{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:48:04Z","timestamp":1772164084757,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[1999,5,1]],"date-time":"1999-05-01T00:00:00Z","timestamp":925516800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[1999,5]]},"DOI":"10.1145\/301453.301480","type":"proceedings-article","created":{"date-parts":[[2003,11,13]],"date-time":"2003-11-13T16:09:32Z","timestamp":1068739772000},"page":"59-70","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":75,"title":["A large-scale study of file-system contents"],"prefix":"10.1145","author":[{"given":"John R.","family":"Douceur","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, WA"}]},{"given":"William J.","family":"Bolosky","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA"}]}],"member":"320","published-online":{"date-parts":[[1999,5]]},"reference":[{"key":"e_1_3_2_1_1_2","doi-asserted-by":"publisher","DOI":"10.1145\/121132.121164"},{"key":"e_1_3_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/111048.111053"},{"key":"e_1_3_2_1_3_2","unstructured":"M. Blaze. \"NFS Tracing by Passive Network Monitoring.\" 1992 Winter USENIX p. 333-343 1992.]]  M. Blaze. \"NFS Tracing by Passive Network Monitoring.\" 1992 Winter USENIX p. 333-343 1992.]]"},{"key":"e_1_3_2_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/277858.277897"},{"key":"e_1_3_2_1_5_2","volume-title":"Introducing Microsoft Windows 98","author":"Borland R.","unstructured":"R. Borland , J. Ross . Introducing Microsoft Windows 98 . Microsoft Press , ! 998.]] R. Borland, J. Ross. Introducing Microsoft Windows 98. Microsoft Press, ! 998.]]"},{"key":"e_1_3_2_1_6_2","first-page":"307","volume-title":"Integrating Simulators and File-Systems.\" USENIX 1996 Annual Technical Conference","author":"Bosch P.","year":"1996","unstructured":"P. Bosch , S. J. Mullender . \"Cut-and- Paste File-Systems : Integrating Simulators and File-Systems.\" USENIX 1996 Annual Technical Conference , p. 307 - 318 , Jan 1996 .]] P. Bosch, S. J. Mullender. \"Cut-and-Paste File-Systems: Integrating Simulators and File-Systems.\" USENIX 1996 Annual Technical Conference, p. 307-318, Jan 1996.]]"},{"key":"e_1_3_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1147\/rd.355.0815"},{"key":"e_1_3_2_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(93)90100-C"},{"key":"e_1_3_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/233008.233038"},{"key":"e_1_3_2_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/69.87963"},{"key":"e_1_3_2_1_11_2","volume-title":"Mathematical Statistics","author":"Freund J. E.","unstructured":"J. E. Freund . Mathematical Statistics , Fifth Edition. Dr,#ntlo# I--I #I1 1QQ\")]] J. E. Freund. Mathematical Statistics, Fifth Edition. Dr,#ntlo# I--I#I1 1QQ\")]]"},{"key":"e_1_3_2_1_12_2","volume-title":"Handbook of Algorithms and Wesley","author":"Gonnet G. H.","year":"1991","unstructured":"G. H. Gonnet , R. Baeza-Yates . Handbook of Algorithms and Wesley , 1991 .]] G. H. Gonnet, R. Baeza-Yates. Handbook of Algorithms and Wesley, 1991.]]"},{"key":"e_1_3_2_1_13_2","volume-title":"Statistics for the Behavioral Sciences","author":"Gravetter F.J.","year":"1996","unstructured":"F.J. Gravetter , L.B. Wallnau . Statistics for the Behavioral Sciences , Fourth Edition. West , 1996 .]] F.J. Gravetter, L.B. Wallnau. Statistics for the Behavioral Sciences, Fourth Edition. West, 1996.]]"},{"key":"e_1_3_2_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/277858.277894"},{"key":"e_1_3_2_1_15_2","first-page":"197","volume-title":"File System Latency Summer USENIX Technical Conference","author":"Griffioen J.","year":"1994","unstructured":"J. Griffioen , R. Appleton . \"Reducing File System Latency Summer USENIX Technical Conference , p. 197 - 207 , Jun 1994 .]] J. Griffioen, R. Appleton. \"Reducing File System Latency Summer USENIX Technical Conference, p. 197-207, Jun 1994.]]"},{"key":"e_1_3_2_1_16_2","unstructured":"International Data Corporation. \"Client Operating Environments 1998 Worldwide Markets and Trends.\" IDC Report #16086 May 1998. (cited with permission)]]  International Data Corporation. \"Client Operating Environments 1998 Worldwide Markets and Trends.\" IDC Report #16086 May 1998. (cited with permission)]]"},{"key":"e_1_3_2_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/238721.238737"},{"key":"e_1_3_2_1_18_2","volume-title":"Queueing Systems","author":"Kleinrock L.","year":"1976","unstructured":"L. Kleinrock . Queueing Systems : Volume 2 , Computer Applications. John Wiley & amp; Sons, 1976 .]] L. Kleinrock. Queueing Systems: Volume 2, Computer Applications. John Wiley &amp; Sons, 1976.]]"