{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T05:10:37Z","timestamp":1744348237118},"reference-count":30,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[1990,5,1]],"date-time":"1990-05-01T00:00:00Z","timestamp":641520000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks and ISDN Systems"],"published-print":{"date-parts":[[1990,5]]},"DOI":"10.1016\/0169-7552(90)90106-3","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T23:11:16Z","timestamp":1060297876000},"page":"243-254","source":"Crossref","is-referenced-by-count":31,"title":["Characteristics of destination address locality in computer networks: A comparison of caching schemes"],"prefix":"10.1016","volume":"18","author":[{"given":"Raj","family":"Jain","sequence":"first","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/0169-7552(90)90106-3_BIB1","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1147\/sj.52.0078","article-title":"A Study of Replacement Algorithms for a Virtual-Storage Computer","volume":"5","author":"Belady","year":"1966","journal-title":"IBM Systems J."},{"issue":"3","key":"10.1016\/0169-7552(90)90106-3_BIB2","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1093\/comjnl\/27.3.238","article-title":"The Measurement of Locality and the Behavior of Programs","volume":"27","author":"Bunt","year":"1984","journal-title":"Comput. J."},{"issue":"5","key":"10.1016\/0169-7552(90)90106-3_BIB3","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1145\/363095.363141","article-title":"The Working Set Model for Program Behavior","volume":"11","author":"Denning","year":"1968","journal-title":"Comm. ACM"},{"key":"10.1016\/0169-7552(90)90106-3_BIB4","series-title":"Proc. IEEE INFOCOM '88","article-title":"Improving Gateway Performance with a Routing-Table Cache","author":"Feldmeier","year":"1988"},{"key":"10.1016\/0169-7552(90)90106-3_BIB5","series-title":"Short-Term File Reference Patterns in a UNIX Environment","author":"Floyd","year":"1986"},{"key":"10.1016\/0169-7552(90)90106-3_BIB6","series-title":"Directory Reference Patterns in a UNIX Environment","author":"Floyd","year":"1986"},{"key":"10.1016\/0169-7552(90)90106-3_BIB7","series-title":"Proc. IEEE 7th Internat. Conf. on Distributed Computing Systems","first-page":"544","article-title":"Effect of Locality in Large Networks","author":"Garg","year":"1987"},{"issue":"2","key":"10.1016\/0169-7552(90)90106-3_BIB8","first-page":"117","article-title":"Transparent Interconnection of Local Networks with Bridges","volume":"2","author":"Hawe","year":"1984","journal-title":"J. Telecomm. Networks"},{"key":"10.1016\/0169-7552(90)90106-3_BIB9","article-title":"A Comparison of Hashing Schemes for Address Lookup in Computer Networks","author":"Jain","year":"1989","journal-title":"DEC Technical Report DEC-TR-593"},{"issue":"6","key":"10.1016\/0169-7552(90)90106-3_BIB10","doi-asserted-by":"crossref","first-page":"986","DOI":"10.1109\/JSAC.1986.1146410","article-title":"Packet Trains: Measurements and New Model for Computer Network Traffic","volume":"4","author":"Jain","year":"1986","journal-title":"IEEE J. Special Areas Comm."},{"key":"10.1016\/0169-7552(90)90106-3_BIB11","series-title":"Proc. SIGCOMM '88","first-page":"175","article-title":"The VMP Network Adapter Board (NAB): High-Performance Network Communication for Multiprocessors","author":"Kanakia","year":"1988"},{"key":"10.1016\/0169-7552(90)90106-3_BIB12","article-title":"Competitive Snoopy Caching","author":"Karlin","year":"1986","journal-title":"Carnegie-Mellon Univ., Report CMU-CS-86-164"},{"key":"10.1016\/0169-7552(90)90106-3_BIB13","article-title":"Cache Coherence in Distributed Systems","author":"Kent","year":"1987","journal-title":"DEC Western Research Lab, Report 87\/4"},{"key":"10.1016\/0169-7552(90)90106-3_BIB14","unstructured":"O. Kure, Optimization of File Migration in Distributed Systems, Univ. of California, Report UCB\/CSD 88\/413."},{"key":"10.1016\/0169-7552(90)90106-3_BIB15","first-page":"73","article-title":"Terminal Servers on Ethernet Local Area Networks","volume":"3","author":"Mann","year":"1986","journal-title":"Digital Techn. J."},{"issue":"2","key":"10.1016\/0169-7552(90)90106-3_BIB16","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1147\/sj.92.0078","article-title":"Evaluation Techniques for Storage Hierarchies","volume":"9","author":"Mattson","year":"1970","journal-title":"IBM Systems J."