{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T13:25:14Z","timestamp":1692969914483},"reference-count":25,"publisher":"Elsevier BV","issue":"14","license":[{"start":{"date-parts":[[1999,9,1]],"date-time":"1999-09-01T00:00:00Z","timestamp":936144000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1999,9]]},"DOI":"10.1016\/s0140-3664(99)00131-0","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T02:56:11Z","timestamp":1027652171000},"page":"1343-1350","source":"Crossref","is-referenced-by-count":2,"title":["The effect of Web caching on network planning"],"prefix":"10.1016","volume":"22","author":[{"given":"H.","family":"Sun","sequence":"first","affiliation":[]},{"given":"X.","family":"Zang","sequence":"additional","affiliation":[]},{"given":"K.S.","family":"Trivedi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(99)00131-0_BIB1","first-page":"193","article-title":"Performance evaluation of Web proxy cache replacement policies, computer performance evaluation: modelling techniques and tools","volume":"1469","author":"Arlitt","year":"1998","journal-title":"Lncs"},{"key":"10.1016\/S0140-3664(99)00131-0_BIB2","unstructured":"M.A. Brams, C.R. Standridge, G. Abdulla, S. Williams, E.A. Fox, Caching Proxies: Limitations and Potentials, http:\/\/ei.cs.vt.edu\/succeed\/WWW4\/WWW4.html."},{"key":"10.1016\/S0140-3664(99)00131-0_BIB3","doi-asserted-by":"crossref","unstructured":"M.A. Brams, C.R. Standridge, G. Abdulla, S. Williams, E.A. Fox, Removal Policies in Network Caches for World-Wide Web Documents. SIGCOMM\u201996, pp. 293\u2013309.","DOI":"10.1145\/248157.248182"},{"key":"10.1016\/S0140-3664(99)00131-0_BIB4","unstructured":"P. Lorenzetti, L. Rizzo, L. Vicisano, Replacement Policies for a Proxy Cache, http:\/\/www.iet.unipi.it\/luigi\/caching.ps."},{"key":"10.1016\/S0140-3664(99)00131-0_BIB5","unstructured":"I. Tatarinov, Cache Policies for Web Servers, http:\/\/ncstrl.cs.cornell.edu:80 \/Dienst\/UI\/1.0\/Display\/ncstrl.ndsu_cs\/NDSU-CSOR-TR-97-05."},{"key":"10.1016\/S0140-3664(99)00131-0_BIB6","unstructured":"I. Tatarinov, Performance Analysis of Cache Policies for Web Servers, http:\/\/ncstrl.cs.cornell.edu:80\/Dienst\/UI\/1.0\/ Display\/ncstrl.ndsu_cs\/NDSU-CSOR-TR-97-06."},{"key":"10.1016\/S0140-3664(99)00131-0_BIB7","unstructured":"P. Cao, S. Irani, Cost-Aware WWW Proxy Caching Algorithms, http:\/\/ncstrl.cs.cornell.edu:80\/Dienst\/UI\/1.0\/Display\/ncstrl.uwmadison\/CS-TR-97-1343."},{"key":"10.1016\/S0140-3664(99)00131-0_BIB8","first-page":"358","article-title":"An adaptive network Prefetch scheme","author":"Jiang","year":"1988","journal-title":"Iee J-sac"},{"key":"10.1016\/S0140-3664(99)00131-0_BIB9","doi-asserted-by":"crossref","unstructured":"V.N. Padmanabhan, J.C. Mogul, Using predictive Prefetching to improve World Wide Web Latency, ACM, Computer Communication Review, pp. 22\u201336.","DOI":"10.1145\/235160.235164"},{"key":"10.1016\/S0140-3664(99)00131-0_BIB10","unstructured":"E.P. Markatos, C.E. Chronaki, A Top-10 Approach to Prefetching on the Web, http:\/\/www.ics.firth.gr\/proj\/arch-vlsi\/www.html."},{"key":"10.1016\/S0140-3664(99)00131-0_BIB11","unstructured":"S. Deng, Empirical model of WWW document arrivals at access link, ICC\u201996, pp. 1797\u20131802."