Jump to content

Web crawler

From Wikipedia, the free encyclopedia

Architecture of a Web crawler

AWeb crawler,sometimes called aspiderorspiderbotand often shortened tocrawler,is anInternet botthat systematically browses theWorld Wide Weband that is typically operated by search engines for the purpose ofWeb indexing(web spidering).[1]

Websearch enginesand some otherwebsitesuse Web crawling or spideringsoftwareto update theirweb contentor indices of other sites' web content. Web crawlers copy pages for processing by a search engine, whichindexesthe downloaded pages so that users can search more efficiently.

Crawlers consume resources on visited systems and often visit sites unprompted. Issues of schedule, load, and "politeness" come into play when large collections of pages are accessed. Mechanisms exist for public sites not wishing to be crawled to make this known to the crawling agent. For example, including arobots.txtfile can requestbotsto index only parts of a website, or nothing at all.

The number of Internet pages is extremely large; even the largest crawlers fall short of making a complete index. For this reason, search engines struggled to give relevant search results in the early years of the World Wide Web, before 2000. Today, relevant results are given almost instantly.

Crawlers can validatehyperlinksandHTMLcode. They can also be used forweb scrapinganddata-driven programming.

Nomenclature[edit]

A web crawler is also known as aspider,[2]anant,anautomatic indexer,[3]or (in theFOAFsoftware context) aWeb scutter.[4]

Overview[edit]

A Web crawler starts with a list ofURLsto visit. Those first URLs are called theseeds.As the crawler visits these URLs, by communicating withweb serversthat respond to those URLs, it identifies all thehyperlinksin the retrieved web pages and adds them to the list of URLs to visit, called thecrawl frontier.URLs from the frontier arerecursivelyvisited according to a set of policies. If the crawler is performing archiving ofwebsites(orweb archiving), it copies and saves the information as it goes. The archives are usually stored in such a way they can be viewed, read and navigated as if they were on the live web, but are preserved as 'snapshots'.[5]

The archive is known as therepositoryand is designed to store and manage the collection ofweb pages.Therepositoryonly storesHTMLpages and these pages are stored as distinct files. A repository is similar to any other system that stores data, like a modern-day database. The only difference is that a repository does not need all the functionality offered by a database system. The repository stores the most recent version of the web page retrieved by the crawler.[citation needed]

The large volume implies the crawler can only download a limited number of the Web pages within a given time, so it needs to prioritize its downloads. The high rate of change can imply the pages might have already been updated or even deleted.

The number of possible URLs crawled being generated by server-side software has also made it difficult for web crawlers to avoid retrievingduplicate content.Endless combinations ofHTTPGET (URL-based) parameters exist, of which only a small selection will actually return unique content. For example, a simple online photo gallery may offer three options to users, as specified through HTTP GET parameters in the URL. If there exist four ways to sort images, three choices ofthumbnailsize, two file formats, and an option to disable user-provided content, then the same set of content can be accessed with 48 different URLs, all of which may be linked on the site. Thismathematical combinationcreates a problem for crawlers, as they must sort through endless combinations of relatively minor scripted changes in order to retrieve unique content.

As Edwardset al.noted, "Given that thebandwidthfor conducting crawls is neither infinite nor free, it is becoming essential to crawl the Web in not only a scalable, but efficient way, if some reasonable measure of quality or freshness is to be maintained. "[6]A crawler must carefully choose at each step which pages to visit next.

Crawling policy[edit]

The behavior of a Web crawler is the outcome of a combination of policies:[7]

  • aselection policywhich states the pages to download,
  • are-visit policywhich states when to check for changes to the pages,
  • apoliteness policythat states how to avoid overloadingWeb sites.
  • aparallelization policythat states how to coordinate distributed web crawlers.

Selection policy[edit]

Given the current size of the Web, even large search engines cover only a portion of the publicly available part. A 2009 study showed even large-scalesearch enginesindex no more than 40–70% of the indexable Web;[8]a previous study bySteve LawrenceandLee Gilesshowed that nosearch engine indexedmore than 16% of the Web in 1999.[9]As a crawler always downloads just a fraction of theWeb pages,it is highly desirable for the downloaded fraction to contain the most relevant pages and not just a random sample of the Web.

This requires a metric of importance for prioritizing Web pages. The importance of a page is a function of itsintrinsicquality, its popularity in terms of links or visits, and even of its URL (the latter is the case ofvertical search enginesrestricted to a singletop-level domain,or search engines restricted to a fixed Web site). Designing a good selection policy has an added difficulty: it must work with partial information, as the complete set of Web pages is not known during crawling.

