{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T04:26:40Z","timestamp":1770524800075,"version":"3.49.0"},"reference-count":47,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2001,11,1]],"date-time":"2001-11-01T00:00:00Z","timestamp":1004572800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Data &amp; Knowledge Engineering"],"published-print":{"date-parts":[[2001,11]]},"DOI":"10.1016\/s0169-023x(01)00038-6","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T14:26:50Z","timestamp":1027607210000},"page":"165-189","source":"Crossref","is-referenced-by-count":37,"title":["Web log data warehousing and mining for intelligent web caching"],"prefix":"10.1016","volume":"39","author":[{"given":"F.","family":"Bonchi","sequence":"first","affiliation":[]},{"given":"F.","family":"Giannotti","sequence":"additional","affiliation":[]},{"given":"C.","family":"Gozzi","sequence":"additional","affiliation":[]},{"given":"G.","family":"Manco","sequence":"additional","affiliation":[]},{"given":"M.","family":"Nanni","sequence":"additional","affiliation":[]},{"given":"D.","family":"Pedreschi","sequence":"additional","affiliation":[]},{"given":"C.","family":"Renso","sequence":"additional","affiliation":[]},{"given":"S.","family":"Ruggieri","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0169-023X(01)00038-6_BIB1","series-title":"Proceedings of the 4th International World-Wide Web Conference","first-page":"119","article-title":"Caching proxies: limitations and potentials","author":"Abrams","year":"1995"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB2","unstructured":"C.C. Aggarwal, J.L. Wolf, P.S. Yu, Caching policies for web objects, Technical Report RC20619, IBM Research Division, New York, 1997"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB3","series-title":"Proceedings of CIKM-97","first-page":"238","article-title":"On disk caching of web objects in proxy servers","author":"Aggarwal","year":"1997"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB4","series-title":"Proceedings of International Conference on Very Large Databases (VLDB)","first-page":"487","article-title":"Fast algorithms for mining association rules in large databases","author":"Agrawal","year":"1994"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB5","doi-asserted-by":"crossref","DOI":"10.1145\/333580.333583","article-title":"On-line algorithms","volume":"31","author":"Albers","year":"1999","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB6","series-title":"Proceedings of the International Conference on Computer Performance Evaluation: Modelling Techniques and Tools (TOOLS)","first-page":"193","article-title":"Performance evaluation of Web proxy cache replacement policies","volume":"vol. 1469","author":"Arlitt","year":"1999"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB7","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1109\/90.649565","article-title":"Internet Web servers: workload characterization and performance implications","volume":"5","author":"Arlitt","year":"1997","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB8","series-title":"Proceedings of the 32nd Annual ACM Symposium on Theory of Computing","first-page":"735","article-title":"A unified approach to approximating resource allocation and scheduling","author":"Bar-Noy","year":"2000"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB9","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1023\/A:1019236319752","article-title":"Changes in Web client access patterns: characteristics and caching implications","volume":"2","author":"Barford","year":"1999","journal-title":"World Wide Web"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB10","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1147\/sj.52.0078","article-title":"A study of replacement algorithms for virtual storage computers","volume":"5","author":"Belady","year":"1996","journal-title":"IBM Systems Journal"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB11","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/s007780050083","article-title":"Analysis of navigation behaviour in web sites integrating multiple information systems","volume":"9","author":"Berendt","year":"2000","journal-title":"VLDB Journal"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB12","series-title":"Proceedings of the INFOCOM'99 Conference","first-page":"163","article-title":"Web caching and Zipf-like distributions: evidence and implications","author":"Breslau","year":"1999"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB13","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1109\/12.675713","article-title":"Maintaining strong cache consistency in the world wide web","volume":"47","author":"Cao","year":"1998","journal-title":"IEEE Transactions on Computers"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB14","series-title":"Proceedings of the USENIX Symposium on Internet Technologies and Systems","first-page":"193","article-title":"Greedydual-size: a cost-aware www proxy caching algorithm","author":"Cao","year":"1997"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB15","series-title":"Proceedings of IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing (Middleware'98)","first-page":"373","article-title":"Active cache: caching dynamic contents on the web","author":"Cao","year":"1998"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB16","series-title":"Proceedings of the International Conference on Distributed Computing Systems","first-page":"385","article-title":"Data mining for traversal patterns in a web environment","author":"Chen","year":"1996"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB17","series-title":"Proceedings of the IEEE Knowledge and Data Engineering Exchange Workshop (KDEX-97)","article-title":"Grouping web page references into transactions for mining world wide web browsing patterns","author":"Cooley","year":"1997"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB18","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/BF03325089","article-title":"Data preparation for mining world wide web browsing patterns","volume":"1","author":"Cooley","year":"1999","journal-title":"Knowledge and Information Systems"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB19","series-title":"Proceedings of the Web Usage Analysis and User Profiling Workshop","first-page":"163","article-title":"Discovery of interesting usage patterns from web data","volume":"vol. 1836","author":"Cooley","year":"2000"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB20","unstructured":"B.D. Davison, Web caching and content delivery resources, http:\/\/www.web-caching.com"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB21","series-title":"Proceedings of the International Web Caching Workshop (WCW'99)","first-page":"67","article-title":"A survey of proxy cache evaluation techniques","author":"Davison","year":"1999"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB22","unstructured":"Department of Electrical Engineering and Computer Sciences, University of California, Berkeley, Berkeley CS HTTP