Academic literature on the topic 'Computer virtualization'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer virtualization.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer virtualization"
Soni, Soni, Abdurrahman Abdurrahman, and Afdhil Hafid. "OPTIMALISASI SUMBER DAYA KOMPUTER DENGAN VIRTUALISASI SERVER MENGGUNAKAN PROXMOX VE." JURNAL FASILKOM 9, no. 2 (August 11, 2019): 369–76. http://dx.doi.org/10.37859/jf.v9i2.1394.
Full textKotsovinos, Evangelos. "Virtualization." Communications of the ACM 54, no. 1 (January 2011): 61–65. http://dx.doi.org/10.1145/1866739.1866754.
Full textDouglis, Fred, and Orran Krieger. "Virtualization." IEEE Internet Computing 17, no. 2 (March 2013): 6–9. http://dx.doi.org/10.1109/mic.2013.42.
Full textSudyana, Didik, Reza Tanujiwa Putra, and Soni Soni. "Digital Forensics Investigation on Proxmox Server Virtualization Using SNI 27037:2014." Sinkron 3, no. 2 (March 9, 2019): 67–72. http://dx.doi.org/10.33395/sinkron.v3i2.10029.
Full textBurcea, Ioana, Stephen Somogyi, Andreas Moshovos, and Babak Falsafi. "Predictor virtualization." ACM SIGPLAN Notices 43, no. 3 (March 25, 2008): 157–67. http://dx.doi.org/10.1145/1353536.1346301.
Full textLv, Hui, Yaozu Dong, Jiangang Duan, and Kevin Tian. "Virtualization challenges." ACM SIGPLAN Notices 47, no. 7 (September 5, 2012): 15–26. http://dx.doi.org/10.1145/2365864.2151030.
Full textDuport, Francois, Anteo Smerieri, Akram Akrout, Marc Haelterman, and Serge Massar. "Virtualization of a Photonic Reservoir Computer." Journal of Lightwave Technology 34, no. 9 (May 1, 2016): 2085–91. http://dx.doi.org/10.1109/jlt.2016.2524559.
Full textSpirin, Oleg M., and Olena S. Holovnia. "ЗАСТОСУВАННЯ ТЕХНОЛОГІЙ ВІРТУАЛІЗАЦІЇ UNIX-ПОДІБНИХ ОПЕРАЦІЙНИХ СИСТЕМ У ПІДГОТОВЦІ БАКАЛАВРІВ ІНФОРМАТИКИ." Information Technologies and Learning Tools 65, no. 3 (July 1, 2018): 201. http://dx.doi.org/10.33407/itlt.v65i3.2055.
Full textSong, Meng Hua. "Analysis of Risks for Virtualization Technology." Applied Mechanics and Materials 539 (July 2014): 374–77. http://dx.doi.org/10.4028/www.scientific.net/amm.539.374.
Full textV. Anbazhagu, U., P. Maheshwaran, K. S. Archana, and Sheela Gowr. "A study on competence and enrichment of virtualization in cloud computing." International Journal of Engineering & Technology 7, no. 2.21 (April 20, 2018): 345. http://dx.doi.org/10.14419/ijet.v7i2.21.12401.
Full textDissertations / Theses on the topic "Computer virtualization"
Southern, Gabriel. "Symmetric multiprocessing virtualization." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3225.
Full textVita: p. 77. Thesis director: David Hwang. Submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Engineering. Title from PDF t.p. (viewed Aug. 28, 20088). Includes bibliographical references (p. 73-76). Also issued in print.
Pelletingeas, Christophe. "Performance evaluation of virtualization with cloud computing." Thesis, Edinburgh Napier University, 2010. http://researchrepository.napier.ac.uk/Output/4010.
Full textKoppe, Jason. "Differential virtualization for large-scale system modeling /." Online version of thesis, 2008. http://hdl.handle.net/1850/7543.
Full textPham, Duy M. "Performance comparison between x86 virtualization technologies." Thesis, California State University, Long Beach, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1528024.
Full textIn computing, virtualization provides the capability to service users with different resource requirements and operating system platform needs on a single host computer system. The potential benefits of virtualization include efficient resource utilization, flexible service offering, as well as scalable system planning and expansion, all desirable whether it is for enterprise level data centers, personal computing, or anything in between. These benefits, however, involve certain costs of performance degradation. This thesis compares the performance costs between two of the most popular and widely-used x86 CPU-based virtualization technologies today in personal computing. The results should be useful for users when determining which virtualization technology to adopt for their particular computing needs.
Jensen, Deron Eugene. "System-wide Performance Analysis for Virtualization." PDXScholar, 2014. https://pdxscholar.library.pdx.edu/open_access_etds/1789.
