To see the other types of publications on this topic, follow the link: Linux Containers.

Journal articles on the topic 'Linux Containers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Linux Containers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ashish, Lingayat, R. Badre2 Ranjana, and Kumar Gupta Anil. "Integration of Linux Containers in OpenStack: An Introspection." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1094–105. https://doi.org/10.11591/ijeecs.v12.i3.pp1094-1105.

Full text
Abstract:
In cloud computing, sharing of resources is supported using heavy weighted traditional virtualization techniques. Such techniques involve hypervisors to emulate hardware for creating virtual machines. The inclusion of an additional layer of hypervisor over host operating system depreciates the performance of the virtual machine. Recent evolution is a lightweight alternative to the virtual machine called containers which have gained popularity among developers and administrators. Container Based virtualization has proven very efficient regarding performance, and many industries are now migratin
APA, Harvard, Vancouver, ISO, and other styles
2

Lingayat, Ashish, Ranjana R. Badre, and Anil Kumar Gupta. "Integration of Linux Containers in OpenStack: An Introspection." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1094. http://dx.doi.org/10.11591/ijeecs.v12.i3.pp1094-1105.

Full text
Abstract:
<p>In cloud computing, sharing of resources is supported using heavy weighted traditional virtualization techniques. Such techniques involve hypervisors to emulate hardware for creating virtual machines. The inclusion of an additional layer of hypervisor over host operating system depreciates the performance of the virtual machine. Recent evolution is a lightweight alternative to the virtual machine called containers which have gained<br />popularity among developers and administrators. Container Based virtualization has proven very efficient regarding performance, and many industr
APA, Harvard, Vancouver, ISO, and other styles
3

Cavet, Cécile, Martin Souchal, Sébastien Gadrat, et al. "ComputeOps: Container for High Performance Computing." EPJ Web of Conferences 245 (2020): 07006. http://dx.doi.org/10.1051/epjconf/202024507006.

Full text
Abstract:
The High Performance Computing (HPC) domain aims to optimize code in order to use the latest multicore and parallel technologies including specific processor instructions. In this computing framework, portability and reproducibility are key concepts. A way to handle these requirements is to use Linux containers. These “light virtual machines” allow to encapsulate applications within its environment in Linux processes. Containers have been recently rediscovered due to their abilities to provide both multi-infrastructure environnement for developers and system administrators and reproducibility
APA, Harvard, Vancouver, ISO, and other styles
4

Lee, Kyungwoon, Youngpil Kim, and Chuck Yoo. "The Impact of Container Virtualization on Network Performance of IoT Devices." Mobile Information Systems 2018 (2018): 1–6. http://dx.doi.org/10.1155/2018/9570506.

Full text
Abstract:
Container-based virtualization offers advantages such as high performance, resource efficiency, and agile environment. These advantages make Internet of Things (IoT) device management easy. Although container-based virtualization has already been introduced to IoT devices, the different network modes of containers and their performance issues have not been addressed. Since the network performance is an important factor in IoT, the analysis of the container network performance is essential. In this study, we analyze the network performance of containers on an IoT device, Raspberry Pi 3. The res
APA, Harvard, Vancouver, ISO, and other styles
5

Nimmagadda, Srikanth. "Linux Namespaces and cgroups as OS Primitives for Lightweight Virtualization: Architecture, Isolation Mechanisms, and Performance Evaluation." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 9, no. 2 (2018): 811–22. https://doi.org/10.61841/turcomat.v9i2.15258.

Full text
Abstract:
Linux namespaces and control groups (cgroups) are key kernel primitives that enable lightweight virtualization by creating isolated environments called containers. These containers share the host kernel while maintaining process isolation and resource control, providing a balance between traditional hypervisor-based virtualization and bare-metal deployment. This paper examines the architecture, isolation mechanisms, and performance characteristics of namespaces and cgroups. We highlight how these features form the foundation of popular container technologies such as Docker and LXC, and compare
APA, Harvard, Vancouver, ISO, and other styles
6

Cavet, Cécile, Aurélien Bailly-Reyre, David Chamont, et al. "ComputeOps: containers for High Performance Computing." EPJ Web of Conferences 214 (2019): 07004. http://dx.doi.org/10.1051/epjconf/201921407004.

