{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T06:55:37Z","timestamp":1772866537484,"version":"3.50.1"},"reference-count":52,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T00:00:00Z","timestamp":1742515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2022YFB4501200"],"award-info":[{"award-number":["2022YFB4501200"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Major Research Plan of the National Natural Science Foundation of China","award":["92373114"],"award-info":[{"award-number":["92373114"]}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62072381"],"award-info":[{"award-number":["62072381"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Natural Science Foundation of Fujian Province of China","award":["2023J06001"],"award-info":[{"award-number":["2023J06001"]}]},{"name":"Ant Group through CCF-Ant Research Fund","award":["CCF-AFSG RF20220001"],"award-info":[{"award-number":["CCF-AFSG RF20220001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Archit. Code Optim."],"published-print":{"date-parts":[[2025,3,31]]},"abstract":"<jats:p>\n            Erasure coding is an effective technique for guaranteeing data reliability for storage systems, yet it incurs a high repair penalty with amplified repair traffic. The repair becomes more intricate in clustered storage systems with the bandwidth diversity property. We present\n            <jats:sans-serif>TPRepair<\/jats:sans-serif>\n            , a\n            <jats:bold>T<\/jats:bold>\n            ree-based\n            <jats:bold>P<\/jats:bold>\n            ipelined\n            <jats:bold>Repair<\/jats:bold>\n            approach, aiming to expedite the overall repair process with the tailored pipelined repair procedure.\n            <jats:sans-serif>TPRepair<\/jats:sans-serif>\n            first prioritizes selecting racks with the current minimum load to participate in the repair process. It subsequently formulates tree-based links, tailored to align seamlessly with the pipelined repair procedure.\n            <jats:sans-serif>TPRepair<\/jats:sans-serif>\n            further designs an optimization algorithm to reduce the bottleneck load when repairing multiple chunks. Large-scale simulations demonstrate that\n            <jats:sans-serif>TPRepair<\/jats:sans-serif>\n            can increase 13.8%\u201341.3% of the balance ratio without amplifying cross-rack traffic. Meanwhile, Alibaba Cloud ECS experiments indicate that\n            <jats:sans-serif>TPRepair<\/jats:sans-serif>\n            can increase repair throughput by 11.3% to 72.9%.\n          <\/jats:p>","DOI":"10.1145\/3705895","type":"journal-article","created":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T11:05:30Z","timestamp":1733483130000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["TPRepair: Tree-based Pipelined Repair in Clustered Storage Systems"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-2591-2683","authenticated-orcid":false,"given":"Jiahui","family":"Yang","sequence":"first","affiliation":[{"name":"Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7762-3252","authenticated-orcid":false,"given":"Fulin","family":"Nan","sequence":"additional","affiliation":[{"name":"Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2673-5868","authenticated-orcid":false,"given":"Zhirong","family":"Shen","sequence":"additional","affiliation":[{"name":"Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3626-8183","authenticated-orcid":false,"given":"Zhisheng","family":"Chen","sequence":"additional","affiliation":[{"name":"Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0760-9707","authenticated-orcid":false,"given":"Yuhui","family":"Cai","sequence":"additional","affiliation":[{"name":"Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2765-4509","authenticated-orcid":false,"given":"Dmitrii","family":"Kaplun","sequence":"additional","affiliation":[{"name":"Saint Petersburg Electrotechnical University, Petersburg, Russian Federation"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8677-9080","authenticated-orcid":false,"given":"Xiaoli","family":"Wang","sequence":"additional","affiliation":[{"name":"Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8989-9662","authenticated-orcid":false,"given":"Quanqing","family":"Xu","sequence":"additional","affiliation":[{"name":"OceanBase, Ant Group, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3530-6476","authenticated-orcid":false,"given":"Chuanhui","family":"Yang","sequence":"additional","affiliation":[{"name":"OceanBase, Ant Group, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7362-2789","authenticated-orcid":false,"given":"Jiwu","family":"Shu","sequence":"additional","affiliation":[{"name":"Minjiang University, Xiamen, China"}]}],"member":"320","published-online":{"date-parts":[[2025,3,21]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"2014. Erasure coding in Ceph. https:\/\/ceph.io\/en\/news\/blog\/2014\/erasure-coding-in-ceph-2\/ (2014)."