{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T18:09:40Z","timestamp":1770833380359,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/infcom.2013.6566920","type":"proceedings-article","created":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T20:12:57Z","timestamp":1375387977000},"page":"1276-1284","source":"Crossref","is-referenced-by-count":44,"title":["An ensemble of replication and erasure codes for cloud file systems"],"prefix":"10.1109","author":[{"given":"Yadi","family":"Ma","sequence":"first","affiliation":[]},{"given":"Thyaga","family":"Nandagopal","sequence":"additional","affiliation":[]},{"given":"Krishna P. N.","family":"Puttaswamy","sequence":"additional","affiliation":[]},{"given":"Suman","family":"Banerjee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043562"},{"key":"17","article-title":"Measurement and analysis of large-scale network file system workloads","author":"leung","year":"2008","journal-title":"Proceedings of Annual Technical Conference"},{"key":"18","article-title":"Erasure coding in windows azure storage","author":"huang","year":"2012","journal-title":"USENIX ATC"},{"key":"15","article-title":"Anatomy of linux journaling file systems","author":"jones","year":"2008","journal-title":"IBM developerWorks"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1288783.1288788"},{"key":"13","article-title":"Extending ssd lifetimes with disk-based write caches","author":"soundararajan","year":"2010","journal-title":"FAST"},{"key":"14","article-title":"Elements of information theory","author":"cover","year":"2006","journal-title":"Wiley Series in Telecommunications"},{"key":"11","author":"xtreem","year":"0","journal-title":"A Cloud File System"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1416944.1416949"},{"key":"21","year":"0","journal-title":"Verizon Internet Protocol Latency Statistics"},{"key":"20","year":"0","journal-title":"Amazon EC2 pricing"},{"key":"22","author":"dimakis","year":"2010","journal-title":"A Survey on Network Codes for Distributed Storage"},{"key":"23","author":"rashmi","year":"2012","journal-title":"Optimal Exact-regenerating Codes for Distributed Storage at the Msr and Mbr Points Via A Productmatrix Construction"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2011.6033980"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2008.9"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2009.14"},{"key":"27","article-title":"Does erasure coding have a role to play in my data center?","author":"zhang","year":"2010","journal-title":"Microsoft Research Technical Report MSR-TR-2010-52"},{"key":"3","author":"gluster","year":"0","journal-title":"Gluster Virtual Storage Appliance"},{"key":"2","author":"amazon","year":"0","journal-title":"Amazon Simple Storage Service Faqs"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2004.1336553"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/945449.945450"},{"key":"7","article-title":"Rethinking erasure codes for cloud file systems: Minimizing i\/o for recovery and degraded reads","author":"khan","year":"2012","journal-title":"FAST"},{"key":"6","article-title":"Everest: Scaling down peak loads through i\/o off-loading","author":"narayanan","year":"2008","journal-title":"OSDI"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1952682.1952709"},{"key":"4","author":"miller","year":"0","journal-title":"Major Data Center Outages of 2009"},{"key":"9","article-title":"High availability in dhts: Erasure coding vs. replication","author":"rodrigues","year":"2005","journal-title":"IPTPS"},{"key":"8","article-title":"Erasure coding vs. replication: A quantitative comparison","author":"weatherspoon","year":"2002","journal-title":"IPTPS"}],"event":{"name":"IEEE INFOCOM 2013 - IEEE Conference on Computer Communications","location":"Turin, Italy","start":{"date-parts":[[2013,4,14]]},"end":{"date-parts":[[2013,4,19]]}},"container-title":["2013 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6556116\/6566708\/06566920.pdf?arnumber=6566920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T21:27:19Z","timestamp":1490218039000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6566920\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/infcom.2013.6566920","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}