},{"key":"10.1016\/S0140-3664(99)00131-0_BIB12","unstructured":"M. Crovella, A. Bestavros, Explaining World Wide Web traffic self-similarity, http:\/\/ncstrl.cs.cornell.edu: 80\/Dienst\/UI\/ 1.0\/Display\/ ncstrl.bu_cs\/95-015."},{"key":"10.1016\/S0140-3664(99)00131-0_BIB13","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/65.642358","article-title":"Hash routing for collections of shared Web caches","author":"Ross","year":"1997","journal-title":"Ieee Network"},{"key":"10.1016\/S0140-3664(99)00131-0_BIB14","unstructured":"D. Wessels, K. Claffy, Internet cache protocol (ICP), version 2, RFC2186."},{"key":"10.1016\/S0140-3664(99)00131-0_BIB15","unstructured":"D. Wessels, K. Claffy, Application of Internet cache protocol (ICP), version 2, RFC2187."},{"key":"10.1016\/S0140-3664(99)00131-0_BIB16","unstructured":"V. Valloppillil, Cache Array Routing Protocol v1.0, INTERNET-DRAFT, !draft-vinod-carp-v1-03.txt?"},{"key":"10.1016\/S0140-3664(99)00131-0_BIB17","series-title":"Program Behavior: Models and Measurements","author":"Spirn","year":"1977"},{"key":"10.1016\/S0140-3664(99)00131-0_BIB18","unstructured":"http:\/\/www.cs.berkeley.edu\/gribble\/traces\/index.html, UC-Berkeley's trace."},{"key":"10.1016\/S0140-3664(99)00131-0_BIB19","unstructured":"ftp:\/\/ftp.digital.com\/pub\/DEC\/traces\/proxy\/webtraces.html, DEC's trace."},{"key":"10.1016\/S0140-3664(99)00131-0_BIB20","unstructured":"ftp:\/\/ei.cs.vt.edu\/pub\/succeed\/Sigcomm96\/, Virginia Tech's traces."},{"key":"10.1016\/S0140-3664(99)00131-0_BIB21","unstructured":"L. Breslau, P. Cao, L. Fan, G. Phillips, S. Shenker, Web caching and Zipf-like distributions: evidence and implications, http:\/\/www.cs.wisc.edu\/cao\/papers\/zipf-implications.html."},{"key":"10.1016\/S0140-3664(99)00131-0_BIB22","unstructured":"B.M. Duska, D. Marwood, M.J. Freeley, The measured access characteristics of World-Wide-Web client proxy caches, University of British Columbia, Technical Report."},{"key":"10.1016\/S0140-3664(99)00131-0_BIB23","unstructured":"V. Almeida, A. Bestavros, M. Crovella, A. Oliveira, Characterizing Reference Locality in the WWW, http:\/\/ncstrl.cs.cornell.edu:80\/Dienst\/UI\/1.0 \/Display \/ncstrl.bu_cs\/96-011."},{"key":"10.1016\/S0140-3664(99)00131-0_BIB24","unstructured":"V. Almeida, A. Oliveira, On the fractal nature of WWW and its application to cache modeling, http:\/\/ncstrl.cs.cornell.edu:80\/Dienst\/UI \/1.0\/Display\/ncstrl.bu_cs\/96-004"},{"key":"10.1016\/S0140-3664(99)00131-0_BIB25","unstructured":"Herb Schwetman, CSIM Users\u2019 Guide, Microeletronics and Computer Technology Corporation, 1991."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366499001310?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366499001310?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T06:05:38Z","timestamp":1580882738000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366499001310"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,9]]},"references-count":25,"journal-issue":{"issue":"14","published-print":{"date-parts":[[1999,9]]}},"alternative-id":["S0140366499001310"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(99)00131-0","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1999,9]]}}}