The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The EU funded FP7 project T-NOVA, with the specific goal of accelerating the evolution of NFV, proposes an open architecture to provide Virtual Network Functions as a Service (VNFaaS), together with a dynamic, and flexible platform for the management of Network Services (NSs) composed by those Virtual Network Functions (VNFs). The proposed architecture allows operators to deploy distinct virtualized...
Live migration is an advanced virtualization capability supported by several Virtual Machine Manager (VMM) solutions that allows a running virtual machine (VM) to be moved from one physical server to another without interruption. In the past, it was a premium feature largely restricted to enterprise datacentres due the need for Storage Area Networks (SANs), but advances in technology and increased...
Virtualization and just-in-time (JIT) compilation have become important paradigms in computer science to address application portability issues without deteriorating average-case performance. Unfortunately, JIT compilation raises predictability issues, which currently hinder its dissemination in real-time applications. Our work aims at reconciling the two domains, i.e. taking advantage of the portability...
In this paper, we propose a virtualization architecture for the multi-core embedded system to provide more system reliability and security while maintaining the same performance without introducing additional special hardware supports or having to implement complex protection mechanism in the virtualization layer. Virtualization has been widely used in embedded systems, especially in consumer electronics,...
Virtualization of embedded systems has recently been in the spotlight especially because of the numerous advantages it can bring. Among these, the improvement of software design quality can be highlighted, since legacy software can be reused along with newer applications, easing newer and older systems' integration. Also, security concerned systems can enjoy the gains of virtualization: two Operating...
Malware is probably the most significant computer security threat to enterprises and businesses alike. To address the exposure gap left by antivirus products, an emerging category of desktop security products that use application-level sandboxing attempts to address malware threats by containing their malicious behavior. High profile applications that now employ sandboxing include the Google Chrome...
The hardware capability and software functionality of sensor networks have continuously evolved. Apart from the merits brought by technological advances, this rapid upgrading pace poses great challenges to make heterogeneous sensor node platforms interoperate with each other. In this work, a service-oriented Application Programming Interface (API) is proposed for wireless sensor networks to handle...
Sequential or single-threaded programming is already a complicated task. The shift to multithreaded programming only increases complexity, cost and code of the program and moreover increases the effort required for debugging, to avoid deadlocks, race conditions and other problems associated with the parallel programs. In this paper we present a comprehensive evaluation methodology to benchmark the...
As a most prevalent topic in recent few years, the public has shown great interest on cloud computing - the brand new concept about service pattern for IT industry. However, the public view is now mainly focused on the technical development of such a framework that is practically available, yet little research has been taken from the aspect of the academic. This article is written with the intention...
With the popularity of virtualization, the problem that how to manage hundreds even thousands of virtual machines running on multiple physical computing nodes becomes important. Current virtual machine management systems only can obtain basic information of virtual machines and execute simple operations on them, such as start, reboot and shutdown. In this paper, we design a virtual machine management...
One of the main sources of fault occurrence in commodity operating system are bugs in device drivers. So, one way to improve system security is to improve reliability of drivers by enforcing proper security policies. In this paper a new method to improve driver's reliability by inlined reference monitor (IRM) is proposed. Virtual machine monitor (VMM) is used to enforce IRM. So without any change...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.