The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2007
DOI: 10.1142/s0219265907001953
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of a P2p Cooperative Proxy Cache System

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2009
2009
2013
2013

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…The results of the performance studies show the impact of cache coherency on the system's performance. It also shows that the proposed routing protocols significantly improve the performance of the cooperative caching system in terms of cache hit ratio, byte hit ratio, user request latency, as well as the number of exchanged messages between the caches in the cooperative set (Wang & Bhulawala, 2005). Yet another study presented a trustable peer-to-peer web caching system, in which peers in the network share their web cache contents.…”
mentioning
confidence: 89%
“…The results of the performance studies show the impact of cache coherency on the system's performance. It also shows that the proposed routing protocols significantly improve the performance of the cooperative caching system in terms of cache hit ratio, byte hit ratio, user request latency, as well as the number of exchanged messages between the caches in the cooperative set (Wang & Bhulawala, 2005). Yet another study presented a trustable peer-to-peer web caching system, in which peers in the network share their web cache contents.…”
mentioning
confidence: 89%
“…Wang and others [26] proposed the Criteria Weighted (CW) algorithm for a peer-to-peer cooperative proxy caching system. The criteria for choosing the replacement victim includes access frequency of the document, size of the document, number of replicas of the document known to the proxy, and time lapsed since the last access to the document.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, the cache must be optimized or freed from existing objects to accommodate new incoming objects. The optimization can be done with cache replacement polices [4], [5], [11]- [26]. Most cache replacement policies select an entire cached object or part of the cached object as a victim and apply the policy to it.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation