{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:21:27Z","timestamp":1740133287420,"version":"3.37.3"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Fuzzy Syst."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/tfuzz.2016.2633371","type":"journal-article","created":{"date-parts":[[2016,11,29]],"date-time":"2016-11-29T14:30:11Z","timestamp":1480429811000},"page":"1752-1764","source":"Crossref","is-referenced-by-count":13,"title":["VD-IT2, Virtual Disk Cloning on Disk Arrays Using a Type-2 Fuzzy Controller"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0607-9517","authenticated-orcid":false,"given":"Guillermo","family":"Navarro","sequence":"first","affiliation":[]},{"given":"David K.","family":"Umberger","sequence":"additional","affiliation":[]},{"given":"Milos","family":"Manic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IFCSTA.2009.161"},{"key":"ref32","first-page":"313","article-title":"Storage\n virtualization based asynchronous remote mirror","author":"xiang","year":"0","journal-title":"Proc 2009 8th Int Conf Grid Cooperative Comput"},{"year":"2015","key":"ref31","article-title":"Performance best practices for VMWare vSphere 6.0"},{"key":"ref30","article-title":"Exposing the unvarnished truth about database storage","author":"staimer","year":"2013","journal-title":"White Paper"},{"article-title":"Managing processing of user requests and data replication for a mass storage system","year":"2015","author":"navarro","key":"ref37"},{"year":"0","key":"ref36","article-title":"20 top factors that impact\n website response time&#x2014;Part 1"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566922"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958793"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2012.6290968"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2011.2174061"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2013.2286416"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2011.6007619"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2011.5937349"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MED.2012.6265708"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2014.2336267"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/GrC.2010.112"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2012.6251287"},{"key":"ref19","first-page":"1","article-title":"Modeling capability of type-1 fuzzy set and interval type-2 fuzzy set","author":"nie","year":"0","journal-title":"Proc 2012 IEEE Int Congr Fuzzy Syst"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2014.6891615"},{"article-title":"Understanding and exploiting snapshot technology for data\n protection, Part 1: Snapshot technology overview","year":"2006","author":"garimella","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IFSA-NAFIPS.2013.6608547"},{"journal-title":"White Paper","article-title":"Implementing local replication using EMC timefinder and recoverpoint and\n coexistence of RP\/CDP with SRDF on symmetrix VMAX","year":"2013","key":"ref3"},{"article-title":"A brief tutorial on interval type-2 fuzzy sets and systems","year":"0","author":"wu","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ROMA.2014.7295867"},{"journal-title":"Logical Storage Management Guide","year":"2014","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2012.2201728"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2012.2186818"},{"year":"2014","key":"ref2","article-title":"QuickSpecs: HP business copy EVA software"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2012.2226891"},{"journal-title":"The SNIA 2015 Dictionary","year":"2015","key":"ref1"},{"journal-title":"Fuzzy Control Fundamentals Stability and Design of Fuzzy Controllers","year":"2006","author":"michels","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2012.2227488"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2013.2286414"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2103531"},{"journal-title":"Storage Network Performance Analysis","year":"2003","author":"simitci","key":"ref23"},{"journal-title":"Queuing Systems Volume II Computer Applications","year":"1976","author":"kleinrock","key":"ref26"},{"journal-title":"Queuing Theory A Linear Algebraic Approach","year":"2008","author":"lipsky","key":"ref25"}],"container-title":["IEEE Transactions on Fuzzy Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/91\/8124149\/07762144.pdf?arnumber=7762144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:41:30Z","timestamp":1641987690000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7762144\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":37,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tfuzz.2016.2633371","relation":{},"ISSN":["1063-6706","1941-0034"],"issn-type":[{"type":"print","value":"1063-6706"},{"type":"electronic","value":"1941-0034"}],"subject":[],"published":{"date-parts":[[2017,12]]}}}