Search results for "Virtualization"

showing 10 items of 54 documents

Wireless NoC for Inter-FPGA Communication: Theoretical Case for Future Datacenters

2020

Integration of FPGAs in datacenters might have different motivations from acceleration to energy efficiency, but the goal of better performance tops all. FPGAs are being utilized in a variety of ways today, tightly coupled with heterogenous computing resources, and as a standalone network of homogenous resources. Open source software stacks, propriety tool chain, and programming languages with advanced methodologies are hitting hard on the programmability wall of the FPGAs. The deployment of FPGAs in datacenters will neither be sustainable nor economical, without realizing the multi-tenancy in multiple FPGAs. Inter-FPGA communication among multiple FPGAs remained relatively less addressed p…

020203 distributed computingComputer sciencebusiness.industryWireless networkDistributed computingCloud computing02 engineering and technologyVirtualizationcomputer.software_genreBottleneck020202 computer hardware & architectureSoftware deployment0202 electrical engineering electronic engineering information engineeringWireless[INFO]Computer Science [cs]businessField-programmable gate arraycomputerComputingMilieux_MISCELLANEOUSEfficient energy use2020 IEEE 23rd International Multitopic Conference (INMIC)
researchProduct

Exploring Virtual Reality as an Integrated Development Environment for Cyber-Physical Systems

2019

Cyber Physical Systems (CPS) development approaches tend to start from the physical (hardware) perspective, and the software is the final element in the process. However, this approach is unfit for the more software-intensive world that is increasingly iterative, connected, and constantly online. Many constraints prevent the application of iterative, incremental, and agile development methodologies, which now are the norm for many other fields of software. Time-consuming system validation can only start when both hardware and software components are ready, which implies that the software delivery and quality is almost always the final bottleneck in the CPS development and integration. Also …

0209 industrial biotechnologybusiness.industryComputer scienceProcess (engineering)Integrated softwareeducationCyber-physical system020207 software engineering02 engineering and technologyVirtualizationcomputer.software_genre113 Computer and information sciencesBottleneck020901 industrial engineering & automationSoftwareComponent-based software engineering0202 electrical engineering electronic engineering information engineeringbusinessSoftware engineeringcomputerAgile software development
researchProduct

Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot

2020

Memory acquisition is a tool used in advanced forensics and malware analysis. Various methods of memory acquisition exist. Such solutions are ranging from tools based on dedicated hardware to software-only solutions. We proposed a hypervisor based memory acquisition tool. [22]. Our method supports ASLR and Modern operating systems which is an innovation compared to past methods [27, 36]. We extend the hypervisor assisted memory acquisition by adding mass storage device honeypots for the malware to cross and propose hiding the hypervisor using bluepill technology.

021110 strategic defence & security studiesAtomicitySoftware_OPERATINGSYSTEMSHoneypotComputer science0211 other engineering and technologiesHypervisor02 engineering and technologycomputer.software_genreVirtualizationMemory forensicsMass storage0202 electrical engineering electronic engineering information engineeringOperating systemMalware020201 artificial intelligence & image processingMalware analysiscomputer
researchProduct

Efficient Protection for VDI Workstations

2019

Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…

021110 strategic defence & security studiesCPU power dissipationWorkstationComputer sciencebusiness.industry0211 other engineering and technologiesControl softwareSingle serverCloud computing02 engineering and technologycomputer.software_genreVirtualizationlaw.inventionlawControl system0202 electrical engineering electronic engineering information engineeringOperating system020201 artificial intelligence & image processingSingle-corebusinesscomputer2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
researchProduct

GSaaS: A Service to Cloudify and Schedule GPUs

2018

Cloud technology is an attractive infrastructure solution that provides customers with an almost unlimited on-demand computational capacity using a pay-per-use approach, and allows data centers to increase their energy and economic savings by adopting a virtualized resource sharing model. However, resources such as graphics processing units (GPUs), have not been fully adapted to this model. Although, general-purpose computing on graphics processing units (GPGPU) is becoming more and more popular, cloud providers lack of flexibility to manage accelerators, because of the extended use of peripheral component interconnect (PCI) passthrough techniques to attach GPUs to virtual machines (VMs). F…

0301 basic medicineScheduleGeneral Computer ScienceComputer scienceDistributed computingnetworkingCloud computing02 engineering and technologycomputer.software_genre03 medical and health sciencesGPU resource management020204 information systems0202 electrical engineering electronic engineering information engineeringCloud computingGeneral Materials ScienceResource managementplatform virtualizationbusiness.industrycloud computingGeneral EngineeringVirtualizationShared resource030104 developmental biologyVirtual machineScalabilityGPU cloudificationlcsh:Electrical engineering. Electronics. Nuclear engineeringGeneral-purpose computing on graphics processing unitsbusinesscomputerlcsh:TK1-9971IEEE Access
researchProduct