},{"key":"e_1_3_1_3_2","unstructured":"2020. Alibaba Cloud Elastic Compute Service. https:\/\/www.alibabacloud.com\/product\/ecs (2020)."},{"key":"e_1_3_1_4_2","unstructured":"2020. HDFS Erasure Coding. https:\/\/hadoop.apache.org\/docs\/current\/hadoop-project-dist\/hadoop-hdfs\/HDFSErasureCoding.html (2020)."},{"key":"e_1_3_1_5_2","first-page":"1","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC\u201914)","author":"Ahmad Faraz","year":"2014","unstructured":"Faraz Ahmad, Srimat T. Chakradhar, Anand Raghunathan, and T. N. Vijaykumar. 2014. ShuffleWatcher: Shuffle-aware scheduling in multi-tenant MapReduce clusters. In Proceedings of the USENIX Annual Technical Conference (ATC\u201914). 1\u201313."},{"key":"e_1_3_1_6_2","first-page":"351","volume-title":"Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201914)","author":"Balakrishnan Shobana","year":"2014","unstructured":"Shobana Balakrishnan, Richard Black, Austin Donnelly, Paul England, Adam Glass, Dave Harper, Sergey Legtchenko, Aaron Ogus, Eric Peterson, and Antony Rowstron. 2014. Pelican: A building block for exascale cold data storage. In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201914). 351\u2013365."},{"key":"e_1_3_1_7_2","unstructured":"Simon S\u00e9hier Bert Hubert and Jacco Geul. 2020. The Wonder Shaper 1.4.1. https:\/\/github.com\/magnific0\/wondershaper (2020)."},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486021"},{"key":"e_1_3_1_9_2","first-page":"31","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC\u201915)","author":"Cidon Asaf","year":"2015","unstructured":"Asaf Cidon, Robert Escriva, Sachin Katti, Mendel Rosenblum, and Emin Gun Sirer. 2015. Tiered replication: A cost-effective alternative to full cluster geo-replication. In Proceedings of the USENIX Annual Technical Conference (ATC\u201915). 31\u201343."},{"issue":"1","key":"e_1_3_1_10_2","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.sysarc.2007.04.002","article-title":"RISC: A resilient interconnection network for scalable cluster storage systems","volume":"54","author":"Deng Yuhui","year":"2008","unstructured":"Yuhui Deng. 2008. RISC: A resilient interconnection network for scalable cluster storage systems. Journal of Systems Architecture 54, 1 (2008), 70\u201380.","journal-title":"Journal of Systems Architecture"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054295"},{"key":"e_1_3_1_12_2","volume-title":"Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201910)","author":"Ford Daniel","year":"2010","unstructured":"Daniel Ford, Fran\u00e7ois Labelle, Florentina I. Popovici, Murray Stokely, Van-Anh Truong, Luiz Barroso, Carrie Grimes, and Sean Quinlan. 2010. Availability in globally distributed storage systems. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201910)."},{"key":"e_1_3_1_13_2","first-page":"1","volume-title":"Proceedings of the IEEE Global Communications Conference (GLOBECOM\u201917)","author":"Ghanem Samah A. M.","year":"2017","unstructured":"Samah A. M. Ghanem. 2017. Piggybacking codes for network coding: The high\/low SNR regime. In Proceedings of the IEEE Global Communications Conference (GLOBECOM\u201917). 1\u20136."},{"key":"e_1_3_1_14_2","first-page":"350","volume-title":"Proceedings of the 2014 ACM Conference on SIGCOMM (SIGCOMM\u201911)","author":"Gill Phillipa","year":"2011","unstructured":"Phillipa Gill, Navendu Jain, and Nachiappan Nagappan. 2011. Understanding network failures in data centers: Measurement, analysis, and implications. In Proceedings of the 2014 ACM Conference on SIGCOMM (SIGCOMM\u201911). 350\u2013361."},{"key":"e_1_3_1_15_2","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/1592568.1592576","volume-title":"Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication (SIGCOMM\u201909)","author":"Greenberg Albert","year":"2009","unstructured":"Albert Greenberg, James R. Hamilton, Navendu Jain, Srikanth Kandula, Changhoon Kim, Parantap Lahiri, David A. Maltz, Parveen Patel, and Sudipta Sengupta. 2009. VL2: A scalable and flexible data center network. In Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication (SIGCOMM\u201909). 51\u201362."},{"key":"e_1_3_1_16_2","first-page":"422","volume-title":"Proceedings of the 23rd International Symposium on Fault-Tolerant Computing","author":"Holland M.","year":"1993","unstructured":"M. Holland, G. A. Gibson, and D. P. Siewiorek. 1993. Fast, on-line failure recovery in redundant disk arrays. In Proceedings of the 23rd International Symposium on Fault-Tolerant Computing. 422\u2013431."},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2902835"},{"key":"e_1_3_1_18_2","volume-title":"Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST\u201912)","author":"Hu Yuchong","year":"2012","unstructured":"Yuchong Hu, Henry C. H. Chen, Patrick P. C. Lee, and Yang Tang. 2012. NCCloud: Applying network coding for the storage repair in a cloud-of-clouds. In Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST\u201912)."