{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:16:53Z","timestamp":1771705013696,"version":"3.50.1"},"reference-count":57,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1109\/msst.2010.5496983","type":"proceedings-article","created":{"date-parts":[[2010,7,6]],"date-time":"2010-07-06T18:06:33Z","timestamp":1278439593000},"page":"1-14","source":"Crossref","is-referenced-by-count":64,"title":["Flat XOR-based erasure codes in storage systems: Constructions, efficient recovery, and tradeoffs"],"prefix":"10.1109","author":[{"given":"Kevin M.","family":"Greenan","sequence":"first","affiliation":[]},{"given":"Xiaozhou","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jay J.","family":"Wylie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1542275.1542326"},{"key":"ref38","first-page":"15","article-title":"Star: an efficient coding scheme for correcting triple storage node failures","author":"huang","year":"2005","journal-title":"Proceedings of the FAST '05 Conference on File and Storage Technologies"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/71.476189"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1177\/1094342009106191"},{"key":"ref31","article-title":"The RAID-6 Liberation codes","author":"plank","year":"2008","journal-title":"FAST-2008 6th Usenix Conference on File and Storage Technologies"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/18.746809"},{"key":"ref36","first-page":"1","article-title":"Row-diagonal parity for double disk failure correction","author":"corbett","year":"2004","journal-title":"FAST-2004 3rd USENIX Conference on File and Storage Technologies"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/18.485722"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/12.364531"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.32"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2007.4367976"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630083"},{"key":"ref2","first-page":"1","article-title":"Disk failures in the real world: What does an MTTF of 1, 000,000 hours mean to you?","author":"schroeder","year":"2007","journal-title":"FAST-2007 5th USENIX Conference on File and Storage Technologies"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217957"},{"key":"ref20","first-page":"212","article-title":"WEAVER Codes: Highly fault tolerant erasure codes for storage systems","author":"hafner","year":"2005","journal-title":"FAST-2005"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SNAPI.2007.20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.40"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311882"},{"key":"ref23","first-page":"246","article-title":"Self-adaptive two-dimensional raid arrays","author":"paris","year":"2007","journal-title":"International Performance Computing and Communications Conference (IPCCC)"},{"key":"ref26","author":"hafner","year":"2006","journal-title":"Notes on Reliability Models for Non-MDS Erasure Codes"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.86"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1954.1057464"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/70082.68194"},{"key":"ref57","first-page":"173","article-title":"Optimizing Cauchy Reed-Solomon codes for fault-tolerant network storage applications","author":"plank","year":"2006","journal-title":"NCA-2006 5th IEEE International Symposium on Network Computing Applications"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2008.4770564"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270300"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.874535"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111337"},{"key":"ref52","first-page":"183","article-title":"Matrix methods for lost data reconstruction in erasure codes","author":"hafner","year":"2005","journal-title":"FAST-2005"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.70821"},{"key":"ref11","author":"greenan","year":"2009","journal-title":"Reliability and Power-efficiency in Erasure Coded Storage Systems"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.864441"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/945449.945450"},{"key":"ref13","year":"0","journal-title":"Hadoop File System (Hdfs)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258573"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","author":"gallager","year":"1963","journal-title":"Low Density Parity-Check Codes"},{"key":"ref16","first-page":"56","article-title":"A digital fountain approach to reliable distribution of bulk data","author":"byers","year":"1998","journal-title":"SIGCOMM '98"},{"key":"ref17","first-page":"cl?597","year":"2008"},{"key":"ref18","first-page":"ci-2004","year":"2009"},{"key":"ref19","author":"wilner","year":"2001","journal-title":"Multiple Drive Failure Tolerant RAID System"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1269899.1254917"},{"key":"ref3","article-title":"Failure trends in a large disk drive population","author":"pinheiro","year":"2007","journal-title":"FAST-2007 5th USENIX Conference on File and Storage Technologies"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CMPCON.1992.186748"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1516046.1516059"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133577"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/143365.143383"},{"key":"ref49","article-title":"Erasure codes for storage applications","author":"plank","year":"2005","journal-title":"FAST-2005 4th Usenix Conference on File and Storage Technologies"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1288783.1289721"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1993.627346"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/50202.50214"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.61"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2008.4745117"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1990.113499"},{"key":"ref44","author":"hafner","year":"2004","journal-title":"Performance Metrics for Erasure Codes in Storage Systems"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2007.37"}],"event":{"name":"2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST)","location":"Incline Village, NV, USA","start":{"date-parts":[[2010,5,3]]},"end":{"date-parts":[[2010,5,7]]}},"container-title":["2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5488875\/5496967\/05496983.pdf?arnumber=5496983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T20:25:46Z","timestamp":1559247946000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5496983\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/msst.2010.5496983","relation":{},"subject":[],"published":{"date-parts":[[2010,5]]}}}