{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:37:42Z","timestamp":1726054662922},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030241230"},{"type":"electronic","value":"9783030241247"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24124-7_2","type":"book-chapter","created":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T15:02:46Z","timestamp":1570719766000},"page":"19-34","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Federated In-memory Database System for Life Sciences"],"prefix":"10.1007","author":[{"given":"Matthieu-P.","family":"Schapranow","sequence":"first","affiliation":[]},{"given":"Cindy","family":"Perscheid","sequence":"additional","affiliation":[]},{"given":"Alf","family":"Wachsmann","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Siegert","sequence":"additional","affiliation":[]},{"given":"Cornelius","family":"Bock","sequence":"additional","affiliation":[]},{"given":"Friedrich","family":"Horschig","sequence":"additional","affiliation":[]},{"given":"Franz","family":"Liedke","sequence":"additional","affiliation":[]},{"given":"Janos","family":"Brauer","sequence":"additional","affiliation":[]},{"given":"Hasso","family":"Plattner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,11]]},"reference":[{"key":"2_CR1","unstructured":"Amazon Web Services, Inc.: Amazon Elastic Computing Cloud (EC2), July 2015. \n                    http:\/\/aws.amazon.com\/ec2\/Jul27\n                    \n                  . Accessed 10 Dec 2018"},{"issue":"4","key":"2_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., et al.: A view of cloud computing. Commun. ACM 53(4), 50\u201358 (2010)","journal-title":"Commun. ACM"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.csbj.2014.11.001","volume":"13","author":"K Bhuvaneshwar","year":"2015","unstructured":"Bhuvaneshwar, K., et al.: A case study for cloud-based high-throughput analysis of NGS data using the globus genomics system. Comput. Struct. Biotechnol. J. 13, 64\u201374 (2015)","journal-title":"Comput. Struct. Biotechnol. J."},{"key":"2_CR4","unstructured":"Bundes\u00e4rztekammer und Kassen\u00e4rztliche Vereinigung: Empfehlungen zur \u00e4rztlichen Schweigepflicht, Datenschutz und Datenverarbeitung in der Arztpraxis. Deutsche \u00c4rzteblatt 111(21), A963\u2013A972 (2014)"},{"key":"2_CR5","unstructured":"CERN: gLite - Lightweight Middleware for Grid Computing, April 2014. \n                    http:\/\/grid-deployment.web.cern.ch\/grid-deployment\/glite-web\/introductionJul27\n                    \n                  . Accessed 10 Dec 2018"},{"key":"2_CR6","unstructured":"Everest Global, Inc.: Enterprise Cloud Adoption Survey, March 2014. \n                    http:\/\/www.everestgrp.com\/wp-content\/uploads\/2014\/03\/2014-Enterprise-Cloud-Adoption-Survey.pdfDec17\n                    \n                  . Accessed 10 Dec 2018"},{"issue":"4","key":"2_CR7","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/2094114.2094126","volume":"40","author":"F F\u00e4rber","year":"2012","unstructured":"F\u00e4rber, F., et al.: SAP HANA database: data management for modern business applications. SIGMOD Rec. 40(4), 45\u201351 (2012)","journal-title":"SIGMOD Rec."},{"issue":"1","key":"2_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1093\/qjmed\/hct236","volume":"107","author":"R Fears","year":"2013","unstructured":"Fears, R., et al.: Data protection regulation and the promotion of health research: getting the balance right. QJM 107(1), 3\u20135 (2013)","journal-title":"QJM"},{"key":"2_CR9","unstructured":"Gartner, Inc.: 2014 Hype Cycle for Emerging Technologies Maps the Journey to Digital Business, August 2014. \n                    http:\/\/www.gartner.com\/newsroom\/id\/2819918Dec11\n                    \n                  . Accessed 10 Dec 2018"},{"issue":"8","key":"2_CR10","doi-asserted-by":"publisher","first-page":"R86","DOI":"10.1186\/gb-2010-11-8-r86","volume":"11","author":"Jeremy Goecks","year":"2010","unstructured":"Goecks, J., Nekrutenko, A., Taylor, J., The Galaxy Team: Galaxy: a comprehensive approach for supporting accessible, reproducible, and transparent computational research in the life sciences. Genome Biol. 11(8), R86 (2010)","journal-title":"Genome Biology"},{"key":"2_CR11","unstructured":"Grondona, M.A.: Parallel Distributed Shell (PDSH), August 2011. \n                    https:\/\/code.google.com\/p\/pdsh\/wiki\/UsingPDSHNov26\n                    \n                  . Accessed 10 Dec 2018"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Hardt, D.: RFC6749: The OAuth 2.0 Authorization Framework, October 2012. \n                    http:\/\/tools.ietf.org\/html\/rfc6749\/Nov26\n                    \n                  . Accessed 10 Dec 2018","DOI":"10.17487\/rfc6749"},{"issue":"6","key":"2_CR13","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1038\/nrg3208","volume":"13","author":"PB Jensen","year":"2012","unstructured":"Jensen, P.B., Jensen, L.J., Brunak, S.: Mining electronic health records: towards better research applications and clinical care. Nat. Rev. Genet. 13(6), 395\u2013405 (2012)","journal-title":"Nat. Rev. Genet."