2022 On The Analysis of Cache Invalidation With LRU Replacement
2022 On The Analysis of Cache Invalidation With LRU Replacement
3, MARCH 2022
Abstract—Caching contents close to end-users can improve the network performance, while causing the problem of guaranteeing
consistency. Specifically, solutions are classified into validation and invalidation, the latter of which can provide strong cache
consistency strictly required in some scenarios. To date, little work on the analysis of cache invalidation has been covered. In this work,
by using conditional probability to characterize the interactive relationship between existence and validity, we develop an analytical
model that evaluates the performance (hit probability and server load) of four different invalidation schemes with LRU replacement
under arbitrary invalidation frequency distribution. The model allows us to theoretically identify some key parameters that affect our
metrics of interest and gain some common insights on parameter settings to balance the performance of cache invalidation. Compared
with other cache invalidation models, our model can achieve higher accuracy in predicting the cache hit probability. We also conduct
extensive simulations that demonstrate the achievable performance of our model.
The value of Tc can be obtained by calculating the unique For Poisson process, the time t is uniformly distributed
root of this equation [23], [24]. over ½0; Tsm ðiÞ
t
3.3 Probability of Validity Fr ði; tÞ ¼ : (8)
Tsm ðiÞ
In this section, we give a basic model to describe whether a
content copy in cache is valid when a request for it arrives. Hence the expected value of Pvm ði; tÞ in the ith interval is
In order to eliminate the influence of the cache capacity
limit, we assume that the cache capacity is infinite and all Z Tsm ðiÞ
contents’ copies have been stored already. Pvm ðiÞ ¼ Pvm ði; tÞdFr ði; tÞ
0
As shown in Fig. 1, the server updates the content m Z Tsm ðiÞ
(9)
according to a point process fTum ðiÞ; i ¼ 0; 1; 2; . . .g where 1 m
¼ ð1 e t Þdt:
Tum ðiÞ represents the time that the update takes place. Thus, 0 Tsm ðiÞ
Authorized licensed use limited to: UNIVERSITAS TELKOM. Downloaded on December 05,2023 at 17:39:42 UTC from IEEE Xplore. Restrictions apply.
658 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 33, NO. 3, MARCH 2022
Hence, on the basis of (5) and (10), the expected value of Phm ðiÞ ¼ Pe;v
m
ðiÞ ¼ Pejv
m
ðiÞ Pvm ðiÞ; (12)
Pvm can be expressed as
or
" m Z #
u ðT Þ
NX Tsm ðiÞ
1
Phm ðiÞ ¼ Pe;v ðiÞ ¼ Pvje ðiÞ Pem ;
m
ð1 e t Þdt
m m
E½Pvm ¼ E lim (13)
T !1 T 0
i¼0
m "Z m # m
where Pejv ðiÞ and Pvje
m
ðiÞ are conditional probabilities. Then
u ðT Þ
NX Ts ðiÞ
1 m t
¼ lim E ð1 e Þdt the average hit probability of content m is
T !1 T 0
i¼0
Z Z m " m #
u ðT Þ
NX
N m ðT Þ 1 ts ðiÞ m Tsm ðiÞ m
¼ lim u ð1 e t ÞdtdF ðtm
s Þ Phm ¼ E lim Ph ðiÞ ; (14)
T !1 T 0 0 T !1 T
i¼0
Z 1 Z tm
1 s m
¼ m ð1 e t ÞdtdF ðtm s Þ: and average hit probability of total contents is
ms 0 0
(11) X
M
Ph ¼ am Phm : (15)
m¼1
The validity probability and hit probability mentioned
below both refer to their respective expected values.
Now we can model the four different schemes of cache
In the model assumptions, it is assumed that the data
invalidation separately and give the hit probability as well
transmission delay is out of consideration. However, based
as server load based on (12), (13), (14) and (15).
on (7), (8), (9) and (11), the influence of transmission delay
on the validity probability can be given as presented in
4.1 Reactive Invalidation
Appendix A, available in the online supplemental material.
