The present invention relates generally to the configuration of Internet browser settings for use in computer network systems, and in particular to automatically modifying browser settings.
This application is related to U.S. patent application Ser. No. 10/882,794, filed Jun. 30, 2004, “System and Method of Accessing a Document Efficiently Through Multi-Tier Web Caching”, which is hereby incorporated by reference in its entirety.
Computer networks may take a variety of forms. They may be located within a small, local geographic area, such as an office building, and consist of only a limited number of devices. This type of network is commonly referred to as a Local Area Network (LAN). On a broader scale, the networks may be larger and support more users over a wider geographic area, such as across a city or state. This type of network is commonly referred to as a Wide Area Network (WAN). On an even broader scale the LAN and WAN networks may be interconnected across a country or globally. An example of a globally connected public data communications network is the Internet. LANs and WANs are more likely to be private networks, that is, those which do not allow access by non-permitted computing devices.
Devices which may be associated with these networks may include personal computers, cellular phones, mobile data terminals, radio modems, portable computers, personal digital assistants, pagers, mainframes, departmental servers, mass storage devices, or any other similar device. A browser is a software program designed to help a user access information stored locally or on networks.
A proxy is a device or mechanism (usually an application program) on a network node which performs specialized functions and typically sits between the user's device and a network. One such function is to provide network security. Security is provided between a private and public network by requiring communications (e.g., information exchanges) to pass through the proxy. Another function of a proxy is to store or cache recently accessed information (e.g., copies of documents and images). If a browser desires information which is located outside the local network, that is to say on an information source attached to an external network, communications pass from the browser through the proxy before going on to the external network.
In accordance with one embodiment of the invention, a method is disclosed for determining a proxy. A first proxy is determined for a predetermined host as well as a second proxy for a desired host. The resulting proxy is the first proxy if the first and second proxies are equivalent and is the second proxy if the first and second proxies are not equivalent.
In accordance with another embodiment of the invention, a method for creating a modified proxy setting for a browser includes inputting a current proxy setting. A first computer programming object is created for determining a first proxy for a predetermined host using the current proxy setting. A second computer programming object is created for determining a second proxy for a desired host using the current proxy setting. A third computer program object is created for returning a predetermined proxy as a proxy if the first proxy and the second proxy are equivalent, and otherwise returning the second proxy as the proxy. A fourth computer program object is created by including at least the first computer programming object and the second computer programming object into a computer program object.
For a better understanding of the nature and embodiments of the invention, reference should be made to the Description of Embodiments below, in conjunction with the following drawings in which like reference numerals refer to corresponding parts throughout the figures.
The client 102 can be any number of different types of client devices, such as a personal computer, a cellular phone, a mobile data terminal, a radio modem, a portable computer, a personal digital assistant, or another type of device that can be used to obtain information from networks. Proxy 110 or 108 can be an application running on the client 102, an application running on a server remote from the client 102 in the network, or a specialized server.
The private network 106 may include of any number of different types of networks including local area networks, wide area networks, and other types of networks within companies or localities or other networks where access is limited or controlled (e.g., a company intranet). The private network 106 is typically defined by a set IP addresses (internet protocol addresses) which are designed to be within certain geographical or logical groupings, but more importantly, not considered to be part of the public internet, such as Internet 104. For example, a company may place its servers and clients on a private network which is isolated from the public.
A user will typically use a browser (not shown) or other application to access a particular resource on the private network 106 or the Internet 104. The user enters a uniform resource locator (URL) into the browser and then the browser attempts to locate the resource. The URL consists of a number of elements, including, for example, a protocol, a hostname and a resource location. Other elements might include a port number or authorization information. The hostname is the name of the server on which the desired resource is located. The hostname may be represented as a domain address, i.e., series of digits such as 216.239.36.10, or by a domain name, such as www.google.com, which must ultimately be translated using a domain name system (DNS) server into a domain address. RFCs 1480 and 1591 promulgated by the Internet Engineering Task Force (IETF) provide more information about domain naming and RFC 1738 addresses URLs. Based on the hostname, the browser determines whether the client 102 will send the request directly to a particular network or to a proxy. As mentioned above, proxies are typically used to provide services such as document caching, DNS caching, security, and/or enforcement of local policies.
