{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T04:03:17Z","timestamp":1749787397399,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491448"},{"type":"electronic","value":"9783319491455"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49145-5_35","type":"book-chapter","created":{"date-parts":[[2016,11,9]],"date-time":"2016-11-09T08:52:57Z","timestamp":1478681577000},"page":"361-370","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Weighted Frequency Based Cache Memory Replacement Policy for Named Data Networking"],"prefix":"10.1007","author":[{"given":"You","family":"Liao","sequence":"first","affiliation":[]},{"given":"Yupeng","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Linjun","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,10]]},"reference":[{"issue":"6","key":"35_CR1","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.3724\/SP.J.1016.2012.0l109","volume":"35","author":"X Gaogang","year":"2012","unstructured":"Gaogang, X.: A survey on future internet architecture. Chin. J. Comput. 35(6), 1109\u20131119 (2012)","journal-title":"Chin. J. Comput."},{"key":"35_CR2","unstructured":"Er Long, M.: Research progress of content center network. Netinfo Secur. 6\u201310 (2012)"},{"issue":"4","key":"35_CR3","first-page":"7","volume":"26","author":"X Lin","year":"2010","unstructured":"Lin, X.: future internet architecture\u2014content centric networks. Telecommun. Sci. 26(4), 7\u201316 (2010)","journal-title":"Telecommun. Sci."},{"key":"35_CR4","unstructured":"Sprangle, E., Carmean, D., Kumar, R.: Distribution of tasks among asymmetric processing elements. US, US8930722 (2015)"},{"issue":"3","key":"35_CR5","doi-asserted-by":"publisher","first-page":"469","DOI":"10.3923\/jse.2015.469.486","volume":"9","author":"R Mu","year":"2015","unstructured":"Mu, R., Zhao, F.: CDN and P2P network model based on HCDN Technology. J. Softw. Eng. 9(3), 469\u2013486 (2015)","journal-title":"J. Softw. Eng."},{"issue":"7","key":"35_CR6","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2012.6231276","volume":"50","author":"B Ahlgren","year":"2012","unstructured":"Ahlgren, B.: A survey of information-centric networking. IEEE Commun. Mag. 50(7), 26\u201336 (2012)","journal-title":"IEEE Commun. Mag."},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"Afanasyev, A.: SNAMP: secure namespace mapping to scale NDN forwarding. In: 2015 IEEE Conference on IEEE Computer Communications Workshops (INFOCOM WKSHPS) (2015)","DOI":"10.1109\/INFCOMW.2015.7179398"},{"key":"35_CR8","unstructured":"Jacobson, V., Mosko, M., Smetters, D.: Content-centric networking. Whitepaper, Palo Alto Research Center, pp. 2\u20134 (2007)"},{"key":"35_CR9","unstructured":"Zhang, L., Estrin, D., Jacobson, V.: Named data networking project. Technical Report, NDN-0001 (2010)"},{"key":"35_CR10","unstructured":"Shin, S.W., Kim, K.Y., Jang, J.S.: LRU based small latency first replacement (SLFR) algorithm for the proxy cache. In: Proceedings. IEEE\/WIC International Conference on IEEE Web Intelligence, WI 2003, pp. 499\u2013502 (2003)"},{"key":"35_CR11","unstructured":"Karakostas, G., Serpanos, D.: Practical LFU implementation for web caching. Technical Report TR-622\u201300, Department of Computer Science, Princeton University (2000)"},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"Wang, J.M., Bensaou, B.: Improving content-centric networks performance with progressive, diversity-load driven caching. In: 2012 1st IEEE International Conference on IEEE Communications in China (ICCC), pp. 85\u201390 (2012)","DOI":"10.1109\/ICCChina.2012.6356996"},{"key":"35_CR13","unstructured":"Chen, X., Fan, Q., Yin, H.: Caching in information-centric networking: from a content delivery path perspective. In: 2013 9th International Conference on IEEE Innovations in Information Technology (IIT), pp. 48\u201353 (2013)"},{"key":"35_CR14","unstructured":"Afanasyev, A., Moiseenko, I., Zhang, L.: ndnSIM: NDN simulator for NS-3. University of California, Los Angeles, Technical report (2012)"},{"key":"35_CR15","unstructured":"Carofiglio, G.: Modeling data transfer in content-centric networking. In: 2011 23rd International IEEE Teletraffic Congress (ITC), pp. 111\u2013118 (2011)"},{"key":"35_CR16","doi-asserted-by":"crossref","unstructured":"Laoutaris, N., Syntila, S., Stavrakakis, I.: Meta algorithms for hierarchical web caches. In: 2004 IEEE International Conference on Performance, Computing, and Communications, pp. 445\u2013452. IEEE (2004)","DOI":"10.1109\/PCCC.2004.1395054"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy and Anonymity in Computation, Communication and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49145-5_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T05:51:29Z","timestamp":1749707489000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49145-5_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491448","9783319491455"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49145-5_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"10 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhangjiajie","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/trust.csu.edu.cn\/conference\/SpaCCS2016\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}