{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:17:17Z","timestamp":1730279837954,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T00:00:00Z","timestamp":1718755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T00:00:00Z","timestamp":1718755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008416","name":"Wuhan National Laboratory for Optoelectronics","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008416","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,19]]},"DOI":"10.1109\/iwqos61813.2024.10682840","type":"proceedings-article","created":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T17:41:00Z","timestamp":1727372460000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Greedy Transfer Planning Search For Improving Repair Throughput of RDP-like Coded Storage Clusters"],"prefix":"10.1109","author":[{"given":"Juehao","family":"Chen","sequence":"first","affiliation":[{"name":"Harbin Institute of Technology,Shenzhen"}]},{"given":"Shiyi","family":"Li","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology,Shenzhen"}]},{"given":"Wen","family":"Xia","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology,Shenzhen"}]},{"given":"Shuaipeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology,Shenzhen"}]},{"given":"Qicong","family":"Lin","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology,Shenzhen"}]},{"given":"Haojun","family":"Hu","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology,Shenzhen"}]}],"member":"263","reference":[{"year":"2023","key":"ref1","article-title":"Amazon EC2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043571"},{"volume-title":"Big Growth Forecasted for Big Data","key":"ref3"},{"article-title":"Availability in globally distributed storage systems","volume-title":"Proc. of the OSDI 2010","author":"Ford","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3626198"},{"article-title":"Exploiting combined locality for Wide-Stripe erasure coding in distributed storage","volume-title":"Proc. of the FAST 2021","author":"Hu","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.08.011"},{"article-title":"Tutorial: Erasure coding for storage applications","volume-title":"Slides presented at 11th Usenix Conference on File and Storage Technologies (FAST 13)","author":"Plank","key":"ref8"},{"article-title":"Rethinking erasure codes for cloud file systems: minimizing i\/o for recovery and degraded reads","volume-title":"Proc. of the FAST 2012","author":"Khan","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054295"},{"key":"ref11","first-page":"15","article-title":"Erasure coding in windows azure storage","volume-title":"Proc. of 2012 USENIX Annual Technical Conference (USENIX ATC 12)","author":"Huang"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2014.36"},{"key":"ref13","first-page":"233","article-title":"Explore data placement algorithm for balanced recovery load distribution","volume-title":"Proc. of 2023 USENIX Annual Technical Conference (USENIX ATC 23)","author":"Shan"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2901318.2901328"},{"key":"ref15","first-page":"567","article-title":"Repair pipelining for Erasure-Coded storage","volume-title":"Proc. of 2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Li"},{"key":"ref16","first-page":"641","article-title":"Boosting Full-Node repair in Erasure-Coded storage","volume-title":"Proc. of 2021 USENIX Annual Technical Conference (USENIX ATC 21)","author":"Lin"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"ref18","first-page":"1","article-title":"Row-diagonal parity for double disk failure correction","volume-title":"Proc. of the 3rd USENIX Conference on File and Storage Technologies (FAST 04)","author":"Corbett"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/12.364531"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1811099.1811054"},{"key":"ref21","volume-title":"The theory of error-correcting codes.","volume":"16","author":"MacWilliams","year":"1977"},{"key":"ref22","article-title":"An xor-based erasure-resilient coding scheme","volume-title":"Technical report at ICSI","author":"Blomer","year":"1995"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.70830"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/18.746771"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1177\/1094342009106191"},{"key":"ref26","article-title":"Jerasure: A library in C\/C++ facilitating erasure coding for storage applications","volume-title":"Technical Report CS-07\u2013603","author":"Plank","year":"2007"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1542275.1542326"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2011.78"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958220"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2859956"}],"event":{"name":"2024 IEEE\/ACM 32nd International Symposium on Quality of Service (IWQoS)","start":{"date-parts":[[2024,6,19]]},"location":"Guangzhou, China","end":{"date-parts":[[2024,6,21]]}},"container-title":["2024 IEEE\/ACM 32nd International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10682818\/10682608\/10682840.pdf?arnumber=10682840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T04:39:15Z","timestamp":1727411955000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10682840\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,19]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/iwqos61813.2024.10682840","relation":{},"subject":[],"published":{"date-parts":[[2024,6,19]]}}}