{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T15:35:20Z","timestamp":1767713720658,"version":"3.46.0"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Keystone R&D Program of China","award":["2016YFB0800101"],"award-info":[{"award-number":["2016YFB0800101"]}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61671001","61521003"],"award-info":[{"award-number":["61671001","61521003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Research Programs","award":["2016B030305005"],"award-info":[{"award-number":["2016B030305005"]}]},{"name":"Shenzhen Research Programs","award":["ZDSYS201603311739428","JCYJ20150331100723974","20140509093817684"],"award-info":[{"award-number":["ZDSYS201603311739428","JCYJ20150331100723974","20140509093817684"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Parallel Distrib. Syst."],"published-print":{"date-parts":[[2017,6,1]]},"DOI":"10.1109\/tpds.2016.2628024","type":"journal-article","created":{"date-parts":[[2016,11,11]],"date-time":"2016-11-11T17:00:33Z","timestamp":1478883633000},"page":"1728-1739","source":"Crossref","is-referenced-by-count":17,"title":["Repair Tree: Fast Repair for Single Failure in Erasure-Coded Distributed Storage Systems"],"prefix":"10.1109","volume":"28","author":[{"given":"Huayu","family":"Zhang","sequence":"first","affiliation":[{"name":"Shenzhen Key Lab of Information Theory and Future Network Arch, Shenzhen Engineering Lab of Converged Networking Technology, PKU Institute of Big Data Technology, School of Electronic and Computer Engineering, Peking University, Beijing, P.R. China"}]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"Shenzhen Key Lab of Information Theory and Future Network Arch, Shenzhen Engineering Lab of Converged Networking Technology, PKU Institute of Big Data Technology, School of Electronic and Computer Engineering, Peking University, Beijing, P.R. China"}]},{"given":"Shuo-Yen Robert","family":"Li","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Sha Tin, Hong Kong"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848127"},{"key":"ref38","first-page":"1","article-title":"Tree-structured data regeneration with network coding in distributed storage systems","author":"li","year":"2009","journal-title":"Proceedings of International Workshop on Quality of Service(IWQoS)"},{"key":"ref33","first-page":"21","article-title":"NCCloud: Applying network coding for the storage repair in a cloud-of-clouds","author":"hu","year":"2012","journal-title":"Proc 10th USENIX Conf File Storage Technol"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2096170"},{"key":"ref31","first-page":"301","article-title":"PRO: A popularity-based multi-threaded reconstruction optimization for raid-structured storage systems","volume":"7","author":"tian","year":"2007","journal-title":"Proc 5th USENIX Conf File Storage Technol"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402967"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488339"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2208937"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2012.6404723"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2134170"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISNETCOD.2011.5978919"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462122"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2159049"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2173792"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2105003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.807285"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377693"},{"key":"ref16","first-page":"1","article-title":"Disk failures in the real world: What does an MTTF of 1, 000, 000 hours mean to you?","volume":"7","author":"schroeder","year":"2007","journal-title":"Proc 5th USENIX Conf File Storage Technol"},{"key":"ref17","article-title":"An XOR-based erasure-resilient coding scheme","author":"bloemer","year":"1995","journal-title":"ICSI TR-95-048 Technical report at ICSI"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199709)27:9<995::AID-SPE111>3.0.CO;2-6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2006.43"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref4","first-page":"1","article-title":"Pond: The OceanStore prototype","volume":"3","author":"rhea","year":"2003","journal-title":"Proc 2nd Usenix Conf File and Storage Technologies"},{"key":"ref27","article-title":"Software-defined networking","author":"mckeown","year":"2009","journal-title":"INFOCOM Keynote Talk"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2010.5496972"},{"article-title":"HDFS and erasure codes, Aug. 2009","year":"0","author":"borthakur","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/49.564132"},{"key":"ref5","article-title":"Paradigm shift in digital assest storage","author":"cleversafe","year":"2008","journal-title":"Cleversafe Whitepaper"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/11558989_21","article-title":"High availability in DHTs: Erasure coding vs. replication","author":"rodrigues","year":"2005","journal-title":"Peer-to-Peer Systems IV"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1007\/3-540-45748-8_31","article-title":"Erasure coding vs. replication: A quantitative comparison","author":"weatherspoon","year":"2002","journal-title":"Peer-to-Peer Systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945450"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054295"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2014.21"},{"article-title":"Jerasure: A library in C\/C++ facilitating erasure coding for storage applications&#x2014;Version 1.2","year":"2008","author":"plank","key":"ref20"},{"journal-title":"EIGRP Network Design Solutions","year":"2000","author":"pepelnjak","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1112"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/net.3230170203"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1137\/0132071"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/BF00288961"},{"key":"ref25","first-page":"573","article-title":"An approximate solution of the Steiner problem in graphs","volume":"24","author":"takahashi","year":"1980","journal-title":"Math Japonica"}],"container-title":["IEEE Transactions on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/71\/7927510\/07742352.pdf?arnumber=7742352","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T18:59:39Z","timestamp":1764269979000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7742352\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,1]]},"references-count":40,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tpds.2016.2628024","relation":{},"ISSN":["1045-9219","1558-2183","2161-9883"],"issn-type":[{"type":"print","value":"1045-9219"},{"type":"electronic","value":"1558-2183"},{"type":"electronic","value":"2161-9883"}],"subject":[],"published":{"date-parts":[[2017,6,1]]}}}