{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:43:24Z","timestamp":1757544204201,"version":"3.40.4"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319053585"},{"type":"electronic","value":"9783319053592"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05359-2_9","type":"book-chapter","created":{"date-parts":[[2014,2,14]],"date-time":"2014-02-14T04:50:00Z","timestamp":1392353400000},"page":"120-135","source":"Crossref","is-referenced-by-count":11,"title":["Evaluation of Caching Strategies Based on Access Statistics of Past Requests"],"prefix":"10.1007","author":[{"given":"Gerhard","family":"Hasslinger","sequence":"first","affiliation":[]},{"given":"Konstantinos","family":"Ntougias","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Akamai, State of the Internet, Quarterly Report Series (2013), http:\/\/www.akamai.com"},{"key":"9_CR2","unstructured":"Bahat, O., Makowski, M.: Optimal replacement policies for non-uniform cache objects with optional eviction. In: Proc. IEEE Infocom Conference, San Francisco, CA, USA (2003)"},{"key":"9_CR3","unstructured":"Bolla, R., et al.: Modeling file popularity in peer-to-peer file sharing systems. In: Proc. 14th ASMTA Conf., Prague, Czech Republic, pp. 149\u2013155 (2007)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Braun, L., et al.: Analyzing caching benefits for YouTube traffic in edge networks: A measurement-based evaluation. In: IEEE Network Operations & Management Symposium, Maui, Hawaii, USA (2012)","DOI":"10.1109\/NOMS.2012.6211913"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Breslau, L., et al.: Web caching and Zipf-like distributions: Evidence and implications. In: Proc. IEEE Infocom (1999)","DOI":"10.1109\/INFCOM.1999.749260"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Buyya, R., Pathan, M., Vakali, A. (eds.): Content delivery networks. LNEE, vol. 9. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-77887-5"},{"key":"9_CR7","unstructured":"Cao, P., Irani, S.: Cost aware WWW caching algorithms. In: Proc. USENIX Symposium, Monterey, CA, USA (1997)"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Cha, M., et al.: I tube, you tube, everybody tubes: Analyzing the world\u2019s largest user generated content video system. In: Internet Measurement Conference, IMC 2007, San Diego, USA (2007)","DOI":"10.1145\/1298306.1298309"},{"issue":"7","key":"9_CR9","first-page":"1305","volume":"20","author":"H. Che","year":"2002","unstructured":"Che, H., Tung, Y., Wang, Z.: Hierarchical web caching systems: modeling, design and experimental results. IEEE JSAC\u00a020(7), 1305\u20131314 (2002)","journal-title":"IEEE JSAC"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1007\/978-3-642-12104-3_12","volume-title":"Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance","author":"J. Charzinski","year":"2010","unstructured":"Charzinski, J.: Traffic properties, client side cachability and CDN usage of popular web sites. In: M\u00fcller-Clostermann, B., Echtle, K., Rathgeb, E.P. (eds.) MMB & DFT 2010. LNCS, vol.\u00a05987, pp. 136\u2013150. Springer, Heidelberg (2010)"},{"key":"9_CR11","unstructured":"Cohen, B.: Incentives build robustness in BitTorrent (2003), bitconjurer.org\/BitTorrent\/bittorrentecon.pdf"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1145\/98460.98525","volume":"18","author":"A. Dan","year":"1990","unstructured":"Dan, A., Towsely, D.: An approximate analysis of the LRU and FIFO buffer replacement schemes. SIGMETRICS Perform. Eval. Rev.\u00a018, 143\u2013152 (1990)","journal-title":"SIGMETRICS Perform. Eval. Rev."},{"key":"9_CR13","unstructured":"Fielding, R., et al.: Hypertext transfer protocol HTTP\/1.1: Caching, Internet-Draft, work in progr. (2013), tools.ietf.org\/html\/draft-ietf-httpbis-p6-cache-22"},{"key":"9_CR14","unstructured":"Fricker, C., Robert, P., Roberts, J.: A versatile and accurate approximation for LRU cache performance. In: Proc. 24th International Teletraffic Congress, Krak\u00f3w, Poland (2012)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Fricker, C., et al.: Impact of traffic mix on caching performance in a content-centric network. In: IEEE INFOCOM 2012 Workshops, pp. 310\u2013315 (2012)","DOI":"10.1109\/INFCOMW.2012.6193511"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Gill, P., et al.: YouTube traffic characterization: A view from the edge. In: Internet Measurement Conference, IMC 2007, San Diego, USA (2007)","DOI":"10.1145\/1298306.1298310"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Guo, L., et al.: Does Internet media traffic really follow Zipf-like distributions? In: ACM SIGMETRICS (2007)","DOI":"10.1145\/1254882.1254929"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Hasslinger, G., Hohlfeld, O.: Efficiency of caches for content distribution on the Internet. In: Proc. 22nd International Teletraffic Congress, Amsterdam, The Netherlands (2010)","DOI":"10.1109\/ITC.2010.5608730"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-642-02205-0_4","volume-title":"Analytical and Stochastic Modeling Techniques and Applications","author":"G. Hasslinger","year":"2009","unstructured":"Hasslinger, G., Hartleb, F., Beckhaus, T.: User access to popular data on the internet and approaches for IP traffic flow optimization. In: Al-Begain, K., Fiems, D., Horv\u00e1th, G. (eds.) ASMTA 2009. LNCS, vol.