{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:49:26Z","timestamp":1725572966224},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.154","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"1291-1298","source":"Crossref","is-referenced-by-count":0,"title":["TurboSockets: Democratizing Distributed Deduplication"],"prefix":"10.1109","author":[{"given":"Joao","family":"Salada","sequence":"first","affiliation":[]},{"given":"Joao","family":"Barreto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Joint Computer Science Technical Report Series","article-title":"The rsync algorithm","year":"1996","author":"tridgell","key":"19"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/509961.509965"},{"key":"17","first-page":"281","article-title":"Taper: Tiered approach for eliminating redundancy in replica","author":"jain","year":"2005","journal-title":"4th Usenix Conference on File and Storage Technologies"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2012.01.012"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1970348.1970351"},{"key":"33","first-page":"2","article-title":"Finding similar files in a large file system","author":"manber","year":"1994","journal-title":"Proceedings of the USENIX Winter 1994 Technical Conference"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502052"},{"key":"34","first-page":"1","article-title":"Identifying and filtering near-duplicate documents","author":"broder","year":"2000","journal-title":"Proceedings of the 11th Annual Symposium on Combinatorial Pattern Matching"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10445-9_6"},{"key":"39","first-page":"111","article-title":"Sparse indexing: Large scale, inline deduplication using sampling and locality","author":"lillibridge","year":"2009","journal-title":"Proccedings of the 7th Conference on File and Storage Technologies"},{"key":"13","first-page":"341","article-title":"Cvs ii: Parallelizing software dev elopment","author":"berliner","year":"1990","journal-title":"Proceedings of the Winter 1990 USENIX Conference"},{"key":"14","first-page":"117","article-title":"Cache-based compaction: A new technique for optimizing web transfer","author":"chan","year":"1999","journal-title":"Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2010.5496987"},{"key":"11","first-page":"6","article-title":"Alternatives for detecting redundancy in storage systems data","author":"policroniades","year":"2004","journal-title":"Proceedings of the Annual Conference on USENIX Annual Technical Conference"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2009.5366623"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2078861.2078864"},{"key":"21","first-page":"269","article-title":"Avoiding the disk bottleneck in the data domain deduplication file system challenges and observations","author":"zhu","year":"2008","journal-title":"Conference FAST"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2011.35"},{"journal-title":"Proc of the USENIX Conference on File and Storage Technologies","article-title":"Wan optimized replication of backup datasets using streaminformed delta compression","year":"2012","author":"shilane","key":"40"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1210596.1210599"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2010.37"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1987816.1987837"},{"journal-title":"Fingerprinting by Random Polynimials Technical Report TR-15-81","year":"1981","author":"rabin","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1321"},{"journal-title":"Secure Hash Standard","year":"2002","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/2287056.2287061"},{"journal-title":"International Associationfor Cryptologic Research EPrint Archive","article-title":"Bounds on birthday attack times","year":"2005","author":"wiener","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1462735.1462739"},{"journal-title":"An IDC White Paper - Sponsored by EMC","article-title":"The expanding digital universe: A forecast of worldwide information growth through 2010","year":"2007","author":"gantz","key":"2"},{"journal-title":"IDC (International Data Corporation)","article-title":"Extracting value from chaos state of the universe","year":"2011","author":"gantz","key":"1"},{"journal-title":"Distributed Systems Concepts and Design","year":"1988","author":"coulouris","key":"10"},{"journal-title":"Cryptography Theory and Practice","year":"1995","author":"stinson","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2011.60"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2010.07.005"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9323-8_11"},{"journal-title":"Proceedings of the 2010 USENIX Conference","article-title":"Wide-area network acceleration for the developing world","year":"2010","author":"ihm","key":"5"},{"key":"31","first-page":"85","article-title":"Compare-by-hash: A reasoned analysis","author":"black","year":"2006","journal-title":"2006 USENIX Annual Technical Conference"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2011.76"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/2141702.2141705"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2089002.2089007"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680976.pdf?arnumber=6680976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T23:54:21Z","timestamp":1490226861000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680976\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.154","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}