First page Back Continue Last page Overview Graphics
Exploits request/response message exchange patterns with locality in requests and similarity in responses.
Cache can be indexed by some combination of
- Service (URL)
- Element location (Xpath)
- Element identity
- Artificial index (URI)
Cache is kept coherent through invalidation with various triggers.