{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:07Z","timestamp":1750221127187,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,28]],"date-time":"2018-04-28T00:00:00Z","timestamp":1524873600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4,28]]},"DOI":"10.1145\/3220199.3220206","type":"proceedings-article","created":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T13:05:12Z","timestamp":1532005512000},"page":"38-43","source":"Crossref","is-referenced-by-count":0,"title":["Multi"],"prefix":"10.1145","author":[{"given":"Dingding","family":"Xie","sequence":"first","affiliation":[{"name":"College of Information Science and Engineering, Hunan University, Changsha, China"}]},{"given":"Junyi","family":"Li","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Hunan University, Changsha, China"}]},{"given":"Lening","family":"Yuan","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Hunan University, Changsha, China"}]},{"given":"Peng","family":"Peng","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Hunan University, Changsha, China"}]}],"member":"320","published-online":{"date-parts":[[2018,4,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"C. C. Shilakes and J.Tylman.Enterprise information portals Nov. 1998.  C. C. Shilakes and J.Tylman.Enterprise information portals Nov. 1998."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066175"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514894.1514901"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767833"},{"key":"e_1_3_2_1_5_1","unstructured":"Korth Henry F. and A. Silberschatz.\"Database System Concepts \/ H.F. Korth A. Silberschatz.\" McGraw-Hill computer science series8.1(1997):1--2.   Korth Henry F. and A. Silberschatz.\"Database System Concepts \/ H.F. Korth A. Silberschatz.\" McGraw-Hill computer science series8.1(1997):1--2."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.10"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807176"},{"key":"e_1_3_2_1_8_1","unstructured":"Qi Y M Hao J M Zhang L etal Method and system for checking consistency of database method and system for locating database difference: CN104731792A{P}. 2015.  Qi Y M Hao J M Zhang L et al. Method and system for checking consistency of database method and system for locating database difference: CN104731792A{P}. 2015."},{"key":"e_1_3_2_1_9_1","unstructured":"Schwartz B. Zaitsev P. & Tkachenko V. (2012). High Performance MySQL: Optimization Backups and Replication. O'Reilly Media Inc.   Schwartz B. Zaitsev P. & Tkachenko V. (2012). High Performance MySQL: Optimization Backups and Replication. O'Reilly Media Inc."},{"key":"e_1_3_2_1_10_1","unstructured":"Hash-Collision-Probabilities http:\/\/preshing.com\/20110504\/hash-collision-probabilities\/.  Hash-Collision-Probabilities http:\/\/preshing.com\/20110504\/hash-collision-probabilities\/."}],"event":{"name":"ICBDC '18: 2018 International Conference on Big Data and Computing","sponsor":["Shenzhen University Shenzhen University"],"location":"Shenzhen China","acronym":"ICBDC '18"},"container-title":["Proceedings of the 2018 International Conference on Big Data and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3220199.3220206","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3220199.3220206","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:19Z","timestamp":1750208539000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3220199.3220206"}},"subtitle":["Source Data Inconsistency Detection and Repair Based on CRC Algorithm"],"short-title":[],"issued":{"date-parts":[[2018,4,28]]},"references-count":10,"alternative-id":["10.1145\/3220199.3220206","10.1145\/3220199"],"URL":"https:\/\/doi.org\/10.1145\/3220199.3220206","relation":{},"subject":[],"published":{"date-parts":[[2018,4,28]]}}}