Aliasing on the world wide web: prevalence and performance implications
Proceedings of the 11th international conference on World Wide Web
ProWGen: a synthetic workload generation tool for simulation evaluation of web proxy caches
Computer Networks: The International Journal of Computer and Telecommunications Networking
Maintaining Mutual Consistency for Cached Web Objects
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
The Content Driven Mobile Internet
Wireless Personal Communications: An International Journal
Architecture and performance of server-directed transcoding
ACM Transactions on Internet Technology (TOIT)
Extended Internet caching protocol: a foundation for building ubiquitous Web caching
Proceedings of the 2003 ACM symposium on Applied computing
Design, Implementation, and Evaluation of Differentiated Caching Services
IEEE Transactions on Parallel and Distributed Systems
GEMA: An Object Replacement Algorithm for Cooperative Web Proxy Systems
Multimedia Tools and Applications
Design, implementation, and evaluation of duplicate transfer detection in HTTP
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
A survey on the design, applications, and enhancements of application-layer overlay networks
ACM Computing Surveys (CSUR)
Performance evaluation of navy's tactical network using OPNET
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Thin-client Web access patterns: Measurements from a cache-busting proxy
Computer Communications
Hi-index | 0.00 |
Computer system designers often use caches to solve performance problems. Caching in the World Wide Web has been both the subject of extensive research and the basis of a large and growing industry. Traditional Web caches store HTTP responses, in anticipation of a subsequent reference to the URL of a cached response. Unfortunately, experience with real Web users shows that there are limits to the performance of this simple caching model, because many responses are useful only once. Researchers have proposed a variety of more complex ways in which HTTP caches can exploit locality in real reference streams. This article surveys several techniques, and reports the results of trace-based studies of a proposal based on automatic recognition of duplicated content