Considering that different characteristic time Tc and content
expiration time Tsm have different effects on the analysis of
4 CACHE INVALIDATION WITH LRU REPLACEMENT m
Pejv m
and Pvje , we model the cache behavior in two cases as
In this section, we give a complete model with the consider- follows:
ation of both existence and validity to derive the cache hit
probability and server load. 4.1.1 Tc > Tsm ðiÞ
As illustrated in Fig. 3, the requests for content m are
Assuming that a request Rm 1 arrives at time t as shown in
classified into four types:
Fig. 4a. If it yields a validity event, there must be at least one
non-existence and invalidity: when Rm request arriving in ½0; tÞ (the grey area). Let t0 denote the
1 arrives, there is
no copy of content m existing in the cache. Mean- time that the first request Rm 0 arrives in ½0; tÞ. Since Tc >
while, it is the first request in the interval Tsm ðiÞ and 0 t0 < t < Tsm ðiÞ, we have t0 < t < Tc . That
½Tum ðiÞ; Tum ði þ 1ÞÞ. is to say, there must be a copy of content m existing in cache
existence and validity: the next request Rm at time t and thus Pejv m
ðiÞ ¼ 1. On the basis of (9) and (12),
2 arrives
before the characteristic time Tc and is not the first we have
request in ½Tum ðiÞ; Tum ði þ 1ÞÞ. Z Tsm ðiÞ
non-existence but validity: the third request Rm 3 is also Phm ðiÞ ¼ Pvm ðiÞ ¼
1 m
ð1 e t Þdt: (16)
not the first request in ½Tum ðiÞ; Tum ði þ 1ÞÞ but arrives 0 Tsm ðiÞ
after Tc .
Authorized licensed use limited to: UNIVERSITAS TELKOM. Downloaded on December 05,2023 at 17:39:42 UTC from IEEE Xplore. Restrictions apply.
ZHENG ET AL.: ON THE ANALYSIS OF CACHE INVALIDATION WITH LRU REPLACEMENT 659
Tc
¼ Pm ðiÞ Pvj0t
m
< Tc ðiÞ
Tsm ðiÞ ðejvÞj0t < Tc 4.3 Proactive Invalidation With Renewing
T m ðiÞ Tc m For proactive invalidation with renewing, when the server
þ s m PðvjeÞjTc t < Tsm ðiÞ ðiÞ PejT
m
c t < Ts ðiÞ
m
Ts ðiÞ updates a content, it will push a new content copy to the
Z Tc
1 m Tc m cache to renew rather than to remove the stale one. Hence
¼ m ð1 e t Þdt þ 1 m ð1 e Tc Þ: the invalidity event has no influence on the cache hit behav-
Ts ðiÞ 0 Ts ðiÞ
ior. In other words, as long as a content copy exists, the
(17)
request for it will yield a cache hit. According to (2), we have
Consequently, according to (5), (14), (16) and (17), we mT
have Phm ¼ 1 e c
: (22)
Z Tc Z tm
1 s m
Phm ¼ ð1 e t ÞdtdF ðtm
s Þ 4.4 Proactive Invalidation With Optional Renewing
mms 0 0
Z 1 n Z Tc Different from proactive invalidation with renewing, proac-
1 m (18)
þ ð1 e t Þdt tive invalidation with optional renewing only updates the
mmsTc 0 top Mp popular contents. For unpopular ones, it will remove
o
m Tc
þ ðtm
s Tc Þð1 e Þ dF ðtm
s Þ:
the stale copies of them from the cache. Let us denote the hit
probabilities of popular contents and unpopular contents as
Phm pop and Phm unpop respectively. Thus, we have
4.2 Proactive Invalidation With Removing (
Pmh pop ; m M p ;
For proactive invalidation with removing, not only eviction Ph ¼
m
m
: (23)
but also invalidity makes content copies nonexistent in the P h unpop ; otherwise:
cache, causing the cache to be not always full. With regard
to this fact, the cache occupancy size O can be represented where
by means of two bounds: (i)when cache is full, evidently the m T 00
first bound is C, (ii)otherwise, only the valid contents can Phm pop ¼ 1 e c ; (24)
stay in the cache P and the second bound can be expressed and
approximately as M m¼1 1 Pv . We take the minimum value
m
R Tc00 R tm m
of both Phm unpop ¼ 1
mm ð1 e t ÞdtdF ðtm
s
s Þ
s 0 n R 00
0
R1
( ) þ m1m T 00
Tc m t
XM 0 ð1 e Þdt (25)
s c o
O min C; 1 Pv
m
00 m 00
Tc
þðtm
s Tc Þð1 e Þ dF ðtm s Þ:
m¼1
( Z 1 Z tm )
XM
1 s
m t
¼ min C; ð1 e ÞdtdF ðts Þ :
m
The value of new characteristic time Tc00 can also be
mm 0
m¼1 s 0
obtained by calculating the fixed point equation as follows:
(19)
X
M X
Mp X
M
In addition, the time that a content copy moves from the O0 ¼ Phm ¼ Phm pop þ Phm unpop ; (26)
top to the bottom and finally to the outside of the cache m¼1 m¼1 m¼Mp þ1
Fig. 6. Comparison between Detti model and our model on reactive Fig. 7. Comparison between Detti model and our model on proactive
invalidation. invalidation with removing.
