{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:08:31Z","timestamp":1757311711028},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,3,8]],"date-time":"2017-03-08T00:00:00Z","timestamp":1488931200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1007\/s11042-017-4540-1","type":"journal-article","created":{"date-parts":[[2017,3,8]],"date-time":"2017-03-08T11:50:25Z","timestamp":1488973825000},"page":"4563-4583","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["An extra-parity energy saving data layout for video surveillance"],"prefix":"10.1007","volume":"77","author":[{"given":"Yu","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Zhang","family":"Changyou","sequence":"additional","affiliation":[]},{"given":"Xue","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Zhu","family":"Hongfei","sequence":"additional","affiliation":[]},{"given":"Li","family":"Yuanzhang","sequence":"additional","affiliation":[]},{"given":"Tan","family":"Yu-An","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,8]]},"reference":[{"key":"4540_CR1","doi-asserted-by":"crossref","unstructured":"Alsmirat M, Jararweh Y, Obaidat I, Gupta B (2016a) Automated wireless video surveillance: an evaluation framework. J Real-Time Image Proc 1\u201320","DOI":"10.1007\/s11554-016-0631-x"},{"key":"4540_CR2","doi-asserted-by":"crossref","unstructured":"Alsmirat M, Jararweh Y, Obaidat I, Gupta BB (2016b) Internet of surveillance: a cloud supported large-scale wireless surveillance system. J Supercomput 1\u201320","DOI":"10.1007\/s11227-016-1857-x"},{"issue":"C","key":"4540_CR3","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.cviu.2015.11.014","volume":"144","author":"S Bagheri","year":"2016","unstructured":"Bagheri S, Zheng J, Sinha S (2016) Temporal mapping of surveillance video for indexing and summarization. Comp Vision Image Underst 144(C):237\u2013257","journal-title":"Comp Vision Image Underst"},{"issue":"2","key":"4540_CR4","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1145\/176979.176981","volume":"26","author":"P Chen","year":"1997","unstructured":"Chen P, Lee E, Gibson G, Katz R, Patterson D (1997) Raid: high-performance, reliable secondary storage. ACM Comput Surv 26(2):145\u2013185","journal-title":"ACM Comput Surv"},{"issue":"5","key":"4540_CR5","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1049\/cje.2016.06.021","volume":"25","author":"Y Fang","year":"2016","unstructured":"Fang Y, Tan Y, Zhang Q, Fei W, Cheng Z, Zheng J (2016) An effective RAID data layout for object-based de-duplication backup system. Chin J Electron 25(5):832\u2013840","journal-title":"Chin J Electron"},{"key":"4540_CR6","doi-asserted-by":"crossref","unstructured":"Gupta B, Agrawal D, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security","DOI":"10.4018\/978-1-5225-0105-3"},{"key":"4540_CR7","unstructured":"Li X, Tan Y, Sun Z (2011) Semi-RAID: a reliable energy-aware RAID data layout for sequential data access. In: Proceedings of IEEE 27th Symposium on Mass Storage Systems & Technologies(MSST), pp. 1\u201311"},{"issue":"6","key":"4540_CR8","doi-asserted-by":"crossref","first-page":"1290","DOI":"10.3724\/SP.J.1016.2013.01290","volume":"36","author":"Y Li","year":"2014","unstructured":"Li Y, Sun Z, Ma Z, Tan Y (2014) S-raid 5:an energy-saving raid for sequential access based applications. Chinese J Comput 36(6):1290\u20131302","journal-title":"Chinese J Comput"},{"key":"4540_CR9","doi-asserted-by":"publisher","unstructured":"Li J, Yan H, Liu Z, Chen X (2015) Location-sharing systems with enhanced privacy in mobile online social networks. IEEE Syst J:1\u201310. doi: 10.1109\/JSYST.2015.2415835","DOI":"10.1109\/JSYST.2015.2415835"},{"issue":"1","key":"4540_CR10","first-page":"37","volume":"50","author":"J Liu","year":"2013","unstructured":"Liu J, Zheng J, Li Y, Sun Z, Wang W, Tan Y (2013) Hybrid s-raid: an energy-efficient data layout for sequential data storage. Journal of Computer Research and Development 50(1):37\u201348","journal-title":"Journal of Computer Research and Development"},{"key":"4540_CR11","first-page":"49","volume":"01","author":"Y Lu","year":"2013","unstructured":"Lu Y, Shu J (2013) Survey on FTL-based storage systems. Journal of Computer Research and Development 01:49\u201359","journal-title":"Journal of Computer Research and Development"},{"issue":"4","key":"4540_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2820615","volume":"11","author":"A Ma","year":"2015","unstructured":"Ma A, Douglis F, Lu G, Sawyer D, Chandra S, Hsu W (2015) RAIDShield: characterizing, monitoring, and proactively protecting against disk failures. ACM