Web Proxy Cache Replacement Strategies (Record no. 57649)

000 -LEADER
fixed length control field 02968nam a22004935i 4500
001 - CONTROL NUMBER
control field 978-1-4471-4893-7
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421112225.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 121230s2013 xxk| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781447148937
-- 978-1-4471-4893-7
082 04 - CLASSIFICATION NUMBER
Call Number 003.3
100 1# - AUTHOR NAME
Author ElAarag, Hala.
245 10 - TITLE STATEMENT
Title Web Proxy Cache Replacement Strategies
Sub Title Simulation, Implementation, and Performance Evaluation /
300 ## - PHYSICAL DESCRIPTION
Number of Pages X, 103 p. 81 illus., 15 illus. in color.
490 1# - SERIES STATEMENT
Series statement SpringerBriefs in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Background Information -- Artificial Neural Networks -- A Quantitative Study of Web Cache Replacement Strategies using Simulation -- Web Proxy Cache Replacement Scheme Based on Back Propagation Neural Network -- Implementation of a Neural Network Proxy Cache Replacement Strategy in the Squid Proxy Server.
520 ## - SUMMARY, ETC.
Summary, etc This work presents a study of cache replacement strategies designed for static web content. Proxy servers can improve performance by caching static web content such as cascading style sheets, java script source files, and large files such as images. This topic is particularly important in wireless ad hoc networks, in which mobile devices act as proxy servers for a group of other mobile devices. Opening chapters present an introduction to web requests and the characteristics of web objects, web proxy servers and Squid, and artificial neural networks. This is followed by a comprehensive review of cache replacement strategies simulated against different performance metrics. The work then describes a novel approach to web proxy cache replacement that uses neural networks for decision making, evaluates its performance and decision structures, and examines its implementation in a real environment, namely, in the Squid proxy server.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4471-4893-7
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- London :
-- Springer London :
-- Imprint: Springer,
-- 2013.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer communication systems.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer system failures.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer simulation.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Simulation and Modeling.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- System Performance and Evaluation.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2191-5768
912 ## -
-- ZDB-2-SCS

No items available.