20 req=s. The request probability is modeled by a Zipf distri- Fig. 7 shows the comparison between Detti model and
bution with exponent z ¼ 0:8. In addition, for proactive our model on proactive invalidation. The curves of Detti
invalidation with optional renewing, we set Mp ¼ 20. With- model and our model are almost coincided and make a
out loss of generality, it is supposed that the higher the quite good agreement on fitting the hit ratio of the simula-
request probability of the content, the lower the content ID. tion of proactive invalidation. In Figs. 6 and 7, the mean
expiration time is all set to 10s.
5.1 Cache Hit Probability Fig. 8 shows the impact of different mean expiration time
For measuring the accuracy of our model, we denote the hit mms on the hit probability Ph . Since the invalidity event makes
probability error as no difference to the cache hit behavior in the proactive
invalidation with renewing, the curve of which can be
jPhmodel Phsim j regarded as a baseline that is equivalent to the hit probabil-
d¼ ; (31) ity without consideration of content expiration. From Fig. 8,
Phsim
we can see that the hit probabilities of reactive invalidation
where Phmodel and Phsim are the mean hit probabilities of the and proactive invalidation with removing increase gradu-
model and simulation respectively. ally and approach the baseline while the mean expiration
Fig. 5 characterizes the hit probability of individual con- time increasing. The smaller the mean expiration time, the
tents with four schemes of cache invalidation. Only the first greater the impact of it on the hit probability. Additionally,
50 contents are shown to avoid cluttering the figure. For com- it is noticed that proactive invalidation with removing has a
prehensive assessments, we set up three distributions of higher hit probability than reactive invalidation, because
expiration time Tsm which are constant (Figs. 5a, 5d, 5g and the former leaves more space for caching by removing stale
5j), uniformly distributed over [0,20] (Figs. 5b, 5e, 5h, and 5k) content copies from the cache.
and exponentially distributed with mean rate 0:1req=s The hit probability of proactive invalidation with optional
(Figs. 5c, 5f, 5i, and 5l). In particular, Figs. 5j, 5k, and 5l show renewing in Fig. 8 is distinctive. The curve of it increases
an apparent piecewise point at ID ¼ 20 for reasons of only when mm s is less than 4s and then decreases and approaches
the top 20 contents being renewed. As revealed in above fig- the baseline from above. To explain this phenomenon, we
ures, the analytical curves match the simulation results sur- recall the definition of the average hit probability Ph first.
prisingly within the maximum error of less than 1.2 percent, According to (15), highly popular contents contribute a lot to
which illustrates the extremely high accuracy of our model. Ph . Therefore, when mm s is small, there is enough space to
Given space limitations, we only consider Tsm with a store the popular contents in the cache, making the hit proba-
exponential distribution with mean rate 1=mm s in the follow- bility of them close to 1. With the increase of mms (but still very
ing part of this paper. small), the hit probability of unpopular contents grows, thus
Fig. 6 shows the comparison between Detti model and causing the overall hit probability to be higher. When mm s is
our model on reactive invalidation. The results of the simu- further larger, unpopular contents will crowd out popular
lations of reactive invalidation and no invalidation are also ones in the cache, which lessens the hit popularity of the lat-
presented in Fig. 6. It is obvious to see that the Detti model ter and then leads to a reduction in the overall hit probability.
for reactive invalidation, in practice, is to describe the no Also be noted that, when the cache is in a critical state of satu-
invalidation where the requests for outdated contents ration or unsaturation (corresponding to the interval [4,8] in
stored in the cache are also counted for a cache hit. The error Fig. 8), the approximate Equation (27) provides a slight error
of Detti model between the simulation of no invalidation is of less than 4.28 percent.
