{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:24:52Z","timestamp":1760189092700,"version":"3.41.0"},"reference-count":190,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2009,11,1]],"date-time":"2009-11-01T00:00:00Z","timestamp":1257033600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Storage"],"published-print":{"date-parts":[[2009,11]]},"abstract":"<jats:p>\n            Parity is a popular form of data protection in\n            <jats:italic>redundant arrays of inexpensive\/independent disks (RAID)<\/jats:italic>\n            . RAID5 dedicates one out of\n            <jats:italic>N<\/jats:italic>\n            disks to parity to mask single disk failures, that is, the contents of a block on a failed disk can be reconstructed by exclusive-ORing the corresponding blocks on surviving disks. RAID5 can mask a single disk failure, and it is vulnerable to data loss if a second disk failure occurs. The RAID5 rebuild process systematically reconstructs the contents of a failed disk on a spare disk, returning the system to its original state, but the rebuild process may be unsuccessful due to unreadable sectors. This has led to\n            <jats:italic>two disk failure tolerant arrays (2DFTs)<\/jats:italic>\n            , such as RAID6 based on Reed-Solomon (RS) codes. EVENODD, RDP (Row-Diagonal-Parity), the X-code, and RM2 (Row-Matrix) are 2DFTs with parity coding. RM2 incurs a higher level of redundancy than two disks, while the X-code is limited to a prime number of disks. RDP is optimal with respect to the number of XOR operations at the encoding, but not for short write operations. For small symbol sizes EVENODD and RDP have the same disk access pattern as RAID6, while RM2 and the X-code incur a high recovery cost with two failed disks. We describe variations to RAID5 and RAID6 organizations, including clustered RAID, different methods to update parities, rebuild processing, disk scrubbing to eliminate sector errors, and the\n            <jats:italic>intra-disk redundancy (IDR)<\/jats:italic>\n            method to deal with sector errors. We summarize the results of recent studies of failures in hard disk drives. We describe Markov chain reliability models to estimate RAID\n            <jats:italic>mean time to data loss (MTTDL)<\/jats:italic>\n            taking into account sector errors and the effect of disk scrubbing. Numerical results show that RAID5 plus IDR attains the same MTTDL level as RAID6, while incurring a lower performance penalty. We conclude with a survey of analytic and simulation studies of RAID performance and tools and benchmarks for RAID performance evaluation.\n          <\/jats:p>","DOI":"10.1145\/1629075.1629076","type":"journal-article","created":{"date-parts":[[2009,11,30]],"date-time":"2009-11-30T14:56:36Z","timestamp":1259592996000},"page":"1-59","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["Higher reliability redundant disk arrays"],"prefix":"10.1145","volume":"5","author":[{"given":"Alexander","family":"Thomasian","sequence":"first","affiliation":[{"name":"Thomasian and Associates, Pleasantville, NY"}]},{"given":"Mario","family":"Blaum","sequence":"additional","affiliation":[{"name":"Universidad Complutense de Madrid (UCM), Madrid, Spain"}]}],"member":"320","published-online":{"date-parts":[[2009,11,30]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/264107.264132"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/279358.279374"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/502912.502915"},{"volume-title":"Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST'03)","author":"Anderson D.","key":"e_1_2_1_4_1","unstructured":"Anderson , D. , Dykes , J. , and Riedel , E . 2003. More than an interface\u2014SCSI vs ATA . In Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST'03) . 245--257. Anderson, D., Dykes, J., and Riedel, E. 2003. More than an interface\u2014SCSI vs ATA. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST'03). 245--257."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1113574.1113575"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/511334.511342"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/383962.384036"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254882.1254917"},{"volume-title":"Proceedings of the 6th USENIX Symposium on File and Storage Technologies (FAST'08)","author":"Bairavasundaram L. N.","key":"e_1_2_1_9_1","unstructured":"Bairavasundaram , L. N. , Goodson , G. R. , Schroeder , B. , Arpaci-Dusseau , A. C. , and Arpaci-Dusseau , R. H . 2008. An analysis of data corruption in the storage stack . In Proceedings of the 6th USENIX Symposium on File and Storage Technologies (FAST'08) . 223--238. Bairavasundaram, L. N., Goodson, G. R., Schroeder, B., Arpaci-Dusseau, A. C., and Arpaci-Dusseau, R. H. 2008. An analysis of data corruption in the storage stack. In Proceedings of the 6th USENIX Symposium on File and Storage Technologies (FAST'08). 223--238."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1020923202104"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/301453.301482"},{"key":"e_1_2_1_12_1","first-page":"862","article-title":"Efficient method for providing fault tolerance against double device failures in multiple device systems","volume":"5","author":"Baylor S.","year":"1999","unstructured":"Baylor , S. , Corbett , P. F. , and Park , C. 1999 . Efficient method for providing fault tolerance against double device failures in multiple device systems . US Patent 5 , 862 ,158. Baylor, S., Corbett, P. F., and Park, C. 1999. Efficient method for providing fault tolerance against double device failures in multiple device systems. US Patent 5,862,158.","journal-title":"US Patent"},{"volume-title":"A class of byte-correcting array codes. Res. Rep. RJ 5652 (57151)","author":"Blaum M.","key":"e_1_2_1_13_1","unstructured":"Blaum , M. 1987. A class of byte-correcting array codes. Res. Rep. RJ 5652 (57151) . IBM Almaden Research Center , San Jose, CA . Blaum, M. 1987. A class of byte-correcting array codes. Res. Rep. RJ 5652 (57151). IBM Almaden Research Center, San Jose, CA."