{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:06:45Z","timestamp":1729638405296,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/msst.2013.6558423","type":"proceedings-article","created":{"date-parts":[[2013,7,25]],"date-time":"2013-07-25T14:59:15Z","timestamp":1374764355000},"page":"1-14","source":"Crossref","is-referenced-by-count":13,"title":["Zettabyte reliability with flexible end-to-end data integrity"],"prefix":"10.1109","author":[{"given":"Yupu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Daniel S.","family":"Myers","sequence":"additional","affiliation":[]},{"given":"Andrea C.","family":"Arpaci-Dusseau","sequence":"additional","affiliation":[]},{"given":"Remzi H.","family":"Arpaci-Dusseau","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1145\/2150976.2150989"},{"doi-asserted-by":"publisher","key":"35","DOI":"10.1145\/1837915.1837917"},{"year":"0","journal-title":"An Integrated End-to-End Data Integrity Solution to Protect Against Silent Data Corruption","key":"17"},{"doi-asserted-by":"publisher","key":"36","DOI":"10.1145\/1555349.1555372"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1145\/502034.502041"},{"doi-asserted-by":"publisher","key":"33","DOI":"10.1109\/DSN.2009.5270353"},{"key":"15","first-page":"253","article-title":"Zero-copy tcp in solaris","author":"chu","year":"1996","journal-title":"USENIX ATC'96"},{"doi-asserted-by":"publisher","key":"34","DOI":"10.1145\/357401.357402"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/DSN.2007.41"},{"doi-asserted-by":"publisher","key":"39","DOI":"10.1109\/FTCS.1991.146625"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/FTCS.1993.627346"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/502034.502042"},{"year":"2004","author":"semiconductor","journal-title":"Soft Errors in Electronic Memory-A White Paper","key":"37"},{"year":"2008","author":"bairavasundaram","journal-title":"An Analysis of Data Corruption in the Storage Stack","key":"11"},{"year":"0","journal-title":"Architectural Model for Data Integrity","key":"38"},{"year":"0","author":"bonwick","journal-title":"ZFSThe Last Word File Systems","key":"12"},{"key":"21","article-title":"Parity lost and parity regained","author":"krioukov","year":"2008","journal-title":"FAST - 08 Pages 127-141"},{"year":"1997","journal-title":"IBM Microelectronics Division","article-title":"D T J A white paper on the benefits of chipkill-correct ecc for pc server main memory","key":"20"},{"year":"0","journal-title":"ASMLib","key":"43"},{"year":"0","journal-title":"SCSI Block Commands-3","key":"42"},{"doi-asserted-by":"publisher","key":"41","DOI":"10.1145\/945445.945466"},{"year":"0","journal-title":"Solaris Internals FileBench","key":"40"},{"key":"45","article-title":"Using Model Checking to Find Serious File System Errors","author":"yang","year":"2004","journal-title":"OSDI' 04"},{"key":"44","article-title":"Explode: A lightweight, general system for finding serious storage system errors","author":"yang","year":"2006","journal-title":"OSDI '06"},{"key":"47","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1126\/science.206.4420.776","article-title":"Effect of cosmic rays on computer memories","volume":"206","author":"ziegler","year":"1979","journal-title":"Science"},{"key":"46","article-title":"End-to-end Data integrity for file systems: A ZFS case study","volume":"10","author":"zhang","year":"2010","journal-title":"FAST"},{"key":"22","article-title":"A realistic evaluation of memory hardware errors and software system susceptibility","volume":"10","author":"li","year":"2010","journal-title":"USENIX ATC"},{"key":"23","article-title":"A memory soft error measurement on production systems","author":"li","year":"2007","journal-title":"Usenix ATC'07"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1109\/TDSC.2007.70216"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1109\/T-ED.1979.19370"},{"year":"0","journal-title":"Improvements in Lustre Data Integrity","key":"26"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1109\/23.556861"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.1147\/rd.401.0041"},{"key":"29","article-title":"A clean-slate look at disk scrubbing","volume":"10","author":"oprea","year":"2010","journal-title":"FAST"},{"year":"0","journal-title":"Repeated Panics Something Gone Bad?","key":"3"},{"year":"0","journal-title":"LASR Traces","key":"2"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/1254882.1254917"},{"year":"0","journal-title":"Data Integrity","key":"1"},{"doi-asserted-by":"publisher","key":"30","DOI":"10.1145\/50202.50214"},{"year":"0","journal-title":"RFC1071-Computing the Internet Checksum","key":"7"},{"year":"0","journal-title":"RFC 793-Transmission Control Protocol","key":"6"},{"key":"32","first-page":"206","author":"prabhakaran","year":"2005","journal-title":"IRON File Systems"},{"year":"0","journal-title":"RFC 3720-Internet Small Computer Systems Interface (ISCSI","key":"5"},{"key":"31","article-title":"Linux data integrity extensions","author":"petersen","year":"2008","journal-title":"Linux Symposium"},{"year":"0","journal-title":"RFC 3385-Internet Protocol Small Computer System Interface (ISCSI) Cyclic Redundancy Check (CRC)\/Checksum Considerations","key":"4"},{"year":"0","journal-title":"Zfs Problems","key":"9"},{"year":"0","journal-title":"Zfs Problem Mirror","key":"8"}],"event":{"name":"2013 IEEE 29th Symposium on Mass Storage Systems and Technologies (MSST)","start":{"date-parts":[[2013,5,6]]},"location":"Long Beach, CA, USA","end":{"date-parts":[[2013,5,10]]}},"container-title":["2013 IEEE 29th Symposium on Mass Storage Systems and Technologies (MSST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6554307\/6558419\/06558423.pdf?arnumber=6558423","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T12:49:23Z","timestamp":1498049363000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6558423\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/msst.2013.6558423","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}