0.34 percent, but it is 22.11 percent between the simulation Fig. 9 shows the impact of different cache capacities C on
of reactive invalidation. With this just the opposite is, the the hit probability Ph . As the cache capacity increases, the hit
error of our model between the simulation of reactive invali- probabilities of the four invalidation schemes grow. How-
dation is only 0.24 percent. ever, due to the impact of content expiration, (i) the curves of
Authorized licensed use limited to: UNIVERSITAS TELKOM. Downloaded on December 05,2023 at 17:39:42 UTC from IEEE Xplore. Restrictions apply.
662 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 33, NO. 3, MARCH 2022
Fig. 8. Hit probability versus mean expiration time, by fixing cache capac- Fig. 10. Server load versus mean expiration time, by fixing cache capac-
ity to 100. ity to 100.
Fig. 11. Server load versus cache capacity, by fixing mean expiration Fig. 12. Hit probability versus Mp =C for proactive invalidation with
time to 10s. optional renewing, by fixing mean expiration time to 10s.
Fig. 15. The hit probabilities of four invalidation schemes for individual
Fig. 14. The distribution of content expiration time counted from Wikipe- contents under the norm distribution of expiration time with m ¼ 45547
dia from January 1, 2015 to December 31, 2019, which is fitted with a and s ¼ 2630.
norm distribution whose shape parameters are m ¼ 45547 and s ¼ 2630.
to note that the APIs only offer the number of page edited
times and corresponding date, and we use the interval
between two consecutive editing events as the content expi-
ration time. In the following part, first, we analyze the real
distribution of content expiration time. Second, we compare
four invalidation schemes with real distribution of content
expiration time. Third, we reduce the mean expiration time
to reflect the effect of invalidation on cache hit probability.
Fig. 14 shows the real distribution of content expiration
time in Wikipedia. The data ranges from January 1, 2015 to
December 31, 2019. Since the smallest time interval is day in
the data, we use the ratio of the number of all page edits to
the number of edited pages for the day to approximately
represent the single page edits per day, and then we use the
ratio of 24 3600ðsÞ to the single page edited times per day
to present the expiration time of the single page. The count- Fig. 16. The hit probability of four invalidation schemes versus mean
ing result approximately follows a norm distribution with expiration time. The values of mean expiration time are 45s, 455s, 4554s
and 45547s respectively.
m ¼ 45547 and s ¼ 2630.
Similarly, to avoid cluttering the figure, only the hit prob-
abilities of the top 50 contents are marked in Fig. 15. Since
the hit probability of proactive invalidation with renewing four invalidation schemes gradually diverge, which means
is not affected by the expiration time, the curve of it can be that the impact of invalidation on hit probability is gradu-
regarded as a curve without invalidation. It is clearly to see ally strengthened. The hit probabilities of the four invalida-
that the curves of four invalidation schemes are almost coin- tion schemes are proactive optional renewing, proactive
cide. That is because the mean content expiration time is renewing, proactive removing and reactive from the largest
45547s which is large enough to eliminate the impact of to the smallest, which is also consistent with the order in
invalidation on cache hit probability. The content is evicted Fig. 8.
from the cache due to the cache capacity limitation far Fig. 17 shows the hit probability of proactive invalidation
before it reaches the expiration time. with optional renewing for individual contents under
Fig. 16 shows the impact of different mean expiration N ð45547; 26302 Þ, N ð4554; 262:92 Þ, N ð455; 26:32 Þ and N ð45; 2:62 Þ
time on the hit probability of four invalidation schemes. It in descending order of m respectively. For proactive invali-
has been seen that the large mean expiration time has dation with optional renewing, the hit probabilities of popu-
scarcely influence upon hit probability in Fig. 15. Thus, we lar contents and unpopular contents are different. However,
decrease the mean expiration time, m, to improve the influ- this difference is not significant in the curve due to the large
ence of invalidation. Besides, in order to maintain the shape mean expiration time as shown in Figs. 5a, 5b, and 5c. Only
of the norm distribution, the other parameter, s, is scaled when the mean expiration time is relatively small as shown
down. The distributions of expiration time in Fig. 16 in Fig. 5d, the difference become obvious and an apparent
are N ð45547; 26302 Þ, N ð4554; 262:92 Þ, N ð455; 26:32 Þ and piecewise point appears at ID = 20. The advantages of pro-
N ð45; 2:62 Þ in descending order of m. As shown in Fig. 16, active invalidation with optional renewing over other three
with the reduction of mean expiration time, the curve of schemes also become notable as shown in Fig. 16 at m ¼ 45.
