{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T04:15:39Z","timestamp":1742530539921,"version":"3.40.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642281440"},{"type":"electronic","value":"9783642281457"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28145-7_35","type":"book-chapter","created":{"date-parts":[[2012,2,15]],"date-time":"2012-02-15T19:58:14Z","timestamp":1329335894000},"page":"357-367","source":"Crossref","is-referenced-by-count":5,"title":["Towards Efficient Execution of Erasure Codes on Multicore Architectures"],"prefix":"10.1007","author":[{"given":"Roman","family":"Wyrzykowski","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lukasz","family":"Kuczynski","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcin","family":"Wozniak","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"5","key":"35_CR1","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1147\/rd.515.0559","volume":"51","author":"T. Chen","year":"2007","unstructured":"Chen, T., Raghavan, R., Dale, J.N., Iwata, E.: Cell Broadband Engine Architecture and its first implementation: A performance view. IBM Journal of Research and Development\u00a051(5), 559\u2013572 (2007)","journal-title":"IBM Journal of Research and Development"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Collins, R., Plank, J.: Assessing the Performance of Erasure Codes in the Wide-Area. In: Proc. 2005 Int. Conf. Dependable Systems and Networks, DSN 2005, pp. 182\u2013187. IEEE Computer Society (2005)","DOI":"10.1109\/DSN.2005.21"},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Curry, M.L., Skjellum, A., Ward, H.L., Brightwell, R.: Arbitrary Dimension Reed-Solomon Coding and Decoding for Extended RAID on GPUs. In: Proc. 3rd Petascale Data Storage Workshop, PDSW 2008 (2008)","DOI":"10.1109\/PDSW.2008.4811887"},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Curry, M.L., Skjellum, A., Ward, H.L., Brightwell, R.: Accelerating Reed-Solomon coding in RAID systems with GPUs. In: IPDPS 2008, pp. 1\u20136. IEEE Press (2008), http:\/\/www.bibsonomy.org\/bibtex\/2e7f39d74179b4d96fea4d89df77c5d6b\/dblp","DOI":"10.1109\/IPDPS.2008.4536322"},{"key":"35_CR5","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1400181.1400197","volume":"51","author":"K. Fatahalian","year":"2008","unstructured":"Fatahalian, K., Houston, M.: GPUs: A Closer Look. Comm. ACM\u00a051, 50\u201357 (2008)","journal-title":"Comm. ACM"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"Kher, V., Kim, Y.: Securing Distributed Storage: Challenges, Techniques, and Systems. In: ACM Workshop on Storage Security and Survivability, pp. 9\u201325 (2005)","DOI":"10.1145\/1103780.1103783"},{"issue":"6","key":"35_CR7","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1049\/ip-com:20050237","volume":"152","author":"D.J.C. MacKay","year":"2005","unstructured":"MacKay, D.J.C.: Fountain Codes. IEE Proc. \u2013 Communications\u00a0152(6), 1062\u20131068 (2005)","journal-title":"IEE Proc. \u2013 Communications"},{"issue":"2","key":"35_CR8","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1365490.1365500","volume":"6","author":"J. Nickolls","year":"2008","unstructured":"Nickolls, J., Buck, I., Garland, M., Skadron, K.: Scalable Parallel Programming with CUDA. Queue\u00a06(2), 40\u201353 (2008)","journal-title":"Queue"},{"key":"35_CR9","unstructured":"OpenCL - The open standard for parallel programming of heterogeneous systems, http:\/\/www.khronos.org\/opencl"},{"issue":"9","key":"35_CR10","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1002\/(SICI)1097-024X(199709)27:9<995::AID-SPE111>3.0.CO;2-6","volume":"27","author":"J. Plank","year":"1997","unstructured":"Plank, J.: A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems. Software \u2013 Practice & Experience\u00a027(9), 995\u20131012 (1997)","journal-title":"Software \u2013 Practice & Experience"},{"issue":"2","key":"35_CR11","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1002\/spe.631","volume":"35","author":"J. Plank","year":"2005","unstructured":"Plank, J., Ding, Y.: Note: Correction to the 1997 tutorial on Reed-Solomon coding. Software \u2013 Practice & Experience\u00a035(2), 189\u2013194 (2005)","journal-title":"Software \u2013 Practice & Experience"},{"key":"35_CR12","unstructured":"Plank, J., Simmerman, S., Schuman, C.: Jerasure: A Library in C\/C++ Facilitating Erasure Coding for Storage Applications, https:\/\/www.cs.utk.edu\/~plank\/plank\/papers\/CS-08-627.pdf"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Plank, J., Thomason, M.: A Practical Analysis of Low-Density Parity-Check Erasure Codes for Wide-Area Storage Applications. In: Proc. 2004 Int. Conf. Dependable Systems and Networks, pp. 115\u2013124. IEEE Comp. Soc. (2004)","DOI":"10.1109\/DSN.2004.1311882"},{"key":"35_CR14","unstructured":"Plank, J., Xu, L.: Optimizing Cauchy Reed-Solomon codes for fault-tolerant network storage applications. In: NCA 2006: 5th IEEE Int. Symp. Network Computing Applications, pp. 173\u2013180 (2006)"},{"key":"35_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/3-540-45748-8_31","volume-title":"Peer-to-Peer Systems","author":"H. Weatherspoon","year":"2002","unstructured":"Weatherspoon, H., Kubiatowicz, J.D.: Erasure Coding Vs. Replication: A Quantitative Comparison. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 328\u2013338. Springer, Heidelberg (2002)"},{"key":"35_CR16","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.parco.2008.12.006","volume":"35","author":"S. Williams","year":"2009","unstructured":"Williams, S., Oliker, L., Vuduc, R., Shalf, J., Yelick, K., Demmel, J.: Optimization of sparse matrix-vector multiplication on emerging multicore platforms. Parallel Computing\u00a035, 178\u2013194 (2009)","journal-title":"Parallel Computing"},{"key":"35_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-14390-8_14","volume-title":"Parallel Processing and Applied Mathematics","author":"M. Wozniak","year":"2010","unstructured":"Wozniak, M., Olas, T., Wyrzykowski, R.: Parallel Implementation of Conjugate Gradient Method on Graphics Processors. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wasniewski, J. (eds.) PPAM 2009. LNCS, vol.\u00a06067, pp. 125\u2013135. Springer, Heidelberg (2010)"},{"key":"35_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1007\/978-3-540-68111-3_87","volume-title":"Parallel Processing and Applied Mathematics","author":"R. Wyrzykowski","year":"2008","unstructured":"Wyrzykowski, R., Kuczynski, L.: Towards Secure Data Management System for Grid Environment Based on the Cell Broadband Engine. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wasniewski, J. (eds.) PPAM 2007. LNCS, vol.\u00a04967, pp. 825\u2013834. Springer, Heidelberg (2008)"},{"key":"35_CR19","unstructured":"Wyrzykowski, R. Kuczynski, L., Rojek, K.: Mapping AES Cryptography and Whirlpool Hashing onto Cell\/B.E. Architecture. In: Proc. PARA 2008 (2010) (accepted for publication)"}],"container-title":["Lecture Notes in Computer Science","Applied Parallel and Scientific Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28145-7_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T21:54:32Z","timestamp":1742507672000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28145-7_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642281440","9783642281457"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28145-7_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}