},{"key":"2_CR14","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-642-37437-1_7","volume-title":"Collaborative, Trusted and Privacy-Aware e\/m-Services","author":"C Kalloniatis","year":"2013","unstructured":"Kalloniatis, C., Manousakis, V., Mouratidis, H., Gritzalis, S.: Migrating into the cloud: identifying the major security and privacy concerns. In: Douligeris, C., Polemi, N., Karantjias, A., Lamersdorf, W. (eds.) I3E 2013. IAICT, vol. 399, pp. 73\u201387. Springer, Heidelberg (2013). \n                    https:\/\/doi.org\/10.1007\/978-3-642-37437-1_7"},{"key":"2_CR15","volume-title":"Fundamental Modeling Concepts: Effective Communication of IT Systems","author":"A Kn\u00f6pfel","year":"2006","unstructured":"Kn\u00f6pfel, A., Grone, B., Tabeling, P.: Fundamental Modeling Concepts: Effective Communication of IT Systems. Wiley, Hoboken (2006)"},{"key":"2_CR16","unstructured":"Kundra, V.: Federal Cloud Computing Strategy, February 2011. \n                    http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/egov_docs\/federal-cloud-computing-strategy.pdfDec15\n                    \n                  . Accessed 10 Dec 2018"},{"key":"2_CR17","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1038\/nmeth.1923","volume":"9","author":"B Langmead","year":"2012","unstructured":"Langmead, B., Salzberg, S.L.: Fast gapped read alignment with bowtie 2. Nat. Methods 9, 357\u2013359 (2012)","journal-title":"Nat. Methods"},{"key":"2_CR18","doi-asserted-by":"publisher","first-page":"1754","DOI":"10.1093\/bioinformatics\/btp324","volume":"25","author":"H Li","year":"2009","unstructured":"Li, H., Durbin, R.: Fast and accurate short read alignment with burrows-wheeler transformation. Bioinformatics 25, 1754\u20131760 (2009)","journal-title":"Bioinformatics"},{"key":"2_CR19","unstructured":"National Institute of Standards and Technology: The NIST Definition of CloudComputing: Recommendations of the National Institute of Standards andTechnology. NIST Special Publication 800-145, September 2011"},{"key":"2_CR20","unstructured":"OpenVPN Technologies, Inc.: Site-to-Site Layer 3 Routing Using OpenVPNAccess Server and a Linux Gateway Client, February 2012. \n                    https:\/\/docs.openvpn.net\/\n                    \n                  . Accessed 10 Dec 2018"},{"key":"2_CR21","series-title":"In-Memory Data Management Research","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03035-7","volume-title":"High-Performance In-Memory Genome Data Analysis: How In-Memory Database Technology Accelerates Personalized Medicine","year":"2014","unstructured":"Plattner, H., Schapranow, M.-P. (eds.): High-Performance In-Memory Genome Data Analysis: How In-Memory Database Technology Accelerates Personalized Medicine. IDMR. Springer, Cham (2014). \n                    https:\/\/doi.org\/10.1007\/978-3-319-03035-7"},{"issue":"1","key":"2_CR22","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/1866739.1866751","volume":"54","author":"MD Ryan","year":"2011","unstructured":"Ryan, M.D.: Cloud computing privacy concerns on our doorstep. Commun. ACM 54(1), 36\u201338 (2011)","journal-title":"Commun. ACM"},{"key":"2_CR23","unstructured":"SAP SE: Add Hosts Using the Command-Line Interface (2014). \n                    http:\/\/help.sap.com\/saphelp_hanaplatform\/helpdata\/en\/0d\/9fe701e2214e98ad4f8721f6558c34\/content.htm\n                    \n                  . Accessed 10 Dec 2018"},{"key":"2_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-00497-6","volume-title":"Multi Tenancy for Cloud-Based In-Memory Column Databases: Workload Management and Data Placement","author":"J Schaffner","year":"2014","unstructured":"Schaffner, J.: Multi Tenancy for Cloud-Based In-Memory Column Databases: Workload Management and Data Placement. Springer, Heidelberg (2014). \n                    https:\/\/doi.org\/10.1007\/978-3-319-00497-6"},{"key":"2_CR25","unstructured":"Schapranow, M.P., et al.: In-memory computing enabling real-time genome data analysis. Int. J. Adv. Life Sci. 6(1 and 2), 11\u201329 (2014)"},{"key":"2_CR26","series-title":"SpringerBriefs in Electrical and Computer Engineering","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-1-4614-7699-3_1","volume-title":"Cloud Computing Basics","author":"S Srinivasan","year":"2014","unstructured":"Srinivasan, S.: Cloud computing evolution. In: Srinivasan, S. (ed.) Cloud Computing Basics. SECE, pp. 1\u201316. Springer, New York (2014). \n                    https:\/\/doi.org\/10.1007\/978-1-4614-7699-3_1"},{"key":"2_CR27","unstructured":"The UNICORE Forum e.V.: UNICORE - Documentation, July 2015. \n                    https:\/\/www.unicore.eu\/documentation\/Jul27\n                    \n                  . Accessed 10 Dec 2018"},{"issue":"2","key":"2_CR28","doi-asserted-by":"publisher","first-page":"e19","DOI":"10.2196\/jmir.1549","volume":"12","author":"P Wicks","year":"2010","unstructured":"Wicks, P., et al.: Sharing health data for better outcomes on PatientsLikeMe. J. Med. Internet Res. 12(2), e19 (2010)","journal-title":"J. Med. Internet Res."},{"issue":"1","key":"2_CR29","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s13174-010-0007-6","volume":"1","author":"Q Zhang","year":"2010","unstructured":"Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1(1), 7\u201318 (2010)","journal-title":"J. Internet Serv. Appl."}],"container-title":["Lecture Notes in Business Information Processing","Real-Time Business Intelligence and Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24124-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T15:22:16Z","timestamp":1570720936000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24124-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030241230","9783030241247"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24124-7_2","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BIRTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Business Intelligence for the Real-Time Enterprise","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kohala Coast, HI","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2015","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2015","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2015","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"birte2015","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/db.cs.pitt.edu\/birte2015\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}