{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T05:50:04Z","timestamp":1763704204602},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2003,4,1]],"date-time":"2003-04-01T00:00:00Z","timestamp":1049155200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2003,4]]},"DOI":"10.1109\/tnet.2003.810312","type":"journal-article","created":{"date-parts":[[2003,4,23]],"date-time":"2003-04-23T14:28:06Z","timestamp":1051108086000},"page":"300-313","source":"Crossref","is-referenced-by-count":72,"title":["End-to-end WAN service availability"],"prefix":"10.1109","volume":"11","author":[{"given":"M.","family":"Dahlin","sequence":"first","affiliation":[]},{"given":"B.V.","family":"Chandra","sequence":"additional","affiliation":[]},{"family":"Lei Gao","sequence":"additional","affiliation":[]},{"given":"A.","family":"Nayate","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"trivedi","year":"2002","journal-title":"Probability and Statistics with Reliability Queuing and Computer Science Applications"},{"key":"ref38","author":"tomlinson","year":"2000","journal-title":"Extensible proxy services framework"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/12.54838"},{"key":"ref32","first-page":"139","article-title":"mining longest repeating subsequences to predict world wide web surfing","author":"pitkow","year":"1999","journal-title":"Proc Usenix Symp Internet Technologies and Systems"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.2172\/551971"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/235160.235164"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.1999.776529"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/224057.224070"},{"key":"ref35","author":"snedecor","year":"1980","journal-title":"Statistical Methods"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1145\/316194.316233","article-title":"the end-to-end effects of internet path selection","author":"savage","year":"1999","journal-title":"Proc ACM Sigcomm"},{"key":"ref10","author":"dahlin","year":"2002","journal-title":"End-to-end WAN service availability (extended version)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/DANCE.2002.1003502"},{"key":"ref11","first-page":"127","article-title":"prefetching hyperlinks","author":"duchamp","year":"1999","journal-title":"Proc Usenix Symp Internet Technologies and Systems"},{"key":"ref12","first-page":"25","article-title":"the measured access characteristics of world-wide-web client proxy caches","author":"duska","year":"1997","journal-title":"Proc Usenix Symp Internet Technologies and Systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1998.665101"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.1995.513454"},{"key":"ref15","article-title":"the effect of heavy-tailed job size distributions on computer system design","author":"harchol-balter","year":"1999","journal-title":"ASA-IMA Conf Applications of Heavy Tailed Distributions in Economics Engineering and Statistics"},{"key":"ref16","author":"hennessy","year":"1996","journal-title":"Computer Architecture A Quantitative Approach"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/35037.35059"},{"key":"ref18","first-page":"179","author":"jain","year":"1991","journal-title":"The Art of Computer Systems Performance Analysis"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/12.580429"},{"key":"ref28","year":"2001","journal-title":"Dataplot Reference Manual NIST Handbook Number 148"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-1283-9_23"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749296"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1997.631176"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.810312"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266708"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372059"},{"key":"ref8","author":"d agostino","year":"1986","journal-title":"Goodness-of-Fit Techniques"},{"key":"ref7","author":"cunha","year":"1995","journal-title":"Characteristics of WWW traces"},{"key":"ref2","year":"2000","journal-title":"Internet Content Adaptation Protocol (ICAP) DS-2326"},{"key":"ref9","author":"dahlin","year":"2000","journal-title":"Using mobile extensions to support disconnected services"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1145\/502059.502048","article-title":"resilient overlay networks","author":"andersen","year":"2001","journal-title":"Proc 18th ACM Symp Operating Systems Principles"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319153"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/146941.146942"},{"key":"ref45","first-page":"25","article-title":"organization-based analysis of web-object sharing and caching","author":"wolman","year":"1999","journal-title":"Proc Usenix Symp Internet Technologies and Systems"},{"key":"ref48","author":"zhang","year":"2000","journal-title":"The stationarity of Internet path properties Routing loss and throughput"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/35.391440"},{"key":"ref47","first-page":"105","article-title":"using smart clients to build scalable services","author":"yoshikawa","year":"1997","journal-title":"Proc Usenix Technical Conf"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WIAPP.1999.788018"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(01)00408-X"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1999.781062"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060320"},{"key":"ref23","first-page":"13","article-title":"exploring the bounds of web latency reduction from caching and prefetching","author":"kroeger","year":"1997","journal-title":"Proc Usenix Symp Internet Technologies and Systems"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1287\/opre.30.2.223"},{"key":"ref26","author":"moissis","year":"1994","journal-title":"SYBASE Replication Server A Practical architechture for distributing and sharing corporate information"},{"key":"ref43","author":"wessels","year":"1998","journal-title":"Squid Internet object cache"},{"key":"ref25","first-page":"1","article-title":"scalable web caching of frequently updated objects using reliable multicast","author":"li","year":"1999","journal-title":"Proc Usenix Symp Internet Technologies and Systems"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/90\/26877\/01194825.pdf?arnumber=1194825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T15:51:14Z","timestamp":1638201074000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1194825\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,4]]},"references-count":48,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2003,4]]}},"URL":"https:\/\/doi.org\/10.1109\/tnet.2003.810312","relation":{},"ISSN":["1063-6692"],"issn-type":[{"value":"1063-6692","type":"print"}],"subject":[],"published":{"date-parts":[[2003,4]]}}}