Full text
Abstract:
The High Performance Computing (HPC) domain aims to optimize code to use the latest multicore and parallel technologies including specific processor instructions. In this computing framework, portability and reproducibility are key concepts. A way to handle these requirements is to use Linux containers. These "light virtual machines" allow users to encapsulate applications within its environment in processes. Containers have been recently highlighted because they provide multi-infrastructure environnement for both developers and system administrators. Furthermore, they offer reproducibility du
APA, Harvard, Vancouver, ISO, and other styles
7

Alsaffar, Awse S., and Ayad H. Alezzy. "A Lightweight Portable Multithreaded Client-Server Docker Containers." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 10 (2022): 31–43. http://dx.doi.org/10.47577/technium.v4i10.7722.

Full text
Abstract:
In terms of diversity in operating systems, environments, and platforms, and with limited host infrastructure resources to hold all operating systems and platforms, the need arises to design applications that run in many or we can say in all operating systems and platforms. This paper deals with designing and implementing a lightweight multithreaded client-server application appears as a separate Docker container. Both client and server containers are based on alpine Linux and developed using Python programming language. The execution unit in the containers is Python program files. As a case s
APA, Harvard, Vancouver, ISO, and other styles
8

I Putu Agus Eka Pratama. "The implementation of Container as a Service (CaaS) cloud using openSUSE kubic." Global Journal of Engineering and Technology Advances 6, no. 1 (2021): 001–9. http://dx.doi.org/10.30574/gjeta.2021.6.1.0123.

Full text
Abstract:
Currently, software development based on Development and Operations (DevOps) generally uses containers and Cloud Computing to support portability, reliability, scalability, and security. One combination of these two technologies is Container as a Service (CaaS) Cloud. From a number of previous researches, no one has studied the technical implementation and deployment of CaaS using openSUSE Kubic based on the Linux kernel and Linux operating system, as well as testing in it using Pods from the service and replication side. The test results prove that openSUSE Kubic is very easy and reliable to
APA, Harvard, Vancouver, ISO, and other styles
9

I, Putu Agus Eka Pratama. "The implementation of Container as a Service (CaaS) cloud using openSUSE kubic." Global Journal of Engineering and Technology Advances 6, no. 1 (2021): 01–09. https://doi.org/10.5281/zenodo.4612147.

Full text
Abstract:
Currently, software development based on Development and Operations (DevOps) generally uses containers and Cloud Computing to support portability, reliability, scalability, and security. One combination of these two technologies is Container as a Service (CaaS) Cloud. From a number of previous researches, no one has studied the technical implementation and deployment of CaaS using openSUSE Kubic based on the Linux kernel and Linux operating system, as well as testing in it using Pods from the service and replication side. The test results prove that openSUSE Kubic is very easy and reliable to
APA, Harvard, Vancouver, ISO, and other styles
10

Šimon, Marek, Ladislav Huraj, and Nicolas Búčik. "A Comparative Analysis of High Availability for Linux Container Infrastructures." Future Internet 15, no. 8 (2023): 253. http://dx.doi.org/10.3390/fi15080253.

Full text
Abstract:
In the current era of prevailing information technology, the requirement for high availability and reliability of various types of services is critical. This paper focusses on the comparison and analysis of different high-availability solutions for Linux container environments. The objective was to identify the strengths and weaknesses of each solution and to determine the optimal container approach for common use cases. Through a series of structured experiments, basic performance metrics were collected, including average service recovery time, average transfer rate, and total number of faile
APA, Harvard, Vancouver, ISO, and other styles
11

Wan, Zhiyuan, David Lo, Xin Xia, and Liang Cai. "Practical and effective sandboxing for Linux containers." Empirical Software Engineering 24, no. 6 (2019): 4034–70. http://dx.doi.org/10.1007/s10664-019-09737-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Nuriev, Marat, Rimma Zaripova, Ramilya Tazieva, Shamil Gazetdinov, and Marat Valiev. "Designing a system call analyser for system calls used inside Linux containers." BIO Web of Conferences 138 (2024): 03025. http://dx.doi.org/10.1051/bioconf/202413803025.

