{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:07:02Z","timestamp":1730207222225,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,12]]},"DOI":"10.1109\/cis.2008.76","type":"proceedings-article","created":{"date-parts":[[2009,1,5]],"date-time":"2009-01-05T21:16:02Z","timestamp":1231190162000},"page":"355-360","source":"Crossref","is-referenced-by-count":0,"title":["Research on Disaster Tolerance System Based on Network Dataflow"],"prefix":"10.1109","author":[{"given":"Lin","family":"Guo","sequence":"first","affiliation":[]},{"given":"Hua","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Lejun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yongtian","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jianpei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","article-title":"snap mirror: filesystem-based asynchronous mirroring for disaster recovery[c]","author":"patterson","year":"2002","journal-title":"First USENIX Conference on File and Storage Technologies"},{"year":"0","key":"14"},{"key":"11","article-title":"storage network performance analysis[m]","author":"dr","year":"2003","journal-title":"Wiley Publishing Inc"},{"journal-title":"Addison Wesley","year":"2003","author":"clark","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/HIS.2001.946698"},{"key":"2","first-page":"30","article-title":"a technology of implementing sequential points snapshot in the storage subsystem[j]","volume":"40","author":"zhong","year":"2004","journal-title":"Computer Engineering and Applications"},{"key":"1","first-page":"34","article-title":"analysis of remote backup and its key technology [j]","volume":"30","author":"han","year":"2004","journal-title":"Eng Comput"},{"journal-title":"Disk-Based Data Protection The New Data Backup and Recovery Imperative[R]","year":"2005","key":"10"},{"journal-title":"A Disaster Recovery very Solution selection Methodology[R\/OL]","year":"2004","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s10550-005-0031-4"},{"key":"5","first-page":"1734","article-title":"new prospect of current computer storage technology[j]","volume":"25","author":"cheng","year":"2004","journal-title":"Computer Engineering and Design"},{"key":"4","first-page":"94","article-title":"research of the ip storage technology[j]","volume":"24","author":"guo","year":"2002","journal-title":"Computing in Science and Engineering"},{"year":"0","key":"9"},{"journal-title":"ADSM Client Disaster Recovery Bare Metal Restore[R\/OL]","year":"1997","key":"8"}],"event":{"name":"2008 International Conference on Computational Intelligence and Security (CIS)","start":{"date-parts":[[2008,12,13]]},"location":"Suzhou, China","end":{"date-parts":[[2008,12,17]]}},"container-title":["2008 International Conference on Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4724593\/4724594\/04724673.pdf?arnumber=4724673","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T15:40:19Z","timestamp":1489765219000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4724673\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/cis.2008.76","relation":{},"subject":[],"published":{"date-parts":[[2008,12]]}}}