iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/CLOUD.2015.108
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:01:24Z","timestamp":1729670484392,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/cloud.2015.108","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T21:46:43Z","timestamp":1440107203000},"page":"781-788","source":"Crossref","is-referenced-by-count":1,"title":["The Impact of Vectorization on Erasure Code Computing in Cloud Storages - A Performance and Power Consumption Study"],"prefix":"10.1109","author":[{"given":"Hsing-Bung","family":"Chen","sequence":"first","affiliation":[]},{"given":"Gary","family":"Grider","sequence":"additional","affiliation":[]},{"given":"Jeff","family":"Inman","sequence":"additional","affiliation":[]},{"family":"Parks","sequence":"additional","affiliation":[]},{"family":"Fields","sequence":"additional","affiliation":[]},{"given":"Jeffery Alan","family":"Kuehn","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Tahoe-LAFS","year":"0","key":"ref33"},{"journal-title":"2012 the 10th USENIX Conference on File and Storage Technologies (FAST) confernence","article-title":"NCCloud: Applying Network Coding for the Storage Repair in a Cloud-of-Clouds","year":"0","author":"yuchong","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1117201.1117224"},{"journal-title":"TI Reed Solomon Decoder TMS320C64x Implementation Application Report SPRA686","year":"2000","key":"ref30"},{"journal-title":"SNIA Eduction","article-title":"Swift Object Storage: Adding Erasure Code","year":"2014","author":"luse","key":"ref35"},{"journal-title":"CEPH Erasure code pool document","year":"0","key":"ref34"},{"journal-title":"Workshop on Modeling Benchmarking and Simulation (MoBS) 2006","article-title":"Full-system power analysis and modeling for server environments","year":"0","author":"economou","key":"ref10"},{"journal-title":"Int Green Computing Conference 2011","article-title":"MIND:A Black-Box Energy Consumption Model for Disk Arrays","year":"0","author":"liu","key":"ref11"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/11574859_12","article-title":"Power Consumption Breakdown on a Modern Laptop","volume":"3471","author":"mahesri","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Intel Technology Journal on Energy and Sustainability","article-title":"Storage Power Optimizations for Client Devices and Data Centers","year":"2012","author":"chang","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2011.101"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454162"},{"journal-title":"2012 IEEE 5th International Conference on Cloud Computing","article-title":"CloudMonitor: Profiling Power Usage","year":"0","author":"william smith","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CGC.2012.113"},{"journal-title":"Jerasure A Library in C\/C++ Facilitating Erasure Coding for Storage Applications - Version 1 2","year":"0","key":"ref18"},{"journal-title":"Jerasure erasure code open source software from UTK","year":"0","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2014.90"},{"journal-title":"2011 International Conference Green Computing Conference and Workshops (IGCC)","article-title":"Power Measurement for High Performance Computing: State of the Art","year":"0","author":"hsu","key":"ref4"},{"journal-title":"Energy Dumpster Diving Second Workshop on Power Aware Comnuting(HotPower)","year":"2009","author":"kazandjieva","key":"ref27"},{"journal-title":"Usenix 2012 FAST conference","article-title":"Rethinking Erasure Codes for Cloud File Systems: Minimizing I\/O for Recovery and Degraded Reads","year":"0","author":"khan","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2009.5289179"},{"journal-title":"zfec - a fast erasure code used in command line c python and Haskell","year":"0","key":"ref29"},{"journal-title":"High-Performance Computing In Proceedings of the 5th ACM\/SPEC international conference on Performance engineering","article-title":"A Power-Measurement Methodology for Large-Scale","year":"2014","author":"scogland","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2318716.2318718"},{"journal-title":"Usenix 2012 FAST conference","article-title":"Power Consumption in Enterprise-Scale Backup Storage Systems","year":"0","author":"zhichao","key":"ref7"},{"journal-title":"In IPTPS 2006 - The 5th International Workshop on Peer-to-Peer Systems","article-title":"Erasure Coding vs. Replication: A Quantitive Comparison","year":"0","author":"weatherspoon","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISCE.2009.5156863"},{"key":"ref1","article-title":"Compare Cost and Performance of Replication and Erasure Coding","volume":"63","author":"cook","year":"2014","journal-title":"Hitach Rev"},{"journal-title":"Open Source Encoder and Decoder for SD Erasure Codes","year":"0","key":"ref20"},{"journal-title":"2013 IEEE 27th International Symposium on Parallel & Distributed Processing Workshops and PhD Forum","article-title":"Use of SIMD Vector Operations to Accelerate Application Code Performance on Low-Powered ARM and Intel Platforms","year":"0","author":"gaurav","key":"ref22"},{"journal-title":"FAST-2013 11th Usenix Conference on File and Storage Technologies","article-title":"Screaming Fast Galois Field Arithmetic Using Intel SIMD Instructions","year":"0","author":"plank","key":"ref21"},{"journal-title":"Proceeding ISPASS '11 Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software","article-title":"Power Signature Analysis of the SPECpower_ ssj2008 Benchmark","year":"0","author":"hsu","key":"ref24"},{"journal-title":"Watts Un\/ net","year":"0","key":"ref23"},{"journal-title":"University of Pisa","article-title":"On the feasibility of software FEC","year":"1998","author":"rizzo","key":"ref26"},{"journal-title":"Sensors Journal Special Issue State-of-the-Art Sensors Technology in Spain","article-title":"Power Measurement Methods for Energy Efficient Applications","year":"2013","author":"guilherme","key":"ref25"}],"event":{"name":"2015 IEEE 8th International Conference on Cloud Computing (CLOUD)","start":{"date-parts":[[2015,6,27]]},"location":"New York City, NY, USA","end":{"date-parts":[[2015,7,2]]}},"container-title":["2015 IEEE 8th International Conference on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7194474\/7212169\/07214118.pdf?arnumber=7214118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T18:01:34Z","timestamp":1498240894000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7214118\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/cloud.2015.108","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}