Full text
Abstract:
This paper examines the development of a system call analyzer used within Linux containers, aiming to ensure security and enhance the performance of containerized applications. Containerization has become a vital aspect of modern software development and operations, enabling efficient isolation of applications and their dependencies. However, selecting a reliable image and analyzing vulnerabilities remain crucial tasks. The focus is on utilizing the ptrace system call and Berkeley Packet Filter technology to monitor and analyze system calls within containers. The developed system call detector
APA, Harvard, Vancouver, ISO, and other styles
13

Rivaldi, Ahmad, Ucuk Darusalam, and Deny Hidayatullah. "Perancangan Multi Node Web Server Menggunakan Docker Swarm dengan Metode Highavability." JURNAL MEDIA INFORMATIKA BUDIDARMA 4, no. 3 (2020): 529. http://dx.doi.org/10.30865/mib.v4i3.2147.

Full text
Abstract:
Container-based virtualization is very popular among programming development in a lightweight virtualization because where the Linux kernel can divide resource-using containers to prevent uninterrupted performance between And as a burden divider in tackling the many incoming bandwidth. One of the most commonly used container-based virtualization is Docker. Docker itself is an open source software that can be changed to your liking. Docker containers can be used for clustering Web servers. It aims to reduce "a single point of failure" (SPOF) in a Web server. However, arranging a lot of containe
APA, Harvard, Vancouver, ISO, and other styles
14

Pallavi, Priya Patharlagadda. "Persist Application Data using Docker and Kubernetes Volumes." Journal of Scientific and Engineering Research 5, no. 12 (2018): 388–95. https://doi.org/10.5281/zenodo.13758667.

Full text
Abstract:
Docker's many advantages have led to its rise in popularity. A virtual machine and a Docker container are comparable. In essence, Docker lets you use a pre-configured "Linux box" within a container. The Docker container shares the host operating system's Linux kernel. Hence, starting a Docker container is often a simple and inexpensive process. In most circumstances, starting a full Docker container (comparable to starting a regular virtual machine), takes about the same amount of time as running a standard command line program. Though it's a different paradigm from the typical virtual machine
APA, Harvard, Vancouver, ISO, and other styles
15

Barlev, S., Z. Basil, S. Kohanim, R. Peleg, S. Regev, and A. Shulman-Peleg. "Secure yet usable: Protecting servers and Linux containers." IBM Journal of Research and Development 60, no. 4 (2016): 12:1–12:10. http://dx.doi.org/10.1147/jrd.2016.2574138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Sobieraj, Maciej, and Daniel Kotyński. "Docker Performance Evaluation across Operating Systems." Applied Sciences 14, no. 15 (2024): 6672. http://dx.doi.org/10.3390/app14156672.

Full text
Abstract:
Docker has gained significant popularity in recent years. With the introduction of Docker Desktop for Windows and macOS, there is a need to determine the impact of the operating system on the performance of the Docker platform. This paper aims to investigate the performance of Docker containers based on the operating system. One of the fundamental goals of this study is to conduct a comprehensive analysis of the Docker architecture. This technology utilizes Linux kernel virtualization mechanisms such as namespaces and cgroups. Upon analyzing the distribution of Docker Desktop for Windows and D
APA, Harvard, Vancouver, ISO, and other styles
17

Leahy, Darragh, and Christina Thorpe. "Zero Trust Container Architecture (ZTCA)." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 111–20. http://dx.doi.org/10.34190/iccws.17.1.35.

Full text
Abstract:
Containerisation is quickly becoming an accepted industry standard for development environments and Gartner, in a recent market forecast, estimated that by 2022 more than 75% of organisations will be using containers in production deployments. With this explosion in growth comes an added focus on security and best practices for using containers. The use of containers, in particular Docker containers, has altered some of the more traditional deployment paradigms by giving control of deployments to the development teams. This has massively benefited the DevOps release cycle, but at the expense o
APA, Harvard, Vancouver, ISO, and other styles
18

Silva, Daniel, João Rafael, and Alexandre Fonte. "Toward Optimal Virtualization: An Updated Comparative Analysis of Docker and LXD Container Technologies." Computers 13, no. 4 (2024): 94. http://dx.doi.org/10.3390/computers13040094.