Junghoo Choet al.made the first study on policies for crawling scheduling. Their data set was a 180,000-pages crawl from thestanford.edudomain, in which a crawling simulation was done with different strategies.[10]The ordering metrics tested werebreadth-first,backlinkcount and partialPageRankcalculations. One of the conclusions was that if the crawler wants to download pages with high Pagerank early during the crawling process, then the partial Pagerank strategy is the better, followed by breadth-first and backlink-count. However, these results are for just a single domain. Cho also wrote his PhD dissertation at Stanford on web crawling.[11]

Najork and Wiener performed an actual crawl on 328 million pages, using breadth-first ordering.[12]They found that a breadth-first crawl captures pages with high Pagerank early in the crawl (but they did not compare this strategy against other strategies). The explanation given by the authors for this result is that "the most important pages have many links to them from numerous hosts, and those links will be found early, regardless of on which host or page the crawl originates."

Abiteboul designed a crawling strategy based on analgorithmcalled OPIC (On-line Page Importance Computation).[13]In OPIC, each page is given an initial sum of "cash" that is distributed equally among the pages it points to. It is similar to a PageRank computation, but it is faster and is only done in one step. An OPIC-driven crawler downloads first the pages in the crawling frontier with higher amounts of "cash". Experiments were carried in a 100,000-pages synthetic graph with a power-law distribution of in-links. However, there was no comparison with other strategies nor experiments in the real Web.

Boldiet al.used simulation on subsets of the Web of 40 million pages from the.itdomain and 100 million pages from the WebBase crawl, testing breadth-first against depth-first, random ordering and an omniscient strategy. The comparison was based on how well PageRank computed on a partial crawl approximates the true PageRank value. Some visits that accumulate PageRank very quickly (most notably, breadth-first and the omniscient visit) provide very poor progressive approximations.[14][15]

Baeza-Yateset al.used simulation on two subsets of the Web of 3 million pages from the.grand.cldomain, testing several crawling strategies.[16]They showed that both the OPIC strategy and a strategy that uses the length of the per-site queues are better thanbreadth-firstcrawling, and that it is also very effective to use a previous crawl, when it is available, to guide the current one.

Daneshpajouhet al.designed a community based algorithm for discovering good seeds.[17]Their method crawls web pages with high PageRank from different communities in less iteration in comparison with crawl starting from random seeds. One can extract good seed from a previously-crawled-Web graph using this new method. Using these seeds, a new crawl can be very effective.

Restricting followed links[edit]

A crawler may only want to seek out HTML pages and avoid all otherMIME types.In order to request only HTML resources, a crawler may make an HTTP HEAD request to determine a Web resource's MIME type before requesting the entire resource with a GET request. To avoid making numerous HEAD requests, a crawler may examine the URL and only request a resource if the URL ends with certain characters such as.html,.htm,.asp,.aspx,.php,.jsp,.jspx or a slash. This strategy may cause numerous HTML Web resources to be unintentionally skipped.

Some crawlers may also avoid requesting any resources that have a"?"in them (are dynamically produced) in order to avoidspider trapsthat may cause the crawler to download an infinite number of URLs from a Web site. This strategy is unreliable if the site usesURL rewritingto simplify its URLs.

URL normalization[edit]

Crawlers usually perform some type ofURL normalizationin order to avoid crawling the same resource more than once. The termURL normalization,also calledURL canonicalization,refers to the process of modifying and standardizing a URL in a consistent manner. There are several types of normalization that may be performed including conversion of URLs to lowercase, removal of "." and ".." segments, and adding trailing slashes to the non-empty path component.[18]

Path-ascending crawling[edit]

Some crawlers intend to download/upload as many resources as possible from a particular web site. Sopath-ascending crawlerwas introduced that would ascend to every path in each URL that it intends to crawl.[19]For example, when given a seed URL of http://llama.org/hamster/monkey/page.html, it will attempt to crawl /hamster/monkey/, /hamster/, and /. Cothey found that a path-ascending crawler was very effective in finding isolated resources, or resources for which no inbound link would have been found in regular crawling.

Focused crawling[edit]

The importance of a page for a crawler can also be expressed as a function of the similarity of a page to a given query. Web crawlers that attempt to download pages that are similar to each other are calledfocused crawlerortopical crawlers.The concepts of topical and focused crawling were first introduced byFilippo Menczer[20][21]and by Soumen Chakrabartiet al.[22]

The main problem in focused crawling is that in the context of a Web crawler, we would like to be able to predict the similarity of the text of a given page to the query before actually downloading the page. A possible predictor is the anchor text of links; this was the approach taken by Pinkerton[23]in the first web crawler of the early days of the Web. Diligentiet al.[24]propose using the complete content of the pages already visited to infer the similarity between the driving query and the pages that have not been visited yet. The performance of a focused crawling depends mostly on the richness of links in the specific topic being searched, and a focused crawling usually relies on a general Web search engine for providing starting points.

