{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:42:50Z","timestamp":1759365770731,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032057914","type":"print"},{"value":"9783032057921","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:00:00Z","timestamp":1759363200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:00:00Z","timestamp":1759363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-05792-1_12","type":"book-chapter","created":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T10:31:36Z","timestamp":1759314696000},"page":"219-236","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Product-Form Model for\u00a0Systems with\u00a0Aging Objects and\u00a0Similarities"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5958-1204","authenticated-orcid":false,"given":"Andrea","family":"Marin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7361-819X","authenticated-orcid":false,"given":"Diletta","family":"Olliaro","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1189-4439","authenticated-orcid":false,"given":"Sabina","family":"Rossi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8953-4003","authenticated-orcid":false,"given":"Daniel","family":"Menasch\u00e9","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,2]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.peva.2014.07.001","volume":"79","author":"DS Berger","year":"2014","unstructured":"Berger, D.S., Gland, P., Singla, S., Ciucu, F.: Exact analysis of TTL cache networks. Perform. Eval. 79, 2\u201323 (2014)","journal-title":"Perform. Eval."},{"key":"12_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2024.102414","volume":"165","author":"A Busic","year":"2024","unstructured":"Busic, A., Doncel, J., Fourneau, J.: Dynamic load balancing in energy packet networks. Perform. Eval. 165, 102414 (2024)","journal-title":"Perform. Eval."},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1017\/S0017089500008545","volume":"34","author":"K Dilcher","year":"1992","unstructured":"Dilcher, K., Nulton, J.D., Stolarsky, K.B.: The zeros of a certain family of trinomials. Glasg. Math. J. 34, 55\u201374 (1992)","journal-title":"Glasg. Math. J."},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Domingues, G., e Silva, E.D.S., Le\u00e3o, R.M., Menasch\u00e9, D.S., Towsley, D.: Enabling opportunistic search and placement in cache networks. Comput. Netw. 119, 17\u201334 (2017)","DOI":"10.1016\/j.comnet.2017.03.005"},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/0304-3975(95)00018-6","volume":"155","author":"J Fourneau","year":"1996","unstructured":"Fourneau, J., Gelenbe, E., Sur\u00f3s, R.: G-networks with multiple classes of negative and positive customers. Theor. Comput. Sci. 155, 141\u2013156 (1996)","journal-title":"Theor. Comput. Sci."},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Fourneau, J., Kloul, L., Quessette, F.: Multiple class G-networks with jumps back to zero. In: 3rd International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication (MASCOTS), pp. 28\u201332 (1995)","DOI":"10.1109\/MASCOT.1995.378652"},{"issue":"3","key":"12_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2896380","volume":"1","author":"M Garetto","year":"2016","unstructured":"Garetto, M., Leonardi, E., Martina, V.: A unified approach to the performance analysis of caching systems. ACM Trans. Model. Perform. Eval. Comput. Syst. (TOMPECS) 1(3), 1\u201328 (2016)","journal-title":"ACM Trans. Model. Perform. Eval. Comput. Syst. (TOMPECS)"},{"key":"12_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108570","volume":"201","author":"M Garetto","year":"2021","unstructured":"Garetto, M., Leonardi, E., Neglia, G.: Content placement in networks of similarity caches. Comput. Netw. 201, 108570 (2021)","journal-title":"Comput. Netw."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Gast, N., Houdt, B.V.: Transient and steady-state regime of a family of list-based cache replacement algorithms. Queueing Syst. 83, 293\u2013328 (2016)","DOI":"10.1007\/s11134-016-9487-9"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/S0166-5316(02)00127-X","volume":"49","author":"E Gelenbe","year":"2002","unstructured":"Gelenbe, E., Fourneau, J.: G-networks with resets. Perform. Eval. 49, 179\u2013191 (2002)","journal-title":"Perform. Eval."},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Gias, A.U., Casale, G.: Cocoa: cold start aware capacity planning for function-as-a-service platforms. In: 28th International symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), pp.\u00a01\u20138 (2020)","DOI":"10.1109\/MASCOTS50786.2020.9285966"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Harchol-Balter, M.: Performance Modeling and Design of Computer Systems: Queueing Theory in Action. Cambridge Press, Cambridge (2013)","DOI":"10.1017\/CBO9781139226424"},{"key":"12_CR13","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1016\/S0304-3975(02)00375-4","volume":"290","author":"PG Harrison","year":"2003","unstructured":"Harrison, P.G.: Turning back time in Markovian process algebra. Theoret. Comput. Sci. 290, 1947\u20131986 (2003)","journal-title":"Theoret. Comput. Sci."},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.tcs.2005.08.007","volume":"346","author":"PG Harrison","year":"2005","unstructured":"Harrison, P.G., Lee, T.T.: Separable equilibrium state probabilities via time reversal in Markovian process algebra. Theoret. Comput. Sci. 346, 161\u2013182 (2005)","journal-title":"Theoret. Comput. Sci."