{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T21:14:47Z","timestamp":1724966087211},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/iwqos49365.2020.9213028","type":"proceedings-article","created":{"date-parts":[[2020,10,6]],"date-time":"2020-10-06T20:03:04Z","timestamp":1602014584000},"source":"Crossref","is-referenced-by-count":11,"title":["Leveraging Stragglers in Coded Computing with Heterogeneous Servers"],"prefix":"10.1109","author":[{"given":"Xiaodi","family":"Fan","sequence":"first","affiliation":[]},{"given":"Pedro","family":"Soto","sequence":"additional","affiliation":[]},{"given":"Xiaomei","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Xi","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"dutta","year":"0","journal-title":"A Unified Coded Deep Neural Network Training Strategy Based on Generalized PolyDot Codes for Matrix Multiplication"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014006"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.191"},{"key":"ref32","author":"kosaian","year":"2018","journal-title":"Learning a code Machine learning for approximate non-linear coded computation"},{"key":"ref31","article-title":"Deepcode: Feedback Codes via Deep Learning","author":"kim","year":"0","journal-title":"Neural Information Processing Systems Conf (NIPS)"},{"key":"ref30","article-title":"Improving MapReduce performance in heterogeneous environments","author":"zaharia","year":"0","journal-title":"USENIX Conference on Operating Systems Design and Implementation (OSDI)"},{"key":"ref37","article-title":"Coded Sparse Matrix Multiplication","author":"wang","year":"0","journal-title":"International Conference on Machine Learning (ICML)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2017.8262882"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437563"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3102980.3103005"},{"key":"ref40","article-title":"Having Your Cake and Eating It Too: Jointly Optimal Erasure Codes for I\/O, Storage, and Network-bandwidth","author":"rashmi","year":"0","journal-title":"USENIX Conference on File and Storage Technologies (FAST)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849451"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849684"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849212"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437871"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2015.7447112"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2017.33"},{"key":"ref17","first-page":"902","article-title":"DRACO: Byzantine-resilient Distributed Training via Redundant Gradients","author":"chen","year":"0","journal-title":"International Conference on Machine Learning (ICML)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2016.7852225"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2010.5707092"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408794"},{"key":"ref4","first-page":"185","article-title":"Effective Straggler Mitigation: Attack of the Clones","author":"ananthanarayanan","year":"2013","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref27","first-page":"2019","year":"0","journal-title":"Open MPI Open Source High Performance Computing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2506161"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2637364.2592042"},{"key":"ref29","article-title":"Reining in the Outliers in Map-Reduce Clusters using Mantri","author":"ananthanarayanan","year":"0","journal-title":"USENIX Conference on Operating Systems Design and Implementation (OSDI)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2496593"},{"key":"ref8","author":"narra","year":"2019","journal-title":"Distributed Matrix Multiplication Using Speed Adaptive Coding"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2622248"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2736066"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.0-166"},{"key":"ref1","first-page":"3368","article-title":"Gradient Coding: Avoiding Stragglers in Distributed Learning","author":"tandon","year":"0","journal-title":"International Conference on Machine Learning (ICML)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006961"},{"key":"ref22","first-page":"5434","article-title":"Straggler Mitigation in Distributed Optimization Through Data Encoding","author":"karakus","year":"2017","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref21","first-page":"2100","article-title":"Short-Dot: Computing Large Linear Transforms Distributedly Using Coded Short Dot Products","author":"dutta","year":"2016","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref24","article-title":"UberShuffle: Communication-efficient Data Shuffling for SGD via Coding Theory","author":"chung","year":"0","journal-title":"31st Conference on Neural Information Processing Systems (NIPS)"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2159049"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8007057"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2391229.2391236"},{"key":"ref25","article-title":"Polynomial Codes: An Optimal Design for High-Dimensional Coded Matrix Multiplication","author":"yu","year":"2017","journal-title":"Advances in Neural Information Processing Systems (NIPS)"}],"event":{"name":"2020 IEEE\/ACM 28th International Symposium on Quality of Service (IWQoS)","location":"Hang Zhou, China","start":{"date-parts":[[2020,6,15]]},"end":{"date-parts":[[2020,6,17]]}},"container-title":["2020 IEEE\/ACM 28th International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9203768\/9212810\/09213028.pdf?arnumber=9213028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:58:01Z","timestamp":1656453481000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9213028\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/iwqos49365.2020.9213028","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}