Academic focused crawler[edit]

An example of thefocused crawlersare academic crawlers, which crawls free-access academic related documents, such as theciteseerxbot,which is the crawler ofCiteSeerXsearch engine. Other academic search engines areGoogle ScholarandMicrosoft Academic Searchetc. Because most academic papers are published inPDFformats, such kind of crawler is particularly interested in crawling PDF,PostScriptfiles,Microsoft Wordincluding theirzippedformats. Because of this, general open-source crawlers, such asHeritrix,must be customized to filter out otherMIME types,or amiddlewareis used to extract these documents out and import them to the focused crawl database and repository.[25]Identifying whether these documents are academic or not is challenging and can add a significant overhead to the crawling process, so this is performed as a post crawling process usingmachine learningorregular expressionalgorithms. These academic documents are usually obtained from home pages of faculties and students or from publication page of research institutes. Because academic documents make up only a small fraction of all web pages, a good seed selection is important in boosting the efficiencies of these web crawlers.[26]Other academic crawlers may download plain text andHTMLfiles, that containsmetadataof academic papers, such as titles, papers, and abstracts. This increases the overall number of papers, but a significant fraction may not provide free PDF downloads.

Semantic focused crawler[edit]

Another type of focused crawlers is semantic focused crawler, which makes use ofdomain ontologiesto represent topical maps and link Web pages with relevant ontological concepts for the selection and categorization purposes.[27]In addition, ontologies can be automatically updated in the crawling process. Dong et al.[28]introduced such an ontology-learning-based crawler using asupport-vector machineto update the content of ontological concepts when crawling Web pages.

Re-visit policy[edit]

The Web has a very dynamic nature, and crawling a fraction of the Web can take weeks or months. By the time a Web crawler has finished its crawl, many events could have happened, including creations, updates, and deletions.

From the search engine's point of view, there is a cost associated with not detecting an event, and thus having an outdated copy of a resource. The most-used cost functions are freshness and age.[29]

Freshness:This is a binary measure that indicates whether the local copy is accurate or not. The freshness of a pagepin the repository at timetis defined as:

Age:This is a measure that indicates how outdated the local copy is. The age of a pagepin the repository, at timetis defined as:

Coffmanet al.worked with a definition of the objective of a Web crawler that is equivalent to freshness, but use a different wording: they propose that a crawler must minimize the fraction of time pages remain outdated. They also noted that the problem of Web crawling can be modeled as a multiple-queue, single-server polling system, on which the Web crawler is the server and the Web sites are the queues. Page modifications are the arrival of the customers, and switch-over times are the interval between page accesses to a single Web site. Under this model, mean waiting time for a customer in the polling system is equivalent to the average age for the Web crawler.[30]

The objective of the crawler is to keep the average freshness of pages in its collection as high as possible, or to keep the average age of pages as low as possible. These objectives are not equivalent: in the first case, the crawler is just concerned with how many pages are outdated, while in the second case, the crawler is concerned with how old the local copies of pages are.

Evolution of Freshness and Age in a web crawler

Two simple re-visiting policies were studied by Cho and Garcia-Molina:[31]

  • Uniform policy: This involves re-visiting all pages in the collection with the same frequency, regardless of their rates of change.
  • Proportional policy: This involves re-visiting more often the pages that change more frequently. The visiting frequency is directly proportional to the (estimated) change frequency.

In both cases, the repeated crawling order of pages can be done either in a random or a fixed order.

Cho and Garcia-Molina proved the surprising result that, in terms of average freshness, the uniform policy outperforms the proportional policy in both a simulated Web and a real Web crawl. Intuitively, the reasoning is that, as web crawlers have a limit to how many pages they can crawl in a given time frame, (1) they will allocate too many new crawls to rapidly changing pages at the expense of less frequently updating pages, and (2) the freshness of rapidly changing pages lasts for shorter period than that of less frequently changing pages. In other words, a proportional policy allocates more resources to crawling frequently updating pages, but experiences less overall freshness time from them.