logs, http:\/\/www.cs.berkeley.edu\/logs\/http"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB23","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/4236.806998","article-title":"Improving proxy cache performance: analysis of three replacement policies","volume":"3","author":"Dilley","year":"1999","journal-title":"IEEE Internet Computing"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB24","series-title":"Proceedings of the USENIX Symposium on Internet Technologies and Systems","article-title":"The measured access characteristics of world-wide-web client proxy caches","author":"Duska","year":"1997"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB25","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/240455.240473","article-title":"The world-wide web: quagmire or gold mine?","volume":"39","author":"Etzioni","year":"1996","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB26","series-title":"Data Mining: Concepts and Techniques","author":"Han","year":"2000"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB27","doi-asserted-by":"crossref","unstructured":"S. Bradley, S. Sarawagi, U.M. Fayyad (Eds.), Internet Data Mining, ACM SIGKDD Explorations 2 (2000)","DOI":"10.1145\/360402.360412"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB28","series-title":"Proceedings of the International Web Caching and Content Delivery Workshop","article-title":"GreedyDual\u2217 Web caching algorithms: exploiting the two sources of temporal locality in Web request streams","author":"Jin","year":"2000"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB29","series-title":"Proceedings of the International Conference on Distributed Computing Systems (ICDCS)","article-title":"Popularity-aware greedydual-size algorithms for web access","author":"Jin","year":"2000"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB30","series-title":"Proceedings of the SIGMETRICS 2000 Conference","first-page":"110","article-title":"Temporal locality in web request streams: sources, characteristics, and caching implications (poster)","author":"Jin","year":"2000"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB31","series-title":"Proceedings of ACM CIKM Workshop on Web Information and Data Management (WIDM'99)","first-page":"63","article-title":"Warehousing and mining web logs","author":"Joshi","year":"1999"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/360402.360406","article-title":"Web mining research: a survey","volume":"2","author":"Kosala","year":"2000","journal-title":"ACM SIGKDD Explorations"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB33","doi-asserted-by":"crossref","first-page":"893","DOI":"10.1016\/0169-7552(96)00035-9","article-title":"Main memory caching of web documents","volume":"28","author":"Markatos","year":"1996","journal-title":"Computer Networks and ISDN Systems"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB34","unstructured":"MicroSoft Corporation, MicroSoft SQL Server 2000, http:\/\/www.microsoft.com\/sql"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB35","series-title":"Proceedings of the Advances in Digital Libraries Conference (ADL'98)","first-page":"19","article-title":"Discovering web access patterns and trends by applying OLAP and data mining technology on web logs","author":"Han","year":"1998"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB36","series-title":"Proceedings of the 3rd International WWW Conference","article-title":"A simple yet robust caching algorithm based on dynamic access patterns","author":"Pitkow","year":"1994"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB37","series-title":"C4.5: Programs for Machine Learning","author":"Quinlan","year":"1993"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB38","doi-asserted-by":"crossref","unstructured":"R. Rivest, The MD5 Message-Digest algorithm, Technical Report RFC 1321, The Internet Engineering Task Force, 1992, http:\/\/www.ietf.org\/rfc\/rfc1321.txt","DOI":"10.17487\/rfc1321"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB39","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1109\/90.842139","article-title":"Replacement policies for a proxy cache","volume":"8","author":"Rizzo","year":"2000","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB40","unstructured":"S. Ruggieri, Efficient C4.5, IEEE Transactions on Knowledge and Data Engineering (to appear). http:\/\/www.computer.org\/tkde\/"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB41","series-title":"Workshop on the Web and Data Bases (WebDB98)","first-page":"109","article-title":"WUM: a web utilization miner","volume":"vol. 1590","author":"Spiliopoulou","year":"1998"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB42","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/846183.846188","article-title":"Web usage mining: discovery and applications of web usage patterns from web data","volume":"1","author":"Srivastava","year":"2000","journal-title":"ACM SIGKDD Explorations"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB43","doi-asserted-by":"crossref","unstructured":"L. Masinter, T. Berners-Lee, R. Fielding, Uniform resource identifiers (URI): generic syntax, Technical Report RFC 2396, The Internet Engineering Task Force, 1998, http:\/\/www.ietf.org\/rfc\/rfc2396.txt","DOI":"10.17487\/rfc2396"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB44","doi-asserted-by":"crossref","unstructured":"L. Masinter, T. Berners-Lee, R. Fielding, Hypertext transfer protocol \u2013 HTTP\/1.1, Technical Report RFC 2616, The Internet Society, 1999, http:\/\/www.w3.org\/Protocols","DOI":"10.17487\/rfc2616"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB45","unstructured":"W3C httpd, Logging control in w3c httpd, http:\/\/www.w3.org\/Daemon\/User\/Config\/Logging.html"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB46","doi-asserted-by":"crossref","unstructured":"S. Williams, M. Abrams, C.R. Standridge, G. Abdulla, E.A. Fox, Removal policies in network caches for world-wide web documents, in: Proceedings of ACM SIGCOMM, 1997, pp. 293\u2013305, revised August 1997, http:\/\/vtopus.cs.vt.edu\/nrg\/williams.html","DOI":"10.1145\/248157.248182"},{"key":"10.1016\/S0169-023X(01)00038-6_BIB47","series-title":"Proceedings of the SIGMETRICS 2000 Conference","first-page":"78","article-title":"Collaborative web caching based on proxy affinities","author":"Yang","year":"2000"}],"container-title":["Data &amp; Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X01000386?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X01000386?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,9]],"date-time":"2020-01-09T09:09:08Z","timestamp":1578560948000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0169023X01000386"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,11]]},"references-count":47,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2001,11]]}},"alternative-id":["S0169023X01000386"],"URL":"https:\/\/doi.org\/10.1016\/s0169-023x(01)00038-6","relation":{},"ISSN":["0169-023X"],"issn-type":[{"value":"0169-023X","type":"print"}],"subject":[],"published":{"date-parts":[[2001,11]]}}}