{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:49:03Z","timestamp":1764841743176},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T00:00:00Z","timestamp":1414800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/tkde.2014.2302297","type":"journal-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T17:40:24Z","timestamp":1391190024000},"page":"2676-2688","source":"Crossref","is-referenced-by-count":4,"title":["Consistent Online Backup in Transactional File Systems"],"prefix":"10.1109","volume":"26","author":[{"given":"Lipika","family":"Deka","sequence":"first","affiliation":[]},{"given":"Gautam","family":"Barua","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","first-page":"41","article-title":"A Comparison of File System Workloads","author":"roselli","year":"2000","journal-title":"Proc USENIX Ann Technical Conf"},{"key":"ref33","author":"bernstein","year":"1986","journal-title":"Concurrency Control and Recovery in Database Systems"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/69.469836"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/BF01840448"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/3-540-08755-9_9","article-title":"Notes on Data Base Operating Systems","volume":"60","author":"gray","year":"1978","journal-title":"Proc Operating Systems An Advanced Course"},{"key":"ref37","first-page":"47","article-title":"WOLF A Novel Reordering Write Buffer to Boost the Performance of Log-Structured File Systems","author":"wang","year":"2002","journal-title":"Proc First Conf File and Storage Technologies"},{"key":"ref36","first-page":"976","article-title":"Long-Term File Activity and Inter-Reference Patterns","author":"gibson","year":"1998","journal-title":"Proc 24th Int?l Computer Measurement Group Conf"},{"key":"ref35","first-page":"213","article-title":"Measurement and Analysis of Large-Scale Network File System Workloads","author":"leung","year":"2008","journal-title":"Proc Usenix Technical Conf"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-50728-0_38"},{"key":"ref10","author":"hitz","year":"1998","journal-title":"Method for Maintaining Consistent States of a File System and for Creating User-Accessible Read-Only Copies of a File System"},{"key":"ref11","first-page":"239","article-title":"Logical vs. Physical File System Backup","author":"hutchinson","year":"1999","journal-title":"Proc Symp Operating Systems Design and Implementation"},{"key":"ref12","first-page":"5","article-title":"Overview of the Spiralog File System","volume":"8","author":"johnson","year":"1996","journal-title":"Digital Technical J"},{"key":"ref13","year":"0"},{"key":"ref14","article-title":"Snapmirror: File-System-Based Asynchronous Mirroring for Disaster Recovery","author":"patterson","year":"2002","journal-title":"Proc First USENIX Conf File and Storage Technologies"},{"key":"ref15","author":"wright","year":"2006","journal-title":"Extending ACID Semantics to the File System via ptrace"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2010.5470433"},{"key":"ref17","article-title":"Megastore: Providing Scalable, Highly Available Storage for Interactive Services","author":"baker","year":"2011","journal-title":"Proceedings of the Biennial Conference on Innovative Data Systems Research"},{"key":"ref18","year":"0"},{"key":"ref19","first-page":"325","article-title":"Tango: Distributed Data Structures over a Shared Log","author":"balakrishnan","year":"2013","journal-title":"Proc 16th ACM Symp Operating Systems Principles"},{"key":"ref28","first-page":"29","article-title":"Enabling Transactional File Access via Lightweight Kernel Extensions","author":"spillane","year":"2009","journal-title":"Proc Seventh Conf File and Storage Technologies (FAST)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1851276.1851285"},{"key":"ref27","article-title":"Transactional File System","author":"verma","year":"2005"},{"key":"ref3","article-title":"Issues in On-line Backup","author":"shumway","year":"1991","journal-title":"Proceedings of the fifth Large Installation Systems Administration Conference"},{"key":"ref6","first-page":"259","article-title":"Point-in-Time Copy: Yesterday, Today and Tomorrow","author":"azagury","year":"2002","journal-title":"Proc IEEE\/NASA Conf Mass Storage Systems (MSS)"},{"key":"ref29","year":"0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629591"},{"key":"ref8","first-page":"17","article-title":"Protecting the File System: A Survey of Backup Techniques","author":"chervanak","year":"1998","journal-title":"Proc Joint NASA and IEEE Mass Storage Conf"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2005.1626989"},{"key":"ref2","article-title":"Long Term Storage Trends and You","author":"gray","year":"2012"},{"key":"ref9","first-page":"32","article-title":"Designing a Fast, On-Line Backup System for a Log-Structured File System","volume":"8","author":"green","year":"1996","journal-title":"Digital Technical J Digital Equipment Corporation"},{"key":"ref1","article-title":"Chunkfs: Using Divide-and-Conquer to Improve File System Reliability and Repair","author":"henson","year":"2006","journal-title":"Proc Second Conf Hot Topics in System Dependability"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522729"},{"key":"ref22","article-title":"Volume Shadow Copy Service","author":"sankara","year":"2004"},{"key":"ref21","author":"gray","year":"1992","journal-title":"Transaction Processing Concepts and Techniques"},{"key":"ref24","year":"0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1063786.1063789"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133592"},{"key":"ref25","article-title":"Using Local Copy Services: How Veritas Storage Foundation Snapshot Facilities Protect Data, Reduce Costs, and Enhance the Quality of IT Service","author":"marathe","year":"2006","journal-title":"Symantec Yellow Books"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/6915958\/06720125.pdf?arnumber=6720125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:52:30Z","timestamp":1642006350000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6720125\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":38,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2014.2302297","relation":{},"ISSN":["1041-4347"],"issn-type":[{"value":"1041-4347","type":"print"}],"subject":[],"published":{"date-parts":[[2014,11]]}}}