pith. sign in

arxiv: 2604.15282 · v1 · submitted 2026-04-16 · 💻 cs.IT · math.IT

Bandwidth Cost of Locally Repairable Convertible Codes in the Global Merge Regime

Pith reviewed 2026-05-10 09:43 UTC · model grok-4.3

classification 💻 cs.IT math.IT
keywords locally repairable codesconvertible codesbandwidth costglobal merge regimedistributed storageinformation-theoretic boundscode conversionrepair locality
0
0 comments X

The pith

Lower bounds prove that existing constructions of locally repairable convertible codes achieve minimal bandwidth during global merges.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper derives the first non-trivial lower bounds on the total data transferred when converting between systematic optimal-distance locally repairable codes in the global merge regime. It generalizes an information-theoretic model of conversion to account for local repair properties and applies it to stable convertible codes that maximize the number of nodes left unchanged. These bounds hold without assuming the codes are linear and match the performance of prior constructions across a wide range of parameters. A sympathetic reader would care because distributed storage systems can then adjust their redundancy levels to match changing disk failure rates while using the least possible network bandwidth. If the bounds are tight, efficient conversion becomes feasible without hidden extra costs.

Core claim

We derive the first non-trivial lower bounds on the bandwidth cost of conversion between systematic optimal-distance Locally Repairable Codes (LRCs) in the global merge regime for stable convertible codes. These bounds hold without any linearity assumptions and match the performance of the constructions by Maturana and Rashmi across a broad range of parameters, establishing their bandwidth optimality.

What carries the argument

The generalized information-theoretic model of code conversion bandwidth, applied to stable convertible codes that preserve information locality when multiple initial LRC codewords merge into one final codeword.

If this is right

  • The constructions of Maturana and Rashmi achieve the minimal possible conversion bandwidth for a broad range of parameters.
  • The lower bounds apply to arbitrary codes, linear or nonlinear.
  • Redundancy adaptation in storage systems can occur with provably minimal data transfer while keeping local repair intact.
  • No conversion method can beat the identified bandwidth cost in this regime.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The information-theoretic approach might be adapted to derive bounds for local-merge or other conversion regimes.
  • Storage architects could select these optimal convertible LRCs to minimize network load during dynamic redundancy changes.
  • Empirical measurements of actual conversion traffic in deployed systems could test whether the predicted savings materialize.

Load-bearing premise

The analysis is restricted to the global merge regime with stable convertible codes that maximize the number of unchanged nodes while preserving locality.

What would settle it

A conversion procedure between optimal-distance LRCs in the global merge regime that transfers strictly less data than the derived lower bound would falsify the optimality claim.

Figures

Figures reproduced from arXiv: 2604.15282 by K.V. Rashmi, Saransh Chopra, Shubhransh Singhvi.

Figure 1
Figure 1. Figure 1: A codeword of a (k = 9, g = 3, r = 3, ℓ = 2)-LRC. Empty boxes denote information symbols. L and G denote local parity symbols and global parity symbols, respectively. Moreover, there has recently been a growing interest in wide codes [8]–[10], i.e., codes with large dimension k, as they can achieve lower storage overhead for a prescribed level of reliability, further exacerbating repair costs of MDS-coded … view at source ↗
Figure 2
Figure 2. Figure 2: Conversion from a (k I = 9, gI = 3, r = 3, ℓ = 1)-LRC to a (k F = 18, gF = 4, r = 3, ℓ = 1)-LRC. Empty boxes denote information symbols. L and G denote local parity symbols and global parity symbols, respectively. We restrict our focus to stable convertible codes, which maximize the number of symbols that remain unchanged during the conversion procedure. For this regime, Maturana and Rashmi proposed constr… view at source ↗
Figure 3
Figure 3. Figure 3: A codeword of a (k = 9, g = 3, r = 3, ℓ = 2)-LRC. The notation for the random variables corresponding to the data stored in information and local parity nodes are globally indexed. k + µℓ + g nodes, where µ := k/r. These consist of k information nodes, each storing a message symbol directly, and µℓ + g parity nodes, storing deterministic functions of the message symbols. The k information nodes are divided… view at source ↗
Figure 4
Figure 4. Figure 4: Stable optimal-distance (k I = 9, gI = 3, r = 3, ℓ = 1; k F = 18, gF = 4, r = 3, ℓ = 1)-LRCC. We adopt a global indexing scheme for both the initial and final codes. Moreover, since the local groups remain unchanged, their labels are omitted in the final code for brevity. parity nodes (see [PITH_FULL_IMAGE:figures/full_fig_p011_4.png] view at source ↗
read the original abstract