\u00a05513, pp. 42\u201355. Springer, Heidelberg (2009)"},{"key":"9_CR20","first-page":"3991","volume":"55","author":"G. Hasslinger","year":"2011","unstructured":"Hasslinger, G., Hartleb, F.: Content delivery and caching from a network provider\u2019s perspective. Special Issue on Internet based Content Delivery, Computer Networks\u00a055, 3991\u20134006 (2011)","journal-title":"Special Issue on Internet based Content Delivery, Computer Networks"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Kandavanam, G., Botvich, D., Balasubranmaniam, S.: PaCRA: A path-aware content replication approach to support QoS guaranteed video on demand service in metropolitan IPTV networks. In: IEEE\/IFIP Network Operations & Mgnt. Symp. NOMS, pp. 591\u2013598 (2010)","DOI":"10.1109\/NOMS.2010.5488442"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Karakostas, G., Serpanos, D.N.: Exploitation of different types of localities for web caching. In: Proc. 7th IEEE Symposium on Computers and Communications (ISCC), pp. 207\u2013212 (2002)","DOI":"10.1109\/ISCC.2002.1021680"},{"issue":"12","key":"9_CR23","doi-asserted-by":"publisher","first-page":"1352","DOI":"10.1109\/TC.2001.970573","volume":"50","author":"D. Lee","year":"2001","unstructured":"Lee, D., et al.: LRFU: A spectrum of policies that subsumes the least recently used and least frequently used policies. IEEE Transactions on Computers\u00a050(12), 1352\u20131361 (2001)","journal-title":"IEEE Transactions on Computers"},{"issue":"4","key":"9_CR24","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MC.2004.1297303","volume":"37","author":"N. Megiddo","year":"2004","unstructured":"Megiddo, N., Modha, S.: Outperforming LRU with an adaptive replacement cache algorithm. IEEE Computer\u00a037(4), 4\u201311 (2004)","journal-title":"IEEE Computer"},{"key":"9_CR25","unstructured":"Panchekha, P.: Caching in theory and practice, Dropbox TechBlog (2012), https:\/\/tech.dropbox.com\/2012\/10\/caching-in-theory-and-practice"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Podlipnik, S., B\u00f6sz\u00f6rmenyi, L.: A survey of web cache replacement strategies. ACM Computer Surveys, 374\u2013398 (2003)","DOI":"10.1145\/954339.954341"},{"key":"9_CR27","volume-title":"Web caching and replication","author":"M. Rabinovich","year":"2002","unstructured":"Rabinovich, M., Spatscheck, O.: Web caching and replication. Addison-Wesley, Boston (2002)"},{"issue":"1","key":"9_CR28","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/S0165-1765(01)00524-9","volume":"74","author":"W.J. Reed","year":"2001","unstructured":"Reed, W.J.: The Pareto, Zipf and other power laws. Economics Letters\u00a074(1), 15\u201319 (2001)","journal-title":"Economics Letters"},{"key":"9_CR29","unstructured":"Shah, K., Mitra, A., Matani, D.: An O(1) algorithm for implementing the LFU cache eviction scheme accessible from, dhruvbird.com\/lfu.pdf or en.wikipedia.org\/wiki\/Least_frequently_used (2010)"},{"key":"9_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/3-540-44463-7_36","volume-title":"Electronic Commerce and Web Technologies","author":"A.I. Vakali","year":"2000","unstructured":"Vakali, A.I.: LRU-based algorithms for web cache replacement. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2000. LNCS, vol.\u00a01875, pp. 409\u2013418. Springer, Heidelberg (2000)"},{"key":"9_CR31","unstructured":"Wessels, D.: Squid: The definitive guide. O\u2019Reilly (2004)"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Williams, A., et al.: Web workload characterization: Ten years later. In: Tang, X., et al. (eds.) Web Content Delivery, pp. 3\u201321. Springer (2005)","DOI":"10.1007\/0-387-27727-7_1"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Zhao, S., Stutzbach, D., Rejaie, R.: Characterizing files in the modern Gnutella network: A measurement study. SPIE\/ACM Proc. Multimedia Computing and Networking (2006)","DOI":"10.1117\/12.643557"}],"container-title":["Lecture Notes in Computer Science","Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05359-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T21:16:39Z","timestamp":1746134199000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-05359-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319053585","9783319053592"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05359-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}