{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T02:10:02Z","timestamp":1746324602989,"version":"3.40.4"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319095806"},{"type":"electronic","value":"9783319095813"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09581-3_13","type":"book-chapter","created":{"date-parts":[[2014,8,2]],"date-time":"2014-08-02T11:20:14Z","timestamp":1406978414000},"page":"185-199","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Scalable P2P RIA Crawling System with Partial Knowledge"],"prefix":"10.1007","author":[{"given":"Khaled","family":"Ben Hafaiedh","sequence":"first","affiliation":[]},{"given":"Gregor","family":"von Bochmann","sequence":"additional","affiliation":[]},{"given":"Guy-Vincent","family":"Jourdan","sequence":"additional","affiliation":[]},{"given":"Iosif Viorel","family":"Onut","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,3]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Mirtaheri, S.M., von Bochmann, G., Jourdan, G.V., Onut, I.V.: GDist-RIA Crawler: a greedy distributed crawler for Rich Internet Applications. In: Noubir, G., Raynal, M. (eds.) NETYS 2014, LNCS 8593, pp. 200\u2013214. Springer, Heidelberg (2014)","key":"13_CR1","DOI":"10.1007\/978-3-319-09581-3_14"},{"doi-asserted-by":"crossref","unstructured":"Zhang, X., Wang, H.: AJAX crawling scheme based on Document Object Model. In: 4th International Conference on Computational and Information Sciences (ICCIS), China, Chongqing, pp. 1198\u20131201 (2012)","key":"13_CR2","DOI":"10.1109\/ICCIS.2012.61"},{"unstructured":"Choudhary, S., Dincturk, M.E., Mirtaheri, S.M., Moosavi, A., von Bochmann, G., Jourdan, G.V., Onut, I.V.: Crawling rich Internet applications: the state of the art. In: Conference of the Center for Advanced Studies on Collaborative Research, Toronto, Markham, pp. 146\u2013160 (2012)","key":"13_CR3"},{"doi-asserted-by":"crossref","unstructured":"Benjamin, K., von Bochmann, G., Dincturk, M.E., Jourdan, G.V., Onut, V.: Some modeling challenges when testing rich internet applications for security. In: 1st International Workshop on Modeling and Detection of Vulnerabilities, France, Paris (2010)","key":"13_CR4","DOI":"10.1109\/ICSTW.2010.46"},{"doi-asserted-by":"crossref","unstructured":"Xiao, X., Zhang, W.Z., Zhang, H.L., Fang, B.X.: A forwarding-based task scheduling algorithm for distributed web crawling over DHTs. In: Proceedings of the 15th International Conference on Parallel and Distributed Systems (ICPADS), China, Shenzhen, pp. 854\u2013859 (2009)","key":"13_CR5","DOI":"10.1109\/ICPADS.2009.29"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MC.2005.385","volume":"38","author":"LD Paulson","year":"2005","unstructured":"Paulson, L.D.: Building rich web applications with Ajax. Computer 38, 14\u201317 (2005). (IEEE Computer Society)","journal-title":"Computer"},{"doi-asserted-by":"crossref","unstructured":"Cho, J., Garcia-Molina, H.: Parallel crawlers. In: Proceedings of the 11th International Conference on World Wide Web, WWW, Hawaii, Honolulu, vol. 2 (2002)","key":"13_CR7","DOI":"10.1145\/511446.511464"},{"unstructured":"Schollmeier, R.: A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In: Proceedings of the IEEE 2001 International Conference on Peer-to-Peer Computing (P2P2001), Sweden, Linkping (2001)","key":"13_CR8"},{"doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Karger, D., Frans Kaashoek, M., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for Internet applications. In: Proceedings of ACM SIGCOMM 2001, California, San Deigo (2001)","key":"13_CR9","DOI":"10.1145\/383059.383071"},{"doi-asserted-by":"crossref","unstructured":"Brin, S., Page, L.: The anatomy of a large-scale hypertextual Web search engine. In: Proceedings of the 7th International Conference on World Wide Web, WWW, Australia, Brisbane, vol. 7 (1998)","key":"13_CR10","DOI":"10.1016\/S0169-7552(98)00110-X"},{"doi-asserted-by":"crossref","unstructured":"Misra, J.: Detecting termination of distributed computations using markers. In: PODC\u201983, Proceedings of the 2nd Annual ACM Symposium on Principles of Distributed Computing, vol. 22, pp. 290\u2013294. ACM, New York (1983)","key":"13_CR11","DOI":"10.1145\/800221.806729"},{"key":"13_CR12","volume-title":"Document Object Model: Processing Structured Documents","author":"J Marini","year":"2002","unstructured":"Marini, J.: Document Object Model: Processing Structured Documents. McGraw-Hill\/Osborne, New York (2002)"},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/BF01386390","volume":"1","author":"EW Dijkstra","year":"1959","unstructured":"Dijkstra, E.W.: A note on two problems in connexion with graphs. Numer. Math. 1, 269\u2013271 (1959)","journal-title":"Numer. Math."},{"unstructured":"Loo, B.T., Owen, L., Krishnamurthy, C.S.: Distributed web crawling over DHTs. Technical report (2004)","key":"13_CR14"},{"unstructured":"Carzanig, A., Rutheford, M.: SSim: a simple Discrete-event Simulation Library, University of Colorado (2003). http:\/\/www.inf.usi.ch\/carzaniga\/ssim\/index.html","key":"13_CR15"}],"container-title":["Lecture Notes in Computer Science","Networked Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09581-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T01:49:35Z","timestamp":1746323375000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-09581-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319095806","9783319095813"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09581-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"3 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}