{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T11:37:13Z","timestamp":1648726633857},"reference-count":13,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2002,2,1]],"date-time":"2002-02-01T00:00:00Z","timestamp":1012521600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T00:00:00Z","timestamp":1374019200000},"content-version":"vor","delay-in-days":4184,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Discrete Applied Mathematics"],"published-print":{"date-parts":[[2002,2]]},"DOI":"10.1016\/s0166-218x(00)00325-5","type":"journal-article","created":{"date-parts":[[2002,10,14]],"date-time":"2002-10-14T11:12:20Z","timestamp":1034593940000},"page":"231-242","source":"Crossref","is-referenced-by-count":0,"title":["Group testing and fault detection for replicated files"],"prefix":"10.1016","volume":"116","author":[{"given":"F.K.","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Wenan","family":"Zang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0166-218X(00)00325-5_BIB1","doi-asserted-by":"crossref","unstructured":"K.A.S. Abdel-Ghaffar, A. El Abbadi, Efficient detection of corrupted pages in a replicated file, 12th ACM Symposium on Principles on Distributed Computing, 1993, pp. 219\u2013229.","DOI":"10.1145\/164051.164076"},{"key":"10.1016\/S0166-218X(00)00325-5_BIB2","unstructured":"K.A.S. Abdel-Ghaffar, A. El Abbadi, Comparing multiple file copies with a primary copy using minimal communication, Technical Report TRCS 93-8, Dept. Computer Science, UC Santa Barbara, 1993."},{"key":"10.1016\/S0166-218X(00)00325-5_BIB3","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/71.262591","article-title":"An optimal strategy for comparing file copies","volume":"5","author":"Abdel-Ghaffar","year":"1994","journal-title":"IEEE Trans. Parallel and Distributed Systems"},{"key":"10.1016\/S0166-218X(00)00325-5_BIB4","doi-asserted-by":"crossref","unstructured":"D. Barbar\u00e1, H. Garcia-Molina, B. Feijoo, Exploiting symmetries for low-cost comparison of file copies, Proceedings of 8th International Conference on Distributed Computing Systems, 1988, pp. 471\u2013479.","DOI":"10.1109\/DCS.1988.12550"},{"key":"10.1016\/S0166-218X(00)00325-5_BIB5","series-title":"Theory and Practice of Error Control Codes","author":"Blahut","year":"1984"},{"key":"10.1016\/S0166-218X(00)00325-5_BIB6","series-title":"Combinatorial Group Testing and its Applications","author":"Du","year":"1993"},{"key":"10.1016\/S0166-218X(00)00325-5_BIB7","unstructured":"W. Fuchs, K.L. Wu, J.A. Abraham, Low-cost comparison and diagnosis of large remotely located files, Proceedings of Symposium on Reliability Distributed Software and Database Systems, Los Angeles, CA, 1986, pp. 67\u201373."},{"key":"10.1016\/S0166-218X(00)00325-5_BIB8","doi-asserted-by":"crossref","first-page":"1241","DOI":"10.1109\/71.640016","article-title":"Detecting corrupted pages in M replicated large files","volume":"8","author":"Hwang","year":"1997","journal-title":"IEEE Trans. Parallel Distributed Systems"},{"key":"10.1016\/S0166-218X(00)00325-5_BIB9","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1109\/TC.1983.1676310","article-title":"A parity structure for large remotely located data files","volume":"32","author":"Metzner","year":"1983","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/S0166-218X(00)00325-5_BIB10","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1109\/12.88489","article-title":"Efficient replicated remote file comparison","volume":"40","author":"Metzner","year":"1991","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/S0166-218X(00)00325-5_BIB11","doi-asserted-by":"crossref","unstructured":"J.J. Metzner, M.A. Abidi, Remote comparison and correction of duplicated data files, Proceedings of the National Telecommunications Conference, 1979, pp. 59.4.1\u201359.4.4.","DOI":"10.1136\/bmj.1.6155.59-d"},{"key":"10.1016\/S0166-218X(00)00325-5_BIB12","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1109\/18.53757","article-title":"A general decoding technique applicable to replicated file disagreement location and concatenated code decoding","volume":"36","author":"Metzner","year":"1990","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/S0166-218X(00)00325-5_BIB13","series-title":"Data Structures and Network Algorithms","author":"Tarjan","year":"1988"}],"container-title":["Discrete Applied Mathematics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0166218X00003255?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0166218X00003255?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T09:19:47Z","timestamp":1578475187000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0166218X00003255"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,2]]},"references-count":13,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2002,2]]}},"alternative-id":["S0166218X00003255"],"URL":"https:\/\/doi.org\/10.1016\/s0166-218x(00)00325-5","relation":{},"ISSN":["0166-218X"],"issn-type":[{"value":"0166-218X","type":"print"}],"subject":[],"published":{"date-parts":[[2002,2]]}}}