{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T14:42:51Z","timestamp":1768920171441,"version":"3.49.0"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T00:00:00Z","timestamp":1659916800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T00:00:00Z","timestamp":1659916800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s11704-022-1176-8","type":"journal-article","created":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T12:03:21Z","timestamp":1659960201000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Research on key technologies of edge cache in virtual data space across WAN"],"prefix":"10.1007","volume":"17","author":[{"given":"Jiantong","family":"Huo","sequence":"first","affiliation":[]},{"given":"Yaowen","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Zhisheng","family":"Huo","sequence":"additional","affiliation":[]},{"given":"Limin","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Zhenxue","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,8]]},"reference":[{"issue":"7","key":"1176_CR1","first-page":"97","volume":"22","author":"K Ashton","year":"2009","unstructured":"Ashton K. That \u2018internet of things\u2019 thing. RFID Journal, 2009, 22(7): 97\u2013114","journal-title":"RFID Journal"},{"issue":"1","key":"1176_CR2","first-page":"122","volume":"33","author":"L M Liu","year":"2014","unstructured":"Liu L M, Wang B. Research of an end-to-end transfer mechanism for big data in CMAGrid environment. Computing Technology and Automation, 2014, 33(1): 122\u2013126","journal-title":"Computing Technology and Automation"},{"issue":"5","key":"1176_CR3","first-page":"632","volume":"21","author":"B Wang","year":"2010","unstructured":"Wang B, Zong X, Tian H. Design and establishment of a nationwide meteorological computational grid. Journal of Applied Meteorological Science, 2010, 21(5): 632\u2013640","journal-title":"Journal of Applied Meteorological Science"},{"issue":"2","key":"1176_CR4","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10796-014-9492-7","volume":"17","author":"S Li","year":"2015","unstructured":"Li S, Xu L D, Zhao S. The internet of things: a survey. Information Systems Frontiers, 2015, 17(2): 243\u2013259","journal-title":"Information Systems Frontiers"},{"issue":"5","key":"1176_CR5","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MIC.2002.1036038","volume":"6","author":"J Dilley","year":"2002","unstructured":"Dilley J, Maggs B, Parikh J, Prokop H, Sitaraman R, Weihl B. Globally distributed content delivery. IEEE Internet Computing, 2002, 6(5): 50\u201358","journal-title":"IEEE Internet Computing"},{"issue":"1","key":"1176_CR6","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MC.2017.9","volume":"50","author":"M Satyanarayanan","year":"2017","unstructured":"Satyanarayanan M. The emergence of edge computing. Computer, 2017, 50(1): 30\u201339","journal-title":"Computer"},{"issue":"1","key":"1176_CR7","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TCCN.2020.2971688","volume":"6","author":"Z Su","year":"2020","unstructured":"Su Z, Dai M, Xu Q, Li R, Fu S. Q-learning-based spectrum access for content delivery in mobile networks. IEEE Transactions on Cognitive Communications and Networking, 2020, 6(1): 35\u201347","journal-title":"IEEE Transactions on Cognitive Communications and Networking"},{"issue":"5","key":"1176_CR8","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1109\/TKDE.2007.1031","volume":"19","author":"L Ramaswamy","year":"2007","unstructured":"Ramaswamy L, Liu L, Iyengar A. Scalable delivery of dynamic content using a cooperative edge cache grid. IEEE Transactions on Knowledge and Data Engineering, 2007, 19(5): 614\u2013630","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"1176_CR9","unstructured":"Zhao J. The case for VM-based cloudlets in mobile computing. See Docin.Com\/P-1950150101 website, 2010"},{"key":"1176_CR10","unstructured":"Wilkinson S, Boshevski T, Brandoff J, Buterin V. Storj a peer-to-peer cloud storage network. See Citeseerx.ist.psu.edu\/viewdoc\/download; jsessionid=D732CB9C4DBDF36BFBCA7F5821A593AC?doi=10.1.1.693.785&rep=rep1&type=website, 2014"},{"issue":"8","key":"1176_CR11","doi-asserted-by":"publisher","first-page":"7527","DOI":"10.1109\/TVT.2017.2659701","volume":"66","author":"B Chen","year":"2017","unstructured":"Chen B, Yang C, Wang G. High-throughput opportunistic cooperative device-to-device communications with caching. IEEE Transactions on Vehicular Technology, 2017, 66(8): 7527\u20137539","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"1176_CR12","doi-asserted-by":"crossref","unstructured":"Tan H, Jiang H C, Han Z, Liu L, Zhao Q. Camul: online caching on multiple caches with relaying and bypassing. In: Proceedings of 2019 IEEE Conference on Computer Communications. 2019","DOI":"10.1109\/INFOCOM.2019.8737396"},{"key":"1176_CR13","unstructured":"Headquarters A. Cisco wide area application services configuration guide. See Cisco.Com\/C\/En\/Us\/Support\/Routers\/Wide-Area-Applicati-on-Services-Waas-Software\/Products-Configuration-Guides-List"},{"key":"1176_CR14","unstructured":"Berg B, Berger D S, McAllister S, Grosof I, Gunasekar S, Lu J, Uhlar M, Carrig J, Beckmann N, Harchol-Balter M, Ganger G R. The Cachelib caching engine: design and experiences at scale. In: Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation. 2020, 753\u2013768"},{"key":"1176_CR15","unstructured":"Cherkasova L. Improving WWW proxies performance with greedy-dual-size-frequency caching policy. See hpl.hp.com\/techreports\/98\/HPL-98\u201369R1 website, 1998"},{"key":"1176_CR16","doi-asserted-by":"crossref","unstructured":"Karger D, Lehman E, Leighton T, Panigrahy R, Levine M, Lewin D. Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web. In: Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing. 1997, 654\u2013663","DOI":"10.1145\/258533.258660"},{"key":"1176_CR17","doi-asserted-by":"crossref","unstructured":"Das A, Gupta I, Motivala A. SWIM: scalable weakly-consistent infection-style process group membership protocol. In: Proceedings International Conference on Dependable Systems and Networks. 2002, 303\u2013312","DOI":"10.1109\/DSN.2002.1028914"},{"issue":"5","key":"1176_CR18","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/1317379.1317382","volume":"41","author":"K Birman","year":"2007","unstructured":"Birman K. The promise, and limitations, of gossip protocols. ACM SIGOPS Operating Systems Review, 2007, 41(5): 8\u201313","journal-title":"ACM SIGOPS Operating Systems Review"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-022-1176-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-022-1176-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-022-1176-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T23:23:35Z","timestamp":1727738615000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-022-1176-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,8]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["1176"],"URL":"https:\/\/doi.org\/10.1007\/s11704-022-1176-8","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,8]]},"assertion":[{"value":"15 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"171102"}}