The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional distributed schedulers only consider the scheduling of jobs and treat the storage system as static and already deployed. However, individual application often needs its own configuration of storage system. Therefore, traditional distributed schedulers are not able to serve multiple tenants. To improve the resource utilization, some mechanisms are needed to consolidate multiple applications...
Virtual clusters are the new ways for managing the computing resources in the cluster environment. Users are presented with virtual clusters instead of physical ones. The storage system for supporting the running clusters is critical in such systems for efficient store of virtual machine images. We have used the CAS (Content Addressable Storage) based storage for manage the large number of virtual...
It is very important to protect critical resources such as private data and code in computer systems. It is promising to protect private data and to improve the system security by leveraging the isolation attribute of virtual machine (VM). The isolation attribute of VM is provided by Virtual Machine Monitor (VMM) that runs in higher priority than guest OSes. If the critical components are isolated...
When a denial-of-service happens, the malicious programs often occupies too much computing resources. A defending schema proposed in this paper can use virtual machine monitor to detect such attack by adapting threshold of available resources. If the defending system assures existence of attack, it will live duplicates the operating system together with the tagged applications to reserved isolated...
Auditable file system is used to track the usage of the file system including the operations like read and write. Auditable file system keeps the trails of userspsila action and the trails are kept faithfully for future auditing. However, as the logs are still kept within the same file system, it will be quite vulnerable to be exposed as malware penetrating the system. Even with the file system hiding...
Software packages in working clusters are often once installed and kept unchanged for a very long time except for some bug fix, security enhancement, or small upgrades. This is due to the sharing property of the clusters among many users or institutes. They do not want to disturb each other while changing the infrastructure software packages. Such typical usage scenario means newly developed technologies...
The virtualization technology can bring some advantages to HPC applications such as fault tolerant, load balance and simplify the system management etc. However, the performance is still a very important factor under considerations in the HPC community. This paper provides some empirical studies on the performance evaluations for the massive passing programs, which composing large amount of HPC applications,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.