Transactions on Storage 11(4):1\u201328","journal-title":"ACM Transactions on Storage"},{"key":"4540_CR13","doi-asserted-by":"crossref","unstructured":"Mao B, Feng D, Jiang H, Wu S (2008) GRAID: a green RAID storage architecture with improved energy efficiency and reliability. In: Proceedings of International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, pp. 113\u2013120","DOI":"10.1109\/MASCOT.2008.4770574"},{"issue":"s2","key":"4540_CR14","first-page":"90","volume":"35","author":"Y Mu","year":"2007","unstructured":"Mu Y, Liu J, Zhang J, Mei R (2007) Application of reed-Solomon algorithm in RAID6. Chin J Electron 35(s2):90\u201394","journal-title":"Chin J Electron"},{"issue":"3","key":"4540_CR15","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1145\/1416944.1416949","volume":"4","author":"D Narayanan","year":"2008","unstructured":"Narayanan D, Donnelly A, Rowstron A (2008) Write off-loading:practical power management for enterprise storage. ACM Transactions on Storage 4(3):256\u2013267","journal-title":"ACM Transactions on Storage"},{"issue":"2","key":"4540_CR16","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1109\/TBC.2015.2419824","volume":"61","author":"Z Pan","year":"2015","unstructured":"Pan Z, Zhang Y, Kwong S (2015) Efficient motion and disparity estimation optimization for low complexity multiview video coding. IEEE Trans Broadcast 61(2):166\u2013176","journal-title":"IEEE Trans Broadcast"},{"key":"4540_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TBC.2015.2470134","volume":"62","author":"Z Pan","year":"2016","unstructured":"Pan Z, Lei J, Zhang Y, Sun X (2016) Fast motion estimation based on content property for low-complexity h.265\/hevc encoder. IEEE Trans Broadcast 62:1\u201310","journal-title":"IEEE Trans Broadcast"},{"key":"4540_CR18","doi-asserted-by":"crossref","unstructured":"Patterson D, Gibson G, Katz R (1988) A case for redundant arrays of inexpensive disks (RAID). In: Proceedings of ACM international conference on management of data, pp 109\u2013116","DOI":"10.1145\/50202.50214"},{"issue":"1","key":"4540_CR19","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/1140103.1140281","volume":"34","author":"E Pinheiro","year":"2006","unstructured":"Pinheiro E, Bianchini R, Dubnicki C (2006) Exploiting redundancy to conserve energy in storage systems. ACM Sigmetrics Performance Evaluation Review 34(1):15\u201326","journal-title":"ACM Sigmetrics Performance Evaluation Review"},{"issue":"9","key":"4540_CR20","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1002\/(SICI)1097-024X(199709)27:9<995::AID-SPE111>3.0.CO;2-6","volume":"27","author":"J Plank","year":"2010","unstructured":"Plank J (2010) A tutorial on reed-Solomon coding for faulttolerance in raid-like systems. Softw Pract Exp 27(9):995\u20131012","journal-title":"Softw Pract Exp"},{"issue":"2","key":"4540_CR21","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1002\/spe.631","volume":"35","author":"J Plank","year":"2005","unstructured":"Plank J, Ding Y (2005) Note: correction to the 1997 tutorial on reed\u2013Solomon coding. Softw Pract Exp 35(2):189\u2013194","journal-title":"Softw Pract Exp"},{"issue":"21","key":"4540_CR22","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1587\/elex.6.1497","volume":"6","author":"K Psannis","year":"2009","unstructured":"Psannis K (2009) Efficient redundant frames encoding algorithm for streaming video over error prone wireless channels. IEICE Electronics Express 6(21):1497\u20131502","journal-title":"IEICE Electronics Express"},{"issue":"2","key":"4540_CR23","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1007\/s11554-015-0514-6","volume":"12","author":"K Psannis","year":"2016","unstructured":"Psannis K (2016) Hevc in wireless environments. J Real-Time Image Proc 12(2):509\u2013516","journal-title":"J Real-Time Image Proc"},{"issue":"8","key":"4540_CR24","doi-asserted-by":"crossref","first-page":"2692","DOI":"10.1093\/ietcom\/e91-b.8.2692","volume":"E91B","author":"K Psannis","year":"2008","unstructured":"Psannis K, Ishibashi Y (2008) Efficient flexible macroblock ordering technique. IEICE Trans Commun E91B(8):2692\u20132701","journal-title":"IEICE Trans Commun"},{"issue":"2","key":"4540_CR25","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/s11235-009-9151-3","volume":"41","author":"K Psannis","year":"2009","unstructured":"Psannis K, Ishibashi Y (2009) Efficient error resilient algorithm for h.264\/avc: mobility management in wireless video streaming. Telecommun Syst 41(2):65\u201376","journal-title":"Telecommun Syst"},{"key":"4540_CR26","unstructured":"Storer M, Greenan K, Miller