Recent studies have shown that distributed storage systems can achieve significant space savings by adapting redundancy levels to varying disk failure rates. This adaptation is performed via code conversion, wherein data encoded under an initial code are transformed to data encoded under a final code. While this process is typically resource-intensive, convertible codes are designed to enable these transformations efficiently while preserving desirable decodability constraints such as repair degree, or the number of nodes accessed during node repair. In this work, we focus on the bandwidth cost of conversion, or the total amount of data transferred during the conversion process. We study fundamental limits on the bandwidth cost of conversion between systematic optimal-distance Locally Repairable Codes (LRCs). We restrict our focus to the global merge regime, in which multiple initial codewords are combined to form a single final codeword while preserving information locality. We focus on stable convertible codes, wherein the number of unchanged nodes is maximized during conversion. We generalize an information-theoretic approach for modeling code conversion to the LRC setting, and derive the first non-trivial lower bounds on the bandwidth cost of conversion in this regime. Notably, our bounds do not rely on any linearity assumptions. Consequently, we show that the constructions of Maturana and Rashmi are bandwidth-optimal across a broad range of parameters in the global merge regime.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 2 minor

Summary. The paper claims to derive the first non-trivial information-theoretic lower bounds on conversion bandwidth for stable locally repairable convertible codes (LRCs) between systematic optimal-distance codes in the global merge regime. It generalizes prior conversion analysis to the LRC setting without linearity assumptions, focusing on stable codes that maximize unchanged nodes while preserving information locality, and concludes that the Maturana-Rashmi constructions achieve these bounds (hence are optimal) across a broad parameter range.

Significance. If the bounds and optimality results hold, this provides the first fundamental limits on bandwidth cost for LRC code conversion, which is relevant for adaptive redundancy in distributed storage. The non-linearity of the bounds and the explicit scoping to stable global-merge convertible codes strengthen applicability, while confirming optimality of known constructions offers immediate design guidance.

major comments (2)
  1. [Section 3] The generalization of the information-theoretic model (abstract and Section 3) incorporates LRC locality constraints into the conversion bandwidth lower bound; however, it is unclear whether the entropy accounting for repair-degree access during the merge fully captures all possible stable conversion strategies or introduces looseness that would affect the claimed tightness against the Maturana-Rashmi constructions.
  2. [Theorem 1 (or equivalent)] Theorem establishing the lower bound (likely Section 4) should explicitly delineate the parameter regime (e.g., in terms of locality parameters r, n, k and merge factors) where the bound is non-trivial and where the constructions meet it, to substantiate the abstract's claim of optimality 'across a broad range of parameters.'
minor comments (2)
  1. Notation for initial versus final code parameters and the definition of 'unchanged nodes' in stable conversion could be summarized in a table for clarity.
  2. [Abstract] The abstract states the bounds are 'non-trivial' but does not preview the key technical step (e.g., the cut or entropy inequality used); a one-sentence hint would improve readability.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for the careful review and constructive feedback. We have revised the manuscript to address the concerns about model completeness and to explicitly delineate the parameter regimes, thereby strengthening the presentation of our results.

read point-by-point responses
  1. Referee: [Section 3] The generalization of the information-theoretic model (abstract and Section 3) incorporates LRC locality constraints into the conversion bandwidth lower bound; however, it is unclear whether the entropy accounting for repair-degree access during the merge fully captures all possible stable conversion strategies or introduces looseness that would affect the claimed tightness against the Maturana-Rashmi constructions.

