• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 226
Next 10 →

Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds

by Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage
"... Third-party cloud computing represents the promise of outsourcing as applied to computation. Services, such as Microsoft’s Azure and Amazon’s EC2, allow users to instantiate virtual machines (VMs) on demand and thus purchase precisely the capacity they require when they require it. In turn, the use ..."
Abstract - Cited by 209 (1 self) - Add to MetaCart
study, we show that it is possible to map the internal cloud infrastructure, identify where a particular target VM is likely to reside, and then instantiate new VMs until one is placed co-resident with the target. We explore how such placement can then be used to mount cross-VM side-channel attacks

The ExoVM system for automatic VM and application reduction

by Ben L. Titzer, Joshua Auerbach, David F. Bacon, Jens Palsberg - IN PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION , 2007
"... Developing embedded systems software poses unique challenges to Java application developers and virtual machine designers. Chief among these challenges is the memory footprint of both the virtual machine and the applications that run within it. With the rapidly increasing set of features provided by ..."
Abstract - Cited by 8 (2 self) - Add to MetaCart
%. We discuss VM and language design decisions that our work shows are important in targeting embedded systems, supporting the long-term goal of a common VM infrastructure spanning from motes to large servers.

Comparing VM-placement algorithms for on-demand Clouds

by K. Mills, J. Filliben, C. Dabrowski - IN PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ONCLOUD COMPUTING TECHNOLOGY AND SCIENCE. LOS ALAMITOS: IEEE COMPUTER SOCIETY , 2011
"... Much recent research has been devoted to investigating algorithms for allocating virtual machines (VMs) to physical machines (PMs) in infrastructure clouds. Many such algorithms address distinct problems, such as initial placement, consolidation, or tradeoffs between honoring service-level agreement ..."
Abstract - Cited by 29 (4 self) - Add to MetaCart
-level agreements and constraining provider operating costs. Even where similar problems are addressed, each individual research team evaluates proposed algorithms under distinct conditions, using various techniques, often targeted to a small collection of VMs and PMs. In this paper, we describe an objective method

Darjeeling, A Feature-Rich VM for the Resource Poor

by Niels Brouwers, Koen Langendoen, Peter Corke
"... The programming and retasking of sensor nodes could benefit greatly from the use of a virtual machine (VM) since byte code is compact, can be loaded on demand, and interpreted on a heterogeneous set of devices. The challenge is to ensure good programming tools and a small footprint for the virtual m ..."
Abstract - Cited by 24 (0 self) - Add to MetaCart
. The Darjeeling VM uses a 16- rather than a 32-bit architecture, which is more efficient on the targeted platforms. Darjeeling features a novel memory organisation with strict separation of reference from non-reference types which eliminates the need for run-time type inspection in the underlying compacting

Paging and Addressing in the VM-DP System

by Chapters And
"... denotes the number of bytes of RAM, and B denotes the number of bytes per disk block. Accordingly, the track size BD is also measured in bytes. We use bytes rather than records because Vcode, the stack-based, intermediate, dataparallel language that is interpreted by VM-DP supports two different re ..."
Abstract - Add to MetaCart
denotes the number of bytes of RAM, and B denotes the number of bytes per disk block. Accordingly, the track size BD is also measured in bytes. We use bytes rather than records because Vcode, the stack-based, intermediate, dataparallel language that is interpreted by VM-DP supports two different

RadixVM: Scalable address spaces for multithreaded applications

by Austin T. Clements, M. Frans Kaashoek, Nickolai Zeldovich
"... RadixVM is a new virtual memory system design that enables fully concurrent operations on shared address spaces for multithreaded processes on cache-coherent multicore computers. Today, most operating systems serialize operations such as mmap and munmap, which forces application developers to split ..."
Abstract - Cited by 15 (4 self) - Add to MetaCart
RadixVM is a new virtual memory system design that enables fully concurrent operations on shared address spaces for multithreaded processes on cache-coherent multicore computers. Today, most operating systems serialize operations such as mmap and munmap, which forces application developers to split

Low-Bandwidth VM Migration via Opportunistic Replay

by Ajay Surie, Eyal De Lara, H. Andrés Lagar-cavilla, M. Satyanarayanan
"... Virtual machine (VM) migration has been proposed as a building block for mobile computing. An important challenge for VM migration is to optimize the transfer of large amounts of disk and memory state. We propose a solution based on the opportunistic replay of user interactions with applications at ..."
Abstract - Cited by 9 (1 self) - Add to MetaCart
at the GUI level. Whereas this approach results in very small replay logs that economize network utilization, replay of user interactions on a VM at the migration target site can result in divergent VM state. Cryptographic hashing techniques are used to identify and transmit only the differences. We discuss

C.: Live migration of virtual machine based on full system trace and replay

by Hai Jin, Haikun Liu, Xiaofei Liao, Liting Hu, Peng Li - In: Proceedings of the 18th ACM international , 2009
"... Live migration of virtual machines (VM) across distinct physical hosts provides a significant new benefit for administrators of data centers and clusters. However, previous memory-to-memory ap-proaches only make the live VM migration be applied in local area networks (LAN), and their im-proved metho ..."
Abstract - Cited by 36 (2 self) - Add to MetaCart
environments. With execution trace logged on the source host, a syn-chronization algorithm is performed to orchestrate the running source and target VM until they get a consistent state. This scheme can greatly reduce the migration downtime and network bandwidth consumption. Theoretic analysis indicates

Security against Side Channel Attack in Cloud Computing

by Bhrugu Sevak
"... Abstract- Cloud computing is a word that delivering hosted service over the internet. Cloud computing has been ideate as the next generation architecture of IT enterprise because of it’s provides ubiquitous network, cost reducing, flexibility and scalability to users. Now days with the fast growing ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
the particular target VM(virtual machine) in internal cloud infrastructure and then placed new VM with targeted VM and extract confidential information from targeted VM on same physical machine called as simple side channel attack. This paper introduces how to avert the side channel attack in cloud computing

NGen-VM: New Generation Execution Environments

by Ricardo Dias, João Nuno Silva
"... This document describes a work-in-progress development of NGen-VM, a distributed infrastructure that manages execu-tion environments with run-time and programming language support targeting applications developed in the Java pro-gramming language, deployed over clusters of many-core com-puters. For ..."
Abstract - Add to MetaCart
This document describes a work-in-progress development of NGen-VM, a distributed infrastructure that manages execu-tion environments with run-time and programming language support targeting applications developed in the Java pro-gramming language, deployed over clusters of many-core com
Next 10 →
Results 1 - 10 of 226
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University