期刊文献+
共找到4,613篇文章
< 1 2 231 >
每页显示 20 50 100
A Resource Management Algorithm for Virtual Machine Migration in Vehicular Cloud Computing 被引量:1
1
作者 Sohan Kumar Pande Sanjaya Kumar Panda +5 位作者 Satyabrata Das Kshira Sagar Sahoo Ashish Kr.Luhach N.Z.Jhanjhi Roobaea Alroobaea Sivakumar Sivanesan 《Computers, Materials & Continua》 SCIE EI 2021年第5期2647-2663,共17页
In recent years,vehicular cloud computing(VCC)has gained vast attention for providing a variety of services by creating virtual machines(VMs).These VMs use the resources that are present in modern smart vehicles.Many ... In recent years,vehicular cloud computing(VCC)has gained vast attention for providing a variety of services by creating virtual machines(VMs).These VMs use the resources that are present in modern smart vehicles.Many studies reported that some of these VMs hosted on the vehicles are overloaded,whereas others are underloaded.As a circumstance,the energy consumption of overloaded vehicles is drastically increased.On the other hand,underloaded vehicles are also drawing considerable energy in the underutilized situation.Therefore,minimizing the energy consumption of the VMs that are hosted by both overloaded and underloaded is a challenging issue in the VCC environment.The proper and efcient utilization of the vehicle’s resources can reduce energy consumption signicantly.One of the solutions is to improve the resource utilization of underloaded vehicles by migrating the over-utilized VMs of overloaded vehicles.On the other hand,a large number of VM migrations can lead to wastage of energy and time,which ultimately degrades the performance of the VMs.This paper addresses the issues mentioned above by introducing a resource management algorithm,called resource utilization-aware VM migration(RU-VMM)algorithm,to distribute the loads among the overloaded and underloaded vehicles,such that energy consumption is minimized.RU-VMM monitors the trend of resource utilization to select the source and destination vehicles within a predetermined threshold for the process of VM migration.It ensures that any vehicles’resource utilization should not exceed the threshold before or after the migration.RU-VMM also tries to avoid unnecessary VM migrations between the vehicles.RU-VMM is extensively simulated and tested using nine datasets.The results are carried out using three performance metrics,namely number of nal source vehicles(nfsv),percentage of successful VM migrations(psvmm)and percentage of dropped VM migrations(pdvmm),and compared with threshold-based algorithm(i.e.,threshold)and cumulative sum(CUSUM)algorithm.The comparisons show that the RU-VMM algorithm performs better than the existing algorithms.RU-VMM algorithm improves 16.91%than the CUSUM algorithm and 71.59%than the threshold algorithm in terms of nfsv,and 20.62%and 275.34%than the CUSUM and threshold algorithms in terms of psvmm. 展开更多
关键词 Resource management virtual machine migration vehicular cloud computing resource utilization source vehicle destination vehicle
在线阅读 下载PDF
A Quantitative Security Metric Model for Security Controls:Secure Virtual Machine Migration Protocol as Target of Assessment 被引量:1
2
作者 Tayyaba Zeb Muhammad Yousaf +1 位作者 Humaira Afzal Muhammad Rafiq Mufti 《China Communications》 SCIE CSCD 2018年第8期126-140,共15页
Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the... Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol. 展开更多
关键词 attack resiliency measure cost-benefit measure performance improvement factor security assessment formal verification security controls security metrics virtual machine migration protocol
在线阅读 下载PDF
Application-Transparent Live Migration for Virtual Machine on Network Security Enhanced Hypervisor 被引量:2
3
作者 陈贤钦 高小鹏 +2 位作者 万寒 王素梅 龙翔 《China Communications》 SCIE CSCD 2011年第3期32-42,共11页
As the number of Virtual Machines(VMs) consolidated on single physical server increases with the rapid advance of server hardware,virtual network turns complex and frangible.Modern Network Security Engines(NSE) are in... As the number of Virtual Machines(VMs) consolidated on single physical server increases with the rapid advance of server hardware,virtual network turns complex and frangible.Modern Network Security Engines(NSE) are introduced to eradicate the intrusions occurring in the virtual network.In this paper,we point out the inadequacy of the present live migration implementation,which hinders itself from providing transparent VM relocation between hypervisors equipped with Network Security Engines(NSE-H).This occurs because the current implementation ignores VM-related Security Context(SC) required by NSEs embedded in NSE-H.We present the CoM,a comprehensive live migration framework,for NSE-H-based virtualization computing environment.We built a prototype system on Xen hypervisors to evaluate our framework,and conduct experiments under various realistic application environments.The results demonstrate that our solution successfully fixes the inadequacy of the present live migration implementation,and the performance overhead is negligible. 展开更多
