{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:17:47Z","timestamp":1771697867178,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/infocom.2016.7524628","type":"proceedings-article","created":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T20:47:54Z","timestamp":1469738874000},"page":"1-9","source":"Crossref","is-referenced-by-count":13,"title":["Reducing access latency in erasure coded cloud storage with local block migration"],"prefix":"10.1109","author":[{"given":"Yaochen","family":"Hu","sequence":"first","affiliation":[]},{"given":"Di","family":"Niu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218426"},{"key":"ref11","article-title":"The user and business impact of server delays, additional bytes, and http chunking in web search","author":"schurman","year":"2009","journal-title":"Velocity Web Performance and Operations Conference"},{"key":"ref12","first-page":"1997","article-title":"On the hardness of approximating max k-cut and its dual","volume":"2","author":"kann","year":"1997","journal-title":"Chicago Journal of Theoretical Computer Science"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-2001-2_9"},{"key":"ref14","article-title":"Performance models of access latency in cloud storage systems","author":"li","year":"2014","journal-title":"Proc Fourth Workshop on Architectures and Systems for Big Data"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1970.tb01770.x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.1982.1585498"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.1110.0492"},{"key":"ref18","first-page":"40","article-title":"The breakout method for escaping from local minima","volume":"93","author":"morris","year":"1993","journal-title":"AAAI"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2360543"},{"key":"ref4","first-page":"15","article-title":"Erasure coding in windows azure storage","author":"huang","year":"2012","journal-title":"USENIX Annual Technical Conference"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043571"},{"key":"ref6","first-page":"20","article-title":"Rethinking erasure codes for cloud file systems: minimizing i\/o for recovery and degraded reads","author":"khan","year":"2012","journal-title":"FAST"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1007\/3-540-45748-8_31","article-title":"Erasure coding vs. replication: A quantitative comparison","author":"weatherspoon","year":"2002","journal-title":"Peer-to-Peer Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626325"},{"key":"ref7","article-title":"A tale of two erasure codes in hdfs","author":"xia","year":"2015","journal-title":"To appear in Proceedings of 13th Usenix Conference on File and Storage Technologies"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/945449.945450"},{"key":"ref1","article-title":"Hdfs architecture guide","author":"borthakur","year":"2008","journal-title":"Apache Hadoop Project"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2289382"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566991"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807162"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566873"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218428"},{"key":"ref23","first-page":"17","article-title":"Volley: Automated data placement for geo-distributed cloud services","author":"agarwal","year":"2010","journal-title":"NSDI"}],"event":{"name":"IEEE INFOCOM 2016 - IEEE Conference on Computer Communications","location":"San Francisco, CA, USA","start":{"date-parts":[[2016,4,10]]},"end":{"date-parts":[[2016,4,14]]}},"container-title":["IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7515093\/7524326\/07524628.pdf?arnumber=7524628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T19:27:34Z","timestamp":1498332454000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7524628\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/infocom.2016.7524628","relation":{},"subject":[],"published":{"date-parts":[[2016,4]]}}}