{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:26:00Z","timestamp":1730233560495,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/iccchina.2018.8641182","type":"proceedings-article","created":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T18:51:51Z","timestamp":1550170311000},"page":"882-887","source":"Crossref","is-referenced-by-count":0,"title":["Low-Complexity Shorten MSR Code for Limited Bandwidth Systems"],"prefix":"10.1109","author":[{"given":"Ke","family":"Li","sequence":"first","affiliation":[]},{"given":"Shushi","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qinyu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620501"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2553670"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2159049"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT.2016.7765367"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054295"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043571"},{"key":"ref6","first-page":"1","article-title":"When can intelligent helper node selection improve the performance of distributed storage networks?","volume":"pp","author":"ahmad","year":"2017","journal-title":"IEEE Transactions on Information Theory"},{"key":"ref5","first-page":"21","article-title":"Nccloud: applying network coding for the storage repair in a cloud-of-clouds","author":"hu","year":"2012","journal-title":"USENIX Conference on File and Storage Technologies"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2480848"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2325570"},{"key":"ref2","first-page":"325","article-title":"Xoring elephants: novel erasure codes for big data","volume":"6","author":"asteris","year":"2013"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5815\/ijmecs.2017.10.01"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541379"}],"event":{"name":"2018 IEEE\/CIC International Conference on Communications in China (ICCC)","start":{"date-parts":[[2018,8,16]]},"location":"Beijing, China","end":{"date-parts":[[2018,8,18]]}},"container-title":["2018 IEEE\/CIC International Conference on Communications in China (ICCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8636844\/8641082\/08641182.pdf?arnumber=8641182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T00:17:46Z","timestamp":1643242666000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8641182\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/iccchina.2018.8641182","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}