] H. Dai, J. Lu, Y. Wang, and B. Liu, “A two-layer intra-domain routing scheme for named data networking,” in 2012 IEEE Global Communications Conference, Dec. 2012, pp. 2815–2820.
[14] A. Udugama, X. Zhang, K. Kuladinithi, and C. Goerg, “An on-demand multi-path interest forwarding strategy for content retrievals in ccn,” in 2014 IEEE Network Operations and Management Symposium, May. 2014, pp. 1–6.
[15] G. Rossini and D. Rossi, “Evaluating ccn multi-path interest forwarding strategies,” Computer Communications, pp. 771–778, Apr. 2013.
[16] W. K. Chai, D. He, I. Psaras, and G. Pavlou, “Cache “less for more” in information-centric networks (extended version),” Computer Communications, pp. 758–770, Apr. 2013.
[17] I. Psaras, W. K. Chai, and G. Pavlou, “Probabilistic in-network caching for information-centric networks,” in Proceedings of the Second Edition of the ICN Workshop on Information-centric Networking, Aug. 2012, pp. 55–60.
[18] L. P. Du, T.-A. Le, N. D. Thai, and P. L. Vo, “The performance of caching strategies in content centric networking,” in 2017 International Conference on Information Networking, Jan. 2017, pp. 628–632.
[19] C. Bernardini, T. Silverston, and O. Festor, “A comparison of caching strategies for content centric networking,” in 2015 IEEE Global Communications Conference, Dec. 2015, pp. 1–6.
[20] M. Arifuzzaman, Y. Keping, Q. N. Nguyen, and S. Takuro, “Locating the content in the locality: Icn caching and routing strategy revisited,” in 2015 European Conference on Networks and Communications, Jun. 2015, pp. 423–428.
[21] D. Kim, Y. B. Ko, and S. H. Lim, “Comprehensive analysis of caching performance under probabilistic traffic patterns for content centric networking,” China Communications, pp. 127–136, Mar. 2016.
[22] G. Rossini and D. Rossi, “Coupling caching and forwarding: Benefits, analysis, and implementation,” in Proceedings of the 1st ACM Conference on Information-Centric Networking, Sep. 2014, pp. 127–136.
[23] K. Thar, T. Z. Oo, C. Pham, S. Ullah, D. H. Lee, and C. S. Hong, “Efficient forwarding and popularity based caching for content centric network,” in 2015 International Conference on Information Networking, Jan. 2015, pp. 330–335.
[24] S. Oueslati, J. Roberts, and N. Sbihi, “Flow-aware traffic control for a content-centric network,” in 2012 Proceedings IEEE INFOCOM, Mar. 2012, pp. 2417–2425.
[25] N. Rozhnova and S. Fdida, “An effective hop-by-hop interest shaping mechanism for ccn communications,” in 2012 Proceedings IEEE INFOCOM Workshops, Mar. 2012, pp. 322–327.
[26] G. Carofiglio, M. Gallo, and L. Muscariello, “Joint hop-by-hop and receiver-driven interest control protocol for content-centric networks,” in Proceedings of the Second Edition of the ICN Workshop on Information- centric Networking, Aug. 2012, pp. 37–42.
[27] C. L. Hu, Y. H. Chang, and K. F. Huang, “Searching with feature similarity in unstructured peer-to-peer networks,” in 2014 7th International Conference on Ubi-Media Computing and Workshops, Jul. 2014, pp. 65–71.
[28] A. Varga and R. Hornig, “An overview of the omnet++ simulation environment,” in Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, Mar. 2008, pp. 60:1–60:10.
[29] C. Yi, J. Abraham, A. Afanasyev, L. Wang, B. Zhang, and L. Zhang, “On the role of routing in named data networking,” in Proceedings of the 1st ACM Conference on Information-Centric Networking, Sep. 2014, pp. 27–36. |