Authorized licensed use limited to: UNIVERSITAS TELKOM. Downloaded on December 05,2023 at 17:39:42 UTC from IEEE Xplore. Restrictions apply.
ZHENG ET AL.: ON THE ANALYSIS OF CACHE INVALIDATION WITH LRU REPLACEMENT 665
6 CONCLUSION
In this paper, we address the problem of modeling four
schemes of cache invalidation with LRU replacement. By
applying conditional probability to characterize the interac-
tions between existence and validity, we derive analytical
expressions for cache hit probability and server load under
arbitrary frequency distribution. The simulation results
demonstrate that our model is able to achieve more extensi-
bility and exceedingly high accuracy than the Detti model.
Also, we compare the performance of four different invali-
Fig. 17. The hit probability of proactive invalidation with optional renew-
dation schemes, among which the proactive invalidation
ing for individual contents under the norm distribution of expiration time. with optional renewing has better scalability and, further,
Only the top 20 contents are positively renewed. can obtain the performance balance by reasonable parame-
ter settings.
5.5 The Summary of Simulation Results and Though the model of invalidation presented here is for
Insights LRU caches, we believe it can be adapted to other caches
In this section, we measure the performance of the proposed with which the characteristic time is able to be associated.
model, draw comparisons with an existing model, assess In addition, the insights gained through a single cache also
the invalidation impact on the LRU cache and compare four can be expanded to guide the design of invalidation
different schemes of cache invalidation. Through the above schemes in cache networks. Furthermore, how the time-
simulations, some important results and insights can be varying content popularity, future traffic (e.g., IoT) as well
summarized as follows: as the distribution of contents’ copies affect the model of
cache invalidation are also attractive topics. We would keep
Our model can achieve a fairly high accuracy on pre- on investigating these issues in the future.
dicting the hit probability and server load of four
cache invalidation schemes. ACKNOWLEDGMENTS
Our model is more accurate than the currently pro-
posed model in calculating the hit probability of the This work was supported in part by the National Key R&D
reactive invalidation. Program of China under Grant 2020YFA0711400, in part by
Due to the mechanism of positively updating popu- the Key R&D Program of Anhui Province in 2020 under Grant
lar contents, the invalidation with proactive optional 202004a05020078 and in part by the CETC Joint Advanced
renewing has a better performance against other Reasearch Foundation under Grant 6141B08080101. We also
invalidation schemes when the cache capacity is would like to acknowledge the supports from the Institute of
tight and the content expires frequently. Artificial Intelligence, Hefei Comprehensive National Science
When the cache is in the critical state of saturation Center and the Institute of Advanced Technology, University
and unsaturation, the hit probability of the invalida- of Science and Technology of China.
tion with proactive optional renewing can reach
maximum. Surprisingly, this cache state can be real- REFERENCES
ized by setting Mp in accordance with our model. [1] S. Podlipnig and L. B€ osz€ormenyi, “A survey of web cache replace-
In general, the proactive invalidation with proactive ment strategies,” ACM Comput. Surv. (CSUR), vol. 35, no. 4,
pp. 374–398, Dec. 2003.
optional renewing can be prioritized when the sys- [2] S. Lee, I. Yeom, and D. Kim, “T-caching: Enhancing feasibility of
tem requires strong cache consistency. Particularly, in-network caching in ICN,” IEEE Trans. Parallel Distrib. Syst., vol.
by setting Mp to reasonable values in different scenes 31, no. 7, pp. 1486–1498, Jul. 2020.
as we mentioned in Section 5.3, this invalidation [3] J. Jung, A. W. Berger, and H. Balakrishnan, “Modeling TTL-based
internet caches,” in Proc. IEEE 22nd Annu. Joint Conf. IEEE Comput.
scheme can achieve better performance on balancing Commun. Soc., 2003, pp. 417–426.
the hit probability and server load. [4] J. Gwertzman and M. I. Seltzer, “World wide web cache consis-
In the simulation with the real distribution of content tency,” in Proc. USENIX Annu. Techn. Conf., 1996, pp. 141–152.
