{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T09:39:47Z","timestamp":1777628387600,"version":"3.51.4"},"reference-count":40,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icdcs.2002.1022312","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T18:04:13Z","timestamp":1056564253000},"page":"617-624","source":"Crossref","is-referenced-by-count":338,"title":["Reclaiming space from duplicate files in a serverless distributed file system"],"prefix":"10.1109","author":[{"given":"J.R.","family":"Douceur","sequence":"first","affiliation":[]},{"given":"A.","family":"Adya","sequence":"additional","affiliation":[]},{"given":"W.J.","family":"Bolosky","sequence":"additional","affiliation":[]},{"given":"P.","family":"Simon","sequence":"additional","affiliation":[]},{"given":"M.","family":"Theimer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.1145\/75108.75373","article-title":"The Placement Optimization Program: A Practical Solution to the Disk File Assignment Problem","author":"wolf","year":"1989","journal-title":"ACM SIGMETRICS 89"},{"key":"ref38","first-page":"59","article-title":"Publius: A Robust, Tamper-Evident Censorship-Resistant Web Publishing System","author":"waldman","year":"2000","journal-title":"9th USENIX Security Symposium"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MRD.1990.138237"},{"key":"ref32","article-title":"A Measurement Study of Peer-to-Peer File Sharing Systems","author":"saroiu","year":"2002","journal-title":"SPIE Multimedia Computing and Networking 2002"},{"key":"ref31","article-title":"Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems","author":"rowstron","year":"0","journal-title":"SIGCOMM 2001 submission"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383072"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266694"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383071"},{"key":"ref35","first-page":"44","article-title":"Practical Techniques for Searches on Encrypted Data","author":"song","year":"2000","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref34","article-title":"Inside Windows NT","author":"solomon","year":"1998"},{"key":"ref10","first-page":"459","article-title":"Experience of Adaptive Replication in Distributed File Systems","author":"cabri","year":"1996","journal-title":"22nd EUROMICRO IEEE"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/510726.510755"},{"key":"ref11","first-page":"173","article-title":"Practical Byzantine Fault Tolerance","author":"castro","year":"1999","journal-title":"3rd OSDI USENIX"},{"key":"ref12","article-title":"Freenet: A Distributed Anonymous Information Storage and Retrieval System","author":"clarke","year":"2000","journal-title":"Proc ICSI Workshop Design Issues in Anonymity and Unobservability"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/301453.301480"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2001.969727"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022312"},{"key":"ref16","article-title":"Dynamic Host Configuration Protocol","author":"droms","year":"1997","journal-title":"RFC 2131"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/75577.75583"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ADL.1998.670389"},{"key":"ref19","first-page":"63","article-title":"Implementation of the Ficus Replicated File System","author":"guy","year":"1990","journal-title":"1990 USENIX Conference Usenix"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502052"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"ref27","article-title":"Handbook of Applied Cryptography","author":"menezes","year":"1997"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/3-540-60865-6_48","article-title":"Two Practical and Provably Secure Block Ciphers: BEAR and LION","author":"anderson","year":"1996","journal-title":"Proc 3rd Fast Software Encryption Workshop"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/258492.258523"},{"key":"ref5","first-page":"156","article-title":"Differential Fault Analysis of Secret Key Cryptosystems","author":"biham","year":"1991","journal-title":"CRYPTO'91"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/339331.339345"},{"key":"ref7","first-page":"13","article-title":"Single Instance Storage in Windows&#x00AE; 2000","author":"bolosky","year":"2000","journal-title":"Proc 4th Usenix Windows Systems Symp"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224066"},{"key":"ref9","article-title":"Efficient, Distributed Data Placement Strategies for Storage Area Networks","author":"brinkmann","year":"2000","journal-title":"12th SPAA ACM"},{"key":"ref1","article-title":"DHCP Options and BOOTP Vendor Extensions","author":"alexander","year":"1997","journal-title":"RFC 2132"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/35037.35059"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"141","DOI":"10.3233\/JCS-2000-82-304","article-title":"Side Channel Cryptanalysis of Product Ciphers","volume":"8","author":"kelsey","year":"2000","journal-title":"Journal of Computer Security"},{"key":"ref21","article-title":"The Art of Computer Systems Performance Analysis","author":"jain","year":"1991","journal-title":"John Wiley & Sons"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"Differential Power Analysis","author":"kocher","year":"1999","journal-title":"Journal of Cryptology'99"},{"key":"ref23","first-page":"104","article-title":"Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems","author":"kocher","year":"1996","journal-title":"Crypto"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MRD.1992.242617"},{"key":"ref25","article-title":"Optimization of File Migration in Distributed Systems","author":"kure","year":"1988","journal-title":"Technical Report UCB\/CSD 88\/413 University of California at Berkeley"}],"event":{"name":"22nd International Conference on Distributed Computing Systems","location":"Vienna, Austria","acronym":"ICDCSW-02"},"container-title":["Proceedings 22nd International Conference on Distributed Computing Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7958\/21986\/01022312.pdf?arnumber=1022312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,23]],"date-time":"2020-03-23T20:42:42Z","timestamp":1584996162000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1022312\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/icdcs.2002.1022312","relation":{},"subject":[]}}