关键词 live migration network security security context virtualIZATION
在线阅读 下载PDF
A Service Level Agreement Aware Online Algorithm for Virtual Machine Migration
4
作者 Iftikhar Ahmad Ambreen Shahnaz +2 位作者 Muhammad Asfand-e-Yar Wajeeha Khalil Yasmin Bano 《Computers, Materials & Continua》 SCIE EI 2023年第1期279-291,共13页
The demand for cloud computing has increased manifold in the recent past.More specifically,on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computi... The demand for cloud computing has increased manifold in the recent past.More specifically,on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing needs.The cloud service provider fulfills different user requirements using virtualization-where a single physical machine can host multiple VirtualMachines.Each virtualmachine potentially represents a different user environment such as operating system,programming environment,and applications.However,these cloud services use a large amount of electrical energy and produce greenhouse gases.To reduce the electricity cost and greenhouse gases,energy efficient algorithms must be designed.One specific area where energy efficient algorithms are required is virtual machine consolidation.With virtualmachine consolidation,the objective is to utilize the minimumpossible number of hosts to accommodate the required virtual machines,keeping in mind the service level agreement requirements.This research work formulates the virtual machine migration as an online problem and develops optimal offline and online algorithms for the single host virtual machine migration problem under a service level agreement constraint for an over-utilized host.The online algorithm is analyzed using a competitive analysis approach.In addition,an experimental analysis of the proposed algorithm on real-world data is conducted to showcase the improved performance of the proposed algorithm against the benchmark algorithms.Our proposed online algorithm consumed 25%less energy and performed 43%fewer migrations than the benchmark algorithms. 展开更多
关键词 Cloud computing green computing online algorithms virtual machine migration
在线阅读 下载PDF
An Efficient On-Demand Virtual Machine Migration in Cloud Using Common Deployment Model
5
作者 C.Saravanakumar R.Priscilla +3 位作者 B.Prabha A.Kavitha M.Prakash C.Arun 《Computer Systems Science & Engineering》 SCIE EI 2022年第7期245-256,共12页
Cloud Computing provides various services to the customer in aflex-ible and reliable manner.Virtual Machines(VM)are created from physical resources of the data center for handling huge number of requests as a task.Thes... Cloud Computing provides various services to the customer in aflex-ible and reliable manner.Virtual Machines(VM)are created from physical resources of the data center for handling huge number of requests as a task.These tasks are executed in the VM at the data center which needs excess hosts for satis-fying the customer request.The VM migration solves this problem by migrating the VM from one host to another host and makes the resources available at any time.This process is carried out based on various algorithms which follow a pre-defined capacity of source VM leads to the capacity issue at the destination VM.The proposed VM migration technique performs the migration process based on the request of the requesting host machine.This technique can perform in three ways namely single VM migration,Multiple VM migration and Cluster VM migration.Common Deployment Manager(CDM)is used to support through negotiation that happens across the source host and destination host for providing the high quality service to their customer.The VM migration requests are handled with an exposure of the source host capabilities.The proposed analysis also uses the retired instructions with execution by the hypervisor to achieve high reliabil-ity.The objective of the proposed technique is to perform a VM migration process based on the prior knowledge of the resource availability in the target VM. 展开更多
关键词 Cloud computing virtualIZATION HYPERVISOR VMmigration virtual machine
在线阅读 下载PDF
Allocation and Migration of Virtual Machines Using Machine Learning
6
