{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:59:52Z","timestamp":1729630792901,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/netcod.2013.6570839","type":"proceedings-article","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T15:40:54Z","timestamp":1376494854000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Storage codes: Managing big data with small overheads"],"prefix":"10.1109","author":[{"given":"Anwitaman","family":"Datta","sequence":"first","affiliation":[]},{"given":"Frederique","family":"Oggier","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"},{"key":"35","article-title":"Does erasure coding have a role to play in my data center?","author":"zhang","year":"2010","journal-title":"Microsoft Research"},{"key":"17","article-title":"Pyramid codes: Flexible schemes to trade space for access efficiency in reliable data storage systems. trans","volume":"9","author":"huang","year":"2013","journal-title":"Storage"},{"key":"18","article-title":"Erasure coding in windows azure storage","author":"huang","year":"2012","journal-title":"USENIX ATC"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195641"},{"key":"34","doi-asserted-by":"crossref","DOI":"10.14778\/2535573.2488339","article-title":"Xoring elephants: Novel erasure codes for big data","author":"sathiamoorthy","year":"2013","journal-title":"Proceedings of the VLDB Endowment"},{"key":"16","article-title":"Nccloud: Applying network coding for the storage repair in a cloud-of-clouds","author":"hu","year":"2012","journal-title":"FAST"},{"key":"13","article-title":"On the locality of codewords symbols","author":"gopalan","year":"2011","journal-title":"ECC"},{"key":"14","article-title":"Glacier: Highly durable, decentralized storage despite massive correlated failures","author":"haeberlen","year":"2005","journal-title":"NSDI"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1713072.1713075"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/945449.945450"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05118-0_36"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2013.6558428"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2011.6089443"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934901"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2011.6038668"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.02.009"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566922"},{"key":"27","article-title":"Decentralized erasure coding for efficient data archival in distributed storage systems","author":"pamies-juarez","year":"2013","journal-title":"ICDCN"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6284027"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/971701.50214"},{"key":"3","article-title":"Total recall: System support for automated availability management","author":"bhagwan","year":"2004","journal-title":"NSDI"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966449"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043571"},{"journal-title":"HDFS RAID","year":"0","key":"1"},{"journal-title":"Converged Storage and Compute Appliances","year":"0","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364689"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054295"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2012.6404723"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2006.22"},{"journal-title":"Optimal Locally Repairable and Secure Codes for Distributed Storage Systems","year":"2012","author":"rawat","key":"31"},{"year":"0","key":"4"},{"journal-title":"The Core Storage Primitive Cross-object Redundancy for Efficient Data Repair & Access in Erasure Coded Storage","year":"2013","author":"esmaili","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2008.9"}],"event":{"name":"2013 International Symposium on Network Coding (NetCod)","start":{"date-parts":[[2013,6,7]]},"location":"Calgary, AB, Canada","end":{"date-parts":[[2013,6,9]]}},"container-title":["2013 International Symposium on Network Coding (NetCod)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6560497\/6570811\/06570839.pdf?arnumber=6570839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T17:49:48Z","timestamp":1498067388000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6570839\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/netcod.2013.6570839","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}