{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:23:05Z","timestamp":1725790985074},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642550317"},{"type":"electronic","value":"9783642550324"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55032-4_44","type":"book-chapter","created":{"date-parts":[[2014,3,25]],"date-time":"2014-03-25T06:15:38Z","timestamp":1395728138000},"page":"438-445","source":"Crossref","is-referenced-by-count":0,"title":["A Design of Web Log Integration Framework Using NoSQL"],"prefix":"10.1007","author":[{"given":"Huijin","family":"Jeong","sequence":"first","affiliation":[]},{"given":"Junho","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Chang","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Ilsun","family":"You","sequence":"additional","affiliation":[]},{"given":"Pankoo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3\/4","key":"44_CR1","first-page":"28","volume":"3","author":"J. Choi","year":"2013","unstructured":"Choi, J., Choi, C., Ko, B., Choi, D., Kim, P.: Detecting Web based DDoS Attack using MapReduce operations in Cloud Computing Environment. Journal of Internet Services and Information Security\u00a03(3\/4), 28\u201337 (2013)","journal-title":"Journal of Internet Services and Information Security"},{"issue":"2","key":"44_CR2","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/2076450.2076466","volume":"55","author":"A. Oliner","year":"2012","unstructured":"Oliner, A., Ganapathi, A., Xu, W.: Advances and challenges in log analysis. Communications of the ACM\u00a055(2), 55\u201361 (2012)","journal-title":"Communications of the ACM"},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Yunhua, G.U., Shu, S., Guansheng, Z.: Application of NoSQL Database in Web Crawling. International Journal of Digital Content Technology and its Applications\u00a05(6) (2011)","DOI":"10.4156\/jdcta.vol5.issue6.31"},{"issue":"1","key":"44_CR4","first-page":"37","volume":"1","author":"M. Elkotob","year":"2013","unstructured":"Elkotob, M., Andersson, K.: Cross-Layer Design for Improved QoE in Content Distribution Networks. IT CoNvergence PRActice (INPRA)\u00a01(1), 37\u201352 (2013)","journal-title":"IT CoNvergence PRActice (INPRA)"},{"key":"44_CR5","doi-asserted-by":"crossref","unstructured":"Srinivasan, V., Bulkowski, B.: Citrusleaf: A Real-Time NoSQL DB which Preserves ACID. In: The 37th International Conference on Very Large Data Bases, Proceedings of the VLDB Endowment, vol.\u00a04(12), pp. 1340\u20131350 (2011)","DOI":"10.14778\/3402755.3402767"},{"key":"44_CR6","unstructured":"Yi, X., Wei, G., Dong, F.: A Survey on NoSQL Database. Communication of Modern Technology, 46\u201350 (2010)"},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Zhou, W., Han, J., Zhang, Z., Dai, J.: Dynamic Random Access for Hadoop Distributed File System. In: 32nd International Conference on Distributed Computing Systems Workshops, pp. 17\u201322. IEEE (2012)","DOI":"10.1109\/ICDCSW.2012.74"},{"key":"44_CR8","unstructured":"http:\/\/www.wikibench.eu"},{"key":"44_CR9","unstructured":"George, L.: HBase The Definitive Guide. O\u2018ReillyMedia (2011)"},{"issue":"4","key":"44_CR10","doi-asserted-by":"publisher","first-page":"667","DOI":"10.13089\/JKIISC.2013.23.4.667","volume":"23","author":"C. Bomin","year":"2013","unstructured":"Bomin, C., Jong-Hwan, K., Sung-Sam, H., Myung-Mook, H.: The Method of Analyzing Firewall Log Data using Map Reduce based on NoSQL. Journal of The Korea Institute of Information Security & Cryptology (JKIISC)\u00a023(4), 667\u2013677 (2013)","journal-title":"Journal of The Korea Institute of Information Security & Cryptology (JKIISC)"},{"key":"44_CR11","doi-asserted-by":"crossref","unstructured":"Yang, J., Leskovec, J.: Patterns of Temporal Variation in Online Media. In: ACM International Conference on Web Search and Data Mining, pp. 177\u2013186 (2011)","DOI":"10.1145\/1935826.1935863"},{"issue":"2","key":"44_CR12","first-page":"6","volume":"35","author":"K.V. Shvachko","year":"2010","unstructured":"Shvachko, K.V.: HDFS Scalability: The limits to growth. Login\u00a035(2), 6\u201316 (2010)","journal-title":"Login"},{"key":"44_CR13","doi-asserted-by":"crossref","unstructured":"Borthakur, D., Sarma, J.S., Gray, J.: Apache Hadoop goes realtime at Facebook. In: SIGMOD, pp. 1071\u20131080 (2011)","DOI":"10.1145\/1989323.1989438"},{"key":"44_CR14","unstructured":"Proffitt, B.: When NoSQL Databases Are Yes Good For You and Your Company (2013)"},{"issue":"3","key":"44_CR15","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1007\/s10618-011-0228-8","volume":"24","author":"M. Agosti","year":"2012","unstructured":"Agosti, M., Crivellari, F., Nunzio, G.M.: Web log analysis: a review of a decade of studies about information acquisition, inspection and interpretation of user interaction. Data Mining and Knowledge Discovery\u00a024(3), 663\u2013696 (2012)","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"3\/4","key":"44_CR16","first-page":"54","volume":"2","author":"C. Choi","year":"2012","unstructured":"Choi, C., Choi, J., Ko, B., Oh, K., Kim, P.: A Design of Onto-ACM (Ontology based Access Control Model) in Cloud Computing Environments. Journal of Internet Services and Information Security\u00a02(3\/4), 54\u201364 (2012)","journal-title":"Journal of Internet Services and Information Security"},{"key":"44_CR17","doi-asserted-by":"crossref","unstructured":"Herrerias, J., Gomez: Log Analysis Towards an Automated Forensic Diagnosis System. IEEE ARES, 15\u201318 (2010)","DOI":"10.1109\/ARES.2010.120"},{"issue":"1","key":"44_CR18","first-page":"2","volume":"1","author":"S. Han","year":"2013","unstructured":"Han, S., Han, Y.: Meaning and Prospects of IT Convergence Technology in Korea. IT CoNvergence PRActice (INPRA)\u00a01(1), 2\u201312 (2013)","journal-title":"IT CoNvergence PRActice (INPRA)"},{"issue":"3","key":"44_CR19","first-page":"49","volume":"1","author":"S. Gonzalez-Miranda","year":"2013","unstructured":"Gonzalez-Miranda, S., Alcarria, R., Robles, T., Morales, A., Gonzalez, I., Montcada, E.: An IoT-leveraged information system for future shopping environments. IT CoNvergence PRActice (INPRA)\u00a01(3), 49\u201365 (2013)","journal-title":"IT CoNvergence PRActice (INPRA)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55032-4_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,16]],"date-time":"2020-08-16T19:37:24Z","timestamp":1597606644000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55032-4_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642550317","9783642550324"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55032-4_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}