{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:46:35Z","timestamp":1725666395486},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/isit.2015.7282525","type":"proceedings-article","created":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T18:09:52Z","timestamp":1443722992000},"page":"601-605","source":"Crossref","is-referenced-by-count":1,"title":["Hermitian codes in distributed storage systems with optimal error-correcting capacity"],"prefix":"10.1109","author":[{"given":"Bin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Haibin","family":"Kan","sequence":"additional","affiliation":[]},{"given":"Kenneth W.","family":"Shum","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2159049"},{"key":"ref3","first-page":"15","article-title":"Erasure coding in Windows Azure storage","author":"huang","year":"2012","journal-title":"USENIX Annual Technical Conference"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124208"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISCCSP.2014.6877800"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.836918"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.122313.130492"},{"journal-title":"The Theory of Error-Correcting Codes","year":"1977","author":"macwilliams","key":"ref12"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-76878-4","author":"stichtenoth","year":"2009","journal-title":"Algebraic Function Fields and Codes"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847952"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/18.21267"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/945449.945450"}],"event":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","start":{"date-parts":[[2015,6,14]]},"location":"Hong Kong, Hong Kong","end":{"date-parts":[[2015,6,19]]}},"container-title":["2015 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7270906\/7282397\/07282525.pdf?arnumber=7282525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T17:06:08Z","timestamp":1692032768000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7282525\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/isit.2015.7282525","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}