In certain situations, an application running on a client may need to communicate with an application on a server. This may be particularly useful for providing services between a client and a network such as the Internet. For example, a system and method for providing accelerated delivery of documents to a client from a network is described in application Ser. No. 10/882,794, System and Method of Accessing a Document Efficiently Through Multi-Tier Web Caching”, filed Jun. 30, 2004, which is hereby incorporated by reference. In such a system and method, a local client assistant is paired with a server application to assist in the delivery of documents. In this context, the term “document” is used broadly and includes files and data structures of many types, including text documents, images, audio, multimedia files, data steams, and so on. Other types of services could be imagined and still fall within the scope of embodiments of the present invention.
The term “located” is used here and elsewhere and should be understood to apply to locations which may be physical or logical. For example, proxies may be local software applications running on the client, stand alone hardware/software combinations, or applications running on a server remote from the client. One of ordinary skill in the art will recognize various ways to achieve desired proxy features.
A client computer may be configured to operate within various types of connectivity situations, the features of which must be addressed when configuring the client computer to work with the client assistant/server combination described above.
When a URL request is processed by the browser on the client 204, the browser will examine the URL to determine whether the address of the host in the request is within the private network 106. This might occur, for example, under control of code within, or accessed by, the browser. The browser determines whether the protocol address is within the private network, and, if it is within the private network, sends those requests to the proxy 206. On the other hand, if the address is determined not to be within the private network, then the request is sent directly to the Internet 104 via the dotted line connection 310. In such an instance, it would be desirable to replace the direct connection 310 with connections that would cause Internet requests that previously would have gone directly to the Internet 104 to be routed to client assistant 208 which would, in turn, direct the requests to server 210. This can be done, for example, by configuring the browser to recognize the client assistant 208 as a local proxy for requests directed to the Internet 104. The combination of client assistant 208 and server 210 can provide enhanced connection services between the client 204 and the Internet 104. For example, client assistant 208 and server 210 could provide enhanced caching and document delivery, thereby decreasing the time from when a user requests a document until user sees or is presented with the document. Although described here and elsewhere using a browser as an exemplary application, one of the ordinary skill in the art will recognize that the concepts employed in the embodiments described herein would apply equally well to other type of applications used to access network resources.
In this connectivity example, the browser configuration should be modified to recognize the client assistant 208 as a local proxy for connections directed to the Internet 104. However, the original proxy settings for addresses within the private network 106, which cause requests directed to those addresses to be sent through proxy 206, should remain unchanged. Altering the original proxy configuration for the private network 106 might have adverse consequences for security, policy enforcement, caching or other features associated with the private network 106.
In some embodiments, when the proxy 214 is determined to be a local proxy, modified proxy settings are not generated. As a result, the services provided by the client assistant/server combination are not available to the client computer 204. In yet other embodiments, when a local proxy 214 is determined to meet predefined criteria, the user's browser configuration is left intact and the local proxy is modified to send its requests to the client assistant 208, which in turn sends the requests to the server 210. However, this embodiment requires knowledge of the local proxy's configuration and the ability to modify it, neither of which are always available.
Placing the client assistant/server combination in the connectivity environments described above according to embodiments of the invention can be accomplished with the following realization: that the browser should route the private network traffic and traffic for specialized proxies as it had before, but otherwise send the traffic to the client assistant. In addition, the client assistant will be configured to route other traffic through the existing, general proxy, if one existed. Otherwise, the client assistant is configured to send the “other traffic” directly to the server paired with the client assistant. In other embodiments, there is not necessarily a direct pairing between client assistants and servers and the client assistant might connect to other servers which still allow the client assistant/server combination to achieve the desired effects.
Initially a control program is run on the client (stage 702). This control program may be launched by user initiated action or by automatic processing, such as by a start-up script. The control program may be configured to operate as a background process. The control program launches the client assistant (stage 704). In some embodiments, the control program waits for an Internet trigger (stage 706) before proceeding further. The Internet trigger may be the establishment of a connection between the client assistant and an associated server to which certain Internet traffic will be routed. In some embodiments, the control program does not wait for an Internet trigger.
Next, the control program reads the current (i.e., original) proxy settings for a browser application (stage 708). The control program reads the original proxy settings by any number of ways according to various embodiments, such as: (1) reading a set of entries in a registry of the client computer's registry; (2) calling an operating system provided function that provides the information; or (3) using a browser-specific function that provides the information.