Full textNarayanan, Sivaramakrishnan. "Efficient Virtualization of Scientific Data." The Ohio State University, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=osu1221079391.
Full textJohansson, Marcus, and Lukas Olsson. "Comparative evaluation of virtualization technologies in the cloud." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-49242.
Full textAthreya, Manoj B. "Subverting Linux on-the-fly using hardware virtualization technology." Thesis, Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34844.
Full textChen, Wei. "Light-Weight Virtualization Driven Runtimes for Big Data Applications." Thesis, University of Colorado Colorado Springs, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13862451.
Full textDatacenters are evolving to host heterogeneous Big Data workloads on shared clusters to reduce the operational cost and achieve higher resource utilization. However, it is challenging to schedule heterogeneous workloads with diverse resource requirements and QoS constraints. For example, when consolidating latency critical jobs and best-effort batch jobs in the same cluster, latency critical jobs may suffer from long queuing delay if their resource requests cannot be met immediately; while best-effort jobs would suffer from killing overhead when preempted. Moreover, resource contention may harm task performance running on worker nodes. Since resource requirements for diverse applications show heterogeneity and is not known before task execution, either the cluster manager has to over-provision resources for all incoming applications resulting in low cluster utilization; or applications may experience performance slowdown or even failure due to resource insufficiency. Existing approaches focus on either application awareness or system awareness and fail to address the semantic gap between the application layer and the system layer (e.g., OS scheduling mechanisms or cloud resource allocators).
To address these issues, we propose to attack these problems from a different angle. In other words, applications and underlying systems should cooperate synergistically. This this way, the resource demands of application can be exposed to the system. At the same time, application schedulers can be assisted with more runtimes of the system layer and perform more dedicated scheduling. However, the system and application co-design is challenging. First, the real resource demands for an application is hard to be predicted since its requirements vary during its lifetime. Second, there are tons of information generated from system layers (e.g., OS process schedulers or hardware counters), from which it is hard to associate these information to a dedicated task. Fortunately, with the help of lightweight virtualization, applications could run in isolated containers such that system level runtime information can be collected at the container level. The rich APIs of container based virtualization also enable to perform more advanced scheduling.
In this thesis, we focus on efficient and scalable techniques in datacenter scheduling by leveraging lightweight virtualization. Our thesis is two folds. First, we focus on profiling and optimizing the performance of Big Data applications. In this aspect, we built a tool to trace the scheduling delay for low-latency online data analytics workloads. We further built a map execution engine to address the performance heterogeneity for MapReduce. Second, we focus on leveraging OS containers to build advanced cluster scheduling mechanisms. In that, we built a preemptive cluster scheduler, an elastic memory manager and an OOM killer for Big Data applications. We also conducted a supplementary research on tracing the performance of Big Data training on TensorFlow.
We conducted extensive evaluations of the proposed projects in a real-world cluster. The experimental results demonstrate the effectiveness of proposed approaches in terms of improving performance and utilization of Big Data clusters.
WENG, LI. "Automatic and efficient data virtualization system for scientific datasets." The Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=osu1154717945.
Full textBooks on the topic "Computer virtualization"
1971-, Newman Amy, ed. Practical virtualization solutions: Virtualization from the trenches. Upper Saddle River, NJ: Prentice Hall/Pearson Education, 2010.
Find full textHess, Kenneth. Practical virtualization solutions: Virtualization from the trenches. Upper Saddle River, NJ: Prentice Hall/Pearson Education, 2010.
Find full textHess, Kenneth. Practical virtualization solutions: Virtualization from the trenches. Upper Saddle River, NJ: Prentice Hall, 2009.
Find full textHagen, William Von. Professional Xen Virtualization. New York: John Wiley & Sons, Ltd., 2008.
Find full textBabette, Haeusser, and International Business Machines Corporation. International Technical Support Organization., eds. IBM Virtualization engine TS7700: Tape virtualization for System Z servers. 2nd ed. [Poughkeepsie, N.Y.]: International Technical Support Organization, 2008.
Find full textBook chapters on the topic "Computer virtualization"
Kizza, Joseph Migga. "Virtualization Security." In Guide to Computer Network Security, 473–90. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_22.
Full textAngepat, Hari, Derek Chiou, Eric S. Chung, and James C. Hoe. "Simulation Virtualization." In FPGA-Accelerated Simulation of Computer Systems, 31–44. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-031-01744-5_4.
Full textKizza, Joseph Migga. "Virtualization Technology and Security." In Texts in Computer Science, 459–76. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_21.
Full textKizza, Joseph Migga. "Virtualization Technology and Security." In Guide to Computer Network Security, 457–75. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_21.