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.179343"},{"key":"e_1_2_1_15_1","first-page":"333","article-title":"Method and means for B-adjacent coding and rebuilding data from up to two unavailable DASDs in a DASD array","volume":"5","author":"Blaum M.","year":"1994","unstructured":"Blaum , M. and Ouchi , K. 1994 . Method and means for B-adjacent coding and rebuilding data from up to two unavailable DASDs in a DASD array . U.S. Patent 5 , 333 ,143. Blaum, M. and Ouchi, K. 1994. Method and means for B-adjacent coding and rebuilding data from up to two unavailable DASDs in a DASD array. U.S. Patent 5,333,143.","journal-title":"U.S. Patent"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.364531"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.485722"},{"key":"e_1_2_1_18_1","volume-title":"Handbook of Coding Theory","author":"Blaum M.","year":"1855","unstructured":"Blaum , M. , Farrell , P. G. , and van Tilborg , H. C. A. 1998. Array codes . In Handbook of Coding Theory , V. S. Pless and W. C. Huffman, Eds., Elsevier Science , Amsterdam, The Netherlands, Chapter 22, 1855 --1909. Blaum, M., Farrell, P. G., and van Tilborg, H. C. A. 1998. Array codes. In Handbook of Coding Theory, V. S. Pless and W. C. Huffman, Eds., Elsevier Science, Amsterdam, The Netherlands, Chapter 22, 1855--1909."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.746771"},{"key":"e_1_2_1_20_1","unstructured":"Blaum M. Brady J. Bruck J. Menon J. and Vardy A. 2002. The EVENODD Code and Its Generalizations. In High Performance Mass Storage and Parallel I\/O: Technologies and Applications H. Jin. T. Cortes and R. Buyya Eds. Wiley New York NY 187--205.  Blaum M. Brady J. Bruck J. Menon J. and Vardy A. 2002. The EVENODD Code and Its Generalizations. In High Performance Mass Storage and Parallel I\/O: Technologies and Applications H. Jin. T. Cortes and R. Buyya Eds. Wiley New York NY 187--205."},{"volume-title":"Coding and Signal Processing for Magnetic Recording Systems","author":"Blaum M.","key":"e_1_2_1_21_1","unstructured":"Blaum , M. 2005. An Introduction to Error-Correcting Codes . In Coding and Signal Processing for Magnetic Recording Systems . B. Vasic and E. M. Kurtas, Eds., Chapter 9, CRC Press , Orlando, FL . Blaum, M. 2005. An Introduction to Error-Correcting Codes. In Coding and Signal Processing for Magnetic Recording Systems. B. Vasic and E. M. Kurtas, Eds., Chapter 9, CRC Press, Orlando, FL."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261569"},{"volume-title":"Proceedings of the 24th IEEE Annual International Symposium on Fault-Tolerant Computing Systems (FTCS-24)","author":"Blum A.","key":"e_1_2_1_23_1","unstructured":"Blum , A. , Goyal , A. , Heidelberger , P. , Lavenberg , S. S. , Nakayama , M. , and Shahabuddin , P . 1994. Modeling and analysis of system dependability using the system availability estimator . In Proceedings of the 24th IEEE Annual International Symposium on Fault-Tolerant Computing Systems (FTCS-24) , 137--141. Blum, A., Goyal, A., Heidelberger, P., Lavenberg, S. S., Nakayama, M., and Shahabuddin, P. 1994. Modeling and analysis of system dependability using the system availability estimator. In Proceedings of the 24th IEEE Annual International Symposium on Fault-Tolerant Computing Systems (FTCS-24), 137--141."},{"volume-title":"Proceedings of the 5th International Conference on Workshop on Quality of Service. 203--206","author":"Borowsky E.","key":"e_1_2_1_24_1","unstructured":"Borowsky , E. , Golding , R. , Merchant , A. , Shriver , E. , Spasojevic , M. , and Wilkes , J . 1997. Using attribute-managed storage to achieve QoS . In Proceedings of the 5th International Conference on Workshop on Quality of Service. 203--206 . Borowsky, E., Golding, R., Merchant, A., Shriver, E., Spasojevic, M., and Wilkes, J. 1997. Using attribute-managed storage to achieve QoS. In Proceedings of the 5th International Conference on Workshop on Quality of Service. 203--206."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.68445"},{"key":"e_1_2_1_26_1","unstructured":"Bucy J. S. Schindler J. Schlosser S. W. Ganger G. R. and Contributors. 2008. The DiskSim simulation environment version 4.0 reference manual. Tech. rep. CMU-PDL-08-101.  Bucy J. S. Schindler J. Schlosser S. W. Ganger G. R. and Contributors. 2008. The DiskSim simulation environment version 4.0 reference manual. Tech. rep. CMU-PDL-08-101."},{"key":"e_1_2_1_27_1","unstructured":"Butterworth H. E. 1999. The design of segment filling and selection algorithms for efficient free-space collection in a log-structured array. IBM Hursley UK unpublished manuscript.  Butterworth H. E. 1999. The design of segment filling and selection algorithms for efficient free-space collection in a log-structured array. IBM Hursley UK unpublished manuscript."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/353360.353367"},{"volume-title":"Proceedings of the 13th International Conference on Distributed Computing Systems (ICDCS'93)","author":"Chandy J.","key":"e_1_2_1_29_1","unstructured":"Chandy , J. and Narasimha Reddy, A. L. 1993. Failure evaluation of disk array organizations . In Proceedings of the 13th International Conference on Distributed Computing Systems (ICDCS'93) , 319--326. Chandy, J. and Narasimha Reddy, A. L. 1993. Failure evaluation of disk array organizations. In Proceedings of the 13th International Conference on Distributed Computing Systems (ICDCS'93), 319--326."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/176979.176981"},{"key":"e_1_2_1_31_1","article-title":"The design and evaluation of RAID 5 and parity striping disk array architectures","volume":"10","author":"Chen S.-Z.","year":"1993","unstructured":"Chen , S.-Z. and Towsley , D. F. 1993 . The design and evaluation of RAID 5 and parity striping disk array architectures . J. Parall. Distrib. Comput. 10 , 1\/2, 41--57. Chen, S.-Z. and Towsley, D. F. 1993. The design and evaluation of RAID 5 and parity striping disk array architectures. J. Parall. Distrib. Comput. 10, 1\/2, 41--57.","journal-title":"J. Parall. Distrib. Comput."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.543706"},{"key":"e_1_2_1_33_1","volume-title":"Operating Systems Principles. Prentice-Hall","author":"Coffman Jr. E. G.","year":"1972","unstructured":"Coffman , Jr. E. G. and Denning , P . 1972 . Operating Systems Principles. Prentice-Hall , 1972 . Coffman, Jr. E. G. and Denning, P. 1972. Operating Systems Principles. Prentice-Hall, 1972."},{"key":"e_1_2_1_34_1","unstructured":"Coffman Jr. E. G. and Hofri M. 1990. Queueing models of secondary storage devices. In Stochastic Analysis of Computer and Communication Systems. H. Takagi Ed. Elsevier Science Amsterdam The Netherlands 549--588.  Coffman Jr. E. G. and Hofri M. 1990. Queueing models of secondary storage devices. In Stochastic Analysis of Computer and Communication Systems. H. Takagi Ed. Elsevier Science Amsterdam The Netherlands 549--588."},{"volume-title":"Proceedings of the 3rd USENIX Conference on File and Storage Technologies (FAST'04)","author":"Corbett P. F.","key":"e_1_2_1_35_1","unstructured":"Corbett , P. F. , English , B. , Goel , A. , Grcanac , T. , Kleiman , S. , Leong , J. , and Sankar , S . 