{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T20:44:14Z","timestamp":1763585054958},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/msst.2015.7208286","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T17:42:30Z","timestamp":1440092550000},"page":"1-10","source":"Crossref","is-referenced-by-count":10,"title":["Realistic request arrival generation in storage benchmarks"],"prefix":"10.1109","author":[{"given":"Rekha","family":"Pitchumani","sequence":"first","affiliation":[]},{"given":"Shayna","family":"Frank","sequence":"additional","affiliation":[]},{"given":"Ethan L.","family":"Miller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1365815.1365816"},{"year":"0","key":"ref32","article-title":"MapKeeper"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637213"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2010.2084711"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592804"},{"year":"0","key":"ref35","article-title":"HBase"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s002360050048"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14778\/2002974.2002977"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989356"},{"year":"0","key":"ref12","article-title":"LeveIDB"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2011.6114196"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2012.6189204"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2012.27"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1555228.1555267"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2002.994770"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2005.37"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038925"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/956993.957004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342360"},{"key":"ref27","first-page":"41","article-title":"Long-Range Dependence at the Disk Drive Level","author":"riska","year":"2006","journal-title":"Proc 3rd International Conference on the Quantitative Evaluation of Systems (QEST'06)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807152"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043558"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2002.1189015"},{"key":"ref5","first-page":"371","article-title":"MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing","author":"fan","year":"2013","journal-title":"Proc of USENIX Conference on Networked Systems Design and Implementation (NSDI'10)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2494621.2494630"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2150982"},{"year":"0","key":"ref2","article-title":"The Seagate Kinetic Open Storage Vision"},{"key":"ref9","first-page":"349","article-title":"Performance Isolation and Fairness for Multi-tenant Cloud Storage","author":"shue","year":"2012","journal-title":"Proc 10th USENIX Conf Operating Systems Design and Implementation (OSDI '12)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2254756.2254766"},{"key":"ref20","article-title":"Workload Modeling for Computer Systems Performance Evaluation","author":"feitelson","year":"2014","journal-title":"This book is being published by Cambridge University"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/378420.378440"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/90.392383"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/90.282603"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/90.650143"},{"key":"ref26","first-page":"97","article-title":"Self-Similarity in I\/O Workload: Analysis and Modeling","author":"gomez","year":"1998","journal-title":"Proceedings of the Workload Characterization Methodology and Case Studies (WWC &#x201C;98)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/277851.277894"}],"event":{"name":"2015 31st Symposium on Mass Storage Systems and Technologies (MSST)","start":{"date-parts":[[2015,5,30]]},"location":"Santa Clara, CA, USA","end":{"date-parts":[[2015,6,5]]}},"container-title":["2015 31st Symposium on Mass Storage Systems and Technologies (MSST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7167175\/7208272\/07208286.pdf?arnumber=7208286","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T18:32:16Z","timestamp":1490380336000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7208286\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/msst.2015.7208286","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}