{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T12:54:35Z","timestamp":1773320075868,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[1994,9,1]],"date-time":"1994-09-01T00:00:00Z","timestamp":778377600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithmica"],"published-print":{"date-parts":[[1994,9]]},"DOI":"10.1007\/bf01185210","type":"journal-article","created":{"date-parts":[[2005,2,18]],"date-time":"2005-02-18T12:46:54Z","timestamp":1108730814000},"page":"182-208","source":"Crossref","is-referenced-by-count":81,"title":["Coding techniques for handling failures in large disk arrays"],"prefix":"10.1007","volume":"12","author":[{"given":"L.","family":"Hellerstein","sequence":"first","affiliation":[]},{"given":"G. A.","family":"Gibson","sequence":"additional","affiliation":[]},{"given":"R. M.","family":"Karp","sequence":"additional","affiliation":[]},{"given":"R. H.","family":"Katz","sequence":"additional","affiliation":[]},{"given":"D. A.","family":"Patterson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF01185210_CR1","volume-title":"Product Description, RAID + Series Model RX, Revision 1.0","author":"Array Technology Corporation","year":"1990","unstructured":"Array Technology CorporationProduct Description, RAID + Series Model RX, Revision 1.0, Array Technology Corporation, Boulder, CO 80301, February 1990."},{"key":"BF01185210_CR2","first-page":"25","volume":"8","author":"K. H. Bates","year":"1989","unstructured":"Bates, K. H., Performance aspects of the HSC controller,Digital Tech. J., Vol. 8, February 1989, pp. 25\u201337.","journal-title":"Digital Tech. J."},{"key":"BF01185210_CR3","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1126\/science.228.4698.462","volume":"228","author":"C. G. Bell","year":"1985","unstructured":"Bell, C. G., Multis: a new class of multiprocessor computers,Science, Vol. 228, April 1985, pp. 462\u2013467.","journal-title":"Science"},{"issue":"No. 9","key":"BF01185210_CR4","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1145\/66451.66457","volume":"32","author":"C. G. Bell","year":"1989","unstructured":"Bell, C. G., The future of high performance computers in science and engineering,Comm. ACM, Vol. 32, No. 9, September 1989, pp. 1091\u20131101.","journal-title":"Comm. ACM"},{"key":"BF01185210_CR5","unstructured":"Bitton, D., and J. Gray, Disk shadowing,Proc. 14th Internat. Conf. on Very Large Data Bases (VLDB), 1988, pp. 331\u2013338."},{"key":"BF01185210_CR6","volume-title":"Combinatorics, Set Systems, Hypergraphs, Families of Vectors, and Combinatorial Probability","author":"B. Bollob\u00e1s","year":"1986","unstructured":"Bollob\u00e1s, B.,Combinatorics, Set Systems, Hypergraphs, Families of Vectors, and Combinatorial Probability, Cambridge University Press, Cambridge, 1986."},{"key":"BF01185210_CR7","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1007\/978-3-642-69419-6_10","volume-title":"Database Machines","author":"H. Boral","year":"1983","unstructured":"Boral, H., and D. DeWitt, Database machines: an idea whose time has passed?,Database Machines, H. O. Leilich and M. Missikoff, eds., Springer-Verlag, New York, September 1983, pp. 166\u2013187."},{"key":"BF01185210_CR8","series-title":"Mathematical Centre Tracts 106","first-page":"75","volume-title":"Packing and Covering in Combinatorics","author":"A. E. Brouwer","year":"1979","unstructured":"Brouwer, A. E., Wilson's theory, inPacking and Covering in Combinatorics, A. Schrijver, ed., Mathematical Centre Tracts 106, Mathematisch Centrum, Amsterdam, 1979, pp. 75\u201388."},{"key":"BF01185210_CR9","series-title":"Mathematical Centre Tracts 106","first-page":"39","volume-title":"Packing and Covering in Combinatorics","author":"A. E. Brouwer","year":"1979","unstructured":"Brouwer, A. E., and A. Schrijver, Uniform hypergraphs, inPacking and Covering in Combinatorics, A. Schrijver, ed., Mathematical Centre Tracts 106, Mathematisch Centrum, Amsterdam, 1979, pp. 39\u201373."