{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:44:07Z","timestamp":1743097447784,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":11,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811039683"},{"type":"electronic","value":"9789811039690"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3969-0_28","type":"book-chapter","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T09:54:59Z","timestamp":1488448499000},"page":"245-253","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Deduplication Algorithm Based on Data Similarity and Delta Encoding"],"prefix":"10.1007","author":[{"given":"Bin","family":"Song","sequence":"first","affiliation":[]},{"given":"Limin","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Guangjun","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Li","family":"Ruan","sequence":"additional","affiliation":[]},{"given":"Shida","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"issue":"6","key":"28_CR1","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1109\/TPDS.2014.2322362","volume":"26","author":"L Wang","year":"2015","unstructured":"Wang, L., Ma, Y., Zomaya, A.Y., et al.: A parallel file system with application-aware data layout policies for massive remote sensing image processing in digital earth. IEEE Trans. Parallel Distrib. Syst. 26(6), 1497\u20131508 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"4","key":"28_CR2","first-page":"14","volume":"7","author":"DT Meyer","year":"2012","unstructured":"Meyer, D.T., Bolosky, W.J.: A study of practical deduplication. ACM Trans. Storage (TOS) 7(4), 14 (2012)","journal-title":"ACM Trans. Storage (TOS)"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 message-digest algorithm. RFC Editor (1992)","DOI":"10.17487\/rfc1321"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Eastlake 3rd, D., Jones, P.: US secure hash algorithm 1 (SHA1) (2001)","DOI":"10.17487\/rfc3174"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Manogar, E., Abirami, S.: A study on data deduplication techniques for optimized storage. In: 2014 Sixth International Conference on Advanced Computing (ICoAC), pp. 161\u2013166. IEEE (2014)","DOI":"10.1109\/ICoAC.2014.7229702"},{"issue":"4","key":"28_CR6","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1145\/1210596.1210599","volume":"2","author":"DR Bobbarjung","year":"2006","unstructured":"Bobbarjung, D.R., Jagannathan, S., Dubnicki, C.: Improving duplicate elimination in storage systems. ACM Trans. Storage 2(4), 424\u2013448 (2006)","journal-title":"ACM Trans. Storage"},{"key":"28_CR7","unstructured":"Kruus, E., Ungureanu, C., Dubnicki, C.: Bimodal content defined chunking for backup streams. In: FAST, pp. 239\u2013252 (2010)"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Manogar, E., Abirami, S.: A study on data deduplication techniques for optimized storage. In: 2014 Sixth International Conference on Advanced Computing (ICoAC), pp. 161\u2013166. IEEE (2014)","DOI":"10.1109\/ICoAC.2014.7229702"},{"issue":"7","key":"28_CR9","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422\u2013426 (1970)","journal-title":"Commun. ACM"},{"issue":"4","key":"28_CR10","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1080\/15427951.2004.10129096","volume":"1","author":"A Broder","year":"2003","unstructured":"Broder, A., Mitzenmacher, M.: Network applications of bloom filters: a survey. Internet Math. 1(4), 485\u2013509 (2003)","journal-title":"Internet Math."},{"key":"28_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/BFb0023080","volume-title":"Software Configuration Management","author":"JJ Hunt","year":"1996","unstructured":"Hunt, J.J., Vo, K.P., Tichy, W.F.: An empirical study of delta algorithms. In: Sommerville, I. (ed.) SCM 1996. LNCS, vol. 1167, pp. 49\u201366. Springer, Heidelberg (1996). doi:\n                    10.1007\/BFb0023080"}],"container-title":["Communications in Computer and Information Science","Geo-Spatial Knowledge and Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3969-0_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T09:03:30Z","timestamp":1558515810000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3969-0_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811039683","9789811039690"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3969-0_28","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"3 March 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GRMSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Geo-Informatics in Resource Management and Sustainable Ecosystem","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"grmse2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.grmse2016.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}