2004. Row-diagonal parity for double disk failure correction . In Proceedings of the 3rd USENIX Conference on File and Storage Technologies (FAST'04) . Corbett, P. F., English, B., Goel, A., Grcanac, T., Kleiman, S., Leong, J., and Sankar, S. 2004. Row-diagonal parity for double disk failure correction. In Proceedings of the 3rd USENIX Conference on File and Storage Technologies (FAST'04)."},{"key":"e_1_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Courtright II W. V. Holland M. C. Gibson G. A. Reilly L. N. and Zelenka J. 1996. RAIDframe: A rapid prototyping tool for RAID systems. Parallel Data Laboratory CMU. http:\/\/www.pdl.cmu.edu\/RAIDframe.  Courtright II W. V. Holland M. C. Gibson G. A. Reilly L. N. and Zelenka J. 1996. RAIDframe: A rapid prototyping tool for RAID systems. Parallel Data Laboratory CMU. http:\/\/www.pdl.cmu.edu\/RAIDframe.","DOI":"10.1145\/233013.233057"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1465482.1465485"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353452.1353453"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/364520.364540"},{"volume-title":"Reliability model and assessment of RAID incorporating latent defects and non-homogeneous Poisson process events. Tech. rep. Mechanical Engineering Department","author":"Elerath J. H.","key":"e_1_2_1_40_1","unstructured":"Elerath , J. H. 2007. Reliability model and assessment of RAID incorporating latent defects and non-homogeneous Poisson process events. Tech. rep. Mechanical Engineering Department , University of Maryland. Elerath, J. H. 2007. Reliability model and assessment of RAID incorporating latent defects and non-homogeneous Poisson process events. Tech. rep. Mechanical Engineering Department, University of Maryland."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.41"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2005.150"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2005.200"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/800264.809309"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.502.0199"},{"key":"e_1_2_1_46_1","first-page":"522","article-title":"RAID level 5 with free blocks\/parity cache","volume":"5","author":"Franaszek P. A.","year":"1996","unstructured":"Franaszek , P. A. , Robinson , J. T. , and Thomasian , A. 1996 . RAID level 5 with free blocks\/parity cache . US Patent 5 , 522 ,032. Franaszek, P. A., Robinson, J. T., and Thomasian, A. 1996. RAID level 5 with free blocks\/parity cache. US Patent 5,522,032.","journal-title":"US Patent"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.565608"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.524.0439"},{"key":"e_1_2_1_49_1","article-title":"The performance and tuning of a StorageTek Iceberg RAID6 disk subsystem","author":"Friedman M B","year":"1995","unstructured":"Friedman , M B . 1995 . The performance and tuning of a StorageTek Iceberg RAID6 disk subsystem . Trans. Comput. Measure. Group. 77--88. Friedman, M B. 1995. The performance and tuning of a StorageTek Iceberg RAID6 disk subsystem. Trans. Comput. Measure. Group. 77--88.","journal-title":"Trans. Comput. Measure. Group. 77--88."},{"volume-title":"Proceedings of the 12th NASA Goddard, 21st IEEE Conference on Mass Storage and Technologies (MSST'04)","author":"Fu G.","key":"e_1_2_1_50_1","unstructured":"Fu , G. , Thomasian , A. , Han , C. , and Ng , S. W . 2004. Rebuild strategies for redundant disk arrays . In Proceedings of the 12th NASA Goddard, 21st IEEE Conference on Mass Storage and Technologies (MSST'04) . Fu, G., Thomasian, A., Han, C., and Ng, S. W. 2004. Rebuild strategies for redundant disk arrays. In Proceedings of the 12th NASA Goddard, 21st IEEE Conference on Mass Storage and Technologies (MSST'04)."},{"volume-title":"Proceedings of the International Symposium on Performance Evaluation Computer and Telecommunication Systems (SPECTS'04)","author":"Fu G.","key":"e_1_2_1_51_1","unstructured":"Fu , G. , Thomasian , A. , Han , C. , and Ng , S. W . 2004b. Rebuild strategies for clustered RAID . In Proceedings of the International Symposium on Performance Evaluation Computer and Telecommunication Systems (SPECTS'04) . 598--607. Fu, G., Thomasian, A., Han, C., and Ng, S. W. 2004b. Rebuild strategies for clustered RAID. In Proceedings of the International Symposium on Performance Evaluation Computer and Telecommunication Systems (SPECTS'04). 598--607."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.45283"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261570"},{"key":"e_1_2_1_54_1","volume-title":"Proceedings of the 21st Computer Measurement Group, 1263--1269","author":"Ganger G.","year":"1995","unstructured":"Ganger . G. 1995 . Generating synthetic workloads . In Proceedings of the 21st Computer Measurement Group, 1263--1269 . Ganger. G. 1995. Generating synthetic workloads. In Proceedings of the 21st Computer Measurement Group, 1263--1269."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.689646"},{"volume-title":"Parallel Secondary Storage","author":"Gibson G. A.","key":"e_1_2_1_56_1","unstructured":"Gibson , G. A. 1992. Redundant Disk Arrays: Reliable , Parallel Secondary Storage . MIT Press , Cambridge, MA . Gibson, G. A. 1992. Redundant Disk Arrays: Reliable, Parallel Secondary Storage. MIT Press, Cambridge, MA."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1006\/jpdc.1993.1002"},{"volume-title":"Proceedings of the Workshop on Modeling and Specification of I\/O.","author":"Golding R.","key":"e_1_2_1_58_1","unstructured":"Golding , R. , Shriver , E. , Sullivan , T. , and Wilkes , J . 1995. Attribute-managed storage . In Proceedings of the Workshop on Modeling and Specification of I\/O. Golding, R., Shriver, E., Sullivan, T., and Wilkes, J. 1995. Attribute-managed storage. In Proceedings of the Workshop on Modeling and Specification of I\/O."},{"volume-title":"Proceedings of the 8th Annual Meeting of the IEEE Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS'00)","author":"Gomez M. E.","key":"e_1_2_1_59_1","unstructured":"Gomez , M. E. and Santonja , V . 2000. A new approach in the modeling and generation of synthetic disk workload . In Proceedings of the 8th Annual Meeting of the IEEE Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS'00) . Gomez, M. E. and Santonja, V. 2000. A new approach in the modeling and generation of synthetic disk workload. In Proceedings of the 8th Annual Meeting of the IEEE Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS'00)."