{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T23:09:21Z","timestamp":1721171361822},"reference-count":17,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1016\/j.comnet.2019.05.020","type":"journal-article","created":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T15:20:18Z","timestamp":1558970418000},"page":"41-50","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["Analysis of the age of data in data backup systems"],"prefix":"10.1016","volume":"160","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-7401-1974","authenticated-orcid":false,"given":"Apoorv","family":"Saxena","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7666-2479","authenticated-orcid":false,"given":"Dieter","family":"Claeys","sequence":"additional","affiliation":[]},{"given":"Herwig","family":"Bruneel","sequence":"additional","affiliation":[]},{"given":"Joris","family":"Walraevens","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2019.05.020_bib0001","unstructured":"Deloitte, Small business, big technology. How the cloud enables rapid growth in SMBs, 2014, (https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/global\/Documents\/Technology-Media-Telecommunications\/gx-tmt-small-business-big-technology.pdf)."},{"key":"10.1016\/j.comnet.2019.05.020_bib0002","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.future.2015.10.003","article-title":"A model to compare cloud and non-cloud storage of big data","volume":"57","author":"Chang","year":"2016","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.comnet.2019.05.020_bib0003","unstructured":"Business-Wire, Cloud Storage Market - Forecasts, 2017, (https:\/\/www.businesswire.com\/news\/home\/20170614005856\/en\/92.48-Billion-Cloud-Storage-Market---Forecasts)."},{"key":"10.1016\/j.comnet.2019.05.020_bib0004","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.comnet.2018.04.001","article-title":"Systematic survey of big data and data mining in internet of things","volume":"139","author":"Shadroo","year":"2018","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2019.05.020_bib0005","unstructured":"D. Reinsel, J. Gantz, J. Rydning, Data age 2025: The evolution of data to life-critical don\u2019t focus on big data, 2017, (https:\/\/www.seagate.com\/our-story\/data-age-2025\/)."},{"key":"10.1016\/j.comnet.2019.05.020_bib0006","unstructured":"I.S. Arul Elumalai, S. Tandon, It as a service: from build to consume, McKinsey & Company, September 2016, (https:\/\/www.mckinsey.com\/industries\/high-tech\/our-insights\/it-as-a-service-from-build-to-consume)."},{"key":"10.1016\/j.comnet.2019.05.020_bib0007","unstructured":"Amazon, Amazon web service s3, 2017, (https:\/\/aws.amazon.com\/s3\/)."},{"key":"10.1016\/j.comnet.2019.05.020_sbref0003","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.comnet.2016.03.024","article-title":"Workload models and performance evaluation of cloud storage services","volume":"109","author":"Gonalves","year":"2016","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2019.05.020_bib0009","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1016\/j.comnet.2015.02.013","article-title":"Minimizing data redundancy for high reliable cloud storage systems","volume":"81","author":"Huang","year":"2015","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2019.05.020_bib0010","unstructured":"D. Boullery, A. Sch\u00f6rgendorfer, P. Van de Ven, B. Zhang, Balanced distributed backup scheduling, 2016. US Patent 9,244,777, (https:\/\/www.google.com\/patents\/US9244777)."},{"key":"10.1016\/j.comnet.2019.05.020_bib0011","series-title":"44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2014, Atlanta, GA, USA, June 23\u201326, 2014","first-page":"660","article-title":"A Markov decision process approach for optimal data backup scheduling","author":"Xia","year":"2014"},{"key":"10.1016\/j.comnet.2019.05.020_bib0012","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.comcom.2018.07.014","article-title":"Modeling data backups as a batch-service queue with vacations and exhaustive policy","volume":"128","author":"Saxena","year":"2018","journal-title":"Comput. Commun."},{"key":"10.1016\/j.comnet.2019.05.020_bib0013","unstructured":"Microsoft, SLA for Site Recovery, 2018, (https:\/\/azure.microsoft.com\/en-us\/support\/legal\/sla\/site-recovery\/v1_0\/)."},{"key":"10.1016\/j.comnet.2019.05.020_bib0014","unstructured":"TEKLINKS, Service Level Agreements, 2018, (https:\/\/www.teklinks.com\/wp-content\/uploads\/2017\/01\/Disaster-Recovery-SLA-20170109.pdf)."},{"issue":"4","key":"10.1016\/j.comnet.2019.05.020_bib0015","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/0167-6377(92)90050-D","article-title":"Numerical inversion of probability generating functions","volume":"12","author":"Abate","year":"1992","journal-title":"Oper. Res. Lett."},{"key":"10.1016\/j.comnet.2019.05.020_bib0016","series-title":"Analytic Combinatorics","author":"Flajolet","year":"2009"},{"issue":"2","key":"10.1016\/j.comnet.2019.05.020_bib0017","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/TIT.2011.2173713","article-title":"Delay bounds in communication networks with heavy-tailed and self-similar traffic","volume":"58","author":"Liebeherr","year":"2012","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128618308727?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128618308727?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,7,20]],"date-time":"2020-07-20T14:24:43Z","timestamp":1595255083000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128618308727"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":17,"alternative-id":["S1389128618308727"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2019.05.020","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2019,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Analysis of the age of data in data backup systems","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2019.05.020","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}