{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T22:43:00Z","timestamp":1774219380823,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T00:00:00Z","timestamp":1564963200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,5]]},"DOI":"10.1145\/3337821.3337831","type":"proceedings-article","created":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T12:34:36Z","timestamp":1564058076000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Fast Recovery Techniques for Erasure-coded Clusters in Non-uniform Traffic Network"],"prefix":"10.1145","author":[{"given":"Yunren","family":"Bai","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Beijing National Research Center for Information Science and Technology, Tsinghua University, Beijing, China"}]},{"given":"Zihan","family":"Xu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Beijing National Research Center for Information Science and Technology, Tsinghua University, Beijing, China"}]},{"given":"Haixia","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology, Tsinghua University Beijing, China"}]},{"given":"Dongsheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Beijing National Research Center for Information Science and Technology, Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2019,8,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2015. iPerf - The ultimate speed test tool for TCP UDP and SCTP. https:\/\/iperf.fr\/iperf-doc.php  2015. iPerf - The ultimate speed test tool for TCP UDP and SCTP. https:\/\/iperf.fr\/iperf-doc.php"},{"key":"e_1_3_2_1_2_1","unstructured":"2015. Under the hood: Facebook\u00e2\u0102&Zacute;s cold storage system. https:\/\/code.fb.com\/core-data\/under-the-hood-facebook-s-cold-storage-system\/  2015. Under the hood: Facebook\u00e2\u0102&Zacute;s cold storage system. https:\/\/code.fb.com\/core-data\/under-the-hood-facebook-s-cold-storage-system\/"},{"key":"e_1_3_2_1_3_1","unstructured":"2016. Ceph Erasure Coding. http:\/\/docs.ceph.com\/docs\/mimic\/rados\/operations\/erasure-code\/  2016. Ceph Erasure Coding. http:\/\/docs.ceph.com\/docs\/mimic\/rados\/operations\/erasure-code\/"},{"key":"e_1_3_2_1_4_1","unstructured":"2017. HDFS Erasure Coding. https:\/\/hadoop.apache.org\/docs\/r3.0.0\/hadoop-project-dist\/hadoop-hdfs\/HDFSErasureCoding.html  2017. HDFS Erasure Coding. https:\/\/hadoop.apache.org\/docs\/r3.0.0\/hadoop-project-dist\/hadoop-hdfs\/HDFSErasureCoding.html"},{"key":"e_1_3_2_1_5_1","unstructured":"2018. The Digitization of the World From Edge to Core. https:\/\/www.seagate.com\/files\/www-content\/our-story\/trends\/files\/idc-seagate-dataage-whitepaper.pdf  2018. The Digitization of the World From Edge to Core. https:\/\/www.seagate.com\/files\/www-content\/our-story\/trends\/files\/idc-seagate-dataage-whitepaper.pdf"},{"key":"e_1_3_2_1_6_1","first-page":"25","article-title":"Total Recall: System Support for Automated Availability Management","volume":"4","author":"Bhagwan Ranjita","year":"2004","unstructured":"Ranjita Bhagwan , Kiran Tati , Yuchung Cheng , Stefan Savage , and Geoffrey M Voelker . 2004 . Total Recall: System Support for Automated Availability Management .. In Nsdi , Vol. 4. 25 -- 25 . Ranjita Bhagwan, Kiran Tati, Yuchung Cheng, Stefan Savage, and Geoffrey M Voelker. 2004. Total Recall: System Support for Automated Availability Management.. In Nsdi, Vol. 4. 25--25.","journal-title":"Nsdi"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043571"},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. USENIX Annu. Tech. Conf.(USENIX ATC).","author":"Chen Yu Lin","year":"2017","unstructured":"Yu Lin Chen , Shuai Mu , Jinyang Li , Cheng Huang , Jin Li , Aaron Ogus , and Douglas Phillips . 2017 . Giza: Erasure coding objects across global data centers . In Proc. USENIX Annu. Tech. Conf.(USENIX ATC). Yu Lin Chen, Shuai Mu, Jinyang Li, Cheng Huang, Jin Li, Aaron Ogus, and Douglas Phillips. 2017. Giza: Erasure coding objects across global data centers. In Proc. USENIX Annu. Tech. Conf.(USENIX ATC)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.131210"},{"key":"e_1_3_2_1_10_1","first-page":"1","article-title":"Availability in Globally Distributed Storage Systems","volume":"10","author":"Ford Daniel","year":"2010","unstructured":"Daniel Ford , Fran\u00e7ois Labelle , Florentina I Popovici , Murray Stokely , Van-Anh Truong , Luiz Barroso , Carrie Grimes , and Sean Quinlan . 2010 . Availability in Globally Distributed Storage Systems .. In Osdi , Vol. 10. 1 -- 7 . Daniel Ford, Fran\u00e7ois Labelle, Florentina I Popovici, Murray Stokely, Van-Anh Truong, Luiz Barroso, Carrie Grimes, and Sean Quinlan. 2010. Availability in Globally Distributed Storage Systems.. In Osdi, Vol. 10. 1--7.","journal-title":"Osdi"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945450"},{"key":"e_1_3_2_1_12_1","unstructured":"Cheng Huang Huseyin Simitci Yikang Xu Aaron Ogus Brad Calder Parikshit Gopalan Jin Li Sergey Yekhanin etal 2012. Erasure Coding in Windows Azure Storage.. In Usenix annual technical conference. Boston MA 15--26.   Cheng Huang Huseyin Simitci Yikang Xu Aaron Ogus Brad Calder Parikshit Gopalan Jin Li Sergey Yekhanin et al. 2012. Erasure Coding in Windows Azure Storage.. In Usenix annual technical conference. Boston MA 15--26."},{"key":"e_1_3_2_1_13_1","unstructured":"Osama Khan Randal C Burns James S Plank William Pierce and Cheng Huang. 2012. Rethinking erasure codes for cloud file systems: minimizing I\/O for recovery and degraded reads.. In FAST. 20.   Osama Khan Randal C Burns James S Plank William Pierce and Cheng Huang. 