{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T18:50:21Z","timestamp":1764874221180,"version":"3.46.0"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2024YFB4505502"],"award-info":[{"award-number":["2024YFB4505502"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62332014"],"award-info":[{"award-number":["62332014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Shaanxi Province for Distinguished Young Scholars","award":["2023-JC-JQ-54"],"award-info":[{"award-number":["2023-JC-JQ-54"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1109\/tmc.2025.3594283","type":"journal-article","created":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T18:33:21Z","timestamp":1753986801000},"page":"691-705","source":"Crossref","is-referenced-by-count":0,"title":["Erasure Coding-Based Cost-Optimized and Latency-Aware Data Storage in UAV-Enabled Edge Systems"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-2609-8456","authenticated-orcid":false,"given":"Zhaoxiang","family":"Huang","sequence":"first","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9905-3238","authenticated-orcid":false,"given":"Zhiwen","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5897-4401","authenticated-orcid":false,"given":"Liang","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"given":"Huan","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0816-2306","authenticated-orcid":false,"given":"Erhe","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6097-2467","authenticated-orcid":false,"given":"Bin","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3422920"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2024.3433579"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3545418"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3460049"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2024.3364141"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1800594"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2992926"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3020220"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2023.3323217"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3357086"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3366944"},{"key":"ref12","first-page":"331","article-title":"$\\lbrace${OpenEC$\\rbrace$}: Toward unified and configurable erasure coding management in distributed storage systems","volume-title":"Proc. 17th USENIX Conf. File Storage Technol.","author":"Li"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INOCON60754.2024.10512243"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS62655.2024.00028"},{"key":"ref15","first-page":"15","article-title":"Erasure coding in windows azure storage","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Huang"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2024.3443424"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3140796"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108466"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3462479"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2024.3351219"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3198074"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3539618.3591676"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488804"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2780834"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3161021"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796714"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2013.6522585"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3708994"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2022.3152849"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2024.3493034"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3298641"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3224751"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3486995"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108857"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3063188"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3443297"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3460063"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3624985"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2024.3506625"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3481276"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7755\/11275706\/11105766.pdf?arnumber=11105766","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T18:39:29Z","timestamp":1764873569000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11105766\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":40,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2025.3594283","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"type":"print","value":"1536-1233"},{"type":"electronic","value":"1558-0660"},{"type":"electronic","value":"2161-9875"}],"subject":[],"published":{"date-parts":[[2026,1]]}}}