{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:37:31Z","timestamp":1742967451022,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540341925"},{"type":"electronic","value":"9783540341932"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11753810_28","type":"book-chapter","created":{"date-parts":[[2006,4,28]],"date-time":"2006-04-28T00:11:58Z","timestamp":1146183118000},"page":"331-343","source":"Crossref","is-referenced-by-count":2,"title":["A Feedback Control Approach to Mitigating Mistreatment in Distributed Caching Groups"],"prefix":"10.1007","author":[{"given":"Georgios","family":"Smaragdakis","sequence":"first","affiliation":[]},{"given":"Nikolaos","family":"Laoutaris","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Matta","sequence":"additional","affiliation":[]},{"given":"Azer","family":"Bestavros","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Stavrakakis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"28_CR1","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TNET.2004.836103","volume":"12","author":"J.W. Byers","year":"2004","unstructured":"Byers, J.W., Considine, J., Mitzenmacher, M., Rost, S.: Informed content delivery across adaptive overlay networks. IEEE\/ACM Transactions on Networking\u00a012(5), 767\u2013780 (2004)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Cohen, E., Shenker, S.: Replication strategies in unstructured peer-to-peer networks. In: Proceedings of ACM SIGCOMM 2002 Conference, Pittsburgh, PA, USA (2002)","DOI":"10.1145\/633025.633043"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Laoutaris, N., Telelis, O., Zissimopoulos, V., Stavrakakis, I.: Distributed selfish replication. IEEE Transactions on Parallel and Distributed Systems (2005) (accepted for publication)","DOI":"10.1109\/TPDS.2006.171"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Laoutaris, N., Smaragdakis, G., Bestavros, A., Stavrakakis, I.: Mistreatment in distributed caching groups: Causes and implications. In: Proceedings of IEEE Infocom, Barcelona, Spain (2006)","DOI":"10.1109\/INFOCOM.2006.131"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Loukopoulos, T., Lampsas, P., Ahmad, I.: Continuous replica placement schemes in distributed systems. In: Proceedings of the ACM ICS, Boston, MA (2005)","DOI":"10.1145\/1088149.1088187"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Jin, S., Bestavros, A.: Sources and Characteristics of Web Temporal Locality. In: Proceedings of IEEE\/ACM Mascots 2000, San Fransisco, CA (2000)","DOI":"10.1109\/MASCOT.2000.876426"},{"key":"28_CR7","volume-title":"Operating systems theory","author":"E.G. Coffman","year":"1973","unstructured":"Coffman, E.G., Denning, P.J.: Operating systems theory. Prentice-Hall, Englewood Cliffs (1973)"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Arlitt, M.F., Williamson, C.L.: Web server workload characterization: the search for invariants. In: Proceedings of the 1996 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pp. 126\u2013137 (1996)","DOI":"10.1145\/233013.233034"},{"key":"28_CR9","unstructured":"Cao, P., Irani, S.: Cost-aware WWW proxy caching algorithms. In: Proceedings of USITS (1997)"},{"key":"28_CR10","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/BF01189992","volume":"11","author":"N. Young","year":"1994","unstructured":"Young, N.: The k-server dual and loose competitiveness for paging. Algorithmica\u00a011, 525\u2013541 (1994)","journal-title":"Algorithmica"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Breslau, L., Cao, P., Fan, L., Philips, G., Shenker, S.: Web caching and Zipf-like distributions: Evidence and implications. In: Proceedings of IEEE Infocom, New York (1999)","DOI":"10.1109\/INFCOM.1999.749260"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Psounis, K., Zhu, A., Prabhakar, B., Motwani, R.: Modeling correlations in web traces and implications for designing replacement policies. Computer Networks\u00a045 (2004)","DOI":"10.1016\/j.comnet.2004.01.004"},{"issue":"3","key":"28_CR13","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/65.844496","volume":"14","author":"A. Mahanti","year":"2000","unstructured":"Mahanti, A., Williamson, C., Eager, D.: Traffic analysis of a web proxy caching hierarchy. IEEE Network\u00a014(3), 16\u201323 (2000)","journal-title":"IEEE Network"},{"issue":"3","key":"28_CR14","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/90.851975","volume":"8","author":"L. Fan","year":"2000","unstructured":"Fan, L., Cao, P., Almeida, J., Broder, A.Z.: Summary cache: a scalable wide-area web cache sharing protocol. IEEE\/ACM Transactions on Networking\u00a08(3), 281\u2013293 (2000)","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"4","key":"28_CR15","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1145\/954339.954341","volume":"35","author":"S. Podlipnig","year":"2003","unstructured":"Podlipnig, S., B\u00f6sz\u00f6rmenyi, L.: A survey of web cache replacement strategies. ACM Computing Surveys\u00a035(4), 374\u2013398 (2003)","journal-title":"ACM Computing Surveys"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Pan, J., Hou, Y.T., Li, B.: An overview DNS-based server selection in content distribution networks. Computer Networks\u00a043(6) (2003)","DOI":"10.1016\/S1389-1286(03)00293-7"},{"key":"28_CR17","volume-title":"Modern control engineering","author":"K. Ogata","year":"2002","unstructured":"Ogata, K.: Modern control engineering, 4th edn. Prentice-Hall, Inc., Upper Saddle River (2002)","edition":"4"},{"key":"28_CR18","volume-title":"Feedback Control of Dynamic Systems","author":"G.F. Franklin","year":"2005","unstructured":"Franklin, G.F., Powell, D.J., Emami-Naeini, A.: Feedback Control of Dynamic Systems, 5th edn. Prentice Hall PTR, Upper Saddle River (2005)","edition":"5"},{"key":"28_CR19","unstructured":"Laoutaris, N., Smaragdakis, G., Bestavros, A., Matta, I., Stavrakakis, I.: Distributed Selfish Caching. Technical Report BUCS-TR-2006-003, CS Department, Boston University (2006)"},{"key":"28_CR20","unstructured":"Lin, G., Noubir, G., Rajaraman, R.: Mobility models for ad hoc network simulation. In: Proceedings of IEEE Infocom, Hong Kong (2004)"},{"key":"28_CR21","unstructured":"Yin, L., Cao, G.: Supporting cooperative caching in ad hoc networks. In: Proceedings of IEEE Infocom, Hong Kong (2004)"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2006. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11753810_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,18]],"date-time":"2019-04-18T06:44:23Z","timestamp":1555569863000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11753810_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540341925","9783540341932"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11753810_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}