    Authors: The information-theoretic model in Section 3 is derived specifically for stable convertible codes in the global merge regime, where the entropy lower bound accounts for the minimum data movement required to satisfy both the final code's locality constraints and the stability condition (maximizing unchanged nodes). The accounting uses subadditivity and the locality parameter r to bound the information that must be transferred from changed nodes; any stable strategy must respect these entropy inequalities, so the bound captures the fundamental cost without assuming linearity. Tightness is established by explicit matching to the Maturana-Rashmi constructions, which achieve equality for the considered parameters. To remove any ambiguity, we have added a clarifying paragraph in the revised Section 3 that walks through why alternative stable strategies cannot undercut the bound. revision: yes

  2. Referee: [Theorem 1 (or equivalent)] Theorem establishing the lower bound (likely Section 4) should explicitly delineate the parameter regime (e.g., in terms of locality parameters r, n, k and merge factors) where the bound is non-trivial and where the constructions meet it, to substantiate the abstract's claim of optimality 'across a broad range of parameters.'

    Authors: We agree that an explicit delineation improves readability. In the revised manuscript we have inserted a new remark immediately following Theorem 1 that states the precise regime: the bound is non-trivial whenever the merge factor m satisfies m ≥ 2 and the locality parameters obey r < k with the optimal-distance condition d = n - k - ⌈k/r⌉ + 2 preserved under merging; equality with the Maturana-Rashmi constructions holds for all such parameters in the stable global-merge setting (i.e., the full range claimed in the abstract). A short table summarizing the regimes for representative (r, k, m) values has also been added for clarity. revision: yes

Circularity Check

0 steps flagged

Minor self-citation to prior constructions; core lower bounds derived independently

full rationale

The paper generalizes an existing information-theoretic conversion model to the LRC setting and derives new lower bounds on bandwidth cost that do not rely on linearity or on the specific constructions being evaluated. These bounds are then used to establish optimality of the Maturana-Rashmi constructions for a range of parameters. While the cited constructions come from prior work by one of the present authors, the load-bearing step (the new lower-bound derivation) is presented as an independent generalization and does not reduce to a self-citation or to a fitted parameter renamed as a prediction. No self-definitional, ansatz-smuggling, or renaming patterns are visible in the stated approach.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 0 invented entities

Based solely on abstract; no explicit free parameters, invented entities, or detailed axioms listed. The central modeling step is a generalization of an information-theoretic approach.

axioms (1)
  • domain assumption Generalized information-theoretic model for code conversion applies to LRCs while preserving locality
    Paper states it generalizes an information-theoretic approach for modeling code conversion to the LRC setting.

pith-pipeline@v0.9.0 · 5538 in / 1197 out tokens · 47521 ms · 2026-05-10T09:43:54.200419+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

52 extracted references · 52 canonical work pages · 1 internal anchor

  1. [1]

    A case for redundant arrays of inexpensive disks (RAID),

    D. A. Patterson, G. Gibson, and R. H. Katz, “A case for redundant arrays of inexpensive disks (RAID),” inProceedings of the 1988 ACM SIGMOD international conference on Management of data, 1988, pp. 109–116

  2. [2]

    The Google file system,

    S. Ghemawat, H. Gobioff, and S.-T. Leung, “The Google file system,” inProceedings of the nineteenth ACM symposium on Operating systems principles, 2003, pp. 29–43

  3. [3]

    Erasure coding in windows azure storage,

    C. Huang, H. Simitci, Y . Xu, A. Ogus, B. Calder, P. Gopalan, J. Li, and S. Yekhanin, “Erasure coding in windows azure storage,” in2012 USENIX Annual Technical Conference (USENIX ATC 12), 2012, pp. 15–26

  4. [4]

