The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data hiding in computer system is an interesting and important research issue, which brings benefits for secret communication and watermarking. The development of virtual machine brings new potential for data hiding. In this paper we explore the potential for data hiding in virtual machine disk images, and especially hiding schemes that can be used with copy-on-write images. Besides being considered...
Large scale clusters based on virtualization technologies have been widely used in many areas, including the data center and cloud computing environment. But how to save energy is a big challenge for building a “green cluster” recently. However, previous researches, including local approaches, which focus on saving the energy of the components in a single workstation without a global vision on the...
During the development of a distributed application, programmers usually involve many programs. These programs have different IP addresses and different ports. Sometimes, they even have a same port. For instance, in P2P environment, peers usually use the same port to communicate with each other. We often need tens of computers to develop such a distributed application. Unfortunately, not each one...
Operating system debugging and system security are two important issues which are attracted more and more attentions. However, traditional solutions of software debugging can not make an integrated replay towards the status of operating system. Moreover, most intrusion detection methods all depend on the operating system excessively, but operating system ex-poses so many interfaces to outside that...
Virtual machine (VM) level checkpoints bring several advantages which process-level checkpoint implementation can hardly provide: compatibility, transparence, flexibility, and simplicity. However, the size of VM-level checkpoint may be very large and even in the order of gigabytes. This disadvantage causes the VM checkpointing and restart time become very long. To reduce the size of VM checkpoint,...
This paper describes the scheme of thread migration in a language virtual machine LAOVM - lightweight application-oriented virtual machine. To maintain high portability and flexibility, thread migration is implemented at language level. To migrate process or thread in runtime in LAOVM, the following issues are addressed: (1) supporting kinds of applications implemented by different programming language;...
Virtual machine (VM) based logging-and-replay technology has attracted much attention for system security, fault tolerance, and debugging. However, so far there is not a replay system designed on virtual machine monitor Xen. In this paper, XenLR presents the design and implementation of a logging tool for full system replay on Xen. To reduce the design complexity, XenLR is achieved on a lightweight...
During the study of grid projects, a real grid environment or simulated grid is built up for development and experiment normally. But there are some disadvantages such as high cost, complex deployment and configuration, hard management, even conflict among people. A novel virtual grid experiment method with HAL (Hardware Abstraction Level) virtualization technology is presented, which can conquer...
The concept of green computing has attracted much attention recently in cluster computing. However, previous local approaches focused on saving the energy cost of the components in a single workstation without a global vision on the whole cluster, so it achieved undesirable power reduction effect. Other cluster-wide energy saving techniques could only be applied to homogeneous workstations and specific...
Virtualization technology has attracted much attention in recent years. This paper describes the vision and mission of ChinaV, which is the national fundamental research program for virtualization technology in China. Furthermore, related topics about single host virtualization, multiple VM management schemes and desktop virtualization will be introduced. We first describe a remote memory virtualization...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.