[5] O. Bahat and A. M. Makowski, “Measuring consistency in TTL-
expiration time, the effect of invalidation on cache based caches,” Perform. Eval., vol. 62, no. 1–4, pp. 439–455, 2005.
performance is obvious only when the mean expira- [6] N. C. Fofack, P. Nain, G. Neglia, and D. Towsley, “Analysis of
tion time is small. TTL-based cache networks,” in Proc. 6th Int. ICST Conf. Perform.
In some networks with real-time features (e.g., IoT Eval. Methodol. Tools, 2012, pp. 1–10.
[7] C. Gray and D. Cheriton, “Leases: An efficient fault-tolerant
networks), the content expiration time is small. If the mechanism for distributed file cache consistency,” ACM SIGOPS
server performance is high and the network Operating Syst. Rev., vol. 23, no. 5, pp 202–210, 1989.
Authorized licensed use limited to: UNIVERSITAS TELKOM. Downloaded on December 05,2023 at 17:39:42 UTC from IEEE Xplore. Restrictions apply.
666 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 33, NO. 3, MARCH 2022
[8] B. Krishnamurthy and C. E. Wills, “Piggyback server invalidation Tao Yang received the BS degree in 2019 from
for proxy cache coherency,” Comput. Netw. ISDN Syst., vol. 30, the Department of Automation, University of Sci-
no. 1–7, pp. 185–193, 1998. ence and Technology of China, Hefei, China,
[9] G. Cao, “A scalable low-latency cache invalidation strategy for where he is currently working toward the MS
mobile environments,” IEEE Trans. Knowl. Data Eng., vol. 15, degree with the Department of Automation. His
no. 5, pp. 1251–1265, 2003. current research interests include caching and
[10] J. Jing, A. Elmagarmid, A. S. Helal, and R. Alonso, “Bit-sequences: modeling of NDN.
An adaptive cache invalidation method in mobile client/server
environments,” Mobile Netw. Appl., vol. 2, no. 2, pp. 115–127, 1997.
[11] A. Detti, L. Bracciale, P. Loreti, and N. B. Melazzi, “Modeling LRU
cache with invalidation,” Comput. Netw., vol. 134, pp. 55–65, 2018.
[12] M. Rabinovich and O. Spatscheck, Web Caching and Replication.
Boston, MA, USA: Addison-Wesley, 2002. Yuanzhi Kan received the BS degree in 2015
[13] R. Fielding et al., “Hypertext transfer protocol–http/1.1,” 1999. from the Department of Automation, University of
[Online]. Available: https://www.w3.org/Protocols/rfc2616/ Science and Technology of China, Hefei, China,
rfc2616.html where he is currently working toward the MS
[14] A. Iyengar, E. Nahum, A. Shaikh, and R. Tewari, “Web caching, degree with the Department of Automation. His
consistency, and content distribution,” The Practical Handbook of current research interests include caching and
Internet Computing, Boca Raton, FL, USA: CRC Press, 2004. modeling of NDN.
[15] A. Iyengar, E. Nahum, A. Shaikh, and R. Tewari, “Enhancing web
performance,” in Proc. IFIP World Comput. Congr., 2002, pp. 95–126.
[16] K.-L. Tian, J. Cai, and B. C. Ooi, “An evaluation of cache invalida-
tion strategies in wireless environments,” IEEE Trans. Parallel Dis-
trib. Syst., vol. 12, no. 8, pp. 789–807, Aug. 2001.
Xiaobin Tan received the BS and PhD degrees
[17] E. J. O’neil, P. E. O’neil, and G. Weikum, “The LRU-K page
from the University of Science and Technology of
replacement algorithm for database disk buffering,” ACM SIG-
China (USTC), Hefei, China, in 1996 and 2003,
MOD Rec., vol. 22, no. 2, pp. 297–306, 1993.
respectively. He is currently an associate professor
[18] D. Lee et al., “LRFU: A spectrum of policies that subsumes the
with the School of Information Science and Tech-
least recently used and least frequently used policies,” IEEE Trans.
nology, USTC. His research interests include net-
Comput., vol. 50, no. 12, pp. 1352–1361, Dec. 2001.
work performance optimization and information
[19] W. F. King, “Analysis of paging algorithms,” in Proc. IFIP Congr.,
security.