},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3149349"},{"key":"e_1_3_1_20_2","first-page":"15","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC\u201912)","author":"Huang Cheng","year":"2012","unstructured":"Cheng Huang, Huseyin Simitci, Yikang Xu, Aaron Ogus, Brad Calder, Parikshit Gopalan, Jin Li, and Sergey Yekhanin. 2012. Erasure coding in Windows Azure Storage. In Proceedings of the USENIX Annual Technical Conference (ATC\u201912). 15\u201326."},{"key":"e_1_3_1_21_2","first-page":"20","volume-title":"Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST\u201912)","author":"Khan Osama","year":"2012","unstructured":"Osama Khan, Randal C. Burns, James S. Plank, William Pierce, and Cheng Huang. 2012. Rethinking erasure codes for cloud file systems: Minimizing I\/O for recovery and degraded reads. In Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST\u201912). 20."},{"key":"e_1_3_1_22_2","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/ES.2018.00029","volume-title":"2018 Sixth International Conference on Enterprise Systems (ES)","author":"Krechowicz Adam","year":"2018","unstructured":"Adam Krechowicz and Stanis\u0142aw Deniziak. 2018. Hierarchical clustering in scalable distributed two-layer datastore for big data as a service. In 2018 Sixth International Conference on Enterprise Systems (ES). 138\u2013145."},{"key":"e_1_3_1_23_2","doi-asserted-by":"crossref","first-page":"28\u2013es","DOI":"10.1145\/1133572.1133576","volume-title":"Proceedings of the 11th Workshop on ACM SIGOPS European Workshop","author":"Lefebvre Geoffrey","year":"2004","unstructured":"Geoffrey Lefebvre and Michael J. Feeley. 2004. Separating durability and availability in self-managed storage. In Proceedings of the 11th Workshop on ACM SIGOPS European Workshop. 28\u2013es."},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2017.2678505"},{"key":"e_1_3_1_25_2","first-page":"567","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC\u201917)","author":"Li Runhui","year":"2017","unstructured":"Runhui Li, Xiaolu Li, Patrick P. C. Lee, and Qun Huang. 2017. Repair pipelining for erasure-coded storage. In Proceedings of the USENIX Annual Technical Conference (ATC\u201917). 567\u2013579."},{"key":"e_1_3_1_26_2","first-page":"17","volume-title":"Proceeding of the 21st USENIX Conference on File and Storage Technologies (FAST\u201924)","author":"Li Xiaolu","year":"2023","unstructured":"Xiaolu Li, Keyun Cheng, Kaicheng Tang, Patrick P. C. Lee, Yuchong Hu, Dan Feng, Jie Li, and Ting-Yi Wu. 2023. ParaRC: Embracing sub-packetization for repair parallelization in MSR-coded storage. In Proceeding of the 21st USENIX Conference on File and Storage Technologies (FAST\u201924). 17\u201332."},{"key":"e_1_3_1_27_2","first-page":"331","volume-title":"Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST\u201919)","author":"Li Xiaolu","year":"2019","unstructured":"Xiaolu Li, Runhui Li, Patrick P. C. Lee, and Yuchong Hu. 2019. OpenEC: Toward unified and configurable erasure coding management in distributed storage systems. In Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST\u201919). 331\u2013344."},{"key":"e_1_3_1_28_2","first-page":"641","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC\u201921)","author":"Lin Shiyao","year":"2021","unstructured":"Shiyao Lin, Guowen Gong, Zhirong Shen, Patrick P. C. Lee, and Jiwu Shu. 2021. Boosting full-node repair in erasure-coded storage. In Proceedings of the USENIX Annual Technical Conference (ATC\u201921). 641\u2013655."},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3404397.3404444"},{"key":"e_1_3_1_30_2","volume-title":"Proceedings of the 11th Innovations in Theoretical Computer Science Conference (ITCS\u201920)","author":"Maturana Francisco","year":"2020","unstructured":"Francisco Maturana and K. V. Rashmi. 2020. Convertible codes: New class of codes for efficient conversion of coded data in distributed storage. In Proceedings of the 11th Innovations in Theoretical Computer Science Conference (ITCS\u201920)."},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/2901318.2901328"},{"key":"e_1_3_1_32_2","first-page":"383","volume-title":"Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201914)","author":"Muralidhar Subramanian","year":"2014","unstructured":"Subramanian Muralidhar, Wyatt Lloyd, Sabyasachi Roy, Cory Hill, Ernest Lin, Weiwen Liu, Satadru Pan, Shiva Shankar, Viswanath Sivakumar, Linpeng Tang, et\u00a0al. 2014. f4: Facebook\u2019s warm BLOB storage system. In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201914). 383\u2013398."},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.14778\/2536222.2536234"},{"key":"e_1_3_1_34_2","first-page":"81","volume-title":"Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST\u201916)","author":"Pamies-Juarez Lluis","year":"2016","unstructured":"Lluis Pamies-Juarez, Filip Blagojevi\u0107, Robert Mateescu, Cyril Gyuot, Eyal En Gad, and Zvonimir Bandi\u0107. 2016. Opening the chrysalis: On the real repair performance of MSR codes. In Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST\u201916). 