    Maximum distance q-nary codes,

    R. Singleton, “Maximum distance q-nary codes,”IEEE Transactions on Information Theory, 1964

  5. [5]

    A solution to the network challenges of data recovery in erasure-coded distributed storage systems: A study on the Facebook warehouse cluster,

    K. V . Rashmi, N. B. Shah, D. Gu, H. Kuang, D. Borthakur, and K. Ramchandran, “A solution to the network challenges of data recovery in erasure-coded distributed storage systems: A study on the Facebook warehouse cluster,” inProceedings of the 5th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage’13). USENIX Association, 2013

  6. [6]

    XORing elephants: Novel erasure codes for big data,

    M. Sathiamoorthy, M. Asteris, D. S. Papailiopoulos, A. G. Dimakis, R. Vadali, S. Chen, and D. Borthakur, “XORing elephants: Novel erasure codes for big data,”Proceedings of the VLDB Endowment, vol. 6, no. 5, pp. 325–336, 2013

  7. [7]

    A hitchhiker’s guide to fast and efficient data reconstruction in erasure-coded data centers,

    K. V . Rashmi, N. B. Shah, D. Gu, H. Kuang, D. Borthakur, and K. Ramchandran, “A hitchhiker’s guide to fast and efficient data reconstruction in erasure-coded data centers,” inProceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS). IEEE, 2014, pp. 331–340

  8. [8]

    PACEMAKER: avoiding HeART attacks in storage clusters with disk-adaptive redundancy,

    S. Kadekodi, F. Maturana, S. J. Subramanya, J. Yang, K. V . Rashmi, and G. R. Ganger, “PACEMAKER: avoiding HeART attacks in storage clusters with disk-adaptive redundancy,” in14th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2020, Virtual Event, November 4-6, 2020. USENIX Association, 2020, pp. 369–385

  9. [9]

    Tiger: Disk-Adaptive Redundancy Without Placement Restrictions,

    S. Kadekodi, F. Maturana, S. Athlur, A. Merchant, K. V . Rashmi, and G. R. Ganger, “Tiger: Disk-Adaptive Redundancy Without Placement Restrictions,” in16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22), 2022, pp. 413–429

  10. [10]

    Practical Design Considerations for Wide Locally Recoverable Codes (LRCs),

    S. Kadekodi, S. Silas, D. Clausen, and A. Merchant, “Practical Design Considerations for Wide Locally Recoverable Codes (LRCs),”ACM Trans. Storage, vol. 19, no. 4, Nov. 2023

  11. [11]

    On the locality of codeword symbols,

    P. Gopalan, C. Huang, H. Simitci, and S. Yekhanin, “On the locality of codeword symbols,”IEEE Transactions on Information Theory, vol. 58, no. 11, pp. 6925–6934, 2012

  12. [12]

    Erasure coding for distributed storage: an overview,

    S. B. Balaji, M. N. Krishnan, M. Vajha, V . Ramkumar, B. Sasidharan, and P. V . Kumar, “Erasure coding for distributed storage: an overview,”Science China Information Sciences, vol. 61, no. 10, p. 100301, 2018

  13. [13]

    Locally Repairable Convertible Codes: Erasure Codes for Efficient Repair and Conversion,

    F. Maturana and K. V . Rashmi, “Locally Repairable Convertible Codes: Erasure Codes for Efficient Repair and Conversion,” in2023 IEEE International Symposium on Information Theory (ISIT), 2023, pp. 2033–2038

  14. [14]

    Cluster storage systems gotta have HeART: improving storage efficiency by exploiting disk-reliability heterogeneity,

    S. Kadekodi, K. V . Rashmi, and G. R. Ganger, “Cluster storage systems gotta have HeART: improving storage efficiency by exploiting disk-reliability heterogeneity,” in17th USENIX Conference on File and Storage Technologies, FAST 2019, Boston, MA, February 25-28, 2019, A. Merchant and H. Weatherspoon, Eds. USENIX Association, 2019, pp. 345–358