To improve freshness, the crawler should penalize the elements that change too often.[32]The optimal re-visiting policy is neither the uniform policy nor the proportional policy. The optimal method for keeping average freshness high includes ignoring the pages that change too often, and the optimal for keeping average age low is to use access frequencies that monotonically (and sub-linearly) increase with the rate of change of each page. In both cases, the optimal is closer to the uniform policy than to the proportional policy: asCoffmanet al.note, "in order to minimize the expected obsolescence time, the accesses to any particular page should be kept as evenly spaced as possible".[30]Explicit formulas for the re-visit policy are not attainable in general, but they are obtained numerically, as they depend on the distribution of page changes. Cho and Garcia-Molina show that the exponential distribution is a good fit for describing page changes,[32]whileIpeirotiset al.show how to use statistical tools to discover parameters that affect this distribution.[33]The re-visiting policies considered here regard all pages as homogeneous in terms of quality ( "all pages on the Web are worth the same" ), something that is not a realistic scenario, so further information about the Web page quality should be included to achieve a better crawling policy.

Politeness policy[edit]

Crawlers can retrieve data much quicker and in greater depth than human searchers, so they can have a crippling impact on the performance of a site. If a single crawler is performing multiple requests per second and/or downloading large files, a server can have a hard time keeping up with requests from multiple crawlers.

As noted by Koster, the use of Web crawlers is useful for a number of tasks, but comes with a price for the general community.[34]The costs of using Web crawlers include:

  • network resources, as crawlers require considerable bandwidth and operate with a high degree of parallelism during a long period of time;
  • server overload, especially if the frequency of accesses to a given server is too high;
  • poorly written crawlers, which can crash servers or routers, or which download pages they cannot handle; and
  • personal crawlers that, if deployed by too many users, can disrupt networks and Web servers.

A partial solution to these problems is therobots exclusion protocol,also known as the robots.txt protocol that is a standard for administrators to indicate which parts of their Web servers should not be accessed by crawlers.[35]This standard does not include a suggestion for the interval of visits to the same server, even though this interval is the most effective way of avoiding server overload. Recently commercial search engines likeGoogle,Ask Jeeves,MSNandYahoo! Searchare able to use an extra "Crawl-delay:" parameter in therobots.txtfile to indicate the number of seconds to delay between requests.

The first proposed interval between successive pageloads was 60 seconds.[36]However, if pages were downloaded at this rate from a website with more than 100,000 pages over a perfect connection with zero latency and infinite bandwidth, it would take more than 2 months to download only that entire Web site; also, only a fraction of the resources from that Web server would be used.

Cho uses 10 seconds as an interval for accesses,[31]and the WIRE crawler uses 15 seconds as the default.[37]The MercatorWeb crawler follows an adaptive politeness policy: if it tooktseconds to download a document from a given server, the crawler waits for 10tseconds before downloading the next page.[38]Dillet al.use 1 second.[39]

For those using Web crawlers for research purposes, a more detailed cost-benefit analysis is needed and ethical considerations should be taken into account when deciding where to crawl and how fast to crawl.[40]

Anecdotal evidence from access logs shows that access intervals from known crawlers vary between 20 seconds and 3–4 minutes. It is worth noticing that even when being very polite, and taking all the safeguards to avoid overloading Web servers, some complaints from Web server administrators are received.Sergey BrinandLarry Pagenoted in 1998, "... running a crawler which connects to more than half a million servers... generates a fair amount of e-mail and phone calls. Because of the vast number of people coming on line, there are always those who do not know what a crawler is, because this is the first one they have seen."[41]

Parallelization policy[edit]

Aparallelcrawler is a crawler that runs multiple processes in parallel. The goal is to maximize the download rate while minimizing the overhead from parallelization and to avoid repeated downloads of the same page. To avoid downloading the same page more than once, the crawling system requires a policy for assigning the new URLs discovered during the crawling process, as the same URL can be found by two different crawling processes.

Architectures[edit]

High-level architecture of a standard Web crawler

A crawler must not only have a good crawling strategy, as noted in the previous sections, but it should also have a highly optimized architecture.

Shkapenyuk and Suel noted that:[42]

While it is fairly easy to build a slow crawler that downloads a few pages per second for a short period of time, building a high-performance system that can download hundreds of millions of pages over several weeks presents a number of challenges in system design, I/O and network efficiency, and robustness and manageability.

Web crawlers are a central part of search engines, and details on their algorithms and architecture are kept as business secrets. When crawler designs are published, there is often an important lack of detail that prevents others from reproducing the work. There are also emerging concerns about "search engine spamming",which prevent major search engines from publishing their ranking algorithms.