作者 Suruchi Talwani Khaled Alhazmi +2 位作者 Jimmy Singla Hasan JAlyamani Ali Kashif Bashir 《Computers, Materials & Continua》 SCIE EI 2022年第2期3349-3364,共16页
Cloud computing promises the advent of a new era of service boosted by means of virtualization technology.The process of virtualization means creation of virtual infrastructure,devices,servers and computing resources ... Cloud computing promises the advent of a new era of service boosted by means of virtualization technology.The process of virtualization means creation of virtual infrastructure,devices,servers and computing resources needed to deploy an application smoothly.This extensively practiced technology involves selecting an efficient Virtual Machine(VM)to complete the task by transferring applications from Physical Machines(PM)to VM or from VM to VM.The whole process is very challenging not only in terms of computation but also in terms of energy and memory.This research paper presents an energy aware VM allocation and migration approach to meet the challenges faced by the growing number of cloud data centres.Machine Learning(ML)based Artificial Bee Colony(ABC)is used to rank the VM with respect to the load while considering the energy efficiency as a crucial parameter.The most efficient virtual machines are further selected and thus depending on the dynamics of the load and energy,applications are migrated fromoneVMto another.The simulation analysis is performed inMatlab and it shows that this research work results in more reduction in energy consumption as compared to existing studies. 展开更多
关键词 Cloud computing VM allocation VM migration machine learning
在线阅读 下载PDF
Kernel-based virtual machine事件跟踪机制的设计与实现 被引量:1
7
作者 刘锋 雷航 李晓瑜 《计算机应用》 CSCD 北大核心 2008年第S2期285-287,共3页
分析了基于处理器硬件虚拟化技术实现的KVM子系统的架构。针对KVM跟踪独立事件信息的局限性,提出一种新的KVM事件跟踪机制(kvmtrace)来达到性能调节的目的,并使用relayfs接口进行了设计与实现。同时探讨了Linux kernel Markers实现机制... 分析了基于处理器硬件虚拟化技术实现的KVM子系统的架构。针对KVM跟踪独立事件信息的局限性,提出一种新的KVM事件跟踪机制(kvmtrace)来达到性能调节的目的,并使用relayfs接口进行了设计与实现。同时探讨了Linux kernel Markers实现机制及其在kvmtrace的实际应用。 展开更多
关键词 处理器硬件虚拟化 KVM kvmtrace
在线阅读 下载PDF
Virtual Machine技术在微机组装实践教学中的运用 被引量:2
8
作者 张沛强 安军科 《电脑知识与技术》 2009年第5X期3976-3977,共2页
该文介绍了如何使用虚拟机软件,在计算机教学中为学生演示计算机系统的底层设置和操作系统地安装。以及学生在不破坏原有系统的情况下,利用虚拟机软件来学习计算机硬盘地分区、格式化和使用虚拟操作系统建设局域网络等操作。
关键词 虚拟机 微机组装 实践教学
在线阅读 下载PDF
Energy-efficient virtual machine consolidation algorithm in cloud data centers 被引量:3
9
作者 ZHOU Zhou HU Zhi-gang YU Jun-yang 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第10期2331-2341,共11页
Cloud data centers consume a multitude of power leading to the problem of high energy consumption. In order to solve this problem, an energy-efficient virtual machine(VM) consolidation algorithm named PVDE(prediction-... Cloud data centers consume a multitude of power leading to the problem of high energy consumption. In order to solve this problem, an energy-efficient virtual machine(VM) consolidation algorithm named PVDE(prediction-based VM deployment algorithm for energy efficiency) is presented. The proposed algorithm uses linear weighted method to predict the load of a host and classifies the hosts in the data center, based on the predicted host load, into four classes for the purpose of VMs migration. We also propose four types of VM selection algorithms for the purpose of determining potential VMs to be migrated. We performed extensive performance analysis of the proposed algorithms. Experimental results show that, in contrast to other energy-saving algorithms, the algorithm proposed in this work significantly reduces the energy consumption and maintains low service level agreement(SLA) violations. 展开更多
关键词 cloud computing energy consumption linear weighted method virtual machine CONSOLIDATION virtual machine selection ALGORITHM
在线阅读 下载PDF
XEN Virtual Machine Technology and Its Security Analysis 被引量:5
10
作者 XUE Haifeng QING Sihan ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期159-162,共4页
This paper interprets the essence of XEN and hardware virtualization technology, which make the virtual machine technology become the focus of people's attention again because of its impressive performance. The secur... This paper interprets the essence of XEN and hardware virtualization technology, which make the virtual machine technology become the focus of people's attention again because of its impressive performance. The security challenges of XEN are mainly researched from the pointes of view: security bottleneck, security isolation and share, life-cycle, digital copyright protection, trusted virtual machine and managements, etc. These security problems significantly affect the security of the virtual machine system based on XEN. At the last, these security measures are put forward, which will be a useful instruction on enhancing XEN security in the future. 展开更多
