{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T09:07:22Z","timestamp":1773133642013,"version":"3.50.1"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2022YFB4501200"],"award-info":[{"award-number":["2022YFB4501200"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["92373114"],"award-info":[{"award-number":["92373114"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2023"],"award-info":[{"award-number":["U22B2023"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Fujian Province of China","award":["2023J06001"],"award-info":[{"award-number":["2023J06001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1109\/tc.2025.3614839","type":"journal-article","created":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T17:52:42Z","timestamp":1759168362000},"page":"4168-4181","source":"Crossref","is-referenced-by-count":1,"title":["ElasticEC: Achieving Fast and Elastic Redundancy Transitioning in Erasure-Coded Clusters"],"prefix":"10.1109","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-0760-9707","authenticated-orcid":false,"given":"Yuhui","family":"Cai","sequence":"first","affiliation":[{"name":"School of Informatics, Xiamen University, Xiamen, China"}]},{"given":"Guowen","family":"Gong","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2673-5868","authenticated-orcid":false,"given":"Zhirong","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2591-2683","authenticated-orcid":false,"given":"Jiahui","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7362-2789","authenticated-orcid":false,"given":"Jiwu","family":"Shu","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University, Xiamen, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Backblaze open-sources reed-solomon erasure coding source code"},{"key":"ref2","article-title":"Locally repairable erasure code plugin"},{"key":"ref3","article-title":"Erasure code support"},{"key":"ref4","article-title":"Apache Hadoop 3.1.4"},{"key":"ref6","article-title":"HDFS erasure coding"},{"key":"ref7","article-title":"The Wonder Shaper 1.4.1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592816"},{"key":"ref9","first-page":"1","article-title":"Pelican: A building block for exascale cold data storage","volume-title":"Proc. USENIX OSDI","author":"Balakrishnan","year":"2014"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2016.26"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043571"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2025.3547872"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3357223.3362713"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945450"},{"key":"ref15","first-page":"233","article-title":"Exploiting combined locality for {Wide-Stripe} erasure coding in distributed storage","volume-title":"Proc. 19th USENIX Conf. File Storage Technol. (FAST)","author":"Hu","year":"2021"},{"key":"ref16","first-page":"15","article-title":"Erasure coding in windows azure storage","volume-title":"Proc. USENIX ATC","author":"Huang","year":"2012"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2326156"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/net.3230120306"},{"key":"ref19","first-page":"413","article-title":"Tiger: Disk-adaptive redundancy without placement restrictions","volume-title":"Proc. USENIX OSDI","author":"Kadekodi","year":"2022"},{"key":"ref20","first-page":"369","article-title":"PACEMAKER: Avoiding HeEAT attacks in storage clusters with disk-adaptive redundancy","volume-title":"Proc. USENIX OSDI","author":"Kadekodi","year":"2020"},{"key":"ref21","first-page":"345","article-title":"Cluster storage systems gotta have HeART: Improving storage efficiency by exploiting disk-reliability heterogeneity","volume-title":"Proc. USENIX FAST","author":"Kadekodi","year":"2019"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9173947"},{"key":"ref23","first-page":"66","article-title":"Convertible codes: New class of codes for efficient conversion of coded data in distributed storage","volume-title":"Proc. Innov. Theor. Comput. Sci. Conf. (ITCS)","author":"Maturana","year":"2020"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9518121"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT50566.2022.9834604"},{"key":"ref26","first-page":"383","article-title":"f4: Facebook\u2019s warm BLOB storage system","volume-title":"Proc. USENIX OSDI","author":"Muralidhar","year":"2014"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14778\/2536222.2536234"},{"key":"ref28","first-page":"1","article-title":"Tutorial: Erasure coding for storage applications","volume-title":"presented at the USENIX FAST","author":"Plank","year":"2013"},{"key":"ref29","article-title":"GF-complete: A comprehensive open source library for Galois field arithmetic version 1.02","author":"Plank","year":"2014"},{"key":"ref30","article-title":"Jerasure: A library in C\/C++ facilitating erasure coding for storage applications-version 1.2","author":"Plank","year":"2008"},{"key":"ref31","first-page":"401","article-title":"EC-Cache: Load-balanced, low-latency cluster caching with online erasure coding","volume-title":"Proc. USENIX OSDI","author":"Rashmi","year":"2016"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS47924.2020.00015"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.37"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190536"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970265"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2822895"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3404397.3404420"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_31"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2012.24"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796704"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS51746.2020.00032"},{"key":"ref43","first-page":"213","article-title":"A tale of two erasure codes in HDFS","volume-title":"Proc. USENIX FAST","author":"Xia","year":"2015"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00053"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485961"},{"key":"ref46","first-page":"1","article-title":"FastScale: Accelerate RAID scaling by minimizing data migration","volume-title":"Proc. USENIX FAST","author":"Zheng","year":"2011"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2876827"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/12\/11234919\/11184335.pdf?arnumber=11184335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T18:47:25Z","timestamp":1762800445000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11184335\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":46,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tc.2025.3614839","relation":{},"ISSN":["0018-9340","1557-9956","2326-3814"],"issn-type":[{"value":"0018-9340","type":"print"},{"value":"1557-9956","type":"electronic"},{"value":"2326-3814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]}}}