Security[edit]

While most of the website owners are keen to have their pages indexed as broadly as possible to have strong presence insearch engines,web crawling can also haveunintended consequencesand lead to acompromiseordata breachif a search engine indexes resources that should not be publicly available, or pages revealing potentially vulnerable versions of software.

Apart from standardweb application securityrecommendations website owners can reduce their exposure to opportunistic hacking by only allowing search engines to index the public parts of their websites (withrobots.txt) and explicitly blocking them from indexing transactional parts (login pages, private pages, etc.).

Crawler identification[edit]

Web crawlers typically identify themselves to a Web server by using theUser-agentfield of anHTTPrequest. Web site administrators typically examine theirWeb servers' log and use the user agent field to determine which crawlers have visited the web server and how often. The user agent field may include aURLwhere the Web site administrator may find out more information about the crawler. Examining Web server log is tedious task, and therefore some administrators use tools to identify, track and verify Web crawlers.Spambotsand other malicious Web crawlers are unlikely to place identifying information in the user agent field, or they may mask their identity as a browser or other well-known crawler.

Web site administrators prefer Web crawlers to identify themselves so that they can contact the owner if needed. In some cases, crawlers may be accidentally trapped in acrawler trapor they may be overloading a Web server with requests, and the owner needs to stop the crawler. Identification is also useful for administrators that are interested in knowing when they may expect their Web pages to be indexed by a particularsearch engine.

Crawling the deep web[edit]

A vast amount of web pages lie in thedeep or invisible web.[43]These pages are typically only accessible by submitting queries to a database, and regular crawlers are unable to find these pages if there are no links that point to them. Google'sSitemapsprotocol andmod oai[44]are intended to allow discovery of thesedeep-Webresources.

Deep web crawling also multiplies the number of web links to be crawled. Some crawlers only take some of the URLs in<a href= "URL" >form. In some cases, such as theGooglebot,Web crawling is done on all text contained inside the hypertext content, tags, or text.

Strategic approaches may be taken to target deep Web content. With a technique calledscreen scraping,specialized software may be customized to automatically and repeatedly query a given Web form with the intention of aggregating the resulting data. Such software can be used to span multiple Web forms across multiple Websites. Data extracted from the results of one Web form submission can be taken and applied as input to another Web form thus establishing continuity across the Deep Web in a way not possible with traditional web crawlers.[45]

Pages built onAJAXare among those causing problems to web crawlers.Googlehas proposed a format of AJAX calls that their bot can recognize and index.[46]

Visual vs programmatic crawlers[edit]

There are a number of "visual web scraper/crawler" products available on the web which will crawl pages and structure data into columns and rows based on the users requirements. One of the main difference between a classic and a visual crawler is the level of programming ability required to set up a crawler. The latest generation of "visual scrapers" remove the majority of the programming skill needed to be able to program and start a crawl to scrape web data.

The visual scraping/crawling method relies on the user "teaching" a piece of crawler technology, which then follows patterns in semi-structured data sources. The dominant method for teaching a visual crawler is by highlighting data in a browser and training columns and rows. While the technology is not new, for example it was the basis of Needlebase which has been bought by Google (as part of a larger acquisition of ITA Labs[47]), there is continued growth and investment in this area by investors and end-users.[citation needed]

List of web crawlers[edit]

The following is a list of published crawler architectures for general-purpose crawlers (excluding focused web crawlers), with a brief description that includes the names given to the different components and outstanding features:

Historical web crawlers[edit]

  • World Wide Web Wormwas a crawler used to build a simple index of document titles and URLs. The index could be searched by using thegrepUnixcommand.
  • Yahoo! Slurp was the name of theYahoo!Search crawler until Yahoo! contracted withMicrosoftto useBingbotinstead.

In-house web crawlers[edit]

  • Applebot isApple's web crawler. It supportsSiriand other products.[48]
  • Bingbotis the name of Microsoft'sBingwebcrawler. It replacedMsnbot.
  • Baiduspider isBaidu's web crawler.
  • DuckDuckBot isDuckDuckGo's web crawler.
  • Googlebotis described in some detail, but the reference is only about an early version of its architecture, which was written in C++ andPython.The crawler was integrated with the indexing process, because text parsing was done for full-text indexing and also for URL extraction. There is a URL server that sends lists of URLs to be fetched by several crawling processes. During parsing, the URLs found were passed to a URL server that checked if the URL have been previously seen. If not, the URL was added to the queue of the URL server.
  • WebCrawlerwas used to build the first publicly available full-text index of a subset of the Web. It was based onlib-WWWto download pages, and another program to parse and order URLs for breadth-first exploration of the Web graph. It also included a real-time crawler that followed links based on the similarity of the anchor text with the provided query.
  • WebFountainis a distributed, modular crawler similar to Mercator but written in C++.
  • Xenonis a web crawler used by government tax authorities to detect fraud.[49][50]

