The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Live migration of virtual machines relocates running VM across physical hosts with unnoticeable service downtime. However, propagating changing VM memory at low cost, especially for write-intensive applications or at relatively low network bandwidth, is still uncovered. This paper presents Microwiper, an improvement of memory propagation in live migration. Our idea is twofold. We propose ordered propagation...
Virtual clusters are the new ways for managing the computing resources in the cluster environment. Users are presented with virtual clusters instead of physical ones. The storage system for supporting the running clusters is critical in such systems for efficient store of virtual machine images. We have used the CAS (Content Addressable Storage) based storage for manage the large number of virtual...
It is very important to protect critical resources such as private data and code in computer systems. It is promising to protect private data and to improve the system security by leveraging the isolation attribute of virtual machine (VM). The isolation attribute of VM is provided by Virtual Machine Monitor (VMM) that runs in higher priority than guest OSes. If the critical components are isolated...
When a denial-of-service happens, the malicious programs often occupies too much computing resources. A defending schema proposed in this paper can use virtual machine monitor to detect such attack by adapting threshold of available resources. If the defending system assures existence of attack, it will live duplicates the operating system together with the tagged applications to reserved isolated...
Auditable file system is used to track the usage of the file system including the operations like read and write. Auditable file system keeps the trails of userspsila action and the trails are kept faithfully for future auditing. However, as the logs are still kept within the same file system, it will be quite vulnerable to be exposed as malware penetrating the system. Even with the file system hiding...
Today virtual machine (VM) technologies play an active role in some IT field. But few researches have been done on the I/O performance of the OS running in VM. This paper deals with measurements and analysis of reading large files on Windows systems in VM. Compared with the system on hardware directly, OS in VM owns a more complicate storage hierarchy, which contains the OS cache, VM cache and disk...
Software packages in working clusters are often once installed and kept unchanged for a very long time except for some bug fix, security enhancement, or small upgrades. This is due to the sharing property of the clusters among many users or institutes. They do not want to disturb each other while changing the infrastructure software packages. Such typical usage scenario means newly developed technologies...
The wave equations based time-lapse seismic forward modeling algorithms and their parallel implementation based on virtualization technology is discussed in this paper. The modeling algorithms use an explicit finite difference scheme, which is high order accurate in space and time. A domain decomposition strategy is used for distributing the workload and the tasks communicate via MPI message passing...
Parallel simulated annealing with VMware virtual machine technology is applied in the time-lapse seismic inversion in this paper. The seismic-derived estimates of reservoir properties estimates are often obtained from time-lapse impedance estimates, it is important to achieve reliable time-lapse impedance models through time-lapse data inversion. For solving time-lapse seismic reservoir monitoring...
The virtualization technology can bring some advantages to HPC applications such as fault tolerant, load balance and simplify the system management etc. However, the performance is still a very important factor under considerations in the HPC community. This paper provides some empirical studies on the performance evaluations for the massive passing programs, which composing large amount of HPC applications,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.