iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/DSN.2009.5270300
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:27:25Z","timestamp":1725676045384},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/dsn.2009.5270300","type":"proceedings-article","created":{"date-parts":[[2009,9,30]],"date-time":"2009-09-30T18:41:36Z","timestamp":1254336096000},"page":"504-513","source":"Crossref","is-referenced-by-count":19,"title":["An efficient XOR-scheduling algorithm for erasure codes encoding"],"prefix":"10.1109","author":[{"given":"Jianqiang","family":"Luo","sequence":"first","affiliation":[]},{"given":"Lihao","family":"Xu","sequence":"additional","affiliation":[]},{"given":"James S.","family":"Plank","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Network Appliance white paper http \/\/www netapp com\/us\/ library\/analystreports\/ar1056 html","article-title":"fas storage systems: laying the foundation for application availability","year":"0","author":"nisbet","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/2.318580"},{"journal-title":"Code for Cauchy Reed-Solomon Coding","year":"1997","author":"luby","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2007.4367974"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1145\/378993.379239","article-title":"oceanstore: an architecture for global-scale persistent storage","author":"kubiatowicz","year":"2000","journal-title":"Proceedings of the 11th international conference on Architectural support for programming languages and operating systems - ASPL"},{"year":"0","key":"13"},{"journal-title":"Cleversafe Dispersed Storage","year":"2008","key":"14"},{"journal-title":"Computer Architecture A Quantitative Approach chapter Appendiex C","year":"2002","author":"hennessy","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2007.4313077"},{"journal-title":"FAST '08 Proc of the 6th Usenix Conference on File and Storage Technologies","article-title":"the raid-6 liberation codes","year":"2008","author":"plank","key":"21"},{"article-title":"jerasure: a library in c\/c++ facilitating erasure coding for storage applications","year":"2007","author":"plank","key":"20"},{"journal-title":"FAST '09 Proc of the 7th Usenix Conference on File and Storage Technologies","article-title":"a performance evaluation and examination of open-source erasure coding libraries for storage","year":"2009","author":"plank","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2006.43"},{"journal-title":"Optimizing Compilers for Modern Architectures","year":"2001","author":"allen","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/800017.800539"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.32"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/18.746809"},{"journal-title":"StorageSS '05 International Workshop on Storage Security and Survivability","article-title":"a platform for survivable and secure data storage systems","year":"2005","author":"hydra","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/18.179343"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/12.364531"},{"journal-title":"FAST '05 Proc of the 4th USENIX Conference on File and Storage Technologies","article-title":"matrix methods for lost data reconstruction in erasure codes","year":"2005","author":"hafner","key":"10"},{"journal-title":"Unlimited","year":"0","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/18.782102"},{"journal-title":"FAST '04 Proc of the 3rd USENIX Conference on File and Storage Technologies","article-title":"row-diagonal parity for double disk failure correction","year":"2004","author":"corbett","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/71.910866"},{"article-title":"an xor-based erasure-resilient coding scheme","year":"1995","author":"blomer","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/18.746771"},{"journal-title":"FAST '05 Proc of the 4th USENIX Conference on File and Storage Technologies","article-title":"weaver codes: highly fault tolerant erasure codes for storage systems","year":"2005","author":"hafner","key":"9"},{"year":"0","key":"8"}],"event":{"name":"Networks (DSN)","start":{"date-parts":[[2009,6,29]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2009,7,2]]}},"container-title":["2009 IEEE\/IFIP International Conference on Dependable Systems & Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5243642\/5270274\/05270300.pdf?arnumber=5270300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T16:05:18Z","timestamp":1633968318000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5270300\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":30,"URL":"http:\/\/dx.doi.org\/10.1109\/dsn.2009.5270300","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}