Full text
Abstract:
Traditional hypervisor-assisted virtualization is a leading virtualization technology in data centers, providing cost savings (CapEx and OpEx), high availability, and disaster recovery. However, its inherent overhead may hinder performance and seems not scale or be flexible enough for certain applications, such as microservices, where deploying an application using a virtual machine is a longer and resource-intensive process. Container-based virtualization has received attention, especially with Docker, as an alternative, which also facilitates continuous integration/continuous deployment (CI/
APA, Harvard, Vancouver, ISO, and other styles
19

Hong, Cheol-Ho, Kyungwoon Lee, Minkoo Kang, and Chuck Yoo. "qCon: QoS-Aware Network Resource Management for Fog Computing." Sensors 18, no. 10 (2018): 3444. http://dx.doi.org/10.3390/s18103444.

Full text
Abstract:
Fog computing is a new computing paradigm that employs computation and network resources at the edge of a network to build small clouds, which perform as small data centers. In fog computing, lightweight virtualization (e.g., containers) has been widely used to achieve low overhead for performance-limited fog devices such as WiFi access points (APs) and set-top boxes. Unfortunately, containers have a weakness in the control of network bandwidth for outbound traffic, which poses a challenge to fog computing. Existing solutions for containers fail to achieve desirable network bandwidth control,
APA, Harvard, Vancouver, ISO, and other styles
20

Marella, Venkat. "Enhancing Cloud Infrastructure Resilience through Kubernetes and Open Shift Cluster Management." International Journal of Computer Science and Mobile Computing 13, no. 12 (2024): 9–22. https://doi.org/10.47760/ijcsmc.2024.v13i12.002.

Full text
Abstract:
Over the last two decades, the IT sector has shifted from managing workloads on physical servers to virtualizing them and then further consolidating them into containers in the subsequent iteration. Later, Kubernetes or Open Shift were used to coordinate container workloads built on Docker and Podman. The use of containerization platforms for high-performance computing (HPC) settings, however, has been trailing behind since there is still much to learn. Containers provide flexibility, adaptability, and maintenance advantages, and they often have lower overhead. Additionally, by monitoring thei
APA, Harvard, Vancouver, ISO, and other styles
21

Calarco, G., and M. Casoni. "On the effectiveness of Linux containers for network virtualization." Simulation Modelling Practice and Theory 31 (February 2013): 169–85. http://dx.doi.org/10.1016/j.simpat.2012.11.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Dinkar, Anubhav, and Prakash Biswagar. "Analysis of Data Oriented Web Application Systems." Journal of University of Shanghai for Science and Technology 23, no. 05 (2021): 636–49. http://dx.doi.org/10.51201/jusst/21/05199.

Full text
Abstract:
The purpose of this paper is to study and analyse the various tools that are used in modern day web application systems, which include but are not limited to Flask, Django, PostgreSQL, MongoDB, Docker containers, virtual machines, and so on. The main aim is to allow users of these technologies to be able to choose the right technology based on their needs and the scale of their applications. This is done with the help of sysbench and Docker and Linux based containers, along with basic Flask and Django web applications. Flask could be preferred for simpler web applications over Django. Docker a
APA, Harvard, Vancouver, ISO, and other styles
23

Khalilnasl, Hossein, Paolo Ferrari, Alessandra Flammini, and Emiliano Sisinni. "On the Use of Containers for LoRaWAN Node Virtualization: Practice and Performance Evaluation." Electronics 14, no. 8 (2025): 1568. https://doi.org/10.3390/electronics14081568.

Full text
Abstract:
This paper investigates the virtualization of LoRaWAN end nodes through Linux containers (LXCs) to improve scalability, flexibility, and resource management. By leveraging lightweight Docker-based virtualization, we break down the core functions of the LoRaWAN node, comprising the application, LoRaWAN, and LoRa layers, into modular containers. In this work, a fully virtualized end node is demonstrated. The obtainable performance is not only compared against the standard approach that leverages a LoRaWAN-compliant module but also against an emulated solution that mimics the desired functionalit
APA, Harvard, Vancouver, ISO, and other styles
24

S Devarajulu, Vishnupriya. "Secure Integration: .NET Core Authentication with SQL Server in Linux Docker Containers." International Journal of Science and Research (IJSR) 12, no. 7 (2023): 2293–94. http://dx.doi.org/10.21275/sr24715234958.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Dykstra, Dave. "Apptainer Without Setuid." EPJ Web of Conferences 295 (2024): 07005. http://dx.doi.org/10.1051/epjconf/202429507005.