E, Voruganti K (2008) Pergamum: replacing tape with energy efficient, reliable, disk-based archival storage. In: Proceedings of Usenix Conference on File and Storage Technologies(FAST), pp.1\u201316"},{"issue":"1","key":"4540_CR27","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s11042-012-1262-2","volume":"73","author":"Z Sun","year":"2014","unstructured":"Sun Z, Tan Y, Li Y (2014) An energy-efficient storage for video surveillance. Multimed Tools Appl 73(1):151\u2013167","journal-title":"Multimed Tools Appl"},{"key":"4540_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2605045","author":"Z Sun","year":"2016","unstructured":"Sun Z, Zhang Q, Li Y, Tan Y (2016) DPPDL: a dynamic partial-parallel data layout for green video surveillance storage. IEEE Trans Circuits Syst Video Technol. doi: 10.1109\/TCSVT.2016.2605045","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"3","key":"4540_CR29","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1109\/TC.2007.70821","volume":"57","author":"J Wang","year":"2007","unstructured":"Wang J, Zhu H, Li D (2007) Eraid: conserving energy in conventional disk-based raid system. IEEE Trans Comput 57(3):359\u2013374","journal-title":"IEEE Trans Comput"},{"key":"4540_CR30","unstructured":"Wang J, Li T, Shi Y, Lian S, Ye J (2016) Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimed Tools Appl 1\u201317"},{"issue":"3","key":"4540_CR31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1288783.1289721","volume":"3","author":"C Weddle","year":"2007","unstructured":"Weddle C, Oldham M, Qian J, Wang A, Reiher P, Kuenning G (2007) Paraid: a gear-shifting power-aware raid. ACM Transactions on Storage 3(3):1\u201313","journal-title":"ACM Transactions on Storage"},{"key":"4540_CR32","unstructured":"Wu S, Jiang H, Feng D, Tian L, Mao B (2009) WorkOut: I\/O workload outsourcing for boosting RAID reconstruction performance. In: Proceedings of Usenix Conference on File and Storage Technologies(FAST), pp 239\u2013252"},{"issue":"7","key":"4540_CR33","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/CC.2016.7559076","volume":"13","author":"C Yuan","year":"2016","unstructured":"Yuan C, Sun X, Lv R (2016) Fingerprint liveness detection based on multi-scale lpq and pca. China Commun 13(7):60\u201365","journal-title":"China Commun"},{"key":"4540_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-016-0721-3","author":"X Zhang","year":"2016","unstructured":"Zhang X, Tan Y, Xue Y, Zhang Q, Li Y, Zhang C, Zheng J (2016) Cryptographic key protection against FROST for mobile devices. Clust Comput. doi: 10.1007\/s10586-016-0721-3","journal-title":"Clust Comput"},{"issue":"2","key":"4540_CR35","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1587\/transinf.2015EDP7217","volume":"E99D","author":"R Zhu","year":"2016","unstructured":"Zhu R, Tan Y, Zhang Q, Wu F, Zheng J, Xue Y (2016a) Determining image base of firmware files for ARM devices. IEICE Trans Inf Syst E99D(2):351\u2013359","journal-title":"IEICE Trans Inf Syst"},{"key":"4540_CR36","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.diin.2016.01.002","volume":"16","author":"R Zhu","year":"2016","unstructured":"Zhu R, Tan Y, Zhang Q, Li Y, Zheng J (2016b) Determining image base of firmware for ARM devices by matching literal pools. Digit Investig 16:19\u201328","journal-title":"Digit Investig"},{"key":"4540_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2016.12.002","author":"R Zhu","year":"2016","unstructured":"Zhu R, Zhang B, Mao J, Zhang Q, Tan Y (2016c) A methodology for determining the image base of arm-based industrial control system firmware. Int J Crit Infrastruct Prot. doi: 10.1016\/j.ijcip.2016.12.002","journal-title":"Int J Crit Infrastruct Prot"},{"key":"4540_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.01.031","author":"H Zhu","year":"2017","unstructured":"Zhu H, Tan Y, Zhang X, Zhu L, Zhang C, Zheng J (2017) A round-optimal lattice-based blind signature scheme for cloud services. Futur Gener Comput Syst. doi: 10.1016\/j.future.2017.01.031","journal-title":"Futur Gener Comput Syst"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-4540-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4540-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4540-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T13:03:38Z","timestamp":1568898218000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-4540-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,8]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["4540"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-4540-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,8]]}}}