  15. [15]

    Morph: Efficient File-Lifetime Redundancy Management for Cluster File Systems,

    T. Kim, S. Athlur, S. Kadekodi, F. Maturana, D. Delvira, A. Merchant, G. R. Ganger, and K. V . Rashmi, “Morph: Efficient File-Lifetime Redundancy Management for Cluster File Systems,” inProceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles, 2024, pp. 330–346

  16. [16]

    Convertible codes: enabling efficient conversion of coded data in distributed storage,

    F. Maturana and K. V . Rashmi, “Convertible codes: enabling efficient conversion of coded data in distributed storage,”IEEE Transactions on Information Theory, vol. 68, pp. 4392–4407, 2022

  17. [17]

    Locally Repairable Convertible Codes With Optimal Access Costs,

    X. Kong, “Locally Repairable Convertible Codes With Optimal Access Costs,”IEEE Transactions on Information Theory, vol. 70, no. 9, pp. 6239–6257, 2024

  18. [18]

    Locally Repairable Convertible Codes: Improved Lower Bound and General Construction,

    S. Ge, H. Cai, and X. Tang, “Locally Repairable Convertible Codes: Improved Lower Bound and General Construction,”IEEE Transactions on Information Theory, 2026

  19. [19]

    Bounds and Optimal Constructions of Generalized Merge-Convertible Codes for Code Conversion into LRCs,

    H. Shi, W. Fang, and Y . Gao, “Bounds and Optimal Constructions of Generalized Merge-Convertible Codes for Code Conversion into LRCs,”IEEE Transactions on Information Theory, 2026

  20. [20]

    Tight lower bounds on the bandwidth cost of MDS convertible codes in the split regime,

    S. Singhvi, S. Chopra, and K. V . Rashmi, “Tight Lower Bounds on the Bandwidth Cost of MDS Convertible Codes in the Split Regime,” arXiv preprint arXiv:2511.12279, 2025

  21. [21]

    On low field size constructions of access-optimal convertible codes,

    S. Chopra, F. Maturana, and K. V . Rashmi, “On low field size constructions of access-optimal convertible codes,” in2024 IEEE International Symposium on Information Theory (ISIT), 2024, pp. 1456–1461. 17

  22. [22]

    Access-optimal linear MDS convertible codes for all parameters,

    F. Maturana, V . S. C. Mukka, and K. V . Rashmi, “Access-optimal linear MDS convertible codes for all parameters,” inIEEE International Symposium on Information Theory, ISIT 2020, Los Angeles, California, USA, June 21-26, 2020, 2020

  23. [23]

    Bandwidth Cost of Code Conversions in the Split Regime,

    F. Maturana and K. V . Rashmi, “Bandwidth Cost of Code Conversions in the Split Regime,” in2022 IEEE International Symposium on Information Theory (ISIT), 2022, pp. 3262–3267

  24. [24]

    Bandwidth Cost of Code Conversions in Distributed Storage: Fundamental Limits and Optimal Constructions,

    ——, “Bandwidth Cost of Code Conversions in Distributed Storage: Fundamental Limits and Optimal Constructions,”IEEE Transactions on Information Theory, vol. 69, no. 8, pp. 4993–5008, 2023

  25. [25]

    MDS generalized convertible code,

    S. Ge, H. Cai, and X. Tang, “MDS Generalized Convertible Code,”arXiv preprint arXiv:2407.14304, 2024

  26. [26]

    On MDS convertible codes in the merge regime,

    V . Ramkumar, X. Kong, G. Y . Sai, M. Vajha, and M. N. Krishnan, “On MDS Convertible Codes in the Merge Regime,”arXiv preprint arXiv:2508.06219, 2025

  27. [27]

    Lower Bounds on Conversion Bandwidth for MDS Convertible Codes in Split Regime,

    L. Wang and S. Hu, “Lower Bounds on Conversion Bandwidth for MDS Convertible Codes in Split Regime,”arXiv preprint arXiv:2511.00953, 2025