Full textKazim, Muhammad, and Shao Ying Zhu. "Virtualization Security in Cloud Computing." In Computer Communications and Networks, 51–63. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25988-8_4.
Full textChen, Chen, Zhuyun Qi, Yirui Liu, and Kai Lei. "Using Virtualization for Blockchain Testing." In Lecture Notes in Computer Science, 289–99. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73830-7_29.
Full textWang, Xiaolin, Lingmei Weng, Zhenlin Wang, and Yingwei Luo. "Towards Eliminating Memory Virtualization Overhead." In Lecture Notes in Computer Science, 295–306. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45293-2_22.
Full textJohanssen, Michael. "Update on System Virtualization Management." In Communications in Computer and Information Science, 125–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88708-9_13.
Full textLoganayagi, B., and S. Sujatha. "Improving Cloud Security through Virtualization." In Communications in Computer and Information Science, 442–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24043-0_45.
Full textDanciu, Vitalian A., and Martin G. Metzker. "On I/O Virtualization Management." In Communications in Computer and Information Science, 75–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14944-3_9.
Full textConference papers on the topic "Computer virtualization"
Arslan, Ibrahim, and Izzet Gokhan Ozbilgin. "Virtualization and security: Examination of a virtualization platform structure." In 2017 International Conference on Computer Science and Engineering (UBMK). IEEE, 2017. http://dx.doi.org/10.1109/ubmk.2017.8093379.
Full textAlaluna, Max, Nuno Neves, and Fernando M. V. Ramos. "Elastic Network Virtualization." In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications. IEEE, 2020. http://dx.doi.org/10.1109/infocom41043.2020.9155287.
Full text"Application of Virtualization Technology in Computer Experiments." In 2017 International Conference on Materials, Energy, Civil Engineering and Computer. Francis Academic Press, 2017. http://dx.doi.org/10.25236/matecc.2017.21.
Full textTsao, Po-Jui, Yi-Feng Sun, Li-Han Chen, and Chuan-Yu Cho. "Efficient Virtualization-Based Fault Tolerance." In 2016 International Computer Symposium (ICS). IEEE, 2016. http://dx.doi.org/10.1109/ics.2016.0031.
Full textAbdElRahem, Omnia, Ayman M. Bahaa-Eldin, and Ayman Taha. "Virtualization security: A survey." In 2016 11th International Conference on Computer Engineering & Systems (ICCES). IEEE, 2016. http://dx.doi.org/10.1109/icces.2016.7821971.
Full textVolpano, Dennis. "Modular network function virtualization." In 2017 IEEE Conference on Computer Communications: Workshops (INFOCOM WKSHPS). IEEE, 2017. http://dx.doi.org/10.1109/infcomw.2017.8116499.
Full textZacharov, I., O. Panarin, E. Ryabinkin, K. Izotov, and A. Teslyuk. "Virtualization for Scientific Workload." In 2018 International Scientific and Technical Conference Modern Computer Network Technologies (MoNeTeC). IEEE, 2018. http://dx.doi.org/10.1109/monetec.2018.8572238.
Full textReeser, Jon, Thomas Jankowski, and Greg M. Kemper. "Maintaining HMI and SCADA systems through computer virtualization." In 2014 IEEE-IAS/PCA Cement Industry Technical Conference. IEEE, 2014. http://dx.doi.org/10.1109/citcon.2014.6820114.
Full textSayed, Suzan M., Shawky E. Shaaban, and El-Sayed A. M. El-Badawy. "LTE Network Virtualization Feasibility Study." In 2014 International Conference on Computer & Communication Engineering (ICCCE). IEEE, 2014. http://dx.doi.org/10.1109/iccce.2014.54.
Full textEgi, Norbert, Adam Greenhalgh, Mark Handley, Mickael Hoerdt, Laurent Mathy, and Tim Schooley. "Evaluating Xen for Router Virtualization." In 2007 16th International Conference on Computer Communications and Networks. IEEE, 2007. http://dx.doi.org/10.1109/icccn.2007.4317993.
Full textReports on the topic "Computer virtualization"
Wheeler, Christopher. Virtualization Shares: Feasibility and Implementation in the USNA Computer Science Department. Fort Belvoir, VA: Defense Technical Information Center, March 2010. http://dx.doi.org/10.21236/ada532377.
Full textSemerikov, Serhiy, Viacheslav Osadchyi, and Olena Kuzminska. Proceedings of the 1st Symposium on Advances in Educational Technology - Volume 2: AET. SciTePress, 2022. http://dx.doi.org/10.31812/123456789/7011.
Full text