{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:55:09Z","timestamp":1760597709302,"version":"3.37.3"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61170042"],"award-info":[{"award-number":["61170042"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004029","name":"Jiangsu Province Development and Reform Commission","doi-asserted-by":"publisher","award":["2013-883"],"award-info":[{"award-number":["2013-883"]}],"id":[{"id":"10.13039\/501100004029","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Syst. Man Cybern, Syst."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/tsmc.2016.2576023","type":"journal-article","created":{"date-parts":[[2016,6,23]],"date-time":"2016-06-23T02:56:53Z","timestamp":1466650613000},"page":"3310-3320","source":"Crossref","is-referenced-by-count":5,"title":["Optimal Distribution of Nonperiodic Full and Incremental Backups"],"prefix":"10.1109","volume":"47","author":[{"given":"Gregory","family":"Levitin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1606-1644","authenticated-orcid":false,"given":"Liudong","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Yuanshun","family":"Dai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2011.02.004"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2009.03.064"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.04.003"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2011.07.020"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2012.02.002"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2010.2103596"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2005.10.047"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2012.07.002"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/0740817X.2011.618176"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-012-4569-2"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S0029-5493(01)00412-5"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2009.08.004"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/S0360-8352(00)00063-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.167"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2013192"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.09.075"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(00)00072-7"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(01)00177-1"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(01)00076-X"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(00)00064-8"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(01)00310-1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(01)00131-4"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1002\/9781119994053"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1115\/1.4010337","article-title":"A statistical distribution function of wide applicability","volume":"18","author":"weibull","year":"1951","journal-title":"J Appl Mech Trans ASME"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2294328"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/3468.925663"},{"key":"ref10","first-page":"32","article-title":"Designing a fast, on-line backup system for a log-structured file system","volume":"8","author":"green","year":"1996","journal-title":"Digit Tech J"},{"key":"ref11","first-page":"171","article-title":"The amanda network backup manager","author":"da silva","year":"1993","journal-title":"Proc USENIX Syst Admin (LISA VII) Conf"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0548(98)00025-2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/237090.237157"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2259194"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(02)00044-3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1214\/088342306000000448"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2307\/3214319"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2008.11.003"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1017\/S0001867800017092"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2005.01.009"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.21541"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.38"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2014.2362728"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.106"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2012.9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.50"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2005.11.007"},{"key":"ref9","first-page":"17","article-title":"Protecting file systems: A survey of backup techniques","author":"chervenak","year":"1998","journal-title":"Proc Joint NASA and IEEE Mass Storage Conf"},{"journal-title":"Design and Analysis of Fault Tolerant Digital Systems","year":"1989","author":"johnson","key":"ref46"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20813-8"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311958"},{"journal-title":"Fault Tolerant Haidware\/Software Architecture for Flight Critical Function","year":"1985","author":"hartmann","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/S0895-7177(03)90140-3"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(00)00238-1"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6575-0"},{"key":"ref43","article-title":"Optimization of full vs. incremental periodic backup policy","author":"levitin","year":"0","journal-title":"IEEE Trans Dependable Secure Comput"}],"container-title":["IEEE Transactions on Systems, Man, and Cybernetics: Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221021\/8110749\/07496940.pdf?arnumber=7496940","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T02:01:41Z","timestamp":1656727301000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7496940\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":53,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tsmc.2016.2576023","relation":{},"ISSN":["2168-2216","2168-2232"],"issn-type":[{"type":"print","value":"2168-2216"},{"type":"electronic","value":"2168-2232"}],"subject":[],"published":{"date-parts":[[2017,12]]}}}