Full text
Abstract:
Apptainer (formerly known as Singularity) since its beginning implemented many of its container features with the assistance of a setuidroot program. It still supports that mode, but as of version 1.1.0 it no longer uses setuid by default. This is feasible because it now can mount squashfs filesystems, ext3 filesystems, and overlay filesystems using unprivileged user namespaces and FUSE. It also now enables unprivileged users to build containers, even without requiring system administrators to configure /etc/subuid and /etc/subgid unlike other “rootless” container systems. As a result, all the
APA, Harvard, Vancouver, ISO, and other styles
26

Daci, Genti. "Evaluation of performance of Solaris Trusted Extensions using containers technology." Perspectives of Innovations, Economics and Business 8, no. 2 (2011): 63–69. https://doi.org/10.15208/pieb.2011.32.

Full text
Abstract:
  Server and system administrators have been concerned about the techniques on how to better utilize their computing resources. Today, there are developed many technologies for this purpose, which consists of running multiple applications and also multiple operating systems on the same hardware, like VMWARE, Linux-VServer, VirtualBox, Xen, etc. These systems try to solve the problem of resource allocation from two main aspects: running multiple operating system instances and virtualizing the operating system environment. Our study presents an evaluation of scalability and performance of a
APA, Harvard, Vancouver, ISO, and other styles
27

Valenzuela, Andrea, and Jakob Blomer. "CernVM-FS ephemeral publishers on Kubernetes." Journal of Physics: Conference Series 2438, no. 1 (2023): 012014. http://dx.doi.org/10.1088/1742-6596/2438/1/012014.

Full text
Abstract:
Abstract The CernVM File System (CernVM-FS) is a global read-only POSIX file system that provides scalable and reliable software distribution to numerous scientific collaborations. It gives access to more than a billion binary files of experiment application software stacks and operating system containers to end user devices, grids, clouds, and supercomputers. CernVM-FS is asymmetric by construction. Writing into the repository is a centralized operation called publishing, while reading is allowed for many clients from many locations. The classic publishing process needs a dedicated “release m
APA, Harvard, Vancouver, ISO, and other styles
28

Abbes, Heithem, Thouraya Louati, and Christophe Cérin. "Dynamic replication factor model for Linux containers-based cloud systems." Journal of Supercomputing 76, no. 9 (2020): 7219–41. http://dx.doi.org/10.1007/s11227-020-03158-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Beserra, David, Edward David Moreno, Patricia Takako Endo, Jymmy Barreto, Stênio Fernandes, and Djamel Sadok. "Performance analysis of Linux containers for high performance computing applications." International Journal of Grid and Utility Computing 8, no. 4 (2017): 321. http://dx.doi.org/10.1504/ijguc.2017.088266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Fernandes, Stênio, Jymmy Barreto, Patricia Takako Endo, David Beserra, Edward David Moreno, and Djamel Sadok. "Performance analysis of Linux containers for high performance computing applications." International Journal of Grid and Utility Computing 8, no. 4 (2017): 321. http://dx.doi.org/10.1504/ijguc.2017.10009368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Kaliappan, Vishnu Kumar, Seungjin Yu, Rajasoundaran Soundararajan, Sangwoo Jeon, Dugki Min, and Enumi Choi. "High-Secured Data Communication for Cloud Enabled Secure Docker Image Sharing Technique Using Blockchain-Based Homomorphic Encryption." Energies 15, no. 15 (2022): 5544. http://dx.doi.org/10.3390/en15155544.

