The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
High assurance MILS and MLS systems require strict limitation of the interactions between different security compartments based on a security policy. Virtualization can be used to provide a high degree of separation in such systems. Even with perfect isolation, however, the I/O devices are shared between different security compartments. Among the I/O controllers, the graphics subsystem is the largest...
Our approach is to design and implement a continual migration strategy for virtual machines to achieve automatic failure recovery. By continually and transparently propagating virtual machine's state to a backup host via live migration techniques, trivial applications encapsulated in the virtual machine can be recovered from hardware failures with minimal downtime while no modifications are required...
Energy efficiency in the field of information and communication technology becomes increasingly important due to the increase in energy costs and the desire to reduce CO2 emissions. Office environments of public administration and companies promise high potential in terms of energy saving. In such environments a high number of hosts are operating on a 24/7 basis. This paper suggests an Energy-Efficient...
Traditional test methods of embedded system software impose on the object system and the result of the test are not accurate enough as expected. Non-interference test method (NITM) can solve the problem. Not same with the traditional test methods, NITM is completely non-interference to the object software, does not add any instructions executed only within the test round into the object program. By...
Server virtualization is a key technology for today's data centers, allowing dedicated hardware to be turned into resources that can be used on demand.However, in spite of its important role, the overall security impact of virtualization is not well understood.To remedy this situation, we have performed a systematic literature review on the security effects of virtualization. Our study shows that,...
I/O virtualizations especially NIC ones is a hot spot in the research filed. In order to utilize the global NIC resources deployed in the distributed virtual machine monitor system, this paper proposes a new approach to implement the NIC virtualization for DVMM. The approach is implemented by the hybrid of hardware-assisted virtualization and the single system image technologies, and resides in the...
The decreasing structure size of VLSI technology features a lot of chances to processor designers but it also brings many risks. Most of these risks stem from the manufacturing process and lead to an increased number of chips with defects which are uniformly distributed over the wafer. Other problems arise during the uptime of the system because of thermal effects or radiation. Happily, one of the...
The configuration complexity of preproduction sites coupled with access-control mechanisms often impede the software development life cycle. Virtualization is a cost-effective way to remove such barriers and provide a test environment similar to the production site, reducing the burden in IT administrators. An eclipse-based virtualization tool framework can offer developers a personal runtime environment...
System-level virtualization provides us various advantages including independent and isolated computing environments on which multiple operating systems can be executed, and improved resource utilization. These benefits come with performance overheads and network operation is one of most typical cases. In this paper, we first present the experimental results of network performance with LRO under varying...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.