关键词 virtual machine XEN SECURITY
在线阅读 下载PDF
Machine Learning-Assisted High-Throughput Virtual Screening for On-Demand Customization of Advanced Energetic Materials 被引量:10
11
作者 Siwei Song Yi Wang +2 位作者 Fang Chen Mi Yan Qinghua Zhang 《Engineering》 SCIE EI 2022年第3期99-109,共11页
Finding energetic materials with tailored properties is always a significant challenge due to low research efficiency in trial and error.Herein,a methodology combining domain knowledge,a machine learning algorithm,and... Finding energetic materials with tailored properties is always a significant challenge due to low research efficiency in trial and error.Herein,a methodology combining domain knowledge,a machine learning algorithm,and experiments is presented for accelerating the discovery of novel energetic materials.A high-throughput virtual screening(HTVS)system integrating on-demand molecular generation and machine learning models covering the prediction of molecular properties and crystal packing mode scoring is established.With the proposed HTVS system,candidate molecules with promising properties and a desirable crystal packing mode are rapidly targeted from the generated molecular space containing 25112 molecules.Furthermore,a study of the crystal structure and properties shows that the good comprehensive performances of the target molecule are in agreement with the predicted results,thus verifying the effectiveness of the proposed methodology.This work demonstrates a new research paradigm for discovering novel energetic materials and can be extended to other organic materials without manifest obstacles. 展开更多
关键词 Energetic materials machine learning High-throughput virtual screening Molecular properties Synthesis
在线阅读 下载PDF
Machine learning seismic reservoir prediction method based on virtual sample generation 被引量:6
12
作者 Kai-Heng Sang Xing-Yao Yin Fan-Chang Zhang 《Petroleum Science》 SCIE CAS CSCD 2021年第6期1662-1674,共13页
Seismic reservoir prediction plays an important role in oil exploration and development.With the progress of artificial intelligence,many achievements have been made in machine learning seismic reservoir prediction.Ho... Seismic reservoir prediction plays an important role in oil exploration and development.With the progress of artificial intelligence,many achievements have been made in machine learning seismic reservoir prediction.However,due to the factors such as economic cost,exploration maturity,and technical limitations,it is often difficult to obtain a large number of training samples for machine learning.In this case,the prediction accuracy cannot meet the requirements.To overcome this shortcoming,we develop a new machine learning reservoir prediction method based on virtual sample generation.In this method,the virtual samples,which are generated in a high-dimensional hypersphere space,are more consistent with the original data characteristics.Furthermore,at the stage of model building after virtual sample generation,virtual samples screening and model iterative optimization are used to eliminate noise samples and ensure the rationality of virtual samples.The proposed method has been applied to standard function data and real seismic data.The results show that this method can improve the prediction accuracy of machine learning significantly. 展开更多
关键词 virtual sample machine learning Reservoir prediction Hypersphere characteristic equation
原文传递
Event-driven process execution model for process virtual machine 被引量:3
13
作者 WU Dong-yao WEI Jun GAO Chu-shu DOU Wen-shen 《计算机集成制造系统》 EI CSCD 北大核心 2012年第8期1675-1685,共11页
Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principle... Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principles of the model were presented to guarantee the correctness and efficiency for process transformation.As a case study,the EPEM descriptions of Web Services Business Process Execution Language(WS-BPEL) were represented and a Process Virtual Machine(PVM)-OncePVM was implemented in compliance with the EPEM. 展开更多
关键词 business process modeling event-driven architecture process virtual machine service orchestration process execution language
在线阅读 下载PDF
Task scheduling and virtual machine allocation policy in cloud computing environment 被引量:3
14
作者 Xiong Fu Yeliang Cang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第4期847-856,共10页
