{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:30:25Z","timestamp":1725492625794},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1109\/asap.2007.4459299","type":"proceedings-article","created":{"date-parts":[[2008,3,5]],"date-time":"2008-03-05T15:21:20Z","timestamp":1204730480000},"page":"415-422","source":"Crossref","is-referenced-by-count":1,"title":["ISA Support for Fingerprinting and Erasure Codes"],"prefix":"10.1109","author":[{"given":"William","family":"Josephson","sequence":"first","affiliation":[]},{"given":"Ruby","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Optimizing Cauchy Reed-Solomon codes for fault-toleratant storage applications","author":"plank","year":"2005","journal-title":"Technical Report"},{"key":"ref11","article-title":"Venti: A new approach to archival storage","author":"quinlan","year":"0","journal-title":"Proc of the USENIX Conference on File and Storage Technologies"},{"key":"ref12","article-title":"Fingerprinting by random polynomials","author":"rabin","year":"1981","journal-title":"Technical Report"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"journal-title":"The Riverbed optimization system (RiOS)","year":"2006","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/347057.347408","article-title":"A protocol-independent technique for eliminating redundant network traffic","author":"spring","year":"2000","journal-title":"Proc of the ACM SIGCOMM"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2005.49"},{"journal-title":"Data domain DD400 enterprise series capacity optimized storage appliances","year":"2005","key":"ref3"},{"journal-title":"private communication","year":"2006","author":"lee","key":"ref6"},{"journal-title":"Accelerating application performance across the WAN","year":"2005","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502052"},{"key":"ref7","article-title":"Finding similar files in a large file system","author":"manber","year":"1994","journal-title":"Proc of the Winter 1994USENIX Tech Conf"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9323-8_11"},{"key":"ref1","article-title":"An XOR-based erasure-resilient coding scheme","author":"blomer","year":"1995","journal-title":"Technical Report"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199709)27:9<995::AID-SPE111>3.3.CO;2-Y"}],"event":{"name":"2007 IEEE International Conf. on Application-specific Systems, Architectures and Processors","start":{"date-parts":[[2007,7,9]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2007,7,11]]}},"container-title":["2007 IEEE International Conf. on Application-specific Systems, Architectures and Processors (ASAP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4429947\/4429948\/04459299.pdf?arnumber=4459299","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T01:15:41Z","timestamp":1497748541000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4459299\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/asap.2007.4459299","relation":{},"subject":[],"published":{"date-parts":[[2007,7]]}}}