Commercial web crawlers[edit]

The following web crawlers are available, for a price::

Open-source crawlers[edit]

See also[edit]

References[edit]

  1. ^"Web Crawlers: Browsing the Web".Archived fromthe originalon 6 December 2021.
  2. ^Spetka, Scott."The TkWWW Robot: Beyond Browsing".NCSA.Archived fromthe originalon 3 September 2004.Retrieved21 November2010.
  3. ^Kobayashi, M. & Takeda, K. (2000). "Information retrieval on the web".ACM Computing Surveys.32(2): 144–173.CiteSeerX10.1.1.126.6094.doi:10.1145/358923.358934.S2CID3710903.
  4. ^Seedefinition of scutter on FOAF Project's wikiArchived13 December 2009 at theWayback Machine
  5. ^Masanès, Julien (15 February 2007).Web Archiving.Springer. p. 1.ISBN978-3-54046332-0.Retrieved24 April2014.
  6. ^Edwards, J.; McCurley, K. S.; and Tomlin, J. A. (2001). "An adaptive model for optimizing performance of an incremental web crawler".Proceedings of the 10th international conference on World Wide Web.pp. 106–113.CiteSeerX10.1.1.1018.1506.doi:10.1145/371920.371960.ISBN978-1581133486.S2CID10316730.Archived fromthe originalon 25 June 2014.Retrieved25 January2007.{{cite book}}:CS1 maint: multiple names: authors list (link)
  7. ^Castillo, Carlos (2004).Effective Web Crawling(PhD thesis). University of Chile.Retrieved3 August2010.
  8. ^Gulls, A.; A. Signori (2005). "The indexable web is more than 11.5 billion pages".Special interest tracks and posters of the 14th international conference on World Wide Web.ACM Press. pp. 902–903.doi:10.1145/1062745.1062789.
  9. ^Lawrence, Steve; C. Lee Giles (8 July 1999)."Accessibility of information on the web".Nature.400(6740): 107–9.Bibcode:1999Natur.400..107L.doi:10.1038/21987.PMID10428673.S2CID4347646.
  10. ^Cho, J.; Garcia-Molina, H.; Page, L. (April 1998)."Efficient Crawling Through URL Ordering".Seventh International World-Wide Web Conference.Brisbane, Australia.doi:10.1142/3725.ISBN978-981-02-3400-3.Retrieved23 March2009.
  11. ^Cho, Junghoo,"Crawling the Web: Discovery and Maintenance of a Large-Scale Web Data",PhD dissertation, Department of Computer Science, Stanford University, November 2001.
  12. ^Najork, Marc and Janet L. Wiener."Breadth-first crawling yields high-quality pages".Archived24 December 2017 at theWayback MachineIn:Proceedings of the Tenth Conference on World Wide Web,pages 114–118, Hong Kong, May 2001. Elsevier Science.
  13. ^Abiteboul, Serge; Mihai Preda; Gregory Cobena (2003)."Adaptive on-line page importance computation".Proceedings of the 12th international conference on World Wide Web.Budapest, Hungary: ACM. pp. 280–290.doi:10.1145/775152.775192.ISBN1-58113-680-3.Retrieved22 March2009.
  14. ^Boldi, Paolo; Bruno Codenotti; Massimo Santini; Sebastiano Vigna (2004)."UbiCrawler: a scalable fully distributed Web crawler"(PDF).Software: Practice and Experience.34(8): 711–726.CiteSeerX10.1.1.2.5538.doi:10.1002/spe.587.S2CID325714.Archived fromthe original(PDF)on 20 March 2009.Retrieved23 March2009.
  15. ^Boldi, Paolo; Massimo Santini; Sebastiano Vigna (2004)."Do Your Worst to Make the Best: Paradoxical Effects in PageRank Incremental Computations"(PDF).Algorithms and Models for the Web-Graph.Lecture Notes in Computer Science. Vol. 3243. pp. 168–180.doi:10.1007/978-3-540-30216-2_14.ISBN978-3-540-23427-2.Archived fromthe original(PDF)on 1 October 2005.Retrieved23 March2009.
  16. ^Baeza-Yates, R.; Castillo, C.; Marin, M. and Rodriguez, A. (2005)."Crawling a Country: Better Strategies than Breadth-First for Web Page Ordering."In:Proceedings of the Industrial and Practical Experience track of the 14th conference on World Wide Web,pages 864–872, Chiba, Japan. ACM Press.
