A survey of web cache replacement strategies

S Podlipnig, L Böszörmenyi - ACM Computing Surveys (CSUR), 2003 - dl.acm.org
Web caching is an important technique to scale the Internet. One important performance
factor of Web caches is the replacement strategy. Due to specific characteristics of the World …

A review of power laws in real life phenomena

CMA Pinto, AM Lopes, JAT Machado - Communications in Nonlinear …, 2012 - Elsevier
Power law distributions, also known as heavy tail distributions, model distinct real life
phenomena in the areas of biology, demography, computer science, economics, information …

Workload analysis of a large-scale key-value store

B Atikoglu, Y Xu, E Frachtenberg, S Jiang… - Proceedings of the 12th …, 2012 - dl.acm.org
Key-value stores are a vital component in many scale-out enterprises, including social
networks, online retail, and risk analysis. Accordingly, they are receiving increased attention …

Graph structure in the web

A Broder, R Kumar, F Maghoul, P Raghavan… - Computer …, 2000 - Elsevier
The study of the Web as a graph is not only fascinating in its own right, but also yields
valuable insight into Web algorithms for crawling, searching and community discovery, and …

A brief history of generative models for power law and lognormal distributions

M Mitzenmacher - Internet mathematics, 2004 - Taylor & Francis
Recently, I became interested in a current debate over whether file size distributions are best
modelled by a power law distribution or a lognormal distribution. In trying to learn enough …

Complexity and robustness

JM Carlson, J Doyle - … of the national academy of sciences, 2002 - National Acad Sciences
Highly optimized tolerance (HOT) was recently introduced as a conceptual framework to
study fundamental aspects of complexity. HOT is motivated primarily by systems from …

Method, system and computer program product for detecting at least one of security threats and undesirable computer files

KR Borders - US Patent 9,055,093, 2015 - Google Patents
US9055093B2 - Method, system and computer program product for detecting at least one of
security threats and undesirable computer files - Google Patents US9055093B2 - Method …

A workload characterization study of the 1998 world cup web site

M Arlitt, T Jin - IEEE network, 2000 - ieeexplore.ieee.org
This article presents a detailed workload characterization study of the 1998 World Cup Web
site. Measurements from this site were collected over a three-month period. During this time …

A survey of web caching schemes for the internet

J Wang - ACM SIGCOMM Computer Communication Review, 1999 - dl.acm.org
The World Wide Web can be considered as a large distributed information system that
provides access to shared data objects. As one of the most popular applications currently …

Link prediction and path analysis using markov chains

RR Sarukkai - Computer networks, 2000 - Elsevier
The enormous growth in the number of documents in the World Wide Web increases the
need for improved link navigation and path analysis models. Link prediction and path …