1971, pp. 485–490.
[20] P. Flajolet, D. Gardy, and L. Thimonier, “Birthday paradox, cou-
pon collectors, caching algorithms and self-organizing search,”
Discrete Appl. Math., vol. 39, no. 3, pp. 207–229, 1992.
[21] A. Dan and D. Towsley, “An approximate analysis of the LRU and
FIFO buffer replacement schemes,” ACM SIGMETRICS Perform. Jian Yang (Senior Member, IEEE) received the
Eval. Rev., vol. 18, no. 1, pp. 143–152, Apr. 1990. BS and PhD degrees from the University of Sci-
[22] E. J. Rosensweig, J. Kurose, and D. Towsley, “Approximate models ence and Technology of China (USTC), Hefei,
for general cache networks,” in Proc. IEEE INFOCOM, 2010, pp. 1–9. China, in 2001 and 2006, respectively. From 2006
[23] H. Che, Y. Tung, and Z. Wang, “Hierarchical Web caching sys- to 2008, he was a postdoctoral scholar with the
tems: Modeling, design and experimental results,” IEEE J. Sel. Department of Electronic Engineering and Infor-
Areas Commun., vol. 20, no. 7, pp. 1305–1314, Sep. 2002. mation Science, USTC. Since 2008, he has been
[24] C. Fricker, P. Robert, and J. Roberts, “A versatile and accurate an associate professor with the Department of
approximation for LRU cache performance,” in Proc. 24th Int. Tele- Automation, USTC. He is currently a professor
traffic Congr., 2012, pp. 1–8. with the School of Information Science and Tech-
[25] V. Martina, M. Garetto, and E. Leonardi, “A unified approach to nology, USTC. His research interests include
the performance analysis of caching systems,” in Proc. IEEE Conf. future network, distributed system design, modeling and optimization,
Comput. Commun., 2014, pp. 2040–2048. and multimedia over wired and wireless and stochastic optimization. He
[26] X. Tang, H. Chi, and S. T. Chanson, “Optimal replica placement was the recipient of Lu Jia-Xi Young Talent Award from the Chinese
under TTL-based consistency,” IEEE Trans. Parallel Distrib. Syst., Academy of Sciences in 2009.
vol. 18, no. 3, pp. 351–363, Mar. 2007.
[27] M. Amadeo, C. Campolo, G. Ruggeri, G. Lia, and A. Molinaro,
“Caching transient contents in vehicular named data networking: Xiaofeng Jiang (Member, IEEE) received the BS
A performance analysis,” Sensors, vol. 20, no. 7, 2020, Art. no. 1985. and PhD degrees from the University of Science
[28] S. Vural, N. Wang, P. Navaratnam, and R. Tafazolli, “Caching and Technology of China (USTC), Hefei, China,
transient data in internet content routers,” IEEE/ACM Trans. in 2008 and 2013, respectively. He is currently an
Netw., vol. 25, no. 2, pp. 1048–1061, Apr. 2017. associate research fellow with the School of Infor-
[29] E. Leonardi and G. L. Torrisi, “Least recently used caches under mation Science and Technology, USTC. His
the shot noise model,” in Proc. IEEE Conf. Comput. Commun., 2015, research interests include partially observable
pp. 2281–2289. arkov decision processes (POMDPs), big data
[30] S. M. Ross et al., Stochastic Processes. New York, NY, USA: Wiley, and higher-order tensor analysis, future network
1996. performance analysis and modeling, and cogni-
tive wireless and radar counter measures.
Quan Zheng received the BS degree in produc-
tion process automation from the Dalian Univer-
sity of Technology, Dalian, China, in 1992, and " For more information on this or any other computing topic,
the MS degree in automatic control theory and please visit our Digital Library at www.computer.org/csdl.
application and the PhD degree in computer
software and theory from the University of Sci-
ence and Technology of China, Hefei, China, in
1995 and 2003, respectively. He is currently an
associate professor with the Department of
Automation and the deputy director of Labora-
tory for Future Networks. His research interests
include video semantic retrieval, media content distribution, video qual-
ity detection, and future networks.
Authorized licensed use limited to: UNIVERSITAS TELKOM. Downloaded on December 05,2023 at 17:39:42 UTC from IEEE Xplore. Restrictions apply.