Full text
Abstract:
In recent years, container-based virtualization technology for edge and cloud computing has advanced dramatically. Virtualization solutions based on Docker Containers provide a more lightweight and efficient virtual environment for Edge and cloud-based applications. Because their use is growing on its own and is still in its early phases, these technologies will face a slew of security issues. Vulnerabilities and malware in Docker container images are two serious security concerns. The risk of privilege escalation is increased because Docker containers share the Linux kernel. This study presen
APA, Harvard, Vancouver, ISO, and other styles
32

Kawaguchi, Nobutaka, Charles Hart, and Hiroki Uchiyama. "Understanding the Effectiveness of SBOM Generation Tools for Manually Installed Packages in Docker Containers." Journal of Internet Services and Information Security 14, no. 3 (2024): 191–212. http://dx.doi.org/10.58346/jisis.2024.i3.011.

Full text
Abstract:
Software Bill of Materials (SBOM), which is a standardized format for the machine-readable list of components included in software, is a key technology for addressing software supply chain attacks. Since Docker containers, now prevalent for software distribution and deployment, typically consists of hundreds of packages, the use of automation tools to generate their SBOMs is recommended. Currently, several OSS-based SBOM generation tools are available, playing indispensable roles in automating SBOM utilization. Generally, the tools make use of information from several package managers and data
APA, Harvard, Vancouver, ISO, and other styles
33

Blomer, Jakob, Dave Dykstra, Gerardo Ganis, Simone Mosciatti, and Jan Priessnitz. "A fully unprivileged CernVM-FS." EPJ Web of Conferences 245 (2020): 07012. http://dx.doi.org/10.1051/epjconf/202024507012.

Full text
Abstract:
The CernVM File System provides the software and container distribution backbone for most High Energy and Nuclear Physics experiments. It is implemented as a file system in user-space (Fuse) module, which permits its execution without any elevated privileges. Yet, mounting the file system in the first place is handled by a privileged suid helper program that is installed by the Fuse package on most systems. The privileged nature of the mount system call is a serious hindrance to running CernVM-FS on opportunistic resource and supercomputers. Fortunately, recent developments in the Linux kernel
APA, Harvard, Vancouver, ISO, and other styles
34

Louati, Thouraya, Heithem Abbes, Christophe Cérin, and Mohamed Jemni. "LXCloud-CR: Towards LinuX Containers Distributed Hash Table based Checkpoint-Restart." Journal of Parallel and Distributed Computing 111 (January 2018): 187–205. http://dx.doi.org/10.1016/j.jpdc.2017.08.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Louati, Thouraya, Heithem Abbes, and Christophe Cérin. "LXCloudFT: Towards high availability, fault tolerant Cloud system based Linux Containers." Journal of Parallel and Distributed Computing 122 (December 2018): 51–69. http://dx.doi.org/10.1016/j.jpdc.2018.07.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Gomes, Jorge, Emanuele Bagnaschi, Isabel Campos, et al. "Enabling rootless Linux Containers in multi-user environments: The udocker tool." Computer Physics Communications 232 (November 2018): 84–97. http://dx.doi.org/10.1016/j.cpc.2018.05.021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Beňo, Lukáš, Rudolf Pribiš, and Peter Drahoš. "Edge Container for Speech Recognition." Electronics 10, no. 19 (2021): 2420. http://dx.doi.org/10.3390/electronics10192420.

Full text
Abstract:
Containerization has been mainly used in pure software solutions, but it is gradually finding its way into the industrial systems. This paper introduces the edge container with artificial intelligence for speech recognition, which performs the voice control function of the actuator as a part of the Human Machine Interface (HMI). This work proposes a procedure for creating voice-controlled applications with modern hardware and software resources. The created architecture integrates well-known digital technologies such as containerization, cloud, edge computing and a commercial voice processing
APA, Harvard, Vancouver, ISO, and other styles
38

Hacker, Joshua P., John Exby, David Gill, et al. "A Containerized Mesoscale Model and Analysis Toolkit to Accelerate Classroom Learning, Collaborative Research, and Uncertainty Quantification." Bulletin of the American Meteorological Society 98, no. 6 (2017): 1129–38. http://dx.doi.org/10.1175/bams-d-15-00255.1.