The existing proxy settings, sometimes herein called the original proxy settings, are stored by the control program (stage 710) both for determining a set of modified proxy settings and for returning the proxy settings to the original proxy settings at an appropriate time, as explained below. In some embodiments, the original proxy settings are stored in a private area of the client computer's system registry. Using the original proxy settings, the control program determines and creates the modified proxy settings (stage 712). One embodiment of stage 712 is described more fully in connection with
After establishing the modified proxy settings, the control program monitors the network connectivity of the client computer. If the network connectivity changes or if the client assistant becomes disconnected from the server (stage 718), the control program restores the original proxy settings (stage 719) and then returns to stage 706. The control program also determines if itself should be terminated (stage 720). For instance, the control program should be terminated if the client computer is performing a shut down or restart sequence, or if the user requests that the control program terminate. When the control program determines that it should be terminated, the control program restores the original proxy settings (stage 722) and the client assistant is terminated (stage 724). Finally, the control program itself terminates (stage 726).
Before discussing how the modified proxy settings are created (stage 712 of
In this discussion, proxy settings are assumed to be a computer program or script that produces a result when presented with a URL as an input. The settings could be, for example, stored in a local file or accessible via a URL. When the result is “no proxy”, this means that a request to download a document at the URL would be sent directly to its host, without being sent to a proxy. Thus, the “no proxy” result is sometimes called “direct”.
At stage 804, a received URL (e.g., a URL specified by a user or by an application program) is run against the original proxy settings. This result is compared against the original proxy result for the public Internet address (stage 806). If the two proxy results are not equivalent (stage 806—no), then the received URL is routed through the proxy designated by the original proxy settings (stage 808). Thus, addresses that were routed through a proxy under the original proxy settings continue to be routed through the same proxy. If the two results are equivalent (stage 806—yes), then a modified proxy setting is used (stage 810). Here, the modified proxy setting is configured to be the client assistant. As described earlier, the client assistant in effect becomes a local proxy on the client.
To see the effects of these stages, it is instructive to examine how the logic would operate in the earlier described connectivity environments with particular reference to
Referring to
Referring to
Referring to
Although embodiments of the invention have been described in relation to a public Internet, those of ordinary skill in the art would recognize that the same techniques could be used when the Internet is replaced with other types of networks, where an address or ranges of address within that network may be known.
Referring to