},{"key":"BF01185210_CR10","unstructured":"Chen, P. M., and D. A. Patterson, Maximizing performance in a striped disk array,Proc. 1990 ACM SIGARCH 17th Ann. Internat. Symp. on Computer Architecture, Seattle, WA, May 1990, pp. 322\u2013331."},{"key":"BF01185210_CR11","doi-asserted-by":"crossref","unstructured":"Gelsinger, P. P., P. A. Gargini, G. H. Parker, and A. Y. C. Yu, Microprocessors circa 2000,IEEE Spectrum, October 1989, pp. 43\u201374.","DOI":"10.1109\/6.40684"},{"key":"BF01185210_CR12","volume-title":"Redundant Disk Arrays: Reliable, Parallel Secondary Storage","author":"G. A. Gibson","year":"1992","unstructured":"Gibson, G. A.,Redundant Disk Arrays: Reliable, Parallel Secondary Storage, M.I.T. Press, Cambridge, MA, 1992."},{"issue":"No. 1","key":"BF01185210_CR13","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1006\/jpdc.1993.1002","volume":"17","author":"G. A. Gibson","year":"1993","unstructured":"Gibson, G. A., and D. A. Patterson, Designing disk arrays for high data reliability,J. Parallel Distrib. Comput., Vol. 17, No. 1, January 1993, pp. 4\u201327.","journal-title":"J. Parallel Distrib. Comput."},{"key":"BF01185210_CR14","unstructured":"Gray, J., Why do computers stop and what can be done about it?, Tandem Technical Report 85.7, June 1985."},{"key":"BF01185210_CR15","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1214\/aoms\/1177705047","volume":"32","author":"H. Hanani","year":"1961","unstructured":"Hanani, H., The existence of construction of balanced incomplete block designs,Ann. of Math. Statist., Vol. 32, 1961, pp. 361\u2013386.","journal-title":"Ann. of Math. Statist."},{"key":"BF01185210_CR16","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/0012-365X(75)90040-0","volume":"11","author":"H. Hanani","year":"1975","unstructured":"Hanani, H., Balanced incomplete block desings and related designs,Discrete Math., Vol. 11, 1975, pp. 255\u2013369.","journal-title":"Discrete Math."},{"key":"BF01185210_CR17","first-page":"60","volume":"18","author":"A. Hoagland","year":"1985","unstructured":"Hoagland, A., Information storage technology: a look at the future,IEEE Trans. Computer, Vol. 18, July 1985, pp. 60\u201367.","journal-title":"IEEE Trans. Computer"},{"key":"BF01185210_CR18","doi-asserted-by":"crossref","unstructured":"Holland, M., and G. A. Gibson, Parity declustering for continuous operation in redundant disk arrays,Fifth Internat. Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS V), Boston, MA, October 1992, pp. 23\u201325.","DOI":"10.1145\/143365.143383"},{"key":"BF01185210_CR19","unstructured":"Jilke, W., Disk array mass storage sytems: the new opportunity, Amperif Corp., September 1986."},{"key":"BF01185210_CR20","unstructured":"Kim, M. Y., Synchronously Interleaved Disk Systems with their Application to the Very Large FFT, Ph.D. Dissertation, Polytechnic University, January 1987."},{"key":"BF01185210_CR21","unstructured":"Klietz, A., J. Turner, and T. C. Jacobson, TurboNFS: fast shared access for Cray disk storage,Proc. Cray User Group Convention, April 1988."},{"issue":"No. 6","key":"BF01185210_CR22","doi-asserted-by":"crossref","first-page":"4358","DOI":"10.1109\/20.45315","volume":"25","author":"M. H. Kryder","year":"1989","unstructured":"Kryder, M. H., Data storage in 2000\u2014trends in data storage technologies,IEEE Trans. Magnetics, Vol. 25, No. 6, November 1989, pp. 4358\u20134363.","journal-title":"IEEE Trans. Magnetics"},{"key":"BF01185210_CR23","unstructured":"Lin, Ting-Ting Yao, Design and Evaluation of an On-Line Predictive Diagnostic System, Ph.D. Dissertation, Carnegie Mellon University, April 1988."