  28. [28]

    Optimal linear codes with a local-error-correction property,

    N. Prakash, G. M. Kamath, V . Lalitha, and P. V . Kumar, “Optimal linear codes with a local-error-correction property,” in2012 IEEE International Symposium on Information Theory Proceedings, 2012, pp. 2776–2780

  29. [29]

    On the combinatorics of locally repairable codes via matroid theory,

    T. Westerb ¨ack, R. Freij-Hollanti, T. Ernvall, and C. Hollanti, “On the combinatorics of locally repairable codes via matroid theory,”IEEE Transactions on Information Theory, vol. 62, no. 10, pp. 5296–5315, 2016

  30. [30]

    Optimal locally repairable and secure codes for distributed storage systems,

    A. S. Rawat, O. O. Koyluoglu, N. Silberstein, and S. Vishwanath, “Optimal locally repairable and secure codes for distributed storage systems,”IEEE Transactions on Information Theory, vol. 60, no. 1, pp. 212–236, 2014

  31. [31]

    A piggybacking design framework for read-and download-efficient distributed storage codes,

    K. V . Rashmi, N. B. Shah, and K. Ramchandran, “A piggybacking design framework for read-and download-efficient distributed storage codes,”IEEE Transactions on Information Theory, vol. 63, no. 9, pp. 5802–5820, 2017

  32. [32]

    Distributed storage codes with repair-by-transfer and nonachievability of interior points on the storage-bandwidth tradeoff,

    N. B. Shah, K. V . Rashmi, P. V . Kumar, and K. Ramchandran, “Distributed storage codes with repair-by-transfer and nonachievability of interior points on the storage-bandwidth tradeoff,”IEEE Transactions on Information Theory, vol. 58, no. 3, pp. 1837–1852, 2011

  33. [33]

    Secure Convertible Codes for Passive Eavesdroppers,

    J. Zhang and K. Rashmi, “Secure Convertible Codes for Passive Eavesdroppers,” in2025 IEEE International Symposium on Information Theory (ISIT), 2025, pp. 1–6

  34. [34]

    Convertible codes for data and device heterogeneity,

    A. Gruica, B. Jany, and S. Kruglik, “Convertible codes for data and device heterogeneity,” 2026

  35. [35]

    ALV: A new data redistribution approach to RAID-5 scaling,

    G. Zhang, W. Zheng, and J. Shu, “ALV: A new data redistribution approach to RAID-5 scaling,”IEEE Transactions on Computers, vol. 59, no. 3, pp. 345–357, 2010

  36. [36]

    Fastscale: accelerate RAID scaling by minimizing data migration,

    W. Zheng and G. Zhang, “Fastscale: accelerate RAID scaling by minimizing data migration,” in9th USENIX Conference on File and Storage Technologies (FAST), San Jose, CA, USA, 2011, pp. 149–161

  37. [37]

    GSR: A global stripe-based redistribution approach to accelerate RAID-5 scaling,

    C. Wu and X. He, “GSR: A global stripe-based redistribution approach to accelerate RAID-5 scaling,” in41st International Conference on Parallel Processing (ICPP), Pittsburgh, PA, USA, 2012, pp. 460–469

  38. [38]

    Rethinking RAID-5 data layout for better scalability,

    G. Zhang, W. Zheng, and K. Li, “Rethinking RAID-5 data layout for better scalability,”IEEE Transactions on Computers, vol. 63, no. 11, pp. 2816–2828, 2014

  39. [39]

    Scale-RS: An efficient scaling scheme for RS-coded storage clusters,

    J. Huang, X. Liang, X. Qin, P. Xie, and C. Xie, “Scale-RS: An efficient scaling scheme for RS-coded storage clusters,”IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 6, pp. 1704–1717, 2015

  40. [40]