The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to best explain the principles of the invention and its practical applications, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated.
Number | Name | Date | Kind |
---|---|---|---|
4953106 | Gansner et al. | Aug 1990 | A |
5450535 | North | Sep 1995 | A |
5559984 | Nakano et al. | Sep 1996 | A |
5727129 | Barrett et al. | Mar 1998 | A |
5748954 | Mauldin | May 1998 | A |
5752241 | Cohen | May 1998 | A |
5802292 | Mogul | Sep 1998 | A |
5832494 | Egger et al. | Nov 1998 | A |
5835905 | Pirolli et al. | Nov 1998 | A |
5848407 | Ishikawa et al. | Dec 1998 | A |
5878223 | Becker et al. | Mar 1999 | A |
5946697 | Shen | Aug 1999 | A |
5978791 | Farber et al. | Nov 1999 | A |
5978847 | Kisor et al. | Nov 1999 | A |
6003030 | Kenner et al. | Dec 1999 | A |
6014678 | Inoue et al. | Jan 2000 | A |
6023726 | Saksena | Feb 2000 | A |
6029175 | Chow et al. | Feb 2000 | A |
6055569 | O'Brien et al. | Apr 2000 | A |
6067565 | Horvitz | May 2000 | A |
6085193 | Malkin et al. | Jul 2000 | A |
6085226 | Horvitz | Jul 2000 | A |
6088707 | Bates et al. | Jul 2000 | A |
6098064 | Pirolli et al. | Aug 2000 | A |
6108703 | Leighton et al. | Aug 2000 | A |
6128644 | Nozaki | Oct 2000 | A |
6128701 | Malcolm et al. | Oct 2000 | A |
6134551 | Aucsmith | Oct 2000 | A |
6134583 | Herriot | Oct 2000 | A |
6167438 | Yates et al. | Dec 2000 | A |
6170013 | Murata | Jan 2001 | B1 |
6178461 | Chan et al. | Jan 2001 | B1 |
6182122 | Berstis | Jan 2001 | B1 |
6182133 | Horvitz | Jan 2001 | B1 |
6195622 | Altschuler et al. | Feb 2001 | B1 |
6205481 | Heddaya et al. | Mar 2001 | B1 |
6230168 | Unger et al. | May 2001 | B1 |
6272534 | Guha | Aug 2001 | B1 |
6282542 | Carneal et al. | Aug 2001 | B1 |
6285999 | Page | Sep 2001 | B1 |
6292880 | Mattis et al. | Sep 2001 | B1 |
6317777 | Skarbo et al. | Nov 2001 | B1 |
6338066 | Martin et al. | Jan 2002 | B1 |
6341311 | Smith et al. | Jan 2002 | B1 |
6405252 | Gupta et al. | Jun 2002 | B1 |
6421726 | Kenner et al. | Jul 2002 | B1 |
6442549 | Schneider | Aug 2002 | B1 |
6484143 | Swildens et al. | Nov 2002 | B1 |
6493702 | Adar et al. | Dec 2002 | B1 |
6502125 | Kenner et al. | Dec 2002 | B1 |
6516320 | Odom et al. | Feb 2003 | B1 |
6526479 | Rosenzweig | Feb 2003 | B2 |
6532520 | Dean et al. | Mar 2003 | B1 |
6542964 | Scharber | Apr 2003 | B1 |
6553411 | Dias et al. | Apr 2003 | B1 |
6578113 | Krishnamurthy et al. | Jun 2003 | B2 |
6581090 | Lindbo et al. | Jun 2003 | B1 |
6584498 | Nguyen | Jun 2003 | B2 |
6611908 | Lentz et al. | Aug 2003 | B2 |
6625643 | Colby et al. | Sep 2003 | B1 |
6631451 | Glance et al. | Oct 2003 | B2 |
6638314 | Meyerzon et al. | Oct 2003 | B1 |
6647421 | Logue et al. | Nov 2003 | B1 |
6665726 | Leighton et al. | Dec 2003 | B1 |
6701316 | Li et al. | Mar 2004 | B1 |
6725214 | Garcia-Chiesa | Apr 2004 | B2 |
6742033 | Smith et al. | May 2004 | B1 |
6744452 | McBrearty et al. | Jun 2004 | B1 |
6745295 | Rodriguez | Jun 2004 | B2 |
6757733 | Gupta | Jun 2004 | B2 |
6766313 | Kromann | Jul 2004 | B1 |
6766352 | McBrearty et al. | Jul 2004 | B1 |
6766422 | Beyda | Jul 2004 | B2 |
6772225 | Jennings, III et al. | Aug 2004 | B1 |
6782393 | Balabanovic et al. | Aug 2004 | B1 |
6813690 | Lango et al. | Nov 2004 | B1 |
6853391 | Bates et al. | Feb 2005 | B2 |
6883135 | Obata et al. | Apr 2005 | B1 |
6912591 | Lash | Jun 2005 | B2 |
