{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T17:33:42Z","timestamp":1772818422004,"version":"3.50.1"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T00:00:00Z","timestamp":1477958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61170042"],"award-info":[{"award-number":["61170042"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Jiangsu Province development and reform commission","award":["2013-883"],"award-info":[{"award-number":["2013-883"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2016,11,1]]},"DOI":"10.1109\/tdsc.2015.2413404","type":"journal-article","created":{"date-parts":[[2015,4,27]],"date-time":"2015-04-27T18:27:12Z","timestamp":1430159232000},"page":"644-656","source":"Crossref","is-referenced-by-count":37,"title":["Optimization of Full versus Incremental Periodic Backup Policy"],"prefix":"10.1109","volume":"13","author":[{"given":"Gregory","family":"Levitin","sequence":"first","affiliation":[]},{"given":"Liudong","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Qingqing","family":"Zhai","sequence":"additional","affiliation":[]},{"given":"Yuanshun","family":"Dai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2005.10.047"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2009.03.064"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2012.02.002"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2011.07.020"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2010.2103596"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(00)00072-7"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2012.07.002"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-012-4569-2"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/0740817X.2011.618176"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.04.003"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(01)00177-1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2009.08.004"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(00)00064-8"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.106"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.38"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2008.11.003"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2005.01.009"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"479","DOI":"10.2307\/1427402","article-title":"A note on the optimal replacement problem","volume":"20","author":"lam","year":"1988","journal-title":"Adv Appl Probability"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(01)00076-X"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.09.075"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(01)00131-4"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(01)00310-1"},{"key":"ref50","article-title":"Fault Tolerant Hardware\/Software Architecture for Flight Critical Function","author":"hartmann","year":"1985"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1002\/9781119994053"},{"key":"ref10","article-title":"Protecting file systems: A survey of backup techniques","author":"chervenak","year":"1998","journal-title":"Proc Joint NASA and IEEE Mass Storage Conf"},{"key":"ref11","first-page":"171","article-title":"The amanda network backup manager","author":"da silva","year":"1993","journal-title":"Proc 8th USENIX System Administration Conf (Lisa VIII)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2011.02.004"},{"key":"ref12","first-page":"32","article-title":"Designing a fast, on-line backup system for a log-structured file system","volume":"8","author":"green","year":"1996","journal-title":"Digital Tech J"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/248209.237157"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2259194"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(02)00044-3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1214\/088342306000000448"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2307\/3214319"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0029-5493(01)00412-5"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0360-8352(00)00063-2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.167"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.21541"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.49"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1147\/sj.422.0322"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2012.9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2315644"},{"key":"ref49","author":"johnson","year":"1989","journal-title":"Design and Analysis of Fault Tolerant Digital Systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.50"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2294328"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2407873"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311958"},{"key":"ref47","article-title":"Effect of failure propagation on cold vs. hot standby tradeoff in heterogeneous 1-out-of-N: G systems","author":"levitin","year":"0","journal-title":"IEEE Trans Rel"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(00)00238-1"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0548(98)00025-2"},{"key":"ref44","author":"modarres","year":"2010","journal-title":"Reliability Engineering and Risk Analysis A Practical Guide (2nd Edition)"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1115\/1.4010337","article-title":"A statistical distribution function of wide applicability","volume":"18","author":"weibull","year":"1951","journal-title":"J Appl Mech -Trans ASME"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/7740116\/07095550.pdf?arnumber=7095550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T05:19:38Z","timestamp":1651814378000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7095550\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,1]]},"references-count":51,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2015.2413404","relation":{},"ISSN":["1545-5971"],"issn-type":[{"value":"1545-5971","type":"print"}],"subject":[],"published":{"date-parts":[[2016,11,1]]}}}