ARTICLE:ANALYSIS_BY[name] student0 ARTICLE:ANALYSIS_TIME[minutes] 8 ARTICLE:COMMENT[string] ARTICLE:COMMERCIAL_EFFORT[none,part,full] part ARTICLE:GRANT_SUPPORT[none or string] none ARTICLE:NSF-SUPPORT[none or number] none ARTICLE:IMPLEMENTATION_EXISTS[unknown,hardware,yes,no] yes ARTICLE:LINK[url] http://doi.acm.org/10.1145/2043556.2043562 ARTICLE:STATUS[not_finished,finished] finished BIBTEX:LABEL[string] ChenSGK11 AUTHOR:NAMES[list of first_last] Yanpei_Chen Kiran_Srinivasan Garth_R._Goodson Randy_H._Katz BIBTEX:LINK[url] http://dblp.uni-trier.de/rec/bibtex/conf/sosp/ChenSGK11 BUILD:ANALYSIS_BY[name] BUILD:ANALYSIS_TIME[minutes] BUILD:COMMENT[string] BUILD:STATUS[one of {unknown,needed,not_needed,started,finished} and list of {downloaded,compiles,runs}] unknown BUILD:ERROR_COMMENT[none,not_needed,comment] not_needed EMAIL:STATUS[unknown,not_needed,not_found or list of {needed,request_1,response_1,sent_thank_you}] needed request_1 response_1 request_2 response_2 sent_thank_you PI:COMMENT_CC[string] They have a trace collection infrastructure which is described in A. Leung, S. Pasupathy, G. Goodson, and E. Miller: "Measurement and analysis of large-scale network file system workloads". In USENIX ATC 2008. Presumably they could share that with us. They also collected traces, which is data - they could share those. PI:COMMENT_TP[string] TOOL:NAME[string] TOOL:ARTICLE_LINK[unknown,none,url,broken and url] none TOOL:GOOGLE_LINK[unknown,none,url,broken and url] none TOOL:EMAIL_LINK[unknown,none,sent_no_url,url,broken and url] unknown TOOL:DATA_LINK[unknown,none,url,broken and url] unknown VERIFY:ANALYSIS_BY[name] student5 VERIFY:STATUS[unknown,needed,not_needed,started,finished] finished VERIFY:COMMENT[string] no implementation. put not_needed for build and email. put no for link_found | student1: based on comments by Christian, modified IMPLEMENTATION_EXISTS-yes, BUILD-unknown, EMAIL-needed EMAIL1:CODE_AVAILABLE[yes,no,no_response] no EMAIL1:REMARK[comment] commercial