[1] 刘磊, 熊小鹏. 最小驻留价值缓存替换算法[J]. 计算机应用, 2013, 33(4): 1018-1022. (LIU L, XIONG X P. Least cache value replacement algorithm [J]. Journal of Computer Applications, 2013, 33(4): 1018-1022.) [2] 秦秀磊, 张文博, 魏峻, 等.云计算环境下分布式缓存技术的现状与挑战[J]. 软件学报, 2013, 24(1): 50-66. (QIN X L, ZHANG W B, WEI J, et al. Progress and challenges of distributed caching techniques in cloud computing [J]. Journal of Software, 2013, 24(1): 50-66.) [3] 卢秉亮, 梅义博, 刘娜. 位置相关查询中基于最小访问代价的缓存替换方法[J]. 计算机应用, 2011, 31(3): 690-693. (LU B L, MEI Y B, LIU N. Cache replacement method based on lowest access cost for location dependent query[J]. Journal of Computer Applications, 2011, 31(3): 690-693.) [4] 肖敬伟, 赵永祥. 基于PageRank的缓存替换策略[J]. 信息技术, 2016(6): 107-110. (XIAO J W, ZHAO Y X. Cache replacement strategy based on PageRank[J]. Information Technology, 2016(6): 107-110.) [5] 石磊, 孟彩霞, 韩英杰. 基于预测的Web缓存替换策略[J]. 计算机应用, 2007, 27(8): 1842-1845. (SHI L, MENG C X, HAN Y J. Web replacement policy based on prediction[J]. Journal of Computer Applications, 2007, 27(8): 1842-1845.) [6] 程思嘉, 张昌宏, 潘帅卿, 等. 基于CP-ABE算法的云存储数据访问控制方案设计[J]. 信息网络安全, 2016(2): 1-6. (CHENG S J, ZHANG C H, PAN S Q, et al. Design on data access control scheme for cloud storage based on CP-ABE algorithm[J]. Netinfo Security, 2016(2): 1-6.) [7] 彭敏, 黄佳佳, 朱佳晖, 等. 基于频繁项集的海量短文本聚类与主题抽取[J]. 计算机研究与发展, 2015, 52(9): 1941-1953. (PENG M, HUANG J J, ZHU J H, et al. Mass of short texts clustering and topic extraction based on frequent itemsets[J]. Journal of Computer Research and Development, 2015, 52(9): 1941-1953.) [8] 肖敬伟.基于数据挖掘的缓存替换算法研究[D]. 北京: 北京交通大学, 2015: 1-66. (XIAO J W. Cache replacement algorithms based on data mining[D]. Beijing: Beijing Jiaotong University, 2015: 1-66.) [9] 陈勇. 基于P2P的内容分发网络及缓存替换算法研究[D]. 成都: 电子科技大学, 2008: 1-79. (CHEN Y. Research on P2P-based content distribution network and cache replacement algorithm[D]. Chengdu: University of Electronic Science and Technology of China, 2008: 1-79.) [10] GOMAA W H, FAHMY A A. A survey of text similarity approaches[J]. International Journal of Computer Applications, 2013, 68(13): 13-18. [11] HARATY R A, ZEITOUNY J. Rule-based data mining cache replacement strategy[J]. International Journal of Data Warehousing & Mining, 2015, 9(1): 56-69. [12] DAS S, AAMODT T M, DALLY W J. Reuse distance-based probabilistic cache replacement[J]. ACM Transactions on Architecture & Code Optimization, 2016, 12(4): 33. [13] GAST N, VAN HOUDT B. Transient and steady-state regime of a family of list-based cache replacement algorithms[C]//SIGMETRICS 2015: Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. New York: ACM, 2015: 123-136. [14] LEE M K, MICHAUD P, SIM J S, et al. A simple proof of optimality for the MIN cache replacement policy[J]. Information Processing Letters, 2015, 116(2): 168-170. [15] LI L, CHEN X, JIANG H, et al. P-CP-ABE: parallelizing ciphertext-policy attribute-based encryption for clouds[C]//Proceedings of the 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. Piscataway, NJ: IEEE, 2016: 575-580. [16] ZOU J, ZHANG Y. Research of the application of CP-ABE algorithm in ABAC model under cloud environment[J]. Journal of Computational Information Systems, 2015, 11(1): 261-268. |