},{"key":"e_1_3_2_1_19_2","volume-title":"Eo Knuth: The Art of Computer Programming","author":"D","year":"1981","unstructured":"D : Eo Knuth: The Art of Computer Programming : Volume 2 , Seminumerical Algorithms, Second Edition . Addison- Wesley , 1981 .]] D: Eo Knuth: The Art of Computer Programming: Volume 2, Seminumerical Algorithms, Second Edition. Addison- Wesley, 1981.]]"},{"key":"e_1_3_2_1_20_2","unstructured":"Microsoft Corporation. \"File Times.\" MSDN Library Edition Jul 1998.]]  Microsoft Corporation. \"File Times.\" MSDN Library Edition Jul 1998.]]"},{"key":"e_1_3_2_1_21_2","volume-title":"Inside the Windows 95 File System. O'Reilly and Associates","author":"Mitchell S.","year":"1997","unstructured":"S. Mitchell . Inside the Windows 95 File System. O'Reilly and Associates , 1997 .]] S. Mitchell. Inside the Windows 95 File System. O'Reilly and Associates, 1997.]]"},{"key":"e_1_3_2_1_22_2","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380140407"},{"key":"e_1_3_2_1_23_2","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199606)26:6%3C705::AID-SPE29%3E3.3.CO;2-F"},{"key":"e_1_3_2_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/323627.323631"},{"key":"e_1_3_2_1_25_2","volume-title":"Excel for Scientists and Engineers","author":"Orvis W. J.","unstructured":"W. J. Orvis . Excel for Scientists and Engineers , Second Edition. Sybex , i995.]] W. J. Orvis. Excel for Scientists and Engineers, Second Edition. Sybex, i995.]]"},{"key":"e_1_3_2_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/149439.133090"},{"key":"e_1_3_2_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/146941.146943"},{"key":"e_1_3_2_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/800216.806597"},{"key":"e_1_3_2_1_29_2","unstructured":"M. Satyanarayanan. \"A Synthetic Driver for File System Simulations.\" Modelling Techniques and Tools for]]  M. Satyanarayanan. \"A Synthetic Driver for File System Simulations.\" Modelling Techniques and Tools for]]"},{"key":"e_1_3_2_1_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/0166-5316(94)90003-5"},{"key":"e_1_3_2_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1981.230843"},{"key":"e_1_3_2_1_32_2","unstructured":"K. A. Smith &amp; M. I. Seltzer. \"File Layout and File System Performance.\" Harvard University technical report TR-35- 94 1994.]]  K. A. Smith &amp; M. I. Seltzer. \"File Layout and File System Performance.\" Harvard University technical report TR-35- 94 1994.]]"},{"key":"e_1_3_2_1_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/258623.258689"},{"key":"e_1_3_2_1_34_2","volume-title":"Inside Windows NT","author":"Solomon D. A.","year":"1998","unstructured":"D. A. Solomon . Inside Windows NT , Second Edition. Microsoft Press , 1998 .]] D. A. Solomon. Inside Windows NT, Second Edition. Microsoft Press, 1998.]]"},{"key":"e_1_3_2_1_35_2","first-page":"2","volume-title":"International Conference on Distributed Computing Systems","author":"Tait C. D.","year":"1991","unstructured":"C. D. Tait , D. Duchamp . \" Detection and Exploitation of File Working Sets .\" l l th International Conference on Distributed Computing Systems , p. 2 - 9 , 1991 .]] C. D. Tait, D. Duchamp. \"Detection and Exploitation of File Working Sets.\" l l th International Conference on Distributed Computing Systems, p. 2-9, 1991.]]"}],"event":{"name":"SIGMETRICS99: ACM SIGMETRICS Conference","location":"Atlanta Georgia USA","acronym":"SIGMETRICS99","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Proceedings of the 1999 ACM SIGMETRICS international conference on Measurement and modeling of computer systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/301453.301480","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/301453.301480","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:04:58Z","timestamp":1750259098000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/301453.301480"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,5]]},"references-count":35,"alternative-id":["10.1145\/301453.301480","10.1145\/301453"],"URL":"https:\/\/doi.org\/10.1145\/301453.301480","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/301464.301480","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[1999,5]]},"assertion":[{"value":"1999-05-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}