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:19900036"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.212304"},{"volume-title":"Proceedings of the 16th International Conference on Very Large Data Bases. 148--159","author":"Gray J","key":"e_1_2_1_62_1","unstructured":"Gray , J , Horst , B. , and Walker , M . 1990. Parity striping of disk arrays: Low-cost reliable storage with acceptable throughput . In Proceedings of the 16th International Conference on Very Large Data Bases. 148--159 . Gray, J, Horst, B., and Walker, M. 1990. Parity striping of disk arrays: Low-cost reliable storage with acceptable throughput. In Proceedings of the 16th International Conference on Very Large Data Bases. 148--159."},{"volume-title":"Proceedings of the 16th Annual IEEE International Conference on Data Engineering (ICDE'00)","author":"Gray J.","key":"e_1_2_1_63_1","unstructured":"Gray , J. and Shenoy , P. J . 2000. Rules of thumb in data engineering . In Proceedings of the 16th Annual IEEE International Conference on Data Engineering (ICDE'00) . 3--12. Gray, J. and Shenoy, P. J. 2000. Rules of thumb in data engineering. In Proceedings of the 16th Annual IEEE International Conference on Data Engineering (ICDE'00). 3--12."},{"key":"e_1_2_1_64_1","volume-title":"First USENIX Conference on File and Storage Technologies (FAST'02)","author":"Gray J.","year":"2002","unstructured":"Gray , J. 2002 . Storage bricks have arrived (Keynote Speech) , First USENIX Conference on File and Storage Technologies (FAST'02) , 56--65. Gray, J. 2002. Storage bricks have arrived (Keynote Speech), First USENIX Conference on File and Storage Technologies (FAST'02), 56--65."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/277851.277894"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/339331.339354"},{"key":"e_1_2_1_67_1","volume-title":"Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST'05)","author":"Hafner J. L.","year":"2005","unstructured":"Hafner , J. L. 2005 . WEAVER codes: Highly fault tolerant erasure codes for storage systems . In Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST'05) . Hafner, J. L. 2005. WEAVER codes: Highly fault tolerant erasure codes for storage systems. In Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST'05)."},{"volume-title":"Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST'05)","author":"Hafner J. L.","key":"e_1_2_1_68_1","unstructured":"Hafner , J. L. , Deenadhayalan , V. W. , Rao , K. K. , and Tomlin , J. A . 2005. Matrix methods for lost data reconstruction in erasure codes . In Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST'05) . Hafner, J. L., Deenadhayalan, V. W., Rao, K. K., and Tomlin, J. A. 2005. Matrix methods for lost data reconstruction in erasure codes. In Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST'05)."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.40"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.524.0413"},{"volume-title":"Combinatorial Theory","author":"Hall M.","key":"e_1_2_1_71_1","unstructured":"Hall , M. 1986. Combinatorial Theory , Second Edition, Wiley-Interscience , New York, NY . Hall, M. 1986. Combinatorial Theory, Second Edition, Wiley-Interscience, New York, NY."},{"key":"e_1_2_1_72_1","doi-asserted-by":"crossref","unstructured":"Hellerstein L. Gibson G. A. Karp R. M. and Katz R. H. 1994. Coding techniques for handling failures in large disk arrays. Algorithmica 12 2\/3 182--208.  Hellerstein L. Gibson G. A. Karp R. M. and Katz R. H. 1994. Coding techniques for handling failures in large disk arrays. Algorithmica 12 2\/3 182--208.","DOI":"10.1007\/BF01185210"},{"key":"e_1_2_1_73_1","volume-title":"Computer Architecture: A Quantitative Approach","author":"Hennessy J. L.","year":"2006","unstructured":"Hennessy , J. L. and Patterson , D. A . 2006 . Computer Architecture: A Quantitative Approach : 4 th Ed. Morgan-Kaufman Publishers , San Mateo, CA . Hennessy, J. L. and Patterson, D. A. 2006. Computer Architecture: A Quantitative Approach: 4th Ed. Morgan-Kaufman Publishers, San Mateo, CA.","edition":"4"},{"key":"e_1_2_1_74_1","unstructured":"Hill E. A. 1994. System for managing data storage based on vector-summed size-frequency vectors for data sets devices and residual storage on devices U.S. Patent 5345584.  Hill E. A. 1994. System for managing data storage based on vector-summed size-frequency vectors for data sets devices and residual storage on devices U.S. Patent 5345584."},{"volume-title":"Proceedings of the USENIX Conference, 235--246","author":"Hitz D.","key":"e_1_2_1_75_1","unstructured":"Hitz , D. , Lau , J. , and Malcolm , M . 1994. File system design for an NFS file server appliance . In Proceedings of the USENIX Conference, 235--246 . Hitz, D., Lau, J., and Malcolm, M. 1994. File system design for an NFS file server appliance. In Proceedings of the USENIX Conference, 235--246."},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01266332"},{"volume-title":"Proceedings of the 26th Hawaii International Conference on System Sciences (HICSS 26)","author":"Hou R. Y.","key":"e_1_2_1_78_1","unstructured":"Hou , R. Y. , Menon , J. , and Patt , Y. N . 1993. Balancing I\/O response time and disk rebuild time in a RAID5 disk array . In Proceedings of the 26th Hawaii International Conference on System Sciences (HICSS 26) , Vol. I , 70--79. Hou, R. Y., Menon, J., and Patt, Y. N. 1993. Balancing I\/O response time and disk rebuild time in a RAID5 disk array. In Proceedings of the 26th Hawaii International Conference on System Sciences (HICSS 26), Vol. I, 70--79."},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.422.0347"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.482.0255"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/1113574.1113577"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.70830"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375457.1375485"},{"key":"e_1_2_1_84_1","volume-title":"Memory Systems: Cache, DRAM, and Disk","author":"Jacob B.","year":"2008","unstructured":"Jacob , B. , Ng , S. W. , and Wang , D. T . 2008 . Memory Systems: Cache, DRAM, and Disk . Morgan Kaufmann Publishers . Jacob, B., Ng, S. W., and Wang, D. T. 2008. Memory Systems: Cache, DRAM, and Disk. Morgan Kaufmann Publishers."},{"key":"e_1_2_1_85_1","volume-title":"Proceedings of the USENIX Annual Technical Conference. 253--268","author":"Ji M.","year":"2003","unstructured":"Ji , M. , Veitch , A. C. , Wilkes , J. 2003 . Seneca: Remote mirroring done write . In Proceedings of the USENIX Annual Technical Conference. 253--268 . Ji, M., Veitch, A. C., Wilkes, J. 2003. Seneca: Remote mirroring done write. In Proceedings of the USENIX Annual Technical Conference. 