{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:03Z","timestamp":1750221123884,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T00:00:00Z","timestamp":1554681600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,8]]},"DOI":"10.1145\/3297280.3297294","type":"proceedings-article","created":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T12:18:47Z","timestamp":1556713127000},"page":"122-129","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Modelling multi level consistency in erasure code based storage systems"],"prefix":"10.1145","author":[{"given":"Ojus Thomas","family":"Lee","sequence":"first","affiliation":[{"name":"College of Engineering Kidangoor, Kottaym, Kerala, India"}]},{"given":"Vijay","family":"Sharma","sequence":"additional","affiliation":[{"name":"National Institute of Technology Calicut, Calicut, Kerala, India"}]},{"given":"S. D Madhu","family":"Kumar","sequence":"additional","affiliation":[{"name":"National Institute of Technology Calicut, Calicut, Kerala, India"}]},{"given":"Priya","family":"Chandran","sequence":"additional","affiliation":[{"name":"National Institute of Technology Calicut, Calicut, Kerala, India"}]}],"member":"320","published-online":{"date-parts":[[2019,4,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2015. HDFS Storage Policies. https:\/\/docs.hortonworks.com\/HDPDocuments\/HDP2\/HDP-2.6.4\/bk_hdfs-administration\/content\/storage_policies_hot_warm_cold.html."},{"key":"e_1_3_2_1_2_1","unstructured":"2017. Azure Blob Storage. https:\/\/docs.microsoft.com\/en-us\/azure\/storage\/blobs\/storage-blob-storage-tiers."},{"key":"e_1_3_2_1_3_1","unstructured":"2017. Hot and Cold data storage. https:\/\/www.backblaze.com\/blog\/reed-solomon\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2017. Intel ISA-L Erasure codes. https:\/\/software.intel.com\/en-us\/articles\/intel-isa-l-erasure-code-and-recovery."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"M.K. Aguilera R. Janakiraman and L. Xu. 2005. Using erasure codes efficiently for storage in a distributed system In Dependable Systems and Networks. IEEE (2005) 336--345. 10.1109\/DSN.2005.96","DOI":"10.1109\/DSN.2005.96"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.96"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40148-0_13"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-016-0275-x"},{"key":"e_1_3_2_1_9_1","volume-title":"Han Mao Kiah, and Olgica Milenkovic","author":"Dau Hoang","year":"2018","unstructured":"Hoang Dau, Iwan Duursma, Han Mao Kiah, and Olgica Milenkovic. 2018. Repairing Reed-Solomon codes with multiple erasures. IEEE Transactions on Information Theory (2018)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2096170"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2017.115"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208461.2208482"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"C. Huang H. Simitci Y. Xu A. Ogus P. Gopalan B. Calder J. Li and S.Yekhanin et al. 2012. Erasure Coding in Windows Azure Storage. In Usenix annual techincal conference. 15--26.","DOI":"10.5555\/2342821.2342823"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","unstructured":"Cheng Huang Huseyin Simitci Yikang Xu Aaron Ogus Brad Calder Parikshit Gopalan Jin Li Sergey Yekhanin et al. 2012. Erasure Coding in Windows Azure Storage.. In Usenix annual technical conference. Boston MA 15--26.","DOI":"10.5555\/2342821.2342823"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087832"},{"key":"e_1_3_2_1_17_1","unstructured":"Ojus Thomas Lee S.D Madhu Kumar and Priya Chandran. 2016. Erasure Coded Storage System for Cloud Storage - Challenges and Opportunities. In Data Science and Engineering(ICDSE) International Conference."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151006"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3136623"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3103111.3104044"},{"key":"e_1_3_2_1_21_1","unstructured":"AP Mittal Vanita Jain and Tanuj Ahuja. 2015. Google File System and Hadoop Distributed File System-An Analogy. (2015)."},{"key":"e_1_3_2_1_22_1","unstructured":"Sape Mullender et al. 1993. Distributed systems. Vol. 12. acm press United States of America."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2286996.2287002"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","unstructured":"K. Rashmi N. B. Shah D. Gu H. Kuang D. Borthakur and K. Ramchandran. 2013. A solution to the network challenges of data recovery in erasure-coded distributed storage systems: A study on the facebook warehouse cluster. In Presented as part of the 5th USENIX Workshop on Hot Topics in Storage and File Systems.","DOI":"10.5555\/2534861.2534869"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2159049"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488339"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2769051"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2321280"},{"key":"e_1_3_2_1_29_1","first-page":"134","article-title":"Data Consistency Properties and the Trade-offs in Commercial Cloud Storage: the Consumers' Perspective","volume":"11","author":"Wada Hiroshi","year":"2011","unstructured":"Hiroshi Wada, Alan Fekete, Liang Zhao, Kevin Lee, and Anna Liu. 2011. Data Consistency Properties and the Trade-offs in Commercial Cloud Storage: the Consumers' Perspective.. In CIDR, Vol. 11. 134--143.","journal-title":"CIDR"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298455.1298485"},{"key":"e_1_3_2_1_31_1","volume-title":"2017 International Conference on. IEEE, 1--6.","author":"Xia Jie","year":"2017","unstructured":"Jie Xia, Jianzhong Huang, Xiao Qin, Qiang Cao, and Changsheng Xie. 2017. Revisiting Updating Schemes for Erasure-Coded In-Memory Stores. In Networking, Architecture, and Storage (NAS), 2017 International Conference on. IEEE, 1--6."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/566340.566342"}],"event":{"name":"SAC '19: The 34th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Limassol Cyprus","acronym":"SAC '19"},"container-title":["Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297294","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297280.3297294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:14Z","timestamp":1750208534000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297294"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,8]]},"references-count":31,"alternative-id":["10.1145\/3297280.3297294","10.1145\/3297280"],"URL":"https:\/\/doi.org\/10.1145\/3297280.3297294","relation":{},"subject":[],"published":{"date-parts":[[2019,4,8]]},"assertion":[{"value":"2019-04-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}