Towards Service-oriented 5G: Virtualizing the Networks for Everything-as-a-Service

2018

It is widely acknowledged that the forthcoming 5G architecture will be highly heterogeneous and deployed with a high degree of density. These changes over the current 4G bring many challenges on how to achieve an efficient operation from the network management perspective. In this article, we introduce a revolutionary vision of the future 5G wireless networks, in which the network is no longer limited by hardware or even software. Specifically, by the idea of virtualizing the wireless networks, which has recently gained increasing attention, we introduce the Everything-as-a-Service (XaaS) taxonomy to light the way towards designing the service-oriented wireless networks. The concepts, chall…

Big Datawireless networksNetworking and Internet Architecture (cs.NI)FOS: Computer and information sciencesvirtualisointisoftware5G-tekniikkawireless network virtualizationEverything-as-a-servicevirtualizationComputer Science - Networking and Internet Architecture5G technologyvirtualisation5G mobile communicationhardwarelcsh:Electrical engineering. Electronics. Nuclear engineeringeverything-as-a-servicecomputer architecturelcsh:TK1-99715Glangattomat verkot
researchProduct

Hypervisor-based Protection of Code

2019

The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…

Computer Networks and CommunicationsComputer science0211 other engineering and technologiesCryptography02 engineering and technologysecurityComputer securitycomputer.software_genreEncryptionkryptografiaObfuscationCode (cryptography)tietoturvavirtual machine monitorsSafety Risk Reliability and QualitySystem bustrusted platform moduleta113021110 strategic defence & security studiescode protectioncryptographybusiness.industryHypervisorVirtualizationObfuscation (software)businesscomputerIEEE Transactions on Information Forensics and Security
researchProduct

Performance comparison of container orchestration platforms with low cost devices in the fog, assisting Internet of Things applications

2020

Abstract In the last decade there has been an increasing interest and demand on the Internet of Things (IoT) and its applications. But, when a high level of computing and/or real time processing is required for these applications, different problems arise due to their requirements. In this context, low cost autonomous and distributed Small Board Computers (SBC) devices, with processing, storage capabilities and wireless communications can assist these IoT networks. Usually, these SBC devices run an operating system based on Linux. In this scenario, container-based technologies and fog computing are an interesting approach and both have led to a new paradigm in how devices cooperate, improvi…

Computer Networks and CommunicationsComputer sciencebusiness.industryDistributed computing020206 networking & telecommunications02 engineering and technologyLoad balancing (computing)Virtualizationcomputer.software_genreNetwork topologyComputer Science ApplicationsHardware and ArchitecturePerformance comparisonScalability0202 electrical engineering electronic engineering information engineeringWireless020201 artificial intelligence & image processingOrchestration (computing)businessInternet of ThingscomputerJournal of Network and Computer Applications
researchProduct

Incentive Mechanism for Resource Allocation in Wireless Virtualized Networks with Multiple Infrastructure Providers

2020

To accommodate the explosively growing demands for mobile traffic service, wireless network virtualization is proposed as the main evolution towards 5G. In this work, a novel contract theoretic incentive mechanism is proposed to study how to manage the resources and provide services to the users in the wireless virtualized networks. We consider that the infrastructure providers (InPs) own the physical networks and the mobile virtual network operator (MVNO) has the service information of the users and needs to lease the physical radio resources for providing services. In particular, we utilize the contract theoretic approach to model the resource trading process between the MVNO and multiple…

Computer Networks and CommunicationsComputer sciencewireless virtualized networkcontract theory02 engineering and technologyresursointicomputer.software_genreresurssitallokointiResource (project management)0202 electrical engineering electronic engineering information engineeringWirelessResource managementElectrical and Electronic EngineeringVirtual networkuser associationbusiness.industryWireless network020206 networking & telecommunicationsVirtualizationpower allocationResource allocationbusinesscomputerSoftware5Glangattomat verkotkannustimetComputer network
researchProduct

Executable Data Quality Models

2017

The paper discusses an external solution for data quality management in information systems. In contradiction to traditional data quality assurance methods, the proposed approach provides the usage of a domain specific language (DSL) for description data quality models. Data quality models consists of graphical diagrams, which elements contain requirements for data object's values and procedures for data object's analysis. The DSL interpreter makes the data quality model executable therefore ensuring measurement and improving of data quality. The described approach can be applied: (1) to check the completeness, accuracy and consistency of accumulated data; (2) to support data migration in c…

Computer scienceData transformation02 engineering and technologycomputer.software_genreData modeling0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringInformation systemLogical data modelGeneral Environmental ScienceData elementDatabaseInformation qualityData warehouseData mapping020303 mechanical engineering & transportsData modelData qualityGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingData pre-processingData architectureData miningSoftware architecturecomputerData migrationData virtualizationProcedia Computer Science
researchProduct