• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 274
Next 10 →

Usermode Kernel: Running the Kernel in Userspace in VM Environments

by Sharath George , 2008
"... In many instances of virtual machine deployments today, virtual machine instances are created to support a single application. Traditional operating systems provide an extensive framework for protecting one process from another. In such deployments, this protection layer becomes an additional source ..."
Abstract - Add to MetaCart
security on the other virtual machines running on the same physical machine, as they are protected by the VMM. We illustrate the design and implementation of such a system with the Xen hypervisor and the XenoLinux kernel. ii Table of Contents Abstract................................. ii

NV-Hypervisor: Hypervisor-based Persistence for Virtual Machines

by Vasily A. Sartakov, Tu Braunschweig, Rüdiger Kapitza, Tu Braunschweig
"... Abstract—Power outages and subsequent recovery are major causes of service downtimes. This issue is amplified by the ongoing trend of steadily growing in-memory state of Internetbased services which increases the risk of data loss and extends recovery time. Protective measures against power outages, ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
-the-shelf software is not ready for benefiting from NVRAM. We present NV-Hypervisor a lightweight hypervisor extension that transparently provides persistence for virtual machines. NV-Hypervisor paves the way for utilizing NVRAM in virtualized environments (i.e., infrastructure-as-a-service clouds) and protects

RESOURCE SHARING FOR HYPERVISOR BASED ARCHITECTURE IN VIRTUALIZATION ENVIRONMENT

by unknown authors
"... In data administration resource sharing has a crucial liability. At the same time we should be conscious about the enslavement factors. In addition virtual platforms can be demoralized as part of gaining the information about a system. As a result the corruption of files can cause crash status of th ..."
Abstract - Add to MetaCart
In data administration resource sharing has a crucial liability. At the same time we should be conscious about the enslavement factors. In addition virtual platforms can be demoralized as part of gaining the information about a system. As a result the corruption of files can cause crash status

VMDedup: Memory De-duplication in Hypervisor

by Furquan Shaikh , Fangzhou Yao , Indranil Gupta , Roy H Campbell
"... Abstract-Virtualization techniques are widely used in cloud computing environments today. Such environments are installed with a large number of similar virtual instances sharing the same physical infrastructure. In this paper, we focus on the memory usage optimization across virtual machines by au ..."
Abstract - Add to MetaCart
-duplication support within the hypervisor to achieve benefits across operating system code, data as well as application binaries. We have implemented a prototype of this system within the Xen hypervisor to support both para-virtualized and fully-virtualized instances of operating systems.

An analysis of performance interference effects in virtual environments

by Younggyun Koh, Rob Knauerhase, Paul Brett, Mic Bowman, Zhihua Wen, Calton Pu - In Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS , 2007
"... Virtualization is an essential technology in modern datacenters. Despite advantages such as security isolation, fault isolation, and environment isolation, current virtualization techniques do not provide effective performance isolation between virtual machines (VMs). Specifically, hidden contention ..."
Abstract - Cited by 71 (5 self) - Add to MetaCart
Virtualization is an essential technology in modern datacenters. Despite advantages such as security isolation, fault isolation, and environment isolation, current virtualization techniques do not provide effective performance isolation between virtual machines (VMs). Specifically, hidden

Storage workload characterization and consolidation in virtualized environments

by Ajay Gulati, Chethan Kumar, Irfan Ahmad - In 2nd International Workshop on Virtualization Performance: Analysis, Characterization, and Tools (VPACT , 2009
"... Server virtualization is accelerating the already existing need for shared storage area network (SAN) infrastructure for the associated benefits of migration, flexible manage-ment and economies of sharing. Understanding the charac-teristics of a workload in terms of access locality, IO sizes, read w ..."
Abstract - Cited by 28 (4 self) - Add to MetaCart
server hypervisor. We further separate out different compo-nents (for example data, index and redo log in a database) of these workloads to understand their behavior in isola-tion. We find that most workloads show highly random ac-cess patterns. Next, we study the impact of storage con

UniCache: Hypervisor Managed Data Storage in RAM and Flash

by Jinho Hwang, Wei Zhang, Ron C. Chiang, Timothy Wood, H. Howie Huang
"... Abstract—Application and OS-level caches are crucial for hiding I/O latency and improving application performance. However, caches are designed to greedily consume memory, which can cause memory-hogging problems in a virtualized data centers since the hypervisor cannot tell for what a virtual machin ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract—Application and OS-level caches are crucial for hiding I/O latency and improving application performance. However, caches are designed to greedily consume memory, which can cause memory-hogging problems in a virtualized data centers since the hypervisor cannot tell for what a virtual

Virtual Systems Workload Characterization An Overview

by Mohamed A. El-refaey, Dr. Mohamed, Abu Rizkaa
"... Abstract—Virtual systems and virtualization technology are taking the momentum nowadays in data centers and IT infrastructure models. Performance analysis of such systems is very invaluable for enterprises but yet is not a deterministic process. Single-workload benchmark is useful in quantifying the ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract—Virtual systems and virtualization technology are taking the momentum nowadays in data centers and IT infrastructure models. Performance analysis of such systems is very invaluable for enterprises but yet is not a deterministic process. Single-workload benchmark is useful in quantifying

Retrofitting the ibm power hypervisor to support mandatory access control

by Enriquillo Valdez, Reiner Sailer, Ronald Perez - In Proceedings of the Twenty-Third Annual Computer Security Applications Conference (ACSAC , 2007
"... Server virtualization more readily enables the collocation of disparate workloads on a shared physical platform. When employed on systems across a data center, the result can be a dramatic increase in server utilization and a decrease in overall power, cooling and floor space requirements. However, ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
, in an environment where workloads share the underlying platforms, achieving other desirable workload goals, such as availability and security, becomes a challenge. In particular, enforcing isolation between workloads in a large, dynamic, and virtualized data center requires strong yet easily configurable controls

TwinDrivers: Semi-Automatic Derivation of Fast and Safe Hypervisor Network Drivers from Guest OS Drivers

by Aravind Menon, Simon Schubert, Willy Zwaenepoel
"... In a virtualized environment, device drivers are often run inside a virtual machine (VM) rather than in the hypervisor, for reasons of safety and reduction in software engineering effort. Unfortunately, this approach results in poor performance for I/O-intensive devices such as network cards. The al ..."
Abstract - Cited by 23 (0 self) - Add to MetaCart
In a virtualized environment, device drivers are often run inside a virtual machine (VM) rather than in the hypervisor, for reasons of safety and reduction in software engineering effort. Unfortunately, this approach results in poor performance for I/O-intensive devices such as network cards
Next 10 →
Results 1 - 10 of 274
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University