6973457 | Bastawala et al. | Dec 2005 | B1 |
7003566 | Codella et al. | Feb 2006 | B2 |
7035921 | Baker | Apr 2006 | B1 |
7051111 | Scullin | May 2006 | B1 |
7095949 | Okada | Aug 2006 | B2 |
7100123 | Todd et al. | Aug 2006 | B1 |
7130872 | de Bonet | Oct 2006 | B2 |
7130890 | Kumar et al. | Oct 2006 | B1 |
7155475 | Agnoli et al. | Dec 2006 | B2 |
7185001 | Burdick et al. | Feb 2007 | B1 |
7228350 | Hong et al. | Jun 2007 | B2 |
7249053 | Wohlers et al. | Jul 2007 | B2 |
7328401 | Obata et al. | Feb 2008 | B2 |
7343397 | Kochanski | Mar 2008 | B2 |
7398271 | Borkovsky et al. | Jul 2008 | B1 |
7415536 | Nakazawa | Aug 2008 | B2 |
7426576 | Banga et al. | Sep 2008 | B1 |
7437364 | Fredricksen et al. | Oct 2008 | B1 |
7437409 | Danieli | Oct 2008 | B2 |
7437725 | Chang et al. | Oct 2008 | B1 |
7461155 | Reisman | Dec 2008 | B2 |
7523181 | Swildens et al. | Apr 2009 | B2 |
7548908 | Fu et al. | Jun 2009 | B2 |
7565425 | Van Vleet et al. | Jul 2009 | B2 |
7627628 | King et al. | Dec 2009 | B2 |
7676576 | Kommula | Mar 2010 | B1 |
7725602 | Liu et al. | May 2010 | B2 |
7761594 | Mowat | Jul 2010 | B1 |
7836044 | Kamvar et al. | Nov 2010 | B2 |
20010020248 | Banga et al. | Sep 2001 | A1 |
20010033557 | Amalfitano | Oct 2001 | A1 |
20010050875 | Kahn et al. | Dec 2001 | A1 |
20020002618 | Vange | Jan 2002 | A1 |
20020004813 | Agrawal et al. | Jan 2002 | A1 |
20020007404 | Vange et al. | Jan 2002 | A1 |
20020007413 | Garcia-Luna-Aceves et al. | Jan 2002 | A1 |
20020016786 | Pitkow et al. | Feb 2002 | A1 |
20020023159 | Vange et al. | Feb 2002 | A1 |
20020031102 | Wiedeman et al. | Mar 2002 | A1 |
20020048269 | Hong et al. | Apr 2002 | A1 |
20020078087 | Stone | Jun 2002 | A1 |
20020078371 | Heilig et al. | Jun 2002 | A1 |
20020082811 | Honjas et al. | Jun 2002 | A1 |
20020097261 | Gottfurcht et al. | Jul 2002 | A1 |
20020107935 | Lowery et al. | Aug 2002 | A1 |
20020143892 | Mogul | Oct 2002 | A1 |
20020143984 | Hudson Michel | Oct 2002 | A1 |
20020152361 | Dean et al. | Oct 2002 | A1 |
20020156864 | Kniest | Oct 2002 | A1 |
20020156980 | Rodriguez | Oct 2002 | A1 |
20020161860 | Godlin et al. | Oct 2002 | A1 |
20020184340 | Srivastava et al. | Dec 2002 | A1 |
20020188665 | Lash | Dec 2002 | A1 |
20020191610 | Baek et al. | Dec 2002 | A1 |
20020198883 | Nishizawa et al. | Dec 2002 | A1 |
20020198961 | Krishnamurthy et al. | Dec 2002 | A1 |
20030005152 | Diwan et al. | Jan 2003 | A1 |
20030023813 | Malcolm | Jan 2003 | A1 |
20030046343 | Krishnamurthy et al. | Mar 2003 | A1 |
20030065743 | Jenny et al. | Apr 2003 | A1 |
20030079027 | Slocombe et al. | Apr 2003 | A1 |
20030079041 | Parrella et al. | Apr 2003 | A1 |
20030084159 | Blewett | May 2003 | A1 |
20030086098 | Sesek et al. | May 2003 | A1 |
20030101234 | McBrearty et al. | May 2003 | A1 |
20030158913 | Agnoli et al. | Aug 2003 | A1 |
20030161611 | Okada | Aug 2003 | A1 |
20030167257 | de Bonet | Sep 2003 | A1 |
20030172075 | Reisman | Sep 2003 | A1 |
20030172183 | Anderson et al. | Sep 2003 | A1 |
20030212779 | Boyter et al. | Nov 2003 | A1 |
20030217173 | Butt et al. | Nov 2003 | A1 |
20040039798 | Hotz et al. | Feb 2004 | A1 |
20040049598 | Tucker et al. | Mar 2004 | A1 |
20040064577 | Dahlin et al. | Apr 2004 | A1 |
20040073707 | Dillon | Apr 2004 | A1 |
20040078453 | Bhogal et al. | Apr 2004 | A1 |
