{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:06:14Z","timestamp":1764785174035,"version":"3.37.3"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010002","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,17]]},"DOI":"10.1109\/infocom53939.2023.10228984","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:40:43Z","timestamp":1693330843000},"page":"1-10","source":"Crossref","is-referenced-by-count":11,"title":["Balancing Repair Bandwidth and Sub-Packetization in Erasure-Coded Storage via Elastic Transformation"],"prefix":"10.1109","author":[{"given":"Kaicheng","family":"Tang","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Keyun","family":"Cheng","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Helen H. W.","family":"Chan","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Xiaolu","family":"Li","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology"}]},{"given":"Patrick P. C.","family":"Lee","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Yuchong","family":"Hu","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology"}]},{"given":"Jie","family":"Li","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd.,Hong Kong"}]},{"given":"Ting-Yi","family":"Wu","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co., Ltd.,Hong Kong"}]}],"member":"263","reference":[{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2015.7084873"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1017\/S0963548398003411"},{"key":"ref5","article-title":"Operating Systems: Three Easy Pieces","volume-title":"Arpaci-Dusseau Books","author":"Arpaci-Dusseau","year":"2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437486"},{"volume-title":"Backblaze Vaults: Zettabyte-scale cloud storage architecture","year":"2019","author":"Beach","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.167"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054295"},{"article-title":"Availability in globally distributed storage systems","volume-title":"Proc. of USENIX OSDI","author":"Ford","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2939111"},{"article-title":"Multi-layer transformed MDS codes with optimal repair access and low sub-packetization","year":"2019","author":"Hou","key":"ref12"},{"article-title":"Erasure coding in Windows Azure storage","volume-title":"Proc. of USENIX ATC","author":"Huang","key":"ref13"},{"volume-title":"Wonder Shaper","year":"2012","author":"Hubert","key":"ref14"},{"article-title":"Rethinking erasure codes for cloud file systems: Minimizing I\/O for recovery and degraded reads","volume-title":"Proc. of USENIX FAST","author":"Khan","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3381832"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00066"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2749255"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3126751"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2855059"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3436890"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2349518"},{"article-title":"OpenEC: Toward unified and configurable erasure coding management in distributed storage systems","volume-title":"Proc. of USENIX FAST","author":"Li","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2901318.2901328"},{"key":"ref25","first-page":"383","article-title":"f4: Facebook\u2019s warm BLOB storage system","volume-title":"Proc. of USENIX OSDI","author":"Muralidhar"},{"article-title":"Opening the chrysalis: On the real repair performance of MSR codes","volume-title":"Proc. of USENIX FAST","author":"Pamies-Juarez","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1051\/epjconf\/202024504008"},{"article-title":"Having your cake and eating it too: Jointly optimal erasure codes for I\/O, storage, and network-bandwidth","volume-title":"Proc. of USENIX FAST","author":"Rashmi","key":"ref28"},{"article-title":"A solution to the network challenges of data recovery in erasure-coded distributed storage systems: A study on the Facebook warehouse cluster","volume-title":"Proc. of USENIX HotStorage","author":"Rashmi","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2715043"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626325"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488339"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483558"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2010.5496972"},{"article-title":"Clay codes: Moulding MDS codes to yield an MSR code","volume-title":"Proc. of USENIX FAST","author":"Vajha","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_31"}],"event":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","start":{"date-parts":[[2023,5,17]]},"location":"New York City, NY, USA","end":{"date-parts":[[2023,5,20]]}},"container-title":["IEEE INFOCOM 2023 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10228851\/10228852\/10228984.pdf?arnumber=10228984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T02:17:10Z","timestamp":1705025830000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10228984\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,17]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/infocom53939.2023.10228984","relation":{},"subject":[],"published":{"date-parts":[[2023,5,17]]}}}