253--268."},{"volume-title":"Latent sector faults and reliability of disk arrays. Doctor of Technology Thesis","author":"Kari H. H.","key":"e_1_2_1_86_1","unstructured":"Kari , H. H. 1997. Latent sector faults and reliability of disk arrays. Doctor of Technology Thesis , University of Technology , Espoo, Finland . http:\/\/www.tcs.hut.fi\/~hhk\/. Kari, H. H. 1997. Latent sector faults and reliability of disk arrays. Doctor of Technology Thesis, University of Technology, Espoo, Finland. http:\/\/www.tcs.hut.fi\/~hhk\/."},{"key":"e_1_2_1_87_1","unstructured":"Kelton W. D. Sadowksi R. P. and Sturrok D. E. 2006. Simulation with Arena 4th Ed. McGraw-Hill New York NY.   Kelton W. D. Sadowksi R. P. and Sturrok D. E. 2006. Simulation with Arena 4th Ed. McGraw-Hill New York NY."},{"key":"e_1_2_1_88_1","volume-title":"Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA). 359--364","author":"Kenyon C.","year":"1996","unstructured":"Kenyon , C. 1996 . Best-fit bin-packing with random order . In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA). 359--364 . Kenyon, C. 1996. Best-fit bin-packing with random order. In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA). 359--364."},{"volume-title":"Theory","author":"Kleinrock L.","key":"e_1_2_1_89_1","unstructured":"Kleinrock , L. 1975. Queueing Systems , Vol. I : Theory . Wiley , New York, NY . Kleinrock, L. 1975. Queueing Systems, Vol. I: Theory. Wiley, New York, NY."},{"key":"e_1_2_1_90_1","unstructured":"Kotz D. F. Roh S. B. and Radhakrishnan S. 1999. A detailed simulation model of the HP 97560 disk drive. Dartmouth College Hanover NH. http:\/\/www.cs.dartmouth.edu\/~dfk\/diskmodel.  Kotz D. F. Roh S. B. and Radhakrishnan S. 1999. A detailed simulation model of the HP 97560 disk drive. Dartmouth College Hanover NH. http:\/\/www.cs.dartmouth.edu\/~dfk\/diskmodel."},{"volume-title":"Computer Performance Modeling Handbook","author":"Lavenberg S. S.","key":"e_1_2_1_91_1","unstructured":"Lavenberg , S. S. 1983. Computer Performance Modeling Handbook . Academic Press, New York , NY. Lavenberg, S. S. 1983. Computer Performance Modeling Handbook. Academic Press, New York, NY."},{"key":"e_1_2_1_92_1","unstructured":"Lazowska E. D. Zahorjan J. Graham. G. S. and Sevcik K. C. 1984. Quantitative Systems Performance: Computer System Analysis Using Queueing Network Models Prentice-Hall Upper Saddle River NJ. http:\/\/www.cs.washington.edu\/homes\/lazowska\/qsp\/.   Lazowska E. D. Zahorjan J. Graham. G. S. and Sevcik K. C. 1984. Quantitative Systems Performance: Computer System Analysis Using Queueing Network Models Prentice-Hall Upper Saddle River NJ. http:\/\/www.cs.washington.edu\/homes\/lazowska\/qsp\/."},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.277289"},{"volume-title":"Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02)","author":"Lu C.","key":"e_1_2_1_94_1","unstructured":"Lu , C. , Alvarez , G. A. , and Wilkes , J . 2002. Aqueduct: Online data migration with performance guarantees . In Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02) . 219--230. Lu, C., Alvarez, G. A., and Wilkes, J. 2002. Aqueduct: Online data migration with performance guarantees. In Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02). 219--230."},{"volume-title":"Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02)","author":"Lumb C. R.","key":"e_1_2_1_95_1","unstructured":"Lumb , C. R. , Schindler , J. , and Ganger , G. R . 2002. Freeblock scheduling outside of disk firmware . In Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02) . 275--288. Lumb, C. R., Schindler, J., and Ganger, G. R. 2002. Freeblock scheduling outside of disk firmware. In Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02). 275--288."},{"volume-title":"Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST'03)","author":"Lumb C. R.","key":"e_1_2_1_96_1","unstructured":"Lumb , C. R. , Merchant , A. , and Alvarez , G. A . 2003. Facade: Virtual storage device with performance guarantees . In Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST'03) . Lumb, C. R., Merchant, A., and Alvarez, G. A. 2003. Facade: Virtual storage device with performance guarantees. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST'03)."},{"key":"e_1_2_1_97_1","unstructured":"MacWilliams F. J. and Sloane N. J. A. 1977. The Theory of Error-Correcting Codes. North Holland Amsterdam The Netherlands.  MacWilliams F. J. and Sloane N. J. A. 1977. The Theory of Error-Correcting Codes. North Holland Amsterdam The Netherlands."},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1006\/jpdc.1993.1013"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367829.1367830"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/989.990"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.381.0047"},{"volume-title":"The Fractal Structure of Data Reference: Applications to the Memory Hierarchy","author":"McNutt B.","key":"e_1_2_1_102_1","unstructured":"McNutt , B. 2000. The Fractal Structure of Data Reference: Applications to the Memory Hierarchy . Kluwer Academic Publishers, Norwell , MA. McNutt, B. 2000. The Fractal Structure of Data Reference: Applications to the Memory Hierarchy. Kluwer Academic Publishers, Norwell, MA."},{"volume-title":"Proceedings of the 37th Annual IEEE Computer Society Conference (COMPCON'92)","author":"Menon J.","key":"e_1_2_1_103_1","unstructured":"Menon , J. and Mattson , D . 1992. Distributed sparing in disk arrays . In Proceedings of the 37th Annual IEEE Computer Society Conference (COMPCON'92) . 410--421. Menon, J. and Mattson, D. 1992. Distributed sparing in disk arrays. In Proceedings of the 37th Annual IEEE Computer Society Conference (COMPCON'92). 410--421."},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1006\/jpdc.1993.1011"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/165123.165144"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01266331"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.5555\/822081.823039"},{"key":"e_1_2_1_108_1","doi-asserted-by":"crossref","unstructured":"Menon J. and Stockmeyer L. 1998. An age threshold algorithm for garbage collection in log-structured arrays and file systems. IBM Research Report RJ 10120 Almaden Research Center. 119--132.  Menon J. and Stockmeyer L. 1998. An age threshold algorithm for garbage collection in log-structured arrays and file systems. IBM Research Report RJ 10120 Almaden Research Center. 119--132.","DOI":"10.1007\/978-1-4615-5611-4_13"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.485575"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/233269.233331"},{"volume-title":"Proceedings of the 16th International Conference on Very Large Data Bases (VLDB). 