81\u201394."},{"key":"e_1_3_1_35_2","volume-title":"Proceedings of the 11th Usenix Conference on File and Storage Technologies (FAST\u201913)","author":"Plank James S.","year":"2013","unstructured":"James S. Plank and C. Huang. 2013. Tutorial: Erasure coding for storage applications, Part 2. In Proceedings of the 11th Usenix Conference on File and Storage Technologies (FAST\u201913)."},{"key":"e_1_3_1_36_2","article-title":"Jerasure: A library in C\/C++ facilitating erasure coding for storage applications-version 1.2","volume":"23","author":"Plank James S.","year":"2008","unstructured":"James S. Plank, Scott Simmerman, and Catherine D. Schuman. 2008. Jerasure: A library in C\/C++ facilitating erasure coding for storage applications-version 1.2. University of Tennessee, Tech. Rep. CS-08-627 23 (2008).","journal-title":"University of Tennessee, Tech. Rep. CS-08-627"},{"key":"e_1_3_1_37_2","first-page":"81","volume-title":"Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST\u201915)","author":"Rashmi K. V.","year":"2015","unstructured":"K. V. Rashmi, Preetum Nakkiran, Jingyan Wang, Nihar B. Shah, and Kannan Ramchandran. 2015. Having your cake and eating it too: Jointly optimal erasure codes for I\/O, storage, and network-bandwidth. In Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST\u201915). 81\u201394."},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626325"},{"issue":"2","key":"e_1_3_1_39_2","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1137\/0108018","article-title":"Polynomial codes over certain finite fields","volume":"8","author":"Reed Irving S.","year":"1960","unstructured":"Irving S. Reed and Gustave Solomon. 1960. Polynomial codes over certain finite fields. J. Soc. Indust. Appl. Math. 8, 2 (1960), 300\u2013304.","journal-title":"J. Soc. Indust. Appl. Math."},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488339"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2774299"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS47924.2020.00015"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.37"},{"key":"e_1_3_1_44_2","first-page":"2601","volume-title":"Proceedings of the IEEE International Symposium on Information Theory (ISIT\u201922)","author":"Shi Hao","year":"2022","unstructured":"Hao Shi, Hanxu Hou, Yunghsiang S. Han, Patrick P. C. Lee, Zhengyi Jiang, Zhongyi Huang, and Bo Bai. 2022. New piggybacking codes with lower repair bandwidth for any single-node failure. In Proceedings of the IEEE International Symposium on Information Theory (ISIT\u201922). 2601\u20132606."},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2010.5496972"},{"key":"e_1_3_1_46_2","first-page":"139","volume-title":"Proceedings of the 16th USENIX Conference on File and Storage Technologies (FAST\u201918)","author":"Vajha Myna","year":"2018","unstructured":"Myna Vajha, Vinayak Ramkumar, Bhagyashree Puranik, Ganesh Kini, Elita Lobo, Birenjith Sasidharan, P. Vijay Kumar, Alexandar Barg, Min Ye, Srinivasan Narayanamurthy, Syed Hussain, and Siddhartha Nandi. 2018. Clay codes: Moulding MDS codes to yield an MSR code. In Proceedings of the 16th USENIX Conference on File and Storage Technologies (FAST\u201918). 139\u2013154."},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/QEST.2012.32"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687814"},{"key":"e_1_3_1_49_2","first-page":"236","volume-title":"Proceedings of the International Symposium on Reliable Distributed Systems (SRDS\u201920)","author":"Xie Xin","year":"2020","unstructured":"Xin Xie, Chentao Wu, Gen Yang, Zongxin Ye, Xubin He, Jie Li, Minyi Guo, Guangtao Xue, Yuanyuan Dong, and Yafei Zhao. 2020. AZ-recovery: An efficient crossing-AZ recovery scheme for erasure coded cloud storage systems. In Proceedings of the International Symposium on Reliable Distributed Systems (SRDS\u201920). 236\u2013245."},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.14778\/3611540.3611560"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS54860.2022.00065"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3472456.3472494"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3153061"}],"container-title":["ACM Transactions on Architecture and Code Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3705895","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3705895","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:13Z","timestamp":1750295893000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3705895"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,21]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,3,31]]}},"alternative-id":["10.1145\/3705895"],"URL":"https:\/\/doi.org\/10.1145\/3705895","relation":{},"ISSN":["1544-3566","1544-3973"],"issn-type":[{"value":"1544-3566","type":"print"},{"value":"1544-3973","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,21]]},"assertion":[{"value":"2024-06-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-06","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}