Cloud computing represents a novel computing model in the contemporary technology world. In a cloud system, the com- puting power of virtual machines (VMs) and network status can greatly affect the completion time o... Cloud computing represents a novel computing model in the contemporary technology world. In a cloud system, the com- puting power of virtual machines (VMs) and network status can greatly affect the completion time of data intensive tasks. How- ever, most of the current resource allocation policies focus only on network conditions and physical hosts. And the computing power of VMs is largely ignored. This paper proposes a comprehensive resource allocation policy which consists of a data intensive task scheduling algorithm that takes account of computing power of VMs and a VM allocation policy that considers bandwidth between storage nodes and hosts. The VM allocation policy includes VM placement and VM migration algorithms. Related simulations show that the proposed algorithms can greatly reduce the task comple- tion time and keep good load balance of physical hosts at the same time. 展开更多
关键词 cloud computing resource allocation task scheduling virtual machine (VM) allocation.
在线阅读 下载PDF
Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing 被引量:2
15
作者 HUANG Qiang SHEN Changxiang FANG Yanxiang 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期13-16,共4页
With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM... With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented "thin" virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied. 展开更多
关键词 trusted computing virtual machine monitor(VMM) separation kernel trusted computing base (TCB)
在线阅读 下载PDF
Virtual System Solution of CNC Machine for Spiral Bevel and Hypoid Gears 被引量:3
16
作者 张威 王太勇 +1 位作者 熊越东 罗珺 《Transactions of Tianjin University》 EI CAS 2006年第5期373-377,共5页
A virtual computerized numerical control C CNC) processing system is built for spiral bevel and hypoid gears. The pre-designed process of the solution to locate the way of realization is investigated. A kind of combi... A virtual computerized numerical control C CNC) processing system is built for spiral bevel and hypoid gears. The pre-designed process of the solution to locate the way of realization is investigated. A kind of combined programming method and principle of solid modeling are chosen. Multienvironmental programming thought and the inter-connected mechanisms between different environments are applied in the proposed system. The problems of data exchange and compatibility of modules are settled. Environment of the system is founded with object oriented programming thought. AutoCAD is located as the graphic environment. Matlab is used for editing the computation module. Virtual C ++6.0 is the realization environment of the main module. Windows is the platform for realizing the multi-environmental method. Through establishing the virtual system based windows message handling mechanism and the component object model, the application of multienvironmental programming is realized in the manufacture system simulation. The virtual gear product can be achieved in the accomplished software. 展开更多
关键词 virtual machining simulation MANUFACTURE spiral bevel and hypoid gear multi-environmental programming
在线阅读 下载PDF
Energy-Efficient Framework for Virtual Machine Consolidation in Cloud Data Centers 被引量:1
17
作者 Kejing He Zhibo Li +1 位作者 Dongyan Deng Yanhua Chen 《China Communications》 SCIE CSCD 2017年第10期192-201,共10页
With the advent of the era of cloud computing, the high energy consumption of cloud computing data centers has become a prominent problem, and how to reduce the energy consumption of cloud computing data center and im... With the advent of the era of cloud computing, the high energy consumption of cloud computing data centers has become a prominent problem, and how to reduce the energy consumption of cloud computing data center and improve the efficiency of data center has become the research focus of researchers all the world. In a cloud environment, virtual machine consolidation(VMC) is an effective strategy that can improve the energy efficiency. However, at the same time, in the process of virtual machine consolidation, we need to deal with the tradeoff between energy consumption and excellent service performance to meet service level agreement(SLA). In this paper, we propose a new virtual machine consolidation framework for achieving better energy efficiency-Improved Underloaded Decision(IUD) algorithm and Minimum Average Utilization Difference(MAUD) algorithm. Finally, based on real workload data on Planet Lab, experiments have been done with the cloud simulation platform Cloud Sim. The experimental result shows that the proposed algorithm can reduce the energy consumption and SLA violation of data centers compared with existing algorithms, improving the energy efficiency of data centers. 展开更多