Full text
Abstract:
Abstract Numerical weather prediction (NWP) experiments can be complex and time consuming; results depend on computational environments and numerous input parameters. Delays in learning and obtaining research results are inevitable. Students face disproportionate effort in the classroom or beginning graduate-level NWP research. Published NWP research is generally not reproducible, introducing uncertainty and slowing efforts that build on past results. This work exploits the rapid emergence of software container technology to produce a transformative research and education environment. The Weat
APA, Harvard, Vancouver, ISO, and other styles
39

Bondarenko, Konstantin Andreevich, and Anatoliy Sergeev. "COMPARISON OF MEMORY PERFORMANCE OF DOCKER CONTAINERS AND THE LINUX OPERATING SYSTEM." Theoretical & Applied Science 140, no. 12 (2024): 121–32. https://doi.org/10.15863/tas.2024.12.140.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Witt, Michael, Christoph Jansen, Dagmar Krefting, and Achim Streit. "Sandboxing of biomedical applications in Linux containers based on system call evaluation." Concurrency and Computation: Practice and Experience 30, no. 12 (2018): e4484. http://dx.doi.org/10.1002/cpe.4484.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Fayos-Jordan, Rafael, Santiago Felici-Castell, Jaume Segura-Garcia, Adolfo Pastor-Aparicio, and Jesus Lopez-Ballester. "Elastic Computing in the Fog on Internet of Things to Improve the Performance of Low Cost Nodes." Electronics 8, no. 12 (2019): 1489. http://dx.doi.org/10.3390/electronics8121489.

Full text
Abstract:
The Internet of Things (IoT) is a network widely used with the purpose of connecting almost everything, everywhere to the Internet. To cope with this goal, low cost nodes are being used; otherwise, it would be very expensive to expand so fast. These networks are set up with small distributed devices (nodes) that have a power supply, processing unit, memory, sensors, and wireless communications. In the market, we can find different alternatives for these devices, such as small board computers (SBCs), e.g., Raspberry Pi (RPi)), with different features. Usually these devices run a coarse version
APA, Harvard, Vancouver, ISO, and other styles
42

Chae, MinSu, HwaMin Lee, and Kiyeol Lee. "A performance comparison of linux containers and virtual machines using Docker and KVM." Cluster Computing 22, S1 (2017): 1765–75. http://dx.doi.org/10.1007/s10586-017-1511-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Zhang, Datong, Yuhui Deng, Yi Zhou, Yifeng Zhu, and Xiao Qin. "Improving the Performance of Deduplication-Based Backup Systems via Container Utilization Based Hot Fingerprint Entry Distilling." ACM Transactions on Storage 17, no. 4 (2021): 1–23. http://dx.doi.org/10.1145/3459626.

Full text
Abstract:
Data deduplication techniques construct an index consisting of fingerprint entries to identify and eliminate duplicated copies of repeating data. The bottleneck of disk-based index lookup and data fragmentation caused by eliminating duplicated chunks are two challenging issues in data deduplication. Deduplication-based backup systems generally employ containers storing contiguous chunks together with their fingerprints to preserve data locality for alleviating the two issues, which is still inadequate. To address these two issues, we propose a container utilization based hot fingerprint entry
APA, Harvard, Vancouver, ISO, and other styles
44

Ouariach Soufiane, Khaldi Maha, Erradi Mohamed, and Khaldi Mohamed. "Implementation of the Moodle e-learning platform from server selection to configuration." GSC Advanced Engineering and Technology 1, no. 1 (2021): 016–25. http://dx.doi.org/10.30574/gscaet.2021.1.1.0023.

Full text
Abstract:
Through this article which concerns the implementation of the Moodle e-learning platform in a server, we will first present an example of a Web server architecture, then we propose the adopted architecture which is based on Linux containers. Afterwards, we propose a description of all the necessary tools chosen for the implementation of the platform in a Web server. Then, we propose through figures the installation of the different technological tools and the Moodle platform. Finally, we propose the configuration of our Moodle platform according to our needs.
APA, Harvard, Vancouver, ISO, and other styles
45

Aleksandrovs-Moisejs, Daniils, Aleksandrs Ipatovs, Elans Grabs, and Dmitrijs Rjazanovs. "Evaluation of a Long-Distance IEEE 802.11ah Wireless Technology in Linux Using Docker Containers." Elektronika ir Elektrotechnika 28, no. 3 (2022): 71–77. http://dx.doi.org/10.5755/j02.eie.31146.