},{"key":"BF01185210_CR24","doi-asserted-by":"crossref","unstructured":"Livny, M., S. Khoshafian, and H. Boral, Multi-disk management algorithms,Proc. ACM SIGMETRICS, May 1987, pp. 69\u201377.","DOI":"10.1145\/29903.29914"},{"key":"BF01185210_CR25","volume-title":"North-Holland Mathematical Library, Vol. 16","author":"F. J. MacWilliams","year":"1977","unstructured":"MacWilliams, F. J., and N. J. A. Sloane,The Theory of Error-Correcting Codes, North-Holland Mathematical Library, Vol. 16, Elsevier Science, New York, 1977."},{"key":"BF01185210_CR26","first-page":"162","volume-title":"Proc. 16th Internat. Conf. on Very Large Data Bases (VDLB)","author":"R. R. Muntz","year":"1990","unstructured":"Muntz, R. R., and J. C. S. Lui, Performance analysis of disk arrays under failure,Proc. 16th Internat. Conf. on Very Large Data Bases (VDLB), D. McLeod, R. Sacks-Davis, and H. Schek, eds., Morgan Kaufman, Los Altos, CA, August 1990, pp. 162\u2013173."},{"issue":"No. 12","key":"BF01185210_CR27","doi-asserted-by":"crossref","first-page":"1605","DOI":"10.1109\/PROC.1986.13680","volume":"74","author":"G. J. Myers","year":"1986","unstructured":"Myers, G. J., A. Y. C. Yi, and D. L. House, Microprocessor technology trends,Proc. IEEE, Vol. 74, No. 12, December 1986, pp. 1605\u20131622.","journal-title":"Proc. IEEE"},{"key":"BF01185210_CR28","doi-asserted-by":"crossref","unstructured":"Newberg, L., and D. Wolfe, String layouts for a redundant array of inexpensive disks,Algorithmica, this issue, pp. 209\u2013224.","DOI":"10.1007\/BF01185211"},{"key":"BF01185210_CR29","doi-asserted-by":"crossref","unstructured":"Patterson, D. A., G. A. Gibson, and R. H. Katz, A case for redundant arrays of inexpensive disks (RAID),ACM SIGMOD 88, Chicago, June 1988, pp. 109\u2013116.","DOI":"10.1145\/971701.50214"},{"key":"BF01185210_CR30","first-page":"131","volume-title":"Error-Correcting Codes","author":"W. W. Peterson","year":"1972","unstructured":"Peterson, W. W., and E. J. Weldon, Jr.,Error-Correcting Codes, 2nd edn., M.I.T. Press, Cambridge, MA, 1972, pp. 131\u2013136.","edition":"2nd edn."},{"key":"BF01185210_CR31","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1145\/62044.62050","volume":"36","author":"M. O. Rabin","year":"1989","unstructured":"Rabin, M. O., Efficient dispersal of information at security, load balancing, and fault tolerance,J. Assoc. Comput. Mach., Vol. 36, 1989, pp. 335\u2013348.","journal-title":"J. Assoc. Comput. Mach."},{"key":"BF01185210_CR32","doi-asserted-by":"crossref","DOI":"10.1002\/9780470316511","volume-title":"Simulation and the Monte Carlo Method","author":"R. Y. Rubinstein","year":"1981","unstructured":"Rubinstein, R. Y.,Simulation and the Monte Carlo Method, Wiley, New York, 1981."},{"key":"BF01185210_CR33","doi-asserted-by":"crossref","unstructured":"Salem, K., and H. Garcia-Molina, Disk striping,Proc. IEEE 1986 Internat. Conf. on Data Engineering, 1986, pp. 336\u2013342.","DOI":"10.1109\/ICDE.1986.7266238"}],"container-title":["Algorithmica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01185210.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01185210\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01185210","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,5]],"date-time":"2020-04-05T21:00:46Z","timestamp":1586120446000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01185210"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994,9]]},"references-count":33,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[1994,9]]}},"alternative-id":["BF01185210"],"URL":"https:\/\/doi.org\/10.1007\/bf01185210","relation":{},"ISSN":["0178-4617","1432-0541"],"issn-type":[{"value":"0178-4617","type":"print"},{"value":"1432-0541","type":"electronic"}],"subject":[],"published":{"date-parts":[[1994,9]]}}}