20040078487 | Cernohous et al. | Apr 2004 | A1 |
20040107296 | Donker et al. | Jun 2004 | A1 |
20040139282 | Yoshioka et al. | Jul 2004 | A1 |
20040205149 | Dillon et al. | Oct 2004 | A1 |
20040205165 | Melamed et al. | Oct 2004 | A1 |
20040215665 | Edgar et al. | Oct 2004 | A1 |
20040225644 | Squillante et al. | Nov 2004 | A1 |
20040230747 | Ims et al. | Nov 2004 | A1 |
20040237044 | Travieso et al. | Nov 2004 | A1 |
20040239681 | Robotham et al. | Dec 2004 | A1 |
20040249971 | Klinker | Dec 2004 | A1 |
20040250119 | Shelest et al. | Dec 2004 | A1 |
20040260466 | Ichihara et al. | Dec 2004 | A1 |
20040262051 | Carro | Dec 2004 | A1 |
20050033803 | Vleet et al. | Feb 2005 | A1 |
20050038787 | Cheung et al. | Feb 2005 | A1 |
20050138604 | Harrison | Jun 2005 | A1 |
20050165778 | Obata et al. | Jul 2005 | A1 |
20050165829 | Varasano | Jul 2005 | A1 |
20050198224 | Kobayashi et al. | Sep 2005 | A1 |
20050198327 | Iwamura et al. | Sep 2005 | A1 |
20050198386 | Accapadi et al. | Sep 2005 | A1 |
20050204064 | Ruiz | Sep 2005 | A1 |
20050246347 | Kobayashi | Nov 2005 | A1 |
20050278222 | Nortrup | Dec 2005 | A1 |
20050278417 | Fremantle et al. | Dec 2005 | A1 |
20060047804 | Fredricksen et al. | Mar 2006 | A1 |
20060085601 | Woffinden et al. | Apr 2006 | A1 |
20060089978 | Lee et al. | Apr 2006 | A1 |
20060143568 | Milener et al. | Jun 2006 | A1 |
20060156387 | Eriksen | Jul 2006 | A1 |
20060167862 | Reisman | Jul 2006 | A1 |
20060168348 | Casalaina | Jul 2006 | A1 |
20060179123 | Smith | Aug 2006 | A1 |
20060253612 | Cheshire | Nov 2006 | A1 |
20060271642 | Stavrakos et al. | Nov 2006 | A1 |
20060294223 | Glasgow et al. | Dec 2006 | A1 |
20060294311 | Fu et al. | Dec 2006 | A1 |
20070022102 | Saxena | Jan 2007 | A1 |
20070174774 | Lerman et al. | Jul 2007 | A1 |
20070189708 | Lerman et al. | Aug 2007 | A1 |
20070214052 | Kao | Sep 2007 | A1 |
20070250841 | Scahill et al. | Oct 2007 | A1 |
20070294480 | Moser | Dec 2007 | A1 |
20080010365 | Schneider | Jan 2008 | A1 |
20080140626 | Wilson | Jun 2008 | A1 |
20080195819 | Dumont | Aug 2008 | A1 |
20080222363 | Khemani et al. | Sep 2008 | A1 |
20080229017 | Plamondon | Sep 2008 | A1 |
20090049388 | Taib et al. | Feb 2009 | A1 |
20090119286 | Reisman | May 2009 | A1 |
20090276407 | Van Vleet et al. | Nov 2009 | A1 |
20100257236 | Agnoli et al. | Oct 2010 | A1 |
Number | Date | Country |
---|---|---|
1182589 | Feb 2002 | EP |
2317723 | Apr 1998 | GB |
WO 0155897 | Aug 2001 | WO |
WO 02100117 | Dec 2002 | WO |
WO 2005006129 | Jan 2005 | WO |
Entry |
---|
Arocena, Applications of a Web Query Language, Aug. 12, 1997, 15 pgs. |
Banga, Optimistic Deltas for WWW Latency Reduction, 1997, 15 pgs. |
Bestavros, Server-initiated Document Dissemination for the WWW, Sep. 3-11, 1996, 8 pgs. |
Botafogo, Structural Analysis of Hypertext: Identifying Hierarchies and Useful Metrics, Apr. 1992, 39 pgs. |
Boyle, To link or not to link: An empirical comparison of hypertext linking strategies, 1992, 11 pgs. |
Bruck, Weighted Bloom Filter, Information Theory, Jul. 9-14, 2006, 5 pgs. |
Cao, A Study of Integrated Prefetching and Caching Strategies, Jun. 1995, 10 pgs. |
Carriere, WebQuery: Searching and Visualizing the Web through Connectivity, 1997, 12 pgs. |
Chan, Cache-based Compaction: A New Technique for Optimizing Web Transfer, 1999, 9 pgs. |
