{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T22:40:35Z","timestamp":1767998435650,"version":"3.49.0"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2018,12,1]]},"DOI":"10.1109\/tbdata.2017.2749255","type":"journal-article","created":{"date-parts":[[2017,9,5]],"date-time":"2017-09-05T18:14:31Z","timestamp":1504635271000},"page":"516-529","source":"Crossref","is-referenced-by-count":42,"title":["HashTag Erasure Codes: From Theory to Practice"],"prefix":"10.1109","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1791-4434","authenticated-orcid":false,"given":"Katina","family":"Kralevska","sequence":"first","affiliation":[]},{"given":"Danilo","family":"Gligoroski","sequence":"additional","affiliation":[]},{"given":"Rune E.","family":"Jensen","sequence":"additional","affiliation":[]},{"given":"Harald","family":"Overby","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2661313"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2329872"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847953"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISNETCOD.2011.5978920"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502493"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282816"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2730863"},{"key":"ref35","author":"white","year":"2012","journal-title":"Hadoop The Definitive Guide"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2017.162"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620242"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2015.7084873"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2658660"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2159049"},{"key":"ref14","article-title":"Rethinking erasure codes for cloud file systems: Minimizing I\/O\n for recovery and degraded reads","author":"khan","year":"2012","journal-title":"Proc USENIX Conf File Storage Technol"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/12.364531"},{"key":"ref16","first-page":"1","article-title":"Row-diagonal parity for double disk failure\n correction","author":"corbett","year":"2004","journal-title":"Proc USENIX Conf File Storage Technol"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620465"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2349518"},{"key":"ref19","article-title":"A new piggybacking design for systematic MDS storage codes","author":"shangguan","year":"2016","journal-title":"CoRR"},{"key":"ref28","first-page":"81","article-title":"Having your cake and eating it too: Jointly optimal erasure codes\n for I\/O, storage, and network-bandwidth","author":"rashmi","year":"2015","journal-title":"Proc USENIX Conf File Storage Technol"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2010.5496972"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2472524"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/945449.945450"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054295"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100216"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"ref8","first-page":"61","article-title":"Availability in globally distributed storage\n systems","author":"ford","year":"2010","journal-title":"Proc 9th USENIX Symp Operating Syst Des Implementation"},{"key":"ref7","first-page":"331","article-title":"A &#x201C;hitchhiker's&#x201D; guide to fast and efficient data reconstruction in erasure-coded data\n centers","author":"rashmi","year":"2014","journal-title":"Proc ACM Conf SIGCOMM"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_31"},{"key":"ref9","first-page":"21","article-title":"NCCloud: Applying network coding for the storage repair\n in a cloud-of-clouds","author":"hu","year":"2012","journal-title":"Proc USENIX Conf File Storage Technol"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2561287"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2241819"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2227110"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2011.6033730"},{"key":"ref24","first-page":"1187","article-title":"Access versus\n bandwidth in codes for storage","author":"tamo","year":"2012","journal-title":"Proc IEEE Int Symp Inf Theory"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2011.6120327"},{"key":"ref26","first-page":"81","article-title":"Opening the chrysalis: On the real repair performance of MSR codes","author":"pamies-juarez","year":"2016","journal-title":"Proc USENIX Conf File Storage Technol"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2011.6190343"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687317\/8552529\/08025778.pdf?arnumber=8025778","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T02:35:10Z","timestamp":1643250910000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8025778\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,1]]},"references-count":38,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2017.2749255","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"value":"2332-7790","type":"electronic"},{"value":"2372-2096","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,1]]}}}