{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T06:14:09Z","timestamp":1761718449929,"version":"3.37.3"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CCF 15-26875","CIF 12-18764","CIF 11-17980","STC Class 2010, CCF 09-39370"],"award-info":[{"award-number":["CCF 15-26875","CIF 12-18764","CIF 11-17980","STC Class 2010, CCF 09-39370"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Strategic Research Program of University of Illinois Urbana-Champaign"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/tnet.2015.2502274","type":"journal-article","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T21:41:05Z","timestamp":1450388465000},"page":"3056-3069","source":"Crossref","is-referenced-by-count":9,"title":["Synchronization and Deduplication in Coded Distributed Storage Networks"],"prefix":"10.1109","volume":"24","author":[{"given":"Salim","family":"El Rouayheb","sequence":"first","affiliation":[]},{"given":"Sreechakra","family":"Goparaju","sequence":"additional","affiliation":[]},{"given":"Han Mao","family":"Kiah","sequence":"additional","affiliation":[]},{"given":"Olgica","family":"Milenkovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/18.910582"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1515\/9783110198119.273","author":"sloane","year":"2002","journal-title":"Codes and Designs"},{"key":"ref31","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions and reversals","volume":"10","author":"levenshtein","year":"1966","journal-title":"Soviet Phys Doklady"},{"journal-title":"Communication issues in distributed computing","year":"1987","author":"orlitsky","key":"ref30"},{"journal-title":"Order Statistics","year":"1970","author":"david","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2093139.2093141"},{"key":"ref34","first-page":"331","article-title":"Design tradeoffs for data deduplication performance in backup workloads","author":"fu","year":"2015","journal-title":"Proc USENIX Conf File Storage Technol"},{"journal-title":"Codes for Mass Data Storage Systems","year":"2004","author":"immink","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398827"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/Grid.2012.21"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1534530.1534541"},{"journal-title":"?The rsync algorithm ?","year":"1996","author":"tridgell","key":"ref14"},{"key":"ref15","first-page":"45","article-title":"Dsync: Efficient block-wise synchronization of multi-gigabyte binary data","author":"knauth","year":"2013","journal-title":"Proc LISA"},{"journal-title":"?zsync?Optimised rsync over HTTP ?","year":"2005","author":"phipps","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.813496"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.815784"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2010.5707079"},{"key":"ref28","volume":"16","author":"macwilliams","year":"1977","journal-title":"The Theory of Error-Correcting Codes"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1365815.1365816"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/18.485722"},{"key":"ref3","first-page":"15","article-title":"Erasure coding in Windows Azure storage","author":"huang","year":"2012","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054295"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1006\/jcta.2000.3081"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/I-SPAN.2009.150"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2208937"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394538"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2010.5496972"},{"key":"ref9","article-title":"Explicit maximally recoverable codes with locality","volume":"20","author":"gopalan","year":"2013","journal-title":"Proc ECC"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282700"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2011.6034196"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2279674"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISTC.2012.6325200"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.140517"},{"key":"ref23","first-page":"1457","article-title":"Update efficient codes for distributed storage","author":"rawat","year":"2011","journal-title":"Proc IEEE Int Symp Inf Theory"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804090"},{"key":"ref25","first-page":"161","article-title":"Concurrent deletion in a distributed content-addressable storage system with global deduplication","author":"strzelczak","year":"2013","journal-title":"Proc FAST"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/90\/7590206\/7358462-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/7590206\/07358462.pdf?arnumber=7358462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T04:58:14Z","timestamp":1718254694000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7358462\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":36,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2015.2502274","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"type":"print","value":"1063-6692"},{"type":"electronic","value":"1558-2566"}],"subject":[],"published":{"date-parts":[[2016,10]]}}}