  17. ^Shervin Daneshpajouh, Mojtaba Mohammadi Nasiri, Mohammad Ghodsi,A Fast Community Based Algorithm for Generating Crawler Seeds Set.In:Proceedings of 4th International Conference on Web Information Systems and Technologies(Webist-2008), Funchal, Portugal, May 2008.
  18. ^Pant, Gautam; Srinivasan, Padmini; Menczer, Filippo (2004)."Crawling the Web"(PDF).In Levene, Mark;Poulovassilis, Alexandra(eds.).Web Dynamics: Adapting to Change in Content, Size, Topology and Use.Springer. pp. 153–178.ISBN978-3-540-40676-1.Archived fromthe original(PDF)on 20 March 2009.Retrieved9 May2006.
  19. ^Cothey, Viv (2004)."Web-crawling reliability"(PDF).Journal of the American Society for Information Science and Technology.55(14): 1228–1238.CiteSeerX10.1.1.117.185.doi:10.1002/asi.20078.
  20. ^Menczer, F. (1997).ARACHNID: Adaptive Retrieval Agents Choosing Heuristic Neighborhoods for Information DiscoveryArchived21 December 2012 at theWayback Machine.In D. Fisher, ed., Machine Learning: Proceedings of the 14th International Conference (ICML97). Morgan Kaufmann
  21. ^Menczer, F. and Belew, R.K. (1998).Adaptive Information Agents in Distributed Textual EnvironmentsArchived21 December 2012 at theWayback Machine.In K. Sycara and M. Wooldridge (eds.) Proc. 2nd Intl. Conf. on Autonomous Agents (Agents '98). ACM Press
  22. ^Chakrabarti, Soumen; Van Den Berg, Martin; Dom, Byron (1999)."Focused crawling: A new approach to topic-specific Web resource discovery"(PDF).Computer Networks.31(11–16): 1623–1640.doi:10.1016/s1389-1286(99)00052-3.Archived fromthe original(PDF)on 17 March 2004.
  23. ^Pinkerton, B. (1994).Finding what people want: Experiences with the WebCrawler.In Proceedings of the First World Wide Web Conference, Geneva, Switzerland.
  24. ^Diligenti, M., Coetzee, F., Lawrence, S., Giles, C. L., and Gori, M. (2000).Focused crawling using context graphs.In Proceedings of 26th International Conference on Very Large Databases (VLDB), pages 527-534, Cairo, Egypt.
  25. ^Wu, Jian; Teregowda, Pradeep; Khabsa, Madian; Carman, Stephen; Jordan, Douglas; San Pedro Wandelmer, Jose; Lu, Xin; Mitra, Prasenjit; Giles, C. Lee (2012). "Web crawler middleware for search engine digital libraries".Proceedings of the twelfth international workshop on Web information and data management - WIDM '12.p. 57.doi:10.1145/2389936.2389949.ISBN9781450317207.S2CID18513666.
  26. ^Wu, Jian; Teregowda, Pradeep; Ramírez, Juan Pablo Fernández; Mitra, Prasenjit; Zheng, Shuyi; Giles, C. Lee (2012). "The evolution of a crawling strategy for an academic document search engine".Proceedings of the 3rd Annual ACM Web Science Conference on - WebSci'12.pp. 340–343.doi:10.1145/2380718.2380762.ISBN9781450312288.S2CID16718130.
  27. ^Dong, Hai; Hussain, Farookh Khadeer; Chang, Elizabeth (2009)."State of the Art in Semantic Focused Crawlers".Computational Science and Its Applications – ICCSA 2009.Lecture Notes in Computer Science. Vol. 5593. pp. 910–924.doi:10.1007/978-3-642-02457-3_74.hdl:20.500.11937/48288.ISBN978-3-642-02456-6.
  28. ^Dong, Hai; Hussain, Farookh Khadeer (2013)."SOF: A semi-supervised ontology-learning-based focused crawler".Concurrency and Computation: Practice and Experience.25(12): 1755–1770.doi:10.1002/cpe.2980.S2CID205690364.
  29. ^Junghoo Cho; Hector Garcia-Molina (2000)."Synchronizing a database to improve freshness"(PDF).Proceedings of the 2000 ACM SIGMOD international conference on Management of data.Dallas, Texas, United States: ACM. pp. 117–128.doi:10.1145/342009.335391.ISBN1-58113-217-4.Retrieved23 March2009.
  30. ^abE. G. Coffman Jr; Zhen Liu; Richard R. Weber (1998). "Optimal robot scheduling for Web search engines".Journal of Scheduling.1(1): 15–29.CiteSeerX10.1.1.36.6087.doi:10.1002/(SICI)1099-1425(199806)1:1<15::AID-JOS3>3.0.CO;2-K.