Cohen, Proactive Caching of DNS Records: Addressing a Performance Bottleneck, SAINT, Jan. 2001, 10 pgs. |
Craswell, Effective Site Finding using Link Anchor Information, Sep. 9-12, 2001, 8 pgs. |
Curewitz, Practical Prefetching via Data Compression, 1993, 10 pgs. |
Doreian, A Measure of Standing for Citation Networks within a Wider Environment, 1994, 11 pgs. |
Doreian, Measuring the Relative Standing of Disciplinary Journals, 1998, 12 pgs. |
Douglis, Dynamic Suppression of Similarity in the Web: a Case for Deployable Detection Mechanisms, Jul. 11, 2002, 8 pgs. |
Fan, Web Prefetching Between Low-Bandwidth Clients and Proxies: Potential and Performance, May 1999, 13 pgs. |
Frisse, Searching for Information in a Hypertext Medical Handbook, Jul. 1998, 7 pgs. |
Garfield, Citation Analysis as a Tool in Journal Evaluation, 1962-1973, 18 pgs. |
Geller, On the Citation Influence Methodology of Pinski and Narin, 1978, 3 pgs. |
Gong, Bloom Filter-based XML Packets Filtering for Millions of Path Queries, 2005, 12 pgs. |
Google Inc., ISR, PCT/US2005/022067, Oct. 1, 2006, 7 pgs. |
Google Inc., ISR/WO, PCT/US2008/054167, Jul. 2, 2008, 8 pgs. |
Google Inc., ISRWO, PCT/US2008/088047, Feb. 23, 2009, 8 pgs. |
Griffioen, Reducing File System Latency Using a Predictive Approach, Jun. 1994, 12 pgs. |
Gwertzman, The Case for Geographical Push-Caching, 1995, 5 pgs. |
Henzinger, Measuring Index Quality Using Random Walks on the Web, May 1999, 35 pgs. |
Hubbell, An Input-Output Approach to Clique Identification Sociometry, 1965, 23 pgs. |
Katz, A New Status Index Derived from Sociometric Analysis, Mar. 1953, 5 pgs. |
Kimbrel, Integrated Parallel Prefetching and Caching, 1996, 2 pgs. |
Kleinberg, Authoritative Sources in a Hyperlinked Environment, Sep. 1999, 29 pgs. |
Kroeger, Digital's Web Proxy Traces, Dec. 1996, 5 pgs. |
Luotonen, World-Wide Web Proxies, Apr. 994, 8 pgs. |
Marchiori, The Quest for Correct Information on the Web: Hyper Search Engines, 1997, 18 pgs. |
Markatos, A Top-10 Approach to Prefetching on the Web, Aug. 1996, 15 pgs. |
McBryan, GENVL and WWWW: Tools for Taming the Web, May 1994, 10 pgs. |
Mizruchi, Techniques for Disaggregating Centrality Scores in Social Networks, 1996, 23 pgs. |
Mogul, Delta Encoding in HTTP, Jan. 2002, 49 pgs. |
Mogul, Potential Benefits of Delta Encoding and Data Compression for HTTP, 1997, 14 pgs. |
Padmanabhan, Using Predictive Prefetching to Improve World Wide Web Latency, Jul. 1996, 15 pgs. |
Palmer, Fido: A Cache That Learns to Fetch, Sep. 1991, 10 pgs. |
Patterson, Informed Prefetching and Caching, May 11, 1995, 24 pgs. |
Pinski, Citation Influence for Journal Aggregates of Scientific Publications: Theory with Application to the Literature of Physics, 1976, 16 pgs. |
Ramer, Similarity, Probability and Database Organization: Extended Abstract, 1996, 6 pgs. |
Rhea, Value-based Web Caching, May 2003, 10 pgs. |
Sakaguchi, A Browsing Tool for Multi-lingual Documents for Users without Multi-lingual Fonts, 1996, 7 pgs. |
Schilit, TeleWeb: Loosely Connected Access to the World Wide Web, May 6-10, 1996, 16 pgs. |
Tait, Detection and Exploitation of File Working Sets, May 1991, 19 pgs. |
Vitter, Optimal Prefetching via Data Compression, Nov. 13, 1995, 20 pgs. |
Wang, Prefetching in World Wide Web, 1996, 5 pgs. |
Williams, Removal Policies in Network Caches for World-Wide Web Documents, Aug. 1996, 14 pgs. |