Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Accessing the deep web

Published: 01 May 2007 Publication History

Abstract

Attempting to locate and quantify material on the Web that is hidden from typical search techniques.

References

[1]
BrightPlanet.com. The deep Web: Surfacing hidden value; brightplanet.com/resources/details/deepweb.html.
[2]
Chen-Chuan Chang, K., He, B., and Zhang, Z. Toward large scale integration: Building a metaquerier over databases on the Web. In Proceedings of the 2nd CIDR Conference, 2005.
[3]
Fetterly, D., Manasse, M., Najork, M., and Wiener, J. A large-scale study of the evolution of Web pages. In Proceedings of the 12th International World Wide Web Conference, 2004, 669--678.
[4]
Ghanem, T.M. and Aref, W.G. Databases deepen the Web. IEEE Computer 73, 1 (2004), 116--117.
[5]
GNU. wget; www.gnu.org/software/wget/wget.html.
[6]
He, H., Meng, W., Yu, C., and Wu, Z. Wise-integrator: An automatic integrator of Web search interfaces for e-commerce. In Proceedings of the 29th VLDB Conference, 2003.
[7]
Lawrence, S. and Giles, C.L. Accessibility of information on the Web. Nature 400, 6740 (1999), 107--109.
[8]
O'Neill, E., Lavoie, B., and Bennett, R. Web characterization; wcp.oclc.org.

Cited By

View all
  • (2024)COMMERCE IN THE SHADOWS: EXPLORING DARK WEB BLACK MARKETSLaw and World10.36475/10.2.1410:2(163-183)Online publication date: 30-Jun-2024
  • (2024)The Web Layers: Security Challenges and Solutions in Surface, Deep and Dark WebSSRN Electronic Journal10.2139/ssrn.4722851Online publication date: 2024
  • (2023)Using file and folder naming and structuring to improve automated detection of child sexual abuse images on the Dark WebForensic Science International: Digital Investigation10.1016/j.fsidi.2023.30162047(301620)Online publication date: Dec-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 50, Issue 5
ACM at sixty: a look back in time
May 2007
111 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/1230819
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 May 2007
Published in CACM Volume 50, Issue 5

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)643
  • Downloads (Last 6 weeks)126
Reflects downloads up to 23 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)COMMERCE IN THE SHADOWS: EXPLORING DARK WEB BLACK MARKETSLaw and World10.36475/10.2.1410:2(163-183)Online publication date: 30-Jun-2024
  • (2024)The Web Layers: Security Challenges and Solutions in Surface, Deep and Dark WebSSRN Electronic Journal10.2139/ssrn.4722851Online publication date: 2024
  • (2023)Using file and folder naming and structuring to improve automated detection of child sexual abuse images on the Dark WebForensic Science International: Digital Investigation10.1016/j.fsidi.2023.30162047(301620)Online publication date: Dec-2023
  • (2023)Ontology learning from relational database: a reviewJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-023-04693-814:12(16841-16851)Online publication date: 19-Sep-2023
  • (2022)Crawling Deep Web Data Based on Three-stage Template2022 7th International Conference on Big Data Analytics (ICBDA)10.1109/ICBDA55095.2022.9760358(30-34)Online publication date: 4-Mar-2022
  • (2022)Multimodal Classification of Onion Services for Proactive Cyber Threat Intelligence Using Explainable Deep LearningIEEE Access10.1109/ACCESS.2022.317696510(56044-56056)Online publication date: 2022
  • (2022)Handling Exit Node Vulnerability in Onion Routing with a Zero-Knowledge ProofInformation Integration and Web Intelligence10.1007/978-3-031-21047-1_34(399-405)Online publication date: 28-Nov-2022
  • (2021)Information Retrieval in the Hidden WebNew Opportunities for Sentiment Analysis and Information Processing10.4018/978-1-7998-8061-5.ch003(50-71)Online publication date: 2021
  • (2021)DeepBlockShield: Blockchain Agent-Based Secured Clinical Data Management Model from the Deep Web EnvironmentMathematics10.3390/math90910699:9(1069)Online publication date: 10-May-2021
  • (2021)Unsupervised DNF Blocking for Efficient Linking of Knowledge Graphs and TablesInformation10.3390/info1203013412:3(134)Online publication date: 19-Mar-2021
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media