},{"key":"10.1016\/0169-7552(90)90106-3_BIB17","series-title":"Proc. 17th Annual Hawaii Internat. Conf. on System Sci.","first-page":"354","article-title":"An Investigation of Locality Phases","author":"Murphy","year":"1984"},{"key":"10.1016\/0169-7552(90)90106-3_BIB18","series-title":"Proc. Internat. Conf. on Modeling Techniques and Tools for Performance Analysis","first-page":"207","article-title":"Performance Analysis of Prefetch Strategies for Database Access","author":"Natarajan","year":"1986"},{"issue":"10","key":"10.1016\/0169-7552(90)90106-3_BIB19","doi-asserted-by":"crossref","first-page":"932","DOI":"10.1145\/6617.6618","article-title":"Notable Computer Networks","volume":"29","author":"Quarterman","year":"1986","journal-title":"Comm. ACM"},{"issue":"3","key":"10.1016\/0169-7552(90)90106-3_BIB20","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1145\/322077.322081","article-title":"Performance Analysis of Cache Memories","volume":"25","author":"Rao","year":"1978","journal-title":"J. ACM"},{"key":"10.1016\/0169-7552(90)90106-3_BIB21","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/C-M.1981.220301","article-title":"Design Trade-Offs in VAX-11 Translation Buffer Organization","author":"Satyanarayanan","year":"1981","journal-title":"IEEE Comput."},{"key":"10.1016\/0169-7552(90)90106-3_BIB22","doi-asserted-by":"crossref","DOI":"10.1145\/323627.323632","article-title":"A Caching File System for a Programmer's Workstation","author":"Schroeder","year":"1985","journal-title":"ACM Oper. Systems Rev."},{"key":"10.1016\/0169-7552(90)90106-3_BIB23","doi-asserted-by":"crossref","first-page":"855","DOI":"10.1109\/PGEC.1966.264467","article-title":"Statistical Analysis of Paged and Segmented Computer Systems","volume":"15","author":"Shemer","year":"1966","journal-title":"IEEE Trans. Electron. Comput."},{"key":"10.1016\/0169-7552(90)90106-3_BIB24","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/0166-5316(81)90004-3","article-title":"Optimization of I\/O Systems by Cache Disks and File Migration: A Summary","volume":"1","author":"Smith","year":"1981","journal-title":"Performance Eval."},{"issue":"8","key":"10.1016\/0169-7552(90)90106-3_BIB25","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1145\/356887.356892","article-title":"Cache Memories","volume":"14","author":"Smith","year":"1982","journal-title":"Comput. Surveys"},{"key":"10.1016\/0169-7552(90)90106-3_BIB26","series-title":"Proc. 18th Annual Hawaii Internat. Conf. on System Sciences","first-page":"468","article-title":"Problems, Directions and Issues in Memory Hierarchies","author":"Smith","year":"1985"},{"key":"10.1016\/0169-7552(90)90106-3_BIB27","series-title":"Program Behavior: Models and Measurements","author":"Spirn","year":"1977"},{"key":"10.1016\/0169-7552(90)90106-3_BIB28","series-title":"Proc. 8th Symp. on Computer Architecture","first-page":"155","article-title":"Cache Memories for PDP-11 Family Computers","author":"Strecker","year":"1976"},{"key":"10.1016\/0169-7552(90)90106-3_BIB29","unstructured":"J.G. Thompson, Efficient Analysis of Caching Systems, Univ. of California, Berkeley, Report No. UCB\/CSD 87\/374."},{"key":"10.1016\/0169-7552(90)90106-3_BIB30","series-title":"Proc. 5th Annual Intenrat. Phoenix Conf. on Computers and Communications (PCCC'86)","first-page":"651","article-title":"Characterizing Short-Term File Referencing Behavior","author":"Williamson","year":"1986"}],"container-title":["Computer Networks and ISDN Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0169755290901063?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0169755290901063?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T07:22:31Z","timestamp":1552634551000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0169755290901063"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990,5]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1990,5]]}},"alternative-id":["0169755290901063"],"URL":"https:\/\/doi.org\/10.1016\/0169-7552(90)90106-3","relation":{},"ISSN":["0169-7552"],"issn-type":[{"value":"0169-7552","type":"print"}],"subject":[],"published":{"date-parts":[[1990,5]]}}}