关键词 cloud computing virtual machine consolidation energy efficiency virtual machine migration
在线阅读 下载PDF
A novel virtual machine deployment algorithm with energy efficiency in cloud computing 被引量:12
18
作者 周舟 胡志刚 +1 位作者 宋铁 于俊洋 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第3期974-983,共10页
In order to improve the energy efficiency of large-scale data centers, a virtual machine(VM) deployment algorithm called three-threshold energy saving algorithm(TESA), which is based on the linear relation between the... In order to improve the energy efficiency of large-scale data centers, a virtual machine(VM) deployment algorithm called three-threshold energy saving algorithm(TESA), which is based on the linear relation between the energy consumption and(processor) resource utilization, is proposed. In TESA, according to load, hosts in data centers are divided into four classes, that is,host with light load, host with proper load, host with middle load and host with heavy load. By defining TESA, VMs on lightly loaded host or VMs on heavily loaded host are migrated to another host with proper load; VMs on properly loaded host or VMs on middling loaded host are kept constant. Then, based on the TESA, five kinds of VM selection policies(minimization of migrations policy based on TESA(MIMT), maximization of migrations policy based on TESA(MAMT), highest potential growth policy based on TESA(HPGT), lowest potential growth policy based on TESA(LPGT) and random choice policy based on TESA(RCT)) are presented, and MIMT is chosen as the representative policy through experimental comparison. Finally, five research directions are put forward on future energy management. The results of simulation indicate that, as compared with single threshold(ST) algorithm and minimization of migrations(MM) algorithm, MIMT significantly improves the energy efficiency in data centers. 展开更多
关键词 cloud computing energy efficiency three-threshold virtual machine(VM) selection policy energy management
在线阅读 下载PDF
Research on optimization of virtual machine memory access based on NUMA architecture 被引量:2
19
作者 He Mujun Zheng Linjiang +2 位作者 Yang Kai Liu Runfeng Liu Weining 《High Technology Letters》 EI CAS 2021年第4期347-356,共10页
With the rapid development of big data and artificial intelligence(AI),the cloud platform architecture system is constantly developing,optimizing,and improving.As such,new applications,like deep computing and high-per... With the rapid development of big data and artificial intelligence(AI),the cloud platform architecture system is constantly developing,optimizing,and improving.As such,new applications,like deep computing and high-performance computing,require enhanced computing power.To meet this requirement,a non-uniform memory access(NUMA)configuration method is proposed for the cloud computing system according to the affinity,adaptability,and availability of the NUMA architecture processor platform.The proposed method is verified based on the test environment of a domestic central processing unit(CPU). 展开更多
关键词 cloud computing virtualIZATION non-uniform memory access(NUMA)virtual machine memory access optimization
在线阅读 下载PDF
Availability Importance Measures for Virtualized System with Live Migration 被引量:1
20
作者 Junjun Zheng Hiroyuki Okamura Tadashi Dohi 《Applied Mathematics》 2015年第2期359-372,共14页
This paper presents component importance analysis for virtualized system with live migration. The component importance analysis is significant to determine the system design of virtualized system from availability and... This paper presents component importance analysis for virtualized system with live migration. The component importance analysis is significant to determine the system design of virtualized system from availability and cost points of view. This paper discusses the importance of components with respect to system availability. Specifically, we introduce two different component importance analyses for hybrid model (fault trees and continuous-time Markov chains) and continuous-time Markov chains, and show the analysis for existing probabilistic models for virtualized system. In numerical examples, we illustrate the quantitative component importance analysis for virtualized system with live migration. 展开更多
关键词 virtualized SYSTEM LIVE migration SYSTEM AVAILABILITY Component IMPORTANCE Analysis Fault Tree CONTINUOUS-TIME MARKOV Chain
暂未订购
上一页 1 2 231 下一页 到第
使用帮助 返回顶部