{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:01:39Z","timestamp":1729616499206,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/ictc.2013.6675444","type":"proceedings-article","created":{"date-parts":[[2013,12,4]],"date-time":"2013-12-04T20:58:59Z","timestamp":1386190739000},"page":"649-653","source":"Crossref","is-referenced-by-count":0,"title":["Reliability comparison of various regenerating codes for cloud services"],"prefix":"10.1109","author":[{"family":"Jung-Hyun Kim","sequence":"first","affiliation":[]},{"family":"Jin Soo Park","sequence":"additional","affiliation":[]},{"family":"Ki-Hyeon Park","sequence":"additional","affiliation":[]},{"family":"Inseon Kim","sequence":"additional","affiliation":[]},{"family":"Mi-Young Nam","sequence":"additional","affiliation":[]},{"family":"Hong-Yeop Song","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181950"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.70830"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2208937"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511791338"},{"key":"16","article-title":"Erasure coding in windows azure storage","author":"huang","year":"2012","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2274265"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6283579"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2009.14"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2178588"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2007.37"},{"year":"0","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1049\/ip-com:20050237"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1145\/1323293.1294281","article-title":"Dynamo: Amazon's highly available key-value store","author":"de candia","year":"2007","journal-title":"ACM SIGOPS"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/945449.945450"},{"key":"10","article-title":"Deterministic regenerating codes for distributed storage","author":"wu","year":"2007","journal-title":"Proc Allerton Conf Control Comput Commun"},{"key":"7","article-title":"Xoring elephants: Novel erasure codes for big data","author":"sathiamoorthy","year":"0","journal-title":"Proc VLDB Endowment"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5005-1"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"4","article-title":"Finding a needle in haystack: Facebook's photo storage","volume":"2010","author":"beaver","year":"0","journal-title":"Proc 9th USENIX Conf on Operating Systems Design and Implementation (OSDI"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054295"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402967"}],"event":{"name":"2013 International Conference on ICT Convergence (ICTC)","start":{"date-parts":[[2013,10,14]]},"location":"JEJU ISLAND, Korea (South)","end":{"date-parts":[[2013,10,16]]}},"container-title":["2013 International Conference on ICT Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6661630\/6675287\/06675444.pdf?arnumber=6675444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T03:39:17Z","timestamp":1498102757000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6675444\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ictc.2013.6675444","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}