By Topic

Web Proxy Caching Object Replacement: Frontier Analysis to Discover the Good-Enough Algorithms

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
G. Kastaniotis ; Dept. of Inf., Univ. of Piraeus, Piraeus ; E. Maragos ; V. Dimitsas ; C. Douligeris
more authors

Object replacement strategies are considered as key performance factors of a web proxy caching application. Several algorithms have been proposed, analyzed and simulated during the last decade, in order to decide upon the champion one. In this paper, we recommend the methodology of Data Envelopment Analysis as a powerful tool, with a complementary activity to that of trace driven simulation, which is able to discover the set of the `good-enough' replacement strategies - i.e. strategies that exhibit good results for the basic performance metrics - under a variety of simulated workloads.

Published in:

2007 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems

Date of Conference:

24-26 Oct. 2007