The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtual machine (VM) technology plays an important role in modern cluster and cloud computing environments due to its advantages in application isolation, resource partition and load consolidation. Since a large number of VMs usually run simultaneously in these environments, VMs scheduling is key to achieve resources efficiency. Unfortunately, most existing scheduling strategies are complicated, with...
Live migration of virtual machines relocates running VM across physical hosts with unnoticeable service downtime. However, propagating changing VM memory at low cost, especially for write-intensive applications or at relatively low network bandwidth, is still uncovered. This paper presents Microwiper, an improvement of memory propagation in live migration. Our idea is twofold. We propose ordered propagation...
When a denial-of-service happens, the malicious programs often occupies too much computing resources. A defending schema proposed in this paper can use virtual machine monitor to detect such attack by adapting threshold of available resources. If the defending system assures existence of attack, it will live duplicates the operating system together with the tagged applications to reserved isolated...
Auditable file system is used to track the usage of the file system including the operations like read and write. Auditable file system keeps the trails of userspsila action and the trails are kept faithfully for future auditing. However, as the logs are still kept within the same file system, it will be quite vulnerable to be exposed as malware penetrating the system. Even with the file system hiding...
Today virtual machine (VM) technologies play an active role in some IT field. But few researches have been done on the I/O performance of the OS running in VM. This paper deals with measurements and analysis of reading large files on Windows systems in VM. Compared with the system on hardware directly, OS in VM owns a more complicate storage hierarchy, which contains the OS cache, VM cache and disk...
Software packages in working clusters are often once installed and kept unchanged for a very long time except for some bug fix, security enhancement, or small upgrades. This is due to the sharing property of the clusters among many users or institutes. They do not want to disturb each other while changing the infrastructure software packages. Such typical usage scenario means newly developed technologies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.