

Author: Roy Sourav
Publisher: Springer Publishing Company
ISSN: 0885-7458
Source: International Journal of Parallel Programming, Vol.38, Iss.3-4, 2010-06, pp. : 277-287
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


The Kendra cache replacement policy and its distribution
By McCann J.A.
World Wide Web, Vol. 3, Iss. 4, 2000-12 ,pp. :




By Kumar Ajey Sarje Anil K. Misra Manoj
International Journal of Ad Hoc and Ubiquitous Computing, Vol. 5, Iss. 1, 2009-12 ,pp. :

