Crawling AJAX by Inferring User Interface State Changes (2008) (тематика web-краулеров), страница 6
Описание файла
Файл "Crawling AJAX by Inferring User Interface State Changes (2008)" внутри архива находится в папке "тематика web-краулеров". PDF-файл из архива "тематика web-краулеров", который расположен в категории "". Всё это находится в предмете "английский язык" из 9 семестр (1 семестр магистратуры), которые можно найти в файловом архиве МГУ им. Ломоносова. Не смотря на прямую связь этого архива с МГУ им. Ломоносова, его также можно найти и в других разделах. .
Просмотр PDF-файла онлайн
Текст 6 страницы из PDF
This paper proposes a crawling method for A JAX. The main contributions of the paper are:• An analysis of the key problems involved in crawlingA JAX applications;• A systematic process and algorithm to infer a state machine from an A JAX application, which can be used to11Mesbah et. al. – Crawling AJAX by Inferring User Interface State Changesgenerate a static mirror site. Challenges addressed include the identification of clickable elements, the detection of DOM changes, and the construction of thestate machine;• The open source tool C RAWLJAX, which implementsthis process;• Six case studies used to evaluate the effectiveness, correctness, performance, and scalability of the proposedapproach.Although we have been focusing on A JAX in this paper,we believe that the approach could be applied to any DOMbased web application.Future work consists of conducting more case studies toimprove the ability of finding clickables in different A JAXsettings.
The fact that the tool is available for download foreveryone, will help to identify exciting case studies. Furthermore, strengthening the tool by extending its functionality, improving the performance, and the state explosionoptimization are other directions we foresee. Exposing thehidden-web induced by A JAX using C RAWLJAX and conducting automatic state-based testing of A JAX applicationbased on the reverse engineering techniques are other applications we will be working on.References[1] A. Andrews, J. Offutt, and R. Alexander.
Testing web applications by modeling with FSMs. Software and SystemsModeling, 4(3):326–345, July 2005.[2] R. Atterer and A. Schmidt. Adding usability to web engineering models and tools. In Proceedings of the 5th International Conferencee on Web Engineering (ICWE’05), pages36–41.
Springer, 2005.[3] Backbase. Designing rich internet applications for searchengine accessibility, 2005. backbase.com Whitepaper.[4] L. Barbosa and J. Freire. An adaptive crawler for locating hidden-web entry points. In WWW ’07: Proceedings ofthe 16th international conference on World Wide Web, pages441–450. ACM Press, 2007.[5] E.
Bozdag, A. Mesbah, and A. van Deursen. A comparisonof push and pull techniques for Ajax. In Proceedings of the9th IEEE International Symposium on Web Site Evolution(WSE’07), pages 15–22. IEEE Computer Society, 2007.[6] S. S. Chawathe, A. Rajaraman, H. Garcia-Molina, andJ.
Widom. Change detection in hierarchically structured information. In SIGMOD ’96: Proceedings of the 1996 ACMSIGMOD international conference on Management of data,pages 493–504. ACM Press, 1996.[7] A. Dasgupta, A. Ghosh, R. Kumar, C. Olston, S. Pandey, andA. Tomkins. The discoverability of the web. In WWW ’07:Proceedings of the 16th international conference on WorldWide Web, pages 421–430.
ACM Press, 2007.12SERG[8] A. F. de Carvalho and F. S. Silva. Smartcrawl: a new strategyfor the exploration of the hidden web. In WIDM ’04: Proceedings of the 6th annual ACM international workshop onWeb information and data management, pages 9–15. ACMPress, 2004.[9] A. van Deursen, P. Klint, and J. Visser. Domain-specificlanguages: an annotated bibliography. SIGPLAN Not.,35(6):26–36, 2000.[10] E. W. Dijkstra. A note on two problems in connexion withgraphs.
Numerische Mathematik, 1(1):269–271, 1959.[11] R. Fielding and R. N. Taylor. Principled design of themodern Web architecture. ACM Trans. Inter. Tech. (TOIT),2(2):115–150, 2002.[12] M. Florins and J. Vanderdonckt. Graceful degradation ofuser interfaces as a design method for multiplatform systems.
In IUI ’04: Proceedings of the 9th international conference on Intelligent user interfaces, pages 140–147. ACMPress, 2004.[13] J. Garrett. Ajax: A new approach to web applications.Adaptive path, 2005. http://www.adaptivepath.com/publications/essays/archives/000385.php.[14] J. P. Lage, A. S.
da Silva, P. B. Golgher, and A. H. F.Laender. Automatic generation of agents for collectinghidden web pages for data extraction. Data Knowl. Eng.,49(2):177–196, 2004.[15] V. L. Levenshtein. Binary codes capable of correcting deletions, insertions, and reversals. Cybernetics and ControlTheory, 10:707–710, 1996.[16] A. Marchetto, P.
Tonella, and F. Ricca. State-based testingof Ajax web applications. In Proceedings of the 1st IEEE International Conference on Software Testing Verification andValidation (ICST’08). IEEE Computer Society, 2008.[17] A. Memon, I. Banerjee, and A. Nagarajan. GUI ripping: Reverse engineering of graphical user interfaces for testing. InWCRE ’03: 10th Working Conference on Reverse Engineering, pages 260–269. IEEE Computer Society, 2003.[18] A. Memon, M.
L. Soffa, and M. E. Pollack. Coveragecriteria for GUI testing. In ESEC/FSE ’01: Proceedingsof the 8th European software engineering conference heldjointly with 9th ACM SIGSOFT international symposium onFoundations of software engineering, pages 256–267. ACMPress, 2001.[19] A. Mesbah and A. van Deursen. Migrating multi-page webapplications to single-page Ajax interfaces. In Proceedingsof the 11th European Conference on Software Maintenanceand Reengineering (CSMR’07), pages 181–190. IEEE Computer Society, 2007.[20] A. Mesbah and A. van Deursen.
A component- and pushbased architectural style for Ajax applications. Journal ofSystems and Software (JSS), 2008. To appear.[21] A. Ntoulas, P. Zerfos, and J. Cho. Downloading textual hidden web content through keyword queries. In JCDL ’05:Proceedings of the 5th ACM/IEEE-CS joint conference onDigital libraries, pages 100–109. ACM Press, 2005.[22] S. Raghavan and H. Garcia-Molina.
Crawling the hiddenweb. In VLDB ’01: Proceedings of the 27th InternationalConference on Very Large Data Bases, pages 129–138. Morgan Kaufmann Publishers Inc., 2001.TUD-SERG-2008-022SERGMesbah et. al. – Crawling AJAX by Inferring User Interface State Changes[23] A. Valmari.
The state explosion problem. In LNCS: Lectureson Petri Nets I, Basic Models, Advances in Petri Nets, pages429–528. Springer-Verlag, 1998.[24] R. K. Yin. Case Study Research: Design and Methods.SAGE Publications Inc, 3d edition, 2003.TUD-SERG-2008-02213Mesbah et. al. – Crawling AJAX by Inferring User Interface State Changes14SERGTUD-SERG-2008-022TUD-SERG-2008-022ISSN 1872-5392SERG.