{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:58:01Z","timestamp":1725742681198},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642401954"},{"type":"electronic","value":"9783642401961"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40196-1_20","type":"book-chapter","created":{"date-parts":[[2013,7,23]],"date-time":"2013-07-23T01:54:56Z","timestamp":1374544496000},"page":"241-257","source":"Crossref","is-referenced-by-count":8,"title":["Effect of Codeword Placement on the Reliability of Erasure Coded Data Storage Systems"],"prefix":"10.1007","author":[{"given":"Vinodh","family":"Venkatesan","sequence":"first","affiliation":[]},{"given":"Ilias","family":"Iliadis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Patterson, D.A., Gibson, G., Katz, R.H.: A case for redundant arrays of inexpensive disks (RAID). In: Proc. 1988 ACM SIGMOD Int\u2019l Conference on Management of Data, pp. 109\u2013116 (1988)","DOI":"10.1145\/971701.50214"},{"issue":"2","key":"20_CR2","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1145\/176979.176981","volume":"26","author":"P.M. Chen","year":"1994","unstructured":"Chen, P.M., Lee, E.K., Gibson, G.A., Katz, R.H., Patterson, D.A.: RAID: high-performance, reliable secondary storage. ACM Computing Surveys\u00a026(2), 145\u2013185 (1994)","journal-title":"ACM Computing Surveys"},{"issue":"3","key":"20_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1629075.1629076","volume":"5","author":"A. Thomasian","year":"2009","unstructured":"Thomasian, A., Blaum, M.: Higher reliability redundant disk arrays: Organization, operation, and coding. ACM Trans. Storage\u00a05(3), 1\u201359 (2009)","journal-title":"ACM Trans. Storage"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Leong, D., Dimakis, A.G., Ho, T.: Distributed storage allocation for high reliability. In: Proc. IEEE Int\u2019l Conference on Communications, pp. 1\u20136 (2010)","DOI":"10.1109\/ICC.2010.5502492"},{"issue":"6","key":"20_CR5","doi-asserted-by":"publisher","first-page":"36","DOI":"10.4304\/jnw.1.6.36-44","volume":"1","author":"M. Leslie","year":"2006","unstructured":"Leslie, M., Davies, J., Huffman, T.: A comparison of replication strategies for reliable decentralised storage. Journal of Networks\u00a01(6), 36\u201344 (2006)","journal-title":"Journal of Networks"},{"key":"20_CR6","doi-asserted-by":"publisher","first-page":"1640","DOI":"10.1109\/TC.2006.201","volume":"55","author":"A. Thomasian","year":"2006","unstructured":"Thomasian, A., Blaum, M.: Mirrored disk organization reliability analysis. IEEE Transactions on Computers\u00a055, 1640\u20131644 (2006)","journal-title":"IEEE Transactions on Computers"},{"issue":"3","key":"20_CR7","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/1925019.1925021","volume":"38","author":"X. Li","year":"2011","unstructured":"Li, X., Lillibridge, M., Uysal, M.: Reliability analysis of deduplicated and erasure-coded storage. ACM SIGMETRICS Performance Evaluation Review\u00a038(3), 4\u20139 (2011)","journal-title":"ACM SIGMETRICS Performance Evaluation Review"},{"key":"20_CR8","unstructured":"Xin, Q., Miller, E.L., Schwarz, T.J.E.: Evaluation of distributed recovery in large-scale storage systems. In: Proc. 13th IEEE Int\u2019l Symposium on High Performance Distributed Computing (HPDC 2004), pp. 172\u2013181 (2004)"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Venkatesan, V., Iliadis, I., Fragouli, C., Urbanke, R.: Reliability of clustered vs. declustered replica placement in data storage systems. In: Proc. 19th Annual IEEE\/ACM Int\u2019l Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2011), pp. 307\u2013317 (2011)","DOI":"10.1109\/MASCOTS.2011.53"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Venkatesan, V., Iliadis, I., Haas, R.: Reliability of data storage systems under network rebuild bandwidth constraints. In: Proc. 20th Annual IEEE Int\u2019l Symposium on Modelling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2012), pp. 189\u2013197 (2012)","DOI":"10.1109\/MASCOTS.2012.31"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/3-540-45748-8_31","volume-title":"Peer-to-Peer Systems","author":"H. Weatherspoon","year":"2002","unstructured":"Weatherspoon, H., Kubiatowicz, J.D.: Erasure coding vs. replication: A quantitative comparison. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 328\u2013338. Springer, Heidelberg (2002)"},{"key":"20_CR12","unstructured":"Plank, J.S., Huang, C.: Tutorial: Erasure coding for storage applications. Slides presented at 11th Usenix Conference on File and Storage Technologies (FAST 2013) (February 2013)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Greenan, K.M., Miller, E.L., Wylie, J.: Reliability of flat XOR-based erasure codes on heterogeneous devices. In: Proc. 38th Annual IEEE\/IFIP Int\u2019l Conference on Dependable Systems and Networks (DSN 2008), pp. 147\u2013156 (June 2008)","DOI":"10.1109\/DSN.2008.4630083"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Venkatesan, V., Iliadis, I.: A general reliability model for data storage systems. In: Proc. 9th Int\u2019l Conference on Quantitative Evaluation of Systems (QEST 2012), pp. 209\u2013219 (2012)","DOI":"10.1109\/QEST.2012.32"},{"key":"20_CR15","unstructured":"Ford, D., Labelle, F., Popovici, F.I., Stokely, M., Truong, V.A., Barroso, L., Grimes, C., Quinlan, S.: Availability in globally distributed storage systems. In: Proc. 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2010), pp. 61\u201374 (2010)"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Ramabhadran, S., Pasquale, J.: Analysis of long-running replicated systems. In: Proc. 25th IEEE Int\u2019l Conference on Computer Communications (INFOCOM 2006), pp. 1\u20139 (2006)","DOI":"10.1109\/INFOCOM.2006.130"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Dimakis, A.G., Ramchandran, K., Wu, Y., Suh, C.: A survey on network coding for distributed storage. Proceedings of the IEEE\u00a099(3) (2011)","DOI":"10.1109\/JPROC.2010.2096170"},{"key":"20_CR18","unstructured":"IBM: XiV Storage System Specifications, \n                    \n                      http:\/\/www.xivstorage.com"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Venkatesan, V., Iliadis, I.: Effect of codeword placement on the reliability of erasure coded data storage systems. Technical Report RZ 3827, IBM Research - Zurich (2012)","DOI":"10.1007\/978-3-642-40196-1_20"}],"container-title":["Lecture Notes in Computer Science","Quantitative Evaluation of Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40196-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T02:54:02Z","timestamp":1557975242000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40196-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642401954","9783642401961"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40196-1_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}