162--173","author":"Muntz R. R.","key":"e_1_2_1_111_1","unstructured":"Muntz , R. R. and Lui , J. C. S. 1990. Performance analysis of disk arrays under failure . In Proceedings of the 16th International Conference on Very Large Data Bases (VLDB). 162--173 . Muntz, R. R. and Lui, J. C. S. 1990. Performance analysis of disk arrays under failure. In Proceedings of the 16th International Conference on Very Large Data Bases (VLDB). 162--173."},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.2213"},{"key":"e_1_2_1_113_1","doi-asserted-by":"crossref","unstructured":"Newberg L. and Wolf D. 1994. String layouts for a redundant array of inexpensive disks. Algorithmica 12 2\/3 209--224.  Newberg L. and Wolf D. 1994. String layouts for a redundant array of inexpensive disks. Algorithmica 12 2\/3 209--224.","DOI":"10.1007\/BF01185211"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/191995.192036"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01267324"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.278490"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.675641"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1980.1675495"},{"volume-title":"Proceedings of the 23rd Annual International Symposium on Fault Tolerant Computing (FTCS-23)","author":"Nicola V. F.","key":"e_1_2_1_119_1","unstructured":"Nicola , V. F. , Shahabuddin , P. , Heidelberger , P. , and Glynn , P. W . 1993. Fast simulation of steady-state availability in non-Markovian highly dependable systems . In Proceedings of the 23rd Annual International Symposium on Fault Tolerant Computing (FTCS-23) . 38--47. Nicola, V. F., Shahabuddin, P., Heidelberger, P., and Glynn, P. W. 1993. Fast simulation of steady-state availability in non-Markovian highly dependable systems. In Proceedings of the 23rd Annual International Symposium on Fault Tolerant Computing (FTCS-23). 38--47."},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.476189"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.296.0546"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1145\/50202.50214"},{"volume-title":"Proceedings of the USENIX Conference on File and Storage Technologies (FAST'07)","author":"Pinheiro E.","key":"e_1_2_1_123_1","unstructured":"Pinheiro , E. , Weber , W. D. , and Barroso , L. A . 2007. Failure trend in a large disk drive population . In Proceedings of the USENIX Conference on File and Storage Technologies (FAST'07) . Pinheiro, E., Weber, W. D., and Barroso, L. A. 2007. Failure trend in a large disk drive population. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST'07)."},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199709)27:9%3C995::AID-SPE111%3E3.3.CO;2-Y"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.v35:2"},{"key":"e_1_2_1_126_1","volume-title":"Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST'05)","author":"Plank J. S.","year":"2005","unstructured":"Plank , J. S. 2005 . Erasure Codes for Storage Applications (Tutorial) . In Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST'05) . Plank, J. S. 2005. Erasure Codes for Storage Applications (Tutorial). In Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST'05)."},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2006.43"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0129626407002909"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.5555\/1364813.1364820"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2008.29"},{"key":"e_1_2_1_131_1","volume-title":"Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST'09)","author":"Plank J. S.","year":"2009","unstructured":"Plank , J. S. , Luo , J. , Schuman , C. D., Xu. L. , and Wilcox-O'Hearn , C. 2009 . A performance evaluation and examination of open-source erasure coding libraries for storage . In Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST'09) . Plank, J. S., Luo, J., Schuman, C. D., Xu. L., and Wilcox-O'Hearn, C. 2009. A performance evaluation and examination of open-source erasure coding libraries for storage. In Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST'09)."},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1976.1674665"},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1145\/133057.133090"},{"key":"e_1_2_1_134_1","unstructured":"Ramakrishnan R. and Gehrke J. 2003. Database Management Systems 3rd Ed. McGraw-Hill New York NY.   Ramakrishnan R. and Gehrke J. 2003. Database Management Systems 3rd Ed. McGraw-Hill New York NY."},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.61"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/146941.146943"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.268881"},{"key":"e_1_2_1_138_1","doi-asserted-by":"crossref","unstructured":"Sahner R. A. Trivedi K. S. and Puliafito A. 1996. Performance and Reliability Analysis of Computer Systems. Kluwer Academic Publishers Norwell MA.   Sahner R. A. Trivedi K. S. and Puliafito A. 1996. Performance and Reliability Analysis of Computer Systems. Kluwer Academic Publishers Norwell MA.","DOI":"10.1007\/978-1-4615-2367-3"},{"key":"e_1_2_1_139_1","first-page":"29","article-title":"Disk cooling\u201d in parallel disk systems","volume":"17","author":"Scheuermann P.","year":"1994","unstructured":"Scheuermann , P. , Weikum , G. , and Zabback , P. 1994 . \u201c Disk cooling\u201d in parallel disk systems . Data Engin. Bul. 17 , 3, 29 -- 40 . Scheuermann, P., Weikum, G., and Zabback, P. 1994. \u201cDisk cooling\u201d in parallel disk systems. Data Engin. Bul. 17, 3, 29--40.","journal-title":"Data Engin. Bul."},{"volume-title":"Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02)","author":"Schindler J.","key":"e_1_2_1_140_1","unstructured":"Schindler , J. , Griffin , J. L. , Lumb , C. R. , and Ganger , G. R . 2002. Track-aligned extents: Matching access patterns to disk drive characteristics . In Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02) . 259--274. Schindler, J., Griffin, J. L., Lumb, C. R., and Ganger, G. R. 2002. Track-aligned extents: Matching access patterns to disk drive characteristics. In Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02). 259--274."},{"volume-title":"Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST'05)","author":"Schlosser S. W.","key":"e_1_2_1_141_1","unstructured":"Schlosser , S. W. , Papadimanolakis , S. , Shao , M. , Schindler , J. Ailamaki , A. , Faloutsos , C. , and Ganger , G. R . 