• No results found

Virtual Machine Monitor / Hypervisor

A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)

A Survey on Virtualization and Attacks on Virtual Machine Monitor (VMM)

... A Hypervisor is also known as a virtual machine ...several virtual machines(VMs). A system on which a hypervisor runs one or more virtual machines is known as a host ...

6

ISSN: 2321-8363 Impact Factor: 5.515

ISSN: 2321-8363 Impact Factor: 5.515

... the hypervisor and the ...of virtual resources on their underlying physical counterparts, however in some cases the VMM is referred to as the hypervisor itself while in others this is merely a ...

6

VBD MF: A Block Device to Monitor the File System of Virtual Machine

VBD MF: A Block Device to Monitor the File System of Virtual Machine

... monitoring virtual machines at the hypervisor layer and has a high dependence on the operating system, so the operation of kernel structure can easily affect the final result ...

10

Comparative Analysis Of Proxmox VE And Xenserver As Type 1 Open Source Based Hypervisors

Comparative Analysis Of Proxmox VE And Xenserver As Type 1 Open Source Based Hypervisors

... KVM virtual machine and OpenVZ ...of hypervisor in making VM ...the virtual firewall, both hypervisors possess the management feature to enhance security with internal capability of packet ...

6

Virtual machine scheduling strategy based on machine learning algorithms for load balancing

Virtual machine scheduling strategy based on machine learning algorithms for load balancing

... the virtual machine executed a period of time, some tasks have been completed, and the virtual machine where these tasks were located would release the server resources, which might cause the ...

16

Proposed Model For Virtual Labs Interaction With Openstack Integration Using KVM Hypervisor

Proposed Model For Virtual Labs Interaction With Openstack Integration Using KVM Hypervisor

... The cloud based preparing skeleton obliges the usage and handling of data in higher education as an absolute component for economy, social, and creative transformation. Accomplishing this goal basically incorporates the ...

5

Secure-Turtles: Building a Secure Execution Environment for Guest VMs on Turtles System

Secure-Turtles: Building a Secure Execution Environment for Guest VMs on Turtles System

... L1 hypervisor disables the /dev/mem and /dev/kmem ...L1 hypervisor. By disabling these two devices, L1 hypervisor closes all interfaces to access arbitrary memory of L1 in the user ...

9

Geography Aware Virtual Machine Migrations and Replications for Distributed Cloud Data Centers

Geography Aware Virtual Machine Migrations and Replications for Distributed Cloud Data Centers

... However, the clients of application services hosted by the cloud provider are not always known a priori and the geographical distribution of requests from clients can be random and difficult to predict. Web based ...

139

A Virtual Machine Scheduling Algorithm Based on the Gravitational Effect for Green Cloud Computing

A Virtual Machine Scheduling Algorithm Based on the Gravitational Effect for Green Cloud Computing

... capable virtual machine for cloudlet ...of virtual machine migration will be proposed which reduce chances of fault occurrence and also reduce resource consumption in the ...

5

Recognize and Monitor Kernel Virtualization Using Memory Heat Map

Recognize and Monitor Kernel Virtualization Using Memory Heat Map

... systems. Virtual machine security is very important in cloud computing, we have discussed various virtual machine architectures & its techniques to prevent malicious attacks in ...

6

A Review On optimization technique in Server
          Virtualization

A Review On optimization technique in Server Virtualization

... create virtual machines or virtual environments by using normal server hardware and a virtual machine ...software. Virtual machine software enables sharing physical hardware ...

5

Detection of repetitive and irregular hypercall attacks from guest virtual machines to Xen hypervisor

Detection of repetitive and irregular hypercall attacks from guest virtual machines to Xen hypervisor

... DomU. Also once Dom0 was compromised then attacker can’t access to private information of DomU. But they do not address DDoS attacks in their work. In another work [18] they design a secure execution environment to ...

10

EMBEDDING RАPIDMINER MODELS IN JAVA CODE

EMBEDDING RАPIDMINER MODELS IN JAVA CODE

... a virtual application or operating system in accordance with the original ...XenServer virtual machine to each virtual machine has a different configuration in resource allocation, the ...

6

Providing a Green Framework for Cloud Data Centers

Providing a Green Framework for Cloud Data Centers

... While virtualization provides many key advancements, this technol- ogy alone is not sufficient. Rather, a collective scheduling and manage- ment for virtual machines is required to piece together a working Cloud. ...

44

Operating System

Operating System

... In the multiprogramming, multiple processes are executing concurrently. Various processes must be protected from other processes. We have to protect our memory by means of register and limit register. Here one process is ...

10

IJCSMC, Vol. 3, Issue. 9, September 2014, pg.599 – 606 RESEARCH ARTICLE A Study of Data Management Technology for Handling Big Data

IJCSMC, Vol. 3, Issue. 9, September 2014, pg.599 – 606 RESEARCH ARTICLE A Study of Data Management Technology for Handling Big Data

... We have done setup of big data processing technology. Hadoop provides all project source code. It is easy to setup the big data processing environment using the virtual images. For a full working cluster it is ...

8

Improving Memory Reclamation Techniques in Hypervisors using Persistent Memory.

Improving Memory Reclamation Techniques in Hypervisors using Persistent Memory.

... Directly attached Persistent-memory devices can be used to provide quality of service guarantees to high priority guest operating systems. Providing Qos guarantees during memory reclamation is a way to ensure predictable ...

50

A Matchmaking Strategy Of Mixed Resource On Cloud Computing Environment

A Matchmaking Strategy Of Mixed Resource On Cloud Computing Environment

... Active Monitor (DWAM) Load Balance algorithm is a modification for the VM-assign Load Balance [23] and Active Monitoring Load Balancer [20] by assigning a dynamic weight to each ...

10

Container Live Migration using Docker Checkpoint and Restore

Container Live Migration using Docker Checkpoint and Restore

... A virtual machine is a software that emulates the function of the physical machine the virtual machine consists of emulated hardware and operating system and on top of it the ...

6

Hardware Virtualization for Low Cost Solutions in Education

Hardware Virtualization for Low Cost Solutions in Education

... Server virtualization is not a new concept. There are different levels of virtualization which we are used earlier like, An operating system support a virtual view of a machine to the processes running on ...

5

Show all 10000 documents...

Related subjects