Full text
Abstract:
Wireless technologies are essential for modern people to maintain uninterrupted connection to the Internet. The most popular standards for wireless technologies are standards of the IEEE 802.11 family. Currently, data transmission rate achievable by IEEE 802.11ac or 802.11ax standards can reach up to 10 Gbit/s. Different IEEE standards have specific data transmission rates. For example, the IEEE 802.11ah standard or Wi-Fi HaLow (code name) operates in the 900 MHz band, which is an unlicensed frequency band below 1 GHz, and is called the “Sub-1-GHz” range. In theory, this standard can provide c
APA, Harvard, Vancouver, ISO, and other styles
46

Marco, De Benedictis, and Lioy Antonio. "Integrity verification of Docker containers for a lightweight cloud environment." Future Generation Computer Systems 97 (July 3, 2019): 236–46. https://doi.org/10.5281/zenodo.3267028.

Full text
Abstract:
Virtualisation techniques are growing in popularity and importance, given their application to server consolidation and to cloud computing. Remote Attestation is a well-known technique to assess the software integrity of a node. It works well with physical platforms, but not so well with virtual machines hosted in a full virtualisation environment (such as the Xen hypervisor or Kernel-based Virtual Machine) and it is simply not available for a lightweight virtualisation environment (such as Docker). On the contrary, the latter is increasingly used, especially
APA, Harvard, Vancouver, ISO, and other styles
47

Song, Chunggeon, Heonchang Yu, and Eunyoung Lee. "CSS: Container Resource Manager Using System Call Pattern for Scientific Workflow." Applied Sciences 12, no. 16 (2022): 8228. http://dx.doi.org/10.3390/app12168228.

Full text
Abstract:
Multiple containers running scientific workflows in SMP-based high-performance computers generate some bottlenecks due to workload flexibility. To improve system resource utilization by minimizing these bottlenecks, vertical resource management is required to determine an appropriate resource usage policy according to the resource usage type of the container. However, the traditional methods have additional overhead for collecting monitoring metrics, and the structure of the resource manager is complex. In this paper, in order to compensate for these shortcomings, we propose CSS, a dynamic res
APA, Harvard, Vancouver, ISO, and other styles
48

Brik, Vladimir, David Schultz, and Gonzalo Merino. "Running IceCube GPU simulations on Titan." EPJ Web of Conferences 214 (2019): 03024. http://dx.doi.org/10.1051/epjconf/201921403024.

Full text
Abstract:
Here we report IceCube’s first experiences of running GPU simulations on the Titan supercomputer. This undertaking was non-trivial because Titan is designed for High Performance Computing (HPC) workloads, whereas IceCube’s workloads fall under the High Throughput Computing (HTC) category. In particular: (i) Titan’s design, policies, and tools are geared heavily toward large MPI applications, while IceCube’s workloads consist of large numbers of relatively small independent jobs, (ii) Titan compute nodes run Cray Linux, which is not directly compatible with IceCube software, and (iii) Titan com
APA, Harvard, Vancouver, ISO, and other styles
49

Cameron, David, Laurence Field, Frederik Van der Veken, et al. "All grown-up; 18 years of LHC@home." EPJ Web of Conferences 295 (2024): 04004. http://dx.doi.org/10.1051/epjconf/202429504004.

Full text
Abstract:
LHC@home was launched as a BOINC project in 2004 as an outreach project for CERN’s 50 years anniversary. Initially focused on the accelerator physics simulation code SixTrack, the project was expanded in 2011 to run other physics simulation codes on Linux thanks to virtualisation. Later on the experiment and theory applications running on the LHC@home platform have evolved to use containers and take advantage of the CVMFS file system as well as content delivery networks. Furthermore, a substantial part of the contributed computing capacity nowadays is provided as opportunistic back-fill from d
APA, Harvard, Vancouver, ISO, and other styles
50

Delbugio, Juan Martinez, and Vijay K. Madisetti. "Enhanced Memory-Safe Linux Security Modules (eLSMs) for Improving Security of Docker Containers for Data Centers." Journal of Software Engineering and Applications 17, no. 05 (2024): 259–69. http://dx.doi.org/10.4236/jsea.2024.175015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!