2005. On multidimensional data and modern disks . In Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST'05) . Schlosser, S. W., Papadimanolakis, S., Shao, M., Schindler, J. Ailamaki, A., Faloutsos, C., and Ganger, G. R. 2005. On multidimensional data and modern disks. In Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST'05)."},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1145\/1288783.1288785"},{"volume-title":"Proceedings of the 5th IEEE Symposium on High Performance Computer Architecture (HPCA). 214--217","author":"Schwarz T. J. E.","key":"e_1_2_1_144_1","unstructured":"Schwarz , T. J. E. , Steinberg , J. , and Burkhard , W. A . 1999. Permutation development data layout (PDDL) disk array declustering . In Proceedings of the 5th IEEE Symposium on High Performance Computer Architecture (HPCA). 214--217 . Schwarz, T. J. E., Steinberg, J., and Burkhard, W. A. 1999. Permutation development data layout (PDDL) disk array declustering. In Proceedings of the 5th IEEE Symposium on High Performance Computer Architecture (HPCA). 214--217."},{"volume-title":"Proceedings of the 13th IEEE Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS'04)","author":"Schwarz T. J. E.","key":"e_1_2_1_145_1","unstructured":"Schwarz , T. J. E. , Xin , Q. , Miller , E. L. , Long , D. D. E. , Hospodor , A. , and Ng , S. W . 2004. Disk scrubbing in large archival storage systems . In Proceedings of the 13th IEEE Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS'04) . 409--418. Schwarz, T. J. E., Xin, Q., Miller, E. L., Long, D. D. E., Hospodor, A., and Ng, S. W. 2004. Disk scrubbing in large archival storage systems. In Proceedings of the 13th IEEE Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS'04). 409--418."},{"volume-title":"Proceedings of the USENIX Winter Technical Conference. 307--326","author":"Seltzer M. I.","key":"e_1_2_1_146_1","unstructured":"Seltzer , M. I. , Bostic , K. , McKusick , M. K. , and Staelin , C . 1993. An implementation of a log-structured file system for UNIX . In Proceedings of the USENIX Winter Technical Conference. 307--326 . Seltzer, M. I., Bostic, K., McKusick, M. K., and Staelin, C. 1993. An implementation of a log-structured file system for UNIX. In Proceedings of the USENIX Winter Technical Conference. 307--326."},{"key":"e_1_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013437003242"},{"key":"e_1_2_1_148_1","unstructured":"Smartmontools. 2008. Self-Monitoring Analysis and Reporting Technology (SMART) disk drive monitoring tools. http:\/\/sourceforge.net\/projects\/smartmontools\/.  Smartmontools. 2008. Self-Monitoring Analysis and Reporting Technology (SMART) disk drive monitoring tools. http:\/\/sourceforge.net\/projects\/smartmontools\/."},{"key":"e_1_2_1_149_1","doi-asserted-by":"publisher","DOI":"10.1145\/3959.3961"},{"key":"e_1_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1145\/277851.277906"},{"volume-title":"Simulations of the age-threshold and fitness free space collection algorithms on a long trace. IBM Res. Rep. RJ 10222","author":"Stockmeyer L.","key":"e_1_2_1_151_1","unstructured":"Stockmeyer , L. 2001. Simulations of the age-threshold and fitness free space collection algorithms on a long trace. IBM Res. Rep. RJ 10222 , Almaden Research Center , CA. Stockmeyer, L. 2001. Simulations of the age-threshold and fitness free space collection algorithms on a long trace. IBM Res. Rep. RJ 10222, Almaden Research Center, CA."},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1145\/185514.185516"},{"key":"e_1_2_1_153_1","series-title":"Queueing Analysis: Foundations of Performance Evaluation","volume-title":"Vacation and Priority Systems, Part 1. North-Holland","author":"Takagi H.","year":"1991","unstructured":"Takagi , H. 1991 . Queueing Analysis: Foundations of Performance Evaluation , Vol. 1 : Vacation and Priority Systems, Part 1. North-Holland , Amsterdam, The Netherlands . Takagi, H. 1991. Queueing Analysis: Foundations of Performance Evaluation, Vol. 1: Vacation and Priority Systems, Part 1. North-Holland, Amsterdam, The Netherlands."},{"key":"e_1_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2005.01.007"},{"key":"e_1_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375457.1375486"},{"volume-title":"Proceedings of the 10th IEEE International Conference on Data Engineering (ICDE'94)","author":"Thomasian A.","key":"e_1_2_1_156_1","unstructured":"Thomasian , A. and Menon , J . 1994. Performance analysis of RAID5 disk arrays with a vacationing server model for rebuild mode operation . In Proceedings of the 10th IEEE International Conference on Data Engineering (ICDE'94) . 111--119. Thomasian, A. and Menon, J. 1994. Performance analysis of RAID5 disk arrays with a vacationing server model for rebuild mode operation. In Proceedings of the 10th IEEE International Conference on Data Engineering (ICDE'94). 111--119."},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.5555\/829516.830606"},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.595583"},{"key":"e_1_2_1_159_1","doi-asserted-by":"publisher","DOI":"10.1145\/511334.511373"},{"volume-title":"Proceedings of the International Symposium on Performance Evaluation Computer and Telecommunication Systems (SPECTS'04)","author":"Thomasian A.","key":"e_1_2_1_160_1","unstructured":"Thomasian , A. and Liu , C . 2004. Performance evaluation for variations of the SATF scheduling policy . In Proceedings of the International Symposium on Performance Evaluation Computer and Telecommunication Systems (SPECTS'04) . 431--437. Thomasian, A. and Liu, C. 2004. Performance evaluation for variations of the SATF scheduling policy. In Proceedings of the International Symposium on Performance Evaluation Computer and Telecommunication Systems (SPECTS'04). 431--437."},{"key":"e_1_2_1_161_1","doi-asserted-by":"publisher","DOI":"10.5555\/1025129.1026070"},{"key":"e_1_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2004.10.009"},{"key":"e_1_2_1_163_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxh108"},{"key":"e_1_2_1_164_1","doi-asserted-by":"publisher","DOI":"10.5555\/1097871.1098206"},{"key":"e_1_2_1_165_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2005.132"},{"key":"e_1_2_1_166_1","doi-asserted-by":"publisher","DOI":"10.1145\/1138085.1138091"},{"key":"e_1_2_1_167_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2006.41"},{"key":"e_1_2_1_168_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.02.035"},{"key":"e_1_2_1_169_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.201"},{"key":"e_1_2_1_170_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxl064"},{"key":"e_1_2_1_171_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.1041"},{"key":"e_1_2_1_172_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxm079"},{"volume-title":"Proceedings of the 5th USENIX Conference on File and Storage Technologies (FAST'07)","author":"Tian L.","key":"e_1_2_1_173_1","unstructured":"Tian , L. , Feng , D. , Jiang , H. , Zhou , K. , Zeng , L. , Chen , J. , Wang , Z. , and Song , Z . 