{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:25:21Z","timestamp":1730201121893,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1109\/blackseacom.2016.7901566","type":"proceedings-article","created":{"date-parts":[[2017,4,17]],"date-time":"2017-04-17T20:32:21Z","timestamp":1492461141000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Efficient storage and replication solutions for healthcare applications"],"prefix":"10.1109","author":[{"given":"Andreea","family":"Pintilie","sequence":"first","affiliation":[]},{"given":"Elena","family":"Apostol","sequence":"additional","affiliation":[]},{"given":"Ciprian","family":"Dobre","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Apache org","year":"2014","key":"ref10"},{"key":"ref11","first-page":"285","article-title":"Influence of image transformations and quality degradations on surf detector efficiency","author":"szczuko","year":"2013","journal-title":"Signal Processing Algorithms Architectures Arraneements and Apnlications"},{"year":"2014","key":"ref12","article-title":"Amazon Web Services"},{"journal-title":"Amazon Web Services","year":"2016","key":"ref13"},{"article-title":"Apache hadoop issues: zero loss hdfs data replication","year":"2015","author":"tianyi","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2010.48"},{"key":"ref16","first-page":"383","article-title":"Optimal parameter selection for efficient memory integrity verification using merkle hash trees","author":"emin gun sirer williams","year":"2004","journal-title":"Network Computing and Applications"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2010.5651233"},{"key":"ref3","first-page":"153","article-title":"Leap segmentation for recovering image surface layout","volume":"10","author":"wills","year":"2012","journal-title":"Image Analysis and Interpretation (SSIAI) 2012 IEEE Southwest Symposium on"},{"journal-title":"Biomedical Informatics Computer Applications in Health Care and Biomedicine","year":"2014","author":"edward","key":"ref6"},{"key":"ref5","first-page":"1700","article-title":"Some trade-offs and a new algorithm for geometric hashing","volume":"2","author":"lindenbaum","year":"1998","journal-title":"Pattern Recognition"},{"journal-title":"Clustering Algorithms Data Mining","year":"2008","author":"stojmenovic","key":"ref8"},{"journal-title":"Microsoft","year":"2016","key":"ref7"},{"journal-title":"Ant Colony Optimization Theory","year":"2004","author":"stutzle","key":"ref2"},{"key":"ref1","article-title":"Improving security of virtual machines during live migrations","author":"katzenbeisser","year":"2013","journal-title":"Privacy Security and Trust (PST) 2013 Eleventh Annual InternationalConference on"},{"journal-title":"Cloud Services Networking and Management","year":"2015","author":"nelson","key":"ref9"}],"event":{"name":"2016 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","start":{"date-parts":[[2016,6,6]]},"location":"Varna, Bulgaria","end":{"date-parts":[[2016,6,9]]}},"container-title":["2016 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7895354\/7901533\/07901566.pdf?arnumber=7901566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,4,27]],"date-time":"2017-04-27T20:53:13Z","timestamp":1493326393000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7901566\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/blackseacom.2016.7901566","relation":{},"subject":[],"published":{"date-parts":[[2016]]}}}