    I/O-efficient scaling schemes for distributed storage systems with CRS codes,

    S. Wu, Y . Xu, Y . Li, and Z. Yang, “I/O-efficient scaling schemes for distributed storage systems with CRS codes,”IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 9, pp. 2639–2652, 2016

  41. [41]

    Toward optimal storage scaling via network coding: from theory to practice,

    X. Zhang, Y . Hu, P. P. C. Lee, and P. Zhou, “Toward optimal storage scaling via network coding: from theory to practice,” inIEEE INFOCOM 2018, Honolulu, HI, USA, 2018, pp. 1808–1816

  42. [42]

    Generalized optimal storage scaling via network coding,

    Y . Hu, X. Zhang, P. P. C. Lee, and P. Zhou, “Generalized optimal storage scaling via network coding,” inIEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 2018, pp. 956–960

  43. [43]

    Efficient storage scaling for MBR and MSR codes,

    X. Zhang and Y . Hu, “Efficient storage scaling for MBR and MSR codes,”IEEE Access, vol. 8, pp. 78 992–79 002, 2020

  44. [44]

    On adaptive distributed storage systems,

    B. K. Rai, V . Dhoorjati, L. Saini, and A. K. Jha, “On adaptive distributed storage systems,” inIEEE International Symposium on Information Theory (ISIT), Hong Kong, China, 2015, pp. 1482–1486

  45. [45]

    On adaptive (functional MSR code based) distributed storage systems,

    B. K. Rai, “On adaptive (functional MSR code based) distributed storage systems,” inInternational Symposium on Network Coding (NetCod), Sydney, Australia, 2015, pp. 46–50

  46. [46]

    On the optimal repair-scaling trade-off in locally repairable codes,

    S. Wu, Z. Shen, and P. P. C. Lee, “On the optimal repair-scaling trade-off in locally repairable codes,” inIEEE Conference on Computer Communications (INFOCOM), 2020

  47. [47]

    Exploiting combined locality for wide-stripe erasure coding in distributed storage,

    Y . Hu, L. Cheng, Q. Yao, P. P. C. Lee, W. Wang, and W. Chen, “Exploiting combined locality for wide-stripe erasure coding in distributed storage,” in19th USENIX Conference on File and Storage Technologies (FAST), 2021, pp. 233–248. 18

  48. [48]

    Optimal repair-scaling trade-off in locally repairable codes: analysis and evaluation,

    S. Wu, Z. Shen, P. P. C. Lee, and Y . Xu, “Optimal repair-scaling trade-off in locally repairable codes: analysis and evaluation,”IEEE Transactions on Parallel and Distributed Systems, vol. 33, pp. 56–69, 2022

  49. [49]

    Optimal Data Placement for Stripe Merging in Locally Repairable Codes,

    S. Wu, Q. Du, P. P. C. Lee, Y . Li, and Y . Xu, “Optimal Data Placement for Stripe Merging in Locally Repairable Codes,” inIEEE INFOCOM 2022 - IEEE Conference on Computer Communications, 2022, pp. 1669–1678

  50. [50]

    Coded Data Rebalancing: Fundamental Limits and Constructions,

    P. Krishnan, V . Lalitha, and L. Natarajan, “Coded Data Rebalancing: Fundamental Limits and Constructions,” in2020 IEEE International Symposium on Information Theory (ISIT), 2020, pp. 640–645

  51. [51]

    Coded Data Rebalancing for Decentralized Distributed Databases,

    K. V . Sushena Sree and P. Krishnan, “Coded Data Rebalancing for Decentralized Distributed Databases,” in2020 IEEE Information Theory Workshop (ITW), 2021, pp. 1–5

  52. [52]

    Coded Data Rebalancing for Distributed Data Storage Systems with Cyclic Storage,

    A. Chandramouli, A. Vaishya, and P. Krishnan, “Coded Data Rebalancing for Distributed Data Storage Systems with Cyclic Storage,” in 2022 IEEE Information Theory Workshop (ITW), 2022, pp. 618–623