1. Asit, D., Towsley, D.: An approximate analysis of the lru and fifo buffer replacement schemes. SIGMETRICS Perform. Eval. Rev. 18(1), 143–152 (1990)
2. Avella, P., Boccia, M., Canonico, R., Emma, D., Sforza, A., Ventre, G.: Web cache location and network design in vpns (2003), http://citeseer.ist.psu.edu/639771.html
3. Cronin, E., Jamin, S., Danny, C., Yuval, R.: Constrained mirror placement on the internet (2002), http://citeseer.ist.psu.edu/cronin02constrained.html
4. Dantzig, P., Hall, R., Schwartz, M.: A case for caching file objects inside internetworks. In: SIGCOMM 1993, pp. 239–243 (1993)
5. Flajolet, P., Gardy, D., Thimonier, L.: Birthday paradox, coupon collectors, caching algorithms and self-organizing search. Discrete Appl. Math. 39(3), 207–229 (1992)