{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T16:25:46Z","timestamp":1694622346551},"reference-count":19,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2004,2,1]],"date-time":"2004-02-01T00:00:00Z","timestamp":1075593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004,2,1]]},"abstract":"An archive is a file containing several related files. Many Internet resources, such as freeware, shareware and trail software, are often packaged into archives for easy installation and taking. Additionally, thousands of users search for archives and download them from different sources everyday. In this paper, previous research on archive downloading is extended via proxy cache to support archive searching. Internet proxy cache servers are used to gather a significant number of Web pages, detect those that contain archive links, and then use the obtained data to search archives by description or filename. Two schemes, iterative and backtracking, are proposed to obtain Web pages with archive links. The experimental results indicate that the precision that both of the schemes can achieve is about the same; however, the backtracking scheme reduces the number of checked pages by a factor of 26. Finally, a real system was implemented to demonstrate the proposed approaches.<\/jats:p>","DOI":"10.1108\/10662240410516309","type":"journal-article","created":{"date-parts":[[2004,3,3]],"date-time":"2004-03-03T23:50:21Z","timestamp":1078357821000},"page":"34-47","source":"Crossref","is-referenced-by-count":1,"title":["Archive knowledge discovery by proxy cache"],"prefix":"10.1108","volume":"14","author":[{"given":"Hsiang\u2010Fu","family":"Yu","sequence":"first","affiliation":[]},{"given":"Yi\u2010Ming","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Li\u2010Ming","family":"Tseng","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020720214297700_B1","doi-asserted-by":"crossref","unstructured":"Amento, B., Terveen, L. and Hill, W. (2000), \u201cDoes \u2018authority\u2019 mean quality? Predicting expert quality ratings of Web documents\u201d, Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 24\u201028 July, pp. 296\u2010303.","DOI":"10.1145\/345508.345603"},{"key":"key2022020720214297700_B2","doi-asserted-by":"crossref","unstructured":"Arasu, A., Cho, J., Garcia\u2010Molina, H., Paepcke, A. and Raghavan, S. (2001), \u201cSearching the Web\u201d, ACM Transactions on Internet Technologies, Vol. 1 No. 1, August, pp. 2\u201043.","DOI":"10.1145\/383034.383035"},{"key":"key2022020720214297700_B3","doi-asserted-by":"crossref","unstructured":"Deutsch, P. (1992), \u201cResource discovery in an Internet environment \u2013 the Archie approach\u201d, Electronic Networking: Research, Applications and Policy, Vol. 2 No. 1, Spring, pp. 45\u201051.","DOI":"10.1108\/eb047253"},{"key":"key2022020720214297700_B4","unstructured":"Distributed System Laboratory, the Department of EE, National Cheng Kung University, Taiwan (2002), \u201cFtpLocate \u2013 make your own FTP search engine\u201d, available at: http:\/\/ftp.ee.ncku.edu.tw\/ftplocate\/readme.english.html"},{"key":"key2022020720214297700_B5","unstructured":"Emtage, A. and Deutsch, P. (1992), \u201cArchie \u2013 an electronic directory service for the Internet\u201d, Proceedings of the Winter 1992 USENIX Conference, pp. 93\u2010110."},{"key":"key2022020720214297700_B6","doi-asserted-by":"crossref","unstructured":"Faloutsos, C. and Christodoulakis, S. (1984), \u201cSignature files: an access method for documents and its analytical performance evaluation\u201d, ACM Transactions on Information System, Vol. 2 No. 4, October, pp. 267\u201088.","DOI":"10.1145\/2275.357411"},{"key":"key2022020720214297700_B7","doi-asserted-by":"crossref","unstructured":"Fielding, R., Gettys, J., Mogul, J., Frystyk, H. and Berners\u2010Lee, T. (1999), \u201cHypertext transfer protocol \u2013 HTTP\/1.1\u201d, RFC 2616, June.","DOI":"10.17487\/rfc2616"},{"key":"key2022020720214297700_B8","unstructured":"FreeBSD (2003), available at: www.freebsd.org"},{"key":"key2022020720214297700_B9","doi-asserted-by":"crossref","unstructured":"Kleinberg, J.M. (1999), \u201cAuthoritative sources in a hyperlinked environment\u201d, Journal of ACM, Vol. 46 No. 6, pp. 604\u201032.","DOI":"10.1145\/324133.324140"},{"key":"key2022020720214297700_B10","doi-asserted-by":"crossref","unstructured":"Manber, U. and Myers, G. (1993), \u201cSuffix arrays: a new method for on\u2010line string searches\u201d, SIAM Journal of Computer, Vol. 22 No. 5, October, pp. 935\u201048.","DOI":"10.1137\/0222058"},{"key":"key2022020720214297700_B11","doi-asserted-by":"crossref","unstructured":"Postel, J. and Reynolds, J. (1985), \u201cFile transfer protocol\u201d, RFC 959.","DOI":"10.17487\/rfc0959"},{"key":"key2022020720214297700_B12","doi-asserted-by":"crossref","unstructured":"Russell, M. and Hopkins, T. (1998), \u201cCFTP: a caching FTP server\u201d, Computer Networks, Vol. 30 No. 22\/23, pp. 2211\u201022.","DOI":"10.1016\/S0169-7552(98)00240-2"},{"key":"key2022020720214297700_B13","unstructured":"Salton, G. (1988), Automatic Text Processing, Addision\u2010Wesley Series in Computer Science, Addision\u2010Wesley\/Longman, Reading, MA."},{"key":"key2022020720214297700_B14","unstructured":"Squid Internet Object Cache (2003), available at: http:\/\/squid.nlanr.net\/Squid"},{"key":"key2022020720214297700_B15","unstructured":"Tornado Technologies Co. (2003), available at: www.tornado.com.tw\/"},{"key":"key2022020720214297700_B16","unstructured":"Witten, I., Moffat, A. and Bell, T. (1999), Managing Gigabytes: Compressing and Indexing Documents and Images, 2nd ed., Morgan Kaufmann, San Francisco, CA."},{"key":"key2022020720214297700_B17","doi-asserted-by":"crossref","unstructured":"Yu, H.\u2010F. and Tseng, L.\u2010M. (2002), \u201cAbnormal Web usage control by proxy strategies\u201d, Internet Research: Electronic Networking Applications and Policy, Vol. 12 No. 1, pp. 66\u201075.","DOI":"10.1108\/10662240210415835"},{"key":"key2022020720214297700_B18","doi-asserted-by":"crossref","unstructured":"Yu, H.\u2010F., Chen, Y.\u2010M., Wang, S.\u2010Y. and Tseng, L.\u2010M. (2003), \u201cImproving Internet archive service through proxy cache\u201d, Internet Research: Electronic Networking Applications and Policy, Vol. 13 No. 1, pp. 61\u201071.","DOI":"10.1108\/10662240310458387"},{"key":"key2022020720214297700_B19","unstructured":"Zipf, G. (1949), Human Behavior and the Principle of Least\u2010Effort, Addison\u2010Wesley, Cambridge, MA."}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/10662240410516309","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240410516309\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240410516309\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,7]],"date-time":"2022-02-07T21:24:24Z","timestamp":1644269064000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240410516309\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,2,1]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2004,2,1]]}},"alternative-id":["10.1108\/10662240410516309"],"URL":"https:\/\/doi.org\/10.1108\/10662240410516309","relation":{},"ISSN":["1066-2243"],"issn-type":[{"value":"1066-2243","type":"print"}],"subject":[],"published":{"date-parts":[[2004,2,1]]}}}