A cache replacement policy is only "optimally efficient" in relation to the access patterns of the context in which it is used.
Investigate and implement/generate:
- A testing harness to comparatively benchmark different policies
- Data sets to simulate a broad range of access patterns