2012. Rethinking erasure codes for cloud file systems: minimizing I\/O for recovery and degraded reads.. In FAST. 20."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/356989.357007"},{"key":"e_1_3_2_1_15_1","volume-title":"Computer networking: A top down approach","author":"Kurose James F","unstructured":"James F Kurose and Keith W Ross . 2012. Computer networking: A top down approach sixth edition. James F Kurose and Keith W Ross. 2012. Computer networking: A top down approach sixth edition."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2623309"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833884"},{"key":"e_1_3_2_1_18_1","volume-title":"2009 17th International Workshop on Quality of Service. IEEE, 1--9.","author":"Li Jun","year":"2009","unstructured":"Jun Li , Shuang Yang , Xin Wang , Xiangyang Xue , and Baochun Li . 2009 . Tree-structured data regeneration with network coding in distributed storage systems . In 2009 17th International Workshop on Quality of Service. IEEE, 1--9. Jun Li, Shuang Yang, Xin Wang, Xiangyang Xue, and Baochun Li. 2009. Tree-structured data regeneration with network coding in distributed storage systems. In 2009 17th International Workshop on Quality of Service. IEEE, 1--9."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC\u00e2\u0102&Zacute;17)","author":"Li Runhui","year":"2017","unstructured":"Runhui Li , Xiaolu Li , Patrick PC Lee , and Qun Huang . 2017 . Repair pipelining for erasure-coded storage . In Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC\u00e2\u0102&Zacute;17) . 567--579. Runhui Li, Xiaolu Li, Patrick PC Lee, and Qun Huang. 2017. Repair pipelining for erasure-coded storage. In Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC\u00e2\u0102&Zacute;17). 567--579."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS.2007.376545"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2820615"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566920"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901318.2901328"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 11th USENIX conference on Operating Systems Design and Implementation. USENIX Association, 383--398","author":"Muralidhar Subramanian","year":"2014","unstructured":"Subramanian Muralidhar , Wyatt Lloyd , Sabyasachi Roy , Cory Hill , Ernest Lin , Weiwen Liu , Satadru Pan , Shiva Shankar , Viswanath Sivakumar , Linpeng Tang , 2014 . f4: Facebook\u00e2\u0102&Zacute;s warm blob storage system . In Proceedings of the 11th USENIX conference on Operating Systems Design and Implementation. USENIX Association, 383--398 . Subramanian Muralidhar, Wyatt Lloyd, Sabyasachi Roy, Cory Hill, Ernest Lin, Weiwen Liu, Satadru Pan, Shiva Shankar, Viswanath Sivakumar, Linpeng Tang, et al. 2014. f4: Facebook\u00e2\u0102&Zacute;s warm blob storage system. In Proceedings of the 11th USENIX conference on Operating Systems Design and Implementation. USENIX Association, 383--398."},{"key":"e_1_3_2_1_25_1","volume-title":"Jerasure: A library in C\/C++ facilitating erasure coding for storage applications-Version 1.2","author":"Plank James S","year":"2008","unstructured":"James S Plank , Scott Simmerman , and Catherine D Schuman . 2008 . Jerasure: A library in C\/C++ facilitating erasure coding for storage applications-Version 1.2 . University of Tennessee , Tech. Rep. CS-08-627 23 (2008). James S Plank, Scott Simmerman, and Catherine D Schuman. 2008. Jerasure: A library in C\/C++ facilitating erasure coding for storage applications-Version 1.2. University of Tennessee, Tech. Rep. CS-08-627 23 (2008)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626325"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2159049"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"e_1_3_2_1_29_1","volume-title":"An explicit, coupled-layer construction of a high-rate MSR code with low sub-packetization level, small field size and all-node repair. arXiv preprint arXiv:1607.07335","author":"Sasidharan Birenjith","year":"2016","unstructured":"Birenjith Sasidharan , Myna Vajha , and P Vijay Kumar . 2016. An explicit, coupled-layer construction of a high-rate MSR code with low sub-packetization level, small field size and all-node repair. arXiv preprint arXiv:1607.07335 ( 2016 ). Birenjith Sasidharan, Myna Vajha, and P Vijay Kumar. 2016. An explicit, coupled-layer construction of a high-rate MSR code with low sub-packetization level, small field size and all-node repair. arXiv preprint arXiv:1607.07335 (2016)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2010.5496972"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2227110"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687814"}],"event":{"name":"ICPP 2019: 48th International Conference on Parallel Processing","location":"Kyoto Japan","acronym":"ICPP 2019","sponsor":["University of Tsukuba University of Tsukuba"]},"container-title":["Proceedings of the 48th International Conference on Parallel Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3337821.3337831","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3337821.3337831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:25Z","timestamp":1750204465000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3337821.3337831"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,5]]},"references-count":32,"alternative-id":["10.1145\/3337821.3337831","10.1145\/3337821"],"URL":"https:\/\/doi.org\/10.1145\/3337821.3337831","relation":{},"subject":[],"published":{"date-parts":[[2019,8,5]]},"assertion":[{"value":"2019-08-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}