Saturday, April 13, 2013

Research Readings in Virtualization

Vlock: Lock virtualization mechanism for exploiting fine-grained parallelism in graph traversal algorithms
J Yan, G Tan, X Zhang, E Yao, N Sun - … and Optimization (CGO), 2013 IEEE/ACM …, 2013
Abstract For graph traversal applications, fine synchronization is required to exploit massive
fine parallelism. However, in the conventional solution using fine-grained locks, locks
themselves suffer huge memory cost as well as poor locality for inherent irregular access ...

Set sampling controls instruction

JH Bartik, LC Heller, DL Osisek, DW Schmidt… - US Patent 8,417,837, 2013
... 6983303, Storage aggregator for enhancing virtualization in data storage networks, January,
2006, Pellegrino et al. ... Foreign References: JP4001834, January, 1992, JP2008027306, February,
2008, USER SPACE VIRTUALIZATION SYSTEM. KR1020050016917, February, 2005 ...

[PDF] Implementation of Xshare Sharing of Mobile Phone by Using System Architecture of Win32, System File API

KGSVKM Hussain - International Journal, 2013
... The virtual environment confines access to the shared data and applications through
name-space virtualization based on file-level access control. ... Namespace virtualization
controls resource access by renaming those resources. ...

[PDF] DoubleGuard: Detecting & Preventing Intrusions in Multitier Web Applications

N Gaikwad, S Kandage, D Gholap - International Journal, 2013
... identify by independent IDS. DoubleGuard is implemented using an Apache web
server with MySQL and lightweight virtualization. Keywords: Virtualization, Intrusion,
Multi Tier, IDS, Anomaly. 1 INTRODUCTION Over a past ...

[PDF] Security in Data Storage and Transmission in Cloud Computing

P Bhisikar, A Sahu - International Journal, 2013
... software. The main technical supporting of cloud computing infrastructures and
services include virtualization, service-oriented software, grid computing technologies,
management of large facilities, and power efficiency. The ...

The Roles of Security and Trust: Comparing Cloud Computing and Banking

R Bose, X Luo, Y Liu - Procedia-Social and Behavioral Sciences, 2013
... Modern virtualization technologies are helping many businesses to dramatically improve
their storage utilization, service delivery, resource efficiency, and space utilization. ... [5] Lombardi,
F. & Pietro, RD (2011). Secure virtualization for cloud computing. ...

[PDF] Task Scheduling & Energy Conservation Techniques for Multiprocessor Computing Systems

N Kaur, S Bansal, RK Bansal - International Journal, 2013
... Static power management techniques [17] are applied at design time (off-line),
targeting both hardware and software. Virtualization [2] and green policies [3] are
another mechanisms used to reduce the power consumption. ...

[HTML] BGP IP VPN Virtual PE

M Napierala, D Ward, L Fang, B Rijsman, R Fernando… - 2013
... 24 Fang et al. Expires <October 7, 2013> [Page 3] INTERNET DRAFT BGP IP VPN Virtual
PE April 7, 2013 1 Introduction Network virtualization enables multiple isolated individual
networks over a shared common network infrastructure. ...

Interconnecting Federated Clouds by Using Publish-Subscribe Service

C Esposito, M Ficco, F Palmieri, A Castiglione - Cluster Computing, 2013
... extremely challenging task. Thus, a suitable network virtualization framework is
needed to deal with the heterogeneity of the different avail- able Cloud solutions
in lack of an uniform data communi- cation model. Specifically, in ...

[PDF] of Deliverable: Energy and Heat-aware classification of applications

JL Prieto, G Da Costa - Energy, 2013
Page 1. Project acronym: CoolEmAll Project full title: Platform for optimising the design and
operation of modular configurable IT infrastructures and facilities with resource-efficient
cooling D5.4 Energy and Heat-aware classification of application ...

No comments:

Post a Comment

 

blogger templates 3 columns | Make Money Online