  31. ^abCho, Junghoo; Garcia-Molina, Hector (2003). "Effective page refresh policies for Web crawlers".ACM Transactions on Database Systems.28(4): 390–426.doi:10.1145/958942.958945.S2CID147958.
  32. ^abJunghoo Cho; Hector Garcia-Molina (2003). "Estimating frequency of change".ACM Transactions on Internet Technology.3(3): 256–290.CiteSeerX10.1.1.59.5877.doi:10.1145/857166.857170.S2CID9362566.
  33. ^Ipeirotis, P., Ntoulas, A., Cho, J., Gravano, L. (2005)Modeling and managing content changes in text databasesArchived5 September 2005 at theWayback Machine.In Proceedings of the 21st IEEE International Conference on Data Engineering, pages 606-617, April 2005, Tokyo.
  34. ^Koster, M. (1995). Robots in the web: threat or treat? ConneXions, 9(4).
  35. ^Koster, M. (1996).A standard for robot exclusionArchived7 November 2007 at theWayback Machine.
  36. ^Koster, M. (1993).Guidelines for robots writersArchived22 April 2005 at theWayback Machine.
  37. ^Baeza-Yates, R. and Castillo, C. (2002).Balancing volume, quality and freshness in Web crawling.In Soft Computing Systems – Design, Management and Applications, pages 565–572, Santiago, Chile. IOS Press Amsterdam.
  38. ^Heydon, Allan; Najork, Marc (26 June 1999)."Mercator: A Scalable, Extensible Web Crawler"(PDF).Archived fromthe original(PDF)on 19 February 2006.Retrieved22 March2009.{{cite journal}}:Cite journal requires|journal=(help)
  39. ^Dill, S.; Kumar, R.; Mccurley, K. S.; Rajagopalan, S.; Sivakumar, D.; Tomkins, A. (2002)."Self-similarity in the web"(PDF).ACM Transactions on Internet Technology.2(3): 205–223.doi:10.1145/572326.572328.S2CID6416041.
  40. ^M. Thelwall; D. Stuart (2006)."Web crawling ethics revisited: Cost, privacy and denial of service".Journal of the American Society for Information Science and Technology.57(13): 1771–1779.doi:10.1002/asi.20388.
  41. ^Brin, Sergey; Page, Lawrence (1998)."The anatomy of a large-scale hypertextual Web search engine".Computer Networks and ISDN Systems.30(1–7): 107–117.doi:10.1016/s0169-7552(98)00110-x.S2CID7587743.
  42. ^Shkapenyuk, V. andSuel, T.(2002).Design and implementation of a high performance distributed web crawler.In Proceedings of the 18th International Conference on Data Engineering (ICDE), pages 357-368, San Jose, California. IEEE CS Press.
  43. ^Shestakov, Denis (2008).Search Interfaces on the Web: Querying and CharacterizingArchived6 July 2014 at theWayback Machine.TUCS Doctoral Dissertations 104, University of Turku
  44. ^Michael L Nelson; Herbert Van de Sompel; Xiaoming Liu; Terry L Harrison; Nathan McFarland (24 March 2005). "mod_oai: An Apache Module for Metadata Harvesting": cs/0503069.arXiv:cs/0503069.Bibcode:2005cs........3069N.{{cite journal}}:Cite journal requires|journal=(help)
  45. ^Shestakov, Denis; Bhowmick, Sourav S.; Lim, Ee-Peng (2005)."DEQUE: Querying the Deep Web"(PDF).Data & Knowledge Engineering.52(3): 273–311.doi:10.1016/s0169-023x(04)00107-7.
  46. ^"AJAX crawling: Guide for webmasters and developers".Retrieved17 March2013.
  47. ^ITA Labs"ITA Labs Acquisition"Archived18 March 2014 at theWayback Machine20 April 2011 1:28 AM
  48. ^"About Applebot".Apple Inc.Retrieved18 October2021.
  49. ^ Norton, Quinn (25 January 2007)."Tax takers send in the spiders".Business.Wired.Archivedfrom the original on 22 December 2016.Retrieved13 October2017.
  50. ^ "Xenon web crawling initiative: privacy impact assessment (PIA) summary".Ottawa: Government of Canada. 11 April 2017.Archivedfrom the original on 25 September 2017.Retrieved13 October2017.

Further reading[edit]