2007. PRO: A popularity-based multi-threaded reconstruction optimization for RAID-structured storage systems . In Proceedings of the 5th USENIX Conference on File and Storage Technologies (FAST'07) . Tian, L., Feng, D., Jiang, H., Zhou, K., Zeng, L., Chen, J., Wang, Z., and Song, Z. 2007. PRO: A popularity-based multi-threaded reconstruction optimization for RAID-structured storage systems. In Proceedings of the 5th USENIX Conference on File and Storage Technologies (FAST'07)."},{"key":"e_1_2_1_174_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367829.1367831"},{"volume-title":"Proceedings of the 1st IEEE Symposium on High Performance Computer Architecture (HPCA). 186--197","author":"Treiber K.","key":"e_1_2_1_175_1","unstructured":"Treiber , K. and Menon , J . 1995. Simulation study of cached RAID5 designs . In Proceedings of the 1st IEEE Symposium on High Performance Computer Architecture (HPCA). 186--197 . Treiber, K. and Menon, J. 1995. Simulation study of cached RAID5 designs. In Proceedings of the 1st IEEE Symposium on High Performance Computer Architecture (HPCA). 186--197."},{"key":"e_1_2_1_176_1","volume-title":"Probability and Statistics with Reliability, Queueing, and Computer Science Applications","author":"Trivedi K. S.","unstructured":"Trivedi , K. S. 2002. Probability and Statistics with Reliability, Queueing, and Computer Science Applications 2 nd Ed. Wiley, New York , NY. Trivedi, K. S. 2002. Probability and Statistics with Reliability, Queueing, and Computer Science Applications 2nd Ed. Wiley, New York, NY.","edition":"2"},{"volume-title":"Proceedings of the 9th IEEE Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS'01)","author":"Uysal M.","key":"e_1_2_1_177_1","unstructured":"Uysal . M. , Alaverez , G. , and Merchant , A . 2001. Analytical throughput model for modern disk arrays . In Proceedings of the 9th IEEE Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS'01) . 183--192. Uysal. M., Alaverez, G., and Merchant, A. 2001. Analytical throughput model for modern disk arrays. In Proceedings of the 9th IEEE Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS'01). 183--192."},{"volume-title":"Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST'03)","author":"Uysal M.","key":"e_1_2_1_178_1","unstructured":"Uysal , M. , Merchant , A. , and Alvarez , G . 2003. Using MEMS-based storage in disk arrays . In Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST'03) . Uysal, M., Merchant, A., and Alvarez, G. 2003. Using MEMS-based storage in disk arrays. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST'03)."},{"key":"e_1_2_1_179_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2004.9"},{"key":"e_1_2_1_180_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.663770"},{"key":"e_1_2_1_181_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.554723"},{"key":"e_1_2_1_182_1","doi-asserted-by":"publisher","DOI":"10.1145\/225535.225539"},{"volume-title":"The Pantheon storage-system simulator. Tech rep. HPL-SSP-95-14","author":"Wilkes J.","key":"e_1_2_1_183_1","unstructured":"Wilkes , J. 1996. The Pantheon storage-system simulator. Tech rep. HPL-SSP-95-14 , HP Labs , Palo Alto, CA . Wilkes, J. 1996. The Pantheon storage-system simulator. Tech rep. HPL-SSP-95-14, HP Labs, Palo Alto, CA."},{"key":"e_1_2_1_184_1","doi-asserted-by":"publisher","DOI":"10.1145\/75108.75373"},{"key":"e_1_2_1_185_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2006.46"},{"key":"e_1_2_1_186_1","doi-asserted-by":"publisher","DOI":"10.1145\/183018.183045"},{"volume-title":"Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST'09)","author":"Wu S.","key":"e_1_2_1_187_1","unstructured":"Wu , S. , Jiang , H. , Feng , D. , Tian , L. and Mao , B . 2009. Workout: I\/O workload outsourcing for boosting RAID reconstruction performance . In Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST'09) . Wu, S., Jiang, H., Feng, D., Tian, L. and Mao, B. 2009. Workout: I\/O workload outsourcing for boosting RAID reconstruction performance. In Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST'09)."},{"key":"e_1_2_1_188_1","doi-asserted-by":"publisher","DOI":"10.5555\/1097871.1098163"},{"key":"e_1_2_1_189_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.746809"},{"key":"e_1_2_1_190_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.782102"},{"volume-title":"Proceedings of the 3rd International Conference on High Performance Computing (HiPC'96)","author":"Zabback P.","key":"e_1_2_1_191_1","unstructured":"Zabback , P. , Riegel , J. , and Menon , J . 1996. The RAID configuration tool . In Proceedings of the 3rd International Conference on High Performance Computing (HiPC'96) . 55--61. Zabback, P., Riegel, J., and Menon, J. 1996. The RAID configuration tool. In Proceedings of the 3rd International Conference on High Performance Computing (HiPC'96). 55--61."},{"key":"e_1_2_1_192_1","first-page":"197","article-title":"Minimum-check-density codes for correcting bytes of errors, erasures, or defects","volume":"19","author":"Zaitsev G. V.","year":"1983","unstructured":"Zaitsev , G. V. , Zinov'ev , V. A. and Semakov , N. V. 1983 . Minimum-check-density codes for correcting bytes of errors, erasures, or defects . Probl. Inform. Trans. 19 , 197 -- 204 . Zaitsev, G. V., Zinov'ev, V. A. and Semakov, N. V. 1983. Minimum-check-density codes for correcting bytes of errors, erasures, or defects. Probl. Inform. Trans. 19, 197--204.","journal-title":"Probl. Inform. Trans."}],"container-title":["ACM Transactions on Storage"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1629075.1629076","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1629075.1629076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:19Z","timestamp":1750278139000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1629075.1629076"}},"subtitle":["Organization, operation, and coding"],"short-title":[],"issued":{"date-parts":[[2009,11]]},"references-count":190,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2009,11]]}},"alternative-id":["10.1145\/1629075.1629076"],"URL":"https:\/\/doi.org\/10.1145\/1629075.1629076","relation":{},"ISSN":["1553-3077","1553-3093"],"issn-type":[{"type":"print","value":"1553-3077"},{"type":"electronic","value":"1553-3093"}],"subject":[],"published":{"date-parts":[[2009,11]]},"assertion":[{"value":"2007-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}