{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:52Z","timestamp":1763468272566,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,4]],"date-time":"2015-10-04T00:00:00Z","timestamp":1443916800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CNS-1149229, CNS-1161541, CNS-1228839, CNS-1405641, CNS-1408695"],"award-info":[{"award-number":["CNS-1149229, CNS-1161541, CNS-1228839, CNS-1405641, CNS-1408695"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,4]]},"DOI":"10.1145\/2815400.2815405","type":"proceedings-article","created":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T12:01:58Z","timestamp":1443700918000},"page":"441-456","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["How to get more value from your file system directory cache"],"prefix":"10.1145","author":[{"given":"Chia-Che","family":"Tsai","sequence":"first","affiliation":[{"name":"Stony Brook University"}]},{"given":"Yang","family":"Zhan","sequence":"additional","affiliation":[{"name":"Stony Brook University"}]},{"given":"Jayashree","family":"Reddy","sequence":"additional","affiliation":[{"name":"Stony Brook University"}]},{"given":"Yizheng","family":"Jiao","sequence":"additional","affiliation":[{"name":"Stony Brook University"}]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Stony Brook University"}]},{"given":"Donald E.","family":"Porter","sequence":"additional","affiliation":[{"name":"Stony Brook University"}]}],"member":"320","published-online":{"date-parts":[[2015,10,4]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"AppArmor. http:\/\/wiki.apparmor.net\/.  AppArmor. http:\/\/wiki.apparmor.net\/."},{"key":"e_1_3_2_2_2_1","unstructured":"Daniel J. Bernstein. Using maildir format. http:\/\/cr.yp.to\/proto\/maildir.html 1995.  Daniel J. Bernstein. Using maildir format. http:\/\/cr.yp.to\/proto\/maildir.html 1995."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2421648.2421652"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1077084"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/824467.825004"},{"key":"e_1_3_2_2_6_1","unstructured":"The *bsdstats project. www.bsdstats.org.  The * bsdstats project. www.bsdstats.org."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1813"},{"key":"e_1_3_2_2_8_1","unstructured":"CERT Secure Coding. FIO21-C. Do not create temporary files in shared directories.  CERT Secure Coding. FIO21-C. Do not create temporary files in shared directories."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103799.2103805"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522712"},{"volume-title":"LWN","year":"2009","author":"Corbet Jonathan","key":"e_1_3_2_2_11_1"},{"volume-title":"Linux Weekly News","year":"2010","author":"Corbet Jonathan","key":"e_1_3_2_2_12_1"},{"key":"e_1_3_2_2_13_1","first-page":"16","volume-title":"Proceedings of the USENIX Annual Technical Conference","author":"Debnath Biplob","year":"2010"},{"volume-title":"Proceedings of the USENIX Summer Technical Conference","year":"1994","author":"Duchamp Dan","key":"e_1_3_2_2_14_1"},{"issue":"3","key":"e_1_3_2_2_15_1","first-page":"90","volume":"40","author":"Farrow Rik","year":"2015","journal-title":"Magazine"},{"volume-title":"Complexity of FreeBSD VFS using ZFS as an example. Part 1. https:\/\/clusterhq.com\/blog\/complexity-freebsd-vfs-using-zfs-example-part-1-2\/","year":"2014","author":"Gapon Andriy","key":"e_1_3_2_2_16_1"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043564"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87779-0_24"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/35037.35059"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2388996.2389114"},{"volume-title":"Strongly universal string hashing is fast. The Computer Journal, page bxt070","year":"2013","author":"Lemire Daniel","key":"e_1_3_2_2_21_1"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485732.2485741"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592820"},{"volume-title":"Proceedings of the USENIX Annual Technical Conference","year":"2001","author":"Loscocco P.","key":"e_1_3_2_2_24_1"},{"volume-title":"Solaris Internals: Solaris 10 and OpenSolaris Kernel Architecture","year":"2008","author":"McDougall Richard","key":"e_1_3_2_2_25_1"},{"journal-title":"Journal.","author":"McKenney Paul E.","key":"e_1_3_2_2_27_1"},{"volume-title":"Neville-Neil. The Design and Implementation of the FreeBSD Operating System","year":"2005","author":"McKusick Marshall Kirk","key":"e_1_3_2_2_28_1"},{"key":"e_1_3_2_2_29_1","first-page":"23","volume-title":"Proceedings of the USENIX Annual Technical Conference","author":"McVoy Larry","year":"1996"},{"key":"e_1_3_2_2_30_1","unstructured":"Microsoft. Description of the \"access check cache bucket count\" and \"access check cache quota\" options that are available in the sp_configure stored procedure. https:\/\/support.microsoft.com\/en-us\/kb\/955644.  Microsoft. Description of the \"access check cache bucket count\" and \"access check cache quota\" options that are available in the sp_configure stored procedure. https:\/\/support.microsoft.com\/en-us\/kb\/955644."},{"volume-title":"Design and implementation of xnu port of lustre client file system. Technical report","year":"2005","author":"Nikita Danilov","key":"e_1_3_2_2_31_1"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.002"},{"key":"e_1_3_2_2_33_1","first-page":"7","volume-title":"Getting Dot-dot Right. In Proceedings of the USENIX Annual Technical Conference","author":"Pike Rob","year":"2000"},{"key":"e_1_3_2_2_34_1","first-page":"89","volume-title":"Proceedings of the USENIX Conference on File and Storage Technologies (FAST)","author":"Quinlan Sean","year":"2002"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361061"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1717352"},{"volume-title":"Proceedings of the USENIX Annual Technical Conference","year":"1985","author":"Sandberg Russel","key":"e_1_3_2_2_37_1"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5661"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1076423"},{"key":"e_1_3_2_2_40_1","first-page":"24","volume-title":"Proceedings of the USENIX Conference on File and Storage Technologies (FAST)","author":"Srinivasan Kiran","year":"2012"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373271"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/GRID.2007.4354139"},{"key":"e_1_3_2_2_43_1","first-page":"11","volume-title":"Proceedings of the USENIX Annual Technical Conference","author":"Triplett Josh","year":"2011"},{"key":"e_1_3_2_2_44_1","first-page":"514","volume-title":"ICCSN","author":"Haitao Lv YixueWang","year":"2011"},{"volume-title":"Computer System","year":"1994","author":"Welch Brent","key":"e_1_3_2_2_45_1"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"crossref","unstructured":"David Wheeler. Sloccount 2009.  David Wheeler. Sloccount 2009.","DOI":"10.12968\/sece.2009.2.1440"},{"volume-title":"USENIX Security Symposium","year":"2002","author":"Wright C.","key":"e_1_3_2_2_47_1"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1654059.1654086"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2012.69"},{"key":"e_1_3_2_2_50_1","first-page":"1","volume-title":"Proceedings of the USENIX Conference on File and Storage Technologies (FAST)","author":"Zhu Benjamin","year":"2008"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.70788"}],"event":{"name":"SOSP '15: ACM SIGOPS 25th Symposium on Operating Systems Principles","sponsor":["SSRC Storage Systems Research Center, UC Santa Cruz","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Monterey California","acronym":"SOSP '15"},"container-title":["Proceedings of the 25th Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815400.2815405","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2815400.2815405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:38Z","timestamp":1750225718000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815400.2815405"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,4]]},"references-count":50,"alternative-id":["10.1145\/2815400.2815405","10.1145\/2815400"],"URL":"https:\/\/doi.org\/10.1145\/2815400.2815405","relation":{},"subject":[],"published":{"date-parts":[[2015,10,4]]},"assertion":[{"value":"2015-10-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}