{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:44:08Z","timestamp":1762875848724},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/bigdata.2016.7840987","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T21:46:59Z","timestamp":1486504019000},"page":"3283-3289","source":"Crossref","is-referenced-by-count":2,"title":["Content-based comparison for collections identification"],"prefix":"10.1109","author":[{"given":"Weijia","family":"Xu","sequence":"first","affiliation":[]},{"given":"Ruizhu","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Esteva","sequence":"additional","affiliation":[]},{"given":"Jawon","family":"Song","sequence":"additional","affiliation":[]},{"given":"Ramona","family":"Walls","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/bbq015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(92)90176-V"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btp163"},{"key":"ref13","first-page":"10","article-title":"Spark: Cluster Computing with Working Sets","author":"zaharia","year":"2010","journal-title":"HotCloud'10 Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/nbt.2050"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0124617"},{"year":"0","key":"ref16","article-title":"Duitama_rice_variation_2015"},{"year":"0","key":"ref17","article-title":"Structural variants WGSOryza_CIAT_LSU_USDA_NCGR"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1104\/pp.15.00052"},{"year":"0","key":"ref19","article-title":"Details for sample code #DDEV"},{"year":"0","key":"ref4","article-title":"Agava Platform"},{"key":"ref3","first-page":"1","article-title":"Authenticity and Provenance in Long Term Digital Preservation: Modeling and Implementation in Preservation Aware Storage","author":"factor","year":"2009","journal-title":"Society"},{"key":"ref6","first-page":"32","article-title":"Authenticity and integrity in the digital environment: an exploratory analysis of the central role of trust","author":"lynch","year":"2000","journal-title":"Authenticity in A Digital Environment"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2015.7364043"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1103780.1103784"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/200979.201000"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3897\/zookeys.494.9352"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2218\/ijdc.v6i1.183"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1006\/jmbi.1990.9999"},{"year":"0","key":"ref20","article-title":"Details for sample code #IFCJ"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1186\/2047-217X-3-17"}],"event":{"name":"2016 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2016,12,5]]},"location":"Washington DC,USA","end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7818133\/7840573\/07840987.pdf?arnumber=7840987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T03:05:09Z","timestamp":1506999909000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7840987\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2016.7840987","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}