{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:39Z","timestamp":1750306119906,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,1,20]],"date-time":"2017-01-20T00:00:00Z","timestamp":1484870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2016R1D1A1A09916932"],"award-info":[{"award-number":["2016R1D1A1A09916932"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,1,20]]},"DOI":"10.1145\/3036331.3036357","type":"proceedings-article","created":{"date-parts":[[2017,6,5]],"date-time":"2017-06-05T12:50:05Z","timestamp":1496667005000},"page":"14-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["RDM"],"prefix":"10.1145","author":[{"given":"Ryan N. S.","family":"Widodo","sequence":"first","affiliation":[{"name":"Department of Ubiquitous IT, Dongseo University, Busan, South Korea"}]},{"given":"Hyotaek","family":"Lim","sequence":"additional","affiliation":[{"name":"Division of Information Engineering, Dongseo University, Busan, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2017,1,20]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Ahn J. and Shin D. 2014. Optimizing Power Consumption of Memory Deduplication Scheme. (2014) 1--2.  Ahn J. and Shin D. 2014. Optimizing Power Consumption of Memory Deduplication Scheme. (2014) 1--2.","key":"e_1_3_2_1_1_1","DOI":"10.1109\/ISCE.2014.6884468"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1016\/j.jcss.2009.06.004"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/362686.362692"},{"unstructured":"Bremler-barr A. et al. Leveraging Traffic Repetitions for High-Speed Deep Packet Inspection.  Bremler-barr A. et al. Leveraging Traffic Repetitions for High-Speed Deep Packet Inspection.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","first-page":"12","article-title":"2009. Method of and system for adaptive selection of a deduplication chunking technique","volume":"2","author":"Haustein N.","year":"2009","journal-title":"United States Patent."},{"doi-asserted-by":"crossref","unstructured":"Hua K.A. et al. 2015. Redundancy Control through Traffic Deduplication. (2015) 10--18.  Hua K.A. et al. 2015. Redundancy Control through Traffic Deduplication. (2015) 10--18.","key":"e_1_3_2_1_6_1","DOI":"10.1109\/INFOCOM.2015.7218362"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1534530.1534540"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/TCE.2014.6852004"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/2797022.2797023"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/2016716.2016721"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/1534530.1534541"},{"doi-asserted-by":"crossref","unstructured":"Papapanagiotou I. et al. 2012. Chunk and Object Level Deduplication for Web Optimization: A Hybrid Approach. (2012) 1393--1398.  Papapanagiotou I. et al. 2012. Chunk and Object Level Deduplication for Web Optimization: A Hybrid Approach. (2012) 1393--1398.","key":"e_1_3_2_1_12_1","DOI":"10.1109\/ICC.2012.6363843"},{"unstructured":"Rabin M.O. 1981. Fingerprinting by random polynomials. Center for Research in Computing Techn. Aiken Computation Laboratory Univ.  Rabin M.O. 1981. Fingerprinting by random polynomials. Center for Research in Computing Techn. Aiken Computation Laboratory Univ.","key":"e_1_3_2_1_13_1"},{"unstructured":"Summary E. 2016. Cisco Visual Networking Index: Forecast and Methodology 2014-2019. (2016) 2014--2019.  Summary E. 2016. Cisco Visual Networking Index: Forecast and Methodology 2014-2019. (2016) 2014--2019.","key":"e_1_3_2_1_14_1"},{"unstructured":"Widodo R.N.S. et al. 2016. A New Content-Defined Chunking Algorithm for Data Deduplication in Cloud Storage. Manuscript. (2016).  Widodo R.N.S. et al. 2016. A New Content-Defined Chunking Algorithm for Data Deduplication in Cloud Storage. Manuscript. (2016).","key":"e_1_3_2_1_15_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1016\/j.future.2016.06.023"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1016\/j.jss.2016.02.021"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1002\/sec.784"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1016\/j.jnca.2014.04.006"},{"doi-asserted-by":"crossref","unstructured":"Zhang Y. et al. 2015. AE: An Asymmetric Extremum Content Defined Chunking Algorithm for Fast and Bandwidth-Efficient Data Deduplication. (2015) 1337--1345.  Zhang Y. et al. 2015. AE: An Asymmetric Extremum Content Defined Chunking Algorithm for Fast and Bandwidth-Efficient Data Deduplication. (2015) 1337--1345.","key":"e_1_3_2_1_20_1","DOI":"10.1109\/INFOCOM.2015.7218510"}],"event":{"sponsor":["Central Queensland University","University of Canberra University of Canberra"],"acronym":"ICCMS '17","name":"ICCMS '17: 8th International Conference on Computer Modeling and Simulation","location":"Canberra Australia"},"container-title":["Proceedings of the 8th International Conference on Computer Modeling and Simulation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3036331.3036357","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3036331.3036357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:43Z","timestamp":1750217803000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3036331.3036357"}},"subtitle":["Rapid Deduplication for Mobile Cloud Storage"],"short-title":[],"issued":{"date-parts":[[2017,1,20]]},"references-count":20,"alternative-id":["10.1145\/3036331.3036357","10.1145\/3036331"],"URL":"https:\/\/doi.org\/10.1145\/3036331.3036357","relation":{},"subject":[],"published":{"date-parts":[[2017,1,20]]},"assertion":[{"value":"2017-01-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}