},{"issue":"11","key":"12_CR15","doi-asserted-by":"publisher","first-page":"1693","DOI":"10.1093\/comjnl\/bxt103","volume":"57","author":"PG Harrison","year":"2014","unstructured":"Harrison, P.G., Marin, A.: Product-forms in multi-way synchronizations. Comput. J. 57(11), 1693\u20131710 (2014)","journal-title":"Comput. J."},{"key":"12_CR16","unstructured":"Kelly, F.: Reversibility and Stochastic Networks. Cambridge Press, Cambridge (1979)"},{"issue":"6","key":"12_CR17","doi-asserted-by":"publisher","first-page":"2751","DOI":"10.1109\/TNET.2021.3102518","volume":"29","author":"Y Li","year":"2021","unstructured":"Li, Y., Ioannidis, S.: Cache networks of counting queues. IEEE\/ACM Trans. Networking 29(6), 2751\u20132764 (2021)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: CacheGen: KV cache compression and streaming for fast large language model serving. In: Proceedings of the ACM SIGCOMM 2024 Conference, pp. 38\u201356 (2024)","DOI":"10.1145\/3651890.3672274"},{"issue":"3","key":"12_CR19","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/2805789.2805800","volume":"45","author":"BM Maggs","year":"2015","unstructured":"Maggs, B.M., Sitaraman, R.K.: Algorithmic nuggets in content delivery. ACM SIGCOMM Comput. Commun. Rev. 45(3), 52\u201366 (2015)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"3","key":"12_CR20","doi-asserted-by":"publisher","first-page":"1130","DOI":"10.1109\/TNET.2020.2982863","volume":"28","author":"M Mahdian","year":"2020","unstructured":"Mahdian, M., Moharrer, A., Ioannidis, S., Yeh, E.: Kelly cache networks. IEEE\/ACM Trans. Networking 28(3), 1130\u20131143 (2020)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"12_CR21","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1017\/S0269964816000048","volume":"30","author":"A Marin","year":"2016","unstructured":"Marin, A.: Product-form in G-networks. Probab. Eng. Inf. Sci. 30, 345\u2013360 (2016)","journal-title":"Probab. Eng. Inf. Sci."},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Marin, A., Meo, M., Sereno, M., Ajmone Marsan, M.: Queuing network models of multiservice RANs. ACM Trans. Model. Perform. Eval. Comput. Syst. 9, 7:1\u20137:26 (2024)","DOI":"10.1145\/3649307"},{"key":"12_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110206","volume":"241","author":"YB Mazziane","year":"2024","unstructured":"Mazziane, Y.B., Alouf, S., Neglia, G., Menasche, D.S.: TTL model for an LRU-based similarity caching policy. Comput. Netw. 241, 110206 (2024)","journal-title":"Comput. Netw."},{"issue":"4","key":"12_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3149001","volume":"2","author":"G Neglia","year":"2017","unstructured":"Neglia, G., Carra, D., Feng, M., Janardhan, V., Michiardi, P., Tsigkari, D.: Access-time-aware cache algorithms. ACM Trans. Model. Perform. Eval. Comput. Syst. (TOMPECS) 2(4), 1\u201329 (2017)","journal-title":"ACM Trans. Model. Perform. Eval. Comput. Syst. (TOMPECS)"},{"key":"12_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2025.102469","volume":"168","author":"D Olliaro","year":"2025","unstructured":"Olliaro, D., Balbo, G., Marin, A., Sereno, M.: Computational algorithms and arrival theorem for non-conventional product-form solutions. Perform. Eval. 168, 102469 (2025)","journal-title":"Perform. Eval."},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Rosensweig, E.J., Kurose, J., Towsley, D.: Approximate models for general cache networks. In: 2010 Proceedings IEEE INFOCOM, pp.\u00a01\u20139 (2010)","DOI":"10.1109\/INFCOM.2010.5461936"},{"key":"12_CR27","unstructured":"Sundarrajan, A., Kasbekar, M., Sitaraman, R.K., Shukla, S.: Midgress-aware traffic provisioning for content delivery. In: 2020 USENIX Annual Technical Conference (USENIX ATC 2020), pp. 543\u2013557 (2020)"},{"key":"12_CR28","unstructured":"Wu, J., Elango, V., Zamarin, S., Trikande, S.: Achieve High Performance at Scale for Model Serving Using Amazon SageMaker Multi-Model Endpoints with GPU (2023). AWS Machine Learning Blog. https:\/\/aws.amazon.com\/blogs\/machine-learning\/achieve-high-performance-at-scale-for-model-serving-using-amazon-sagemaker-multi-model-endpoints-with-gpu\/"}],"container-title":["Lecture Notes in Computer Science","Quantitative Evaluation of Systems and Formal Modeling and Analysis of Timed Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05792-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T10:31:39Z","timestamp":1759314699000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05792-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,2]]},"ISBN":["9783032057914","9783032057921"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05792-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,2]]},"assertion":[{"value":"2 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"QEST+FORMATS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Quantitative Evaluation of Systems and Formal Modeling and Analysis of Timed Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Aarhus","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"qest2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.qest-formats.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}