To see the other types of publications on this topic, follow the link: OS-level virtualization.

Journal articles on the topic 'OS-level virtualization'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 18 journal articles for your research on the topic 'OS-level virtualization.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shan, Zhiyong, Xin Wang, Tzi-cker Chiueh, and Xiaofeng Meng. "Facilitating inter-application interactions for OS-level virtualization." ACM SIGPLAN Notices 47, no. 7 (2012): 75–86. http://dx.doi.org/10.1145/2365864.2151036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhiyong Shan, Xin Wang, and Tzi-cker Chiueh. "Shuttle: Facilitating Inter-Application Interactions for OS-Level Virtualization." IEEE Transactions on Computers 63, no. 5 (2014): 1220–33. http://dx.doi.org/10.1109/tc.2012.297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Renner, Thomas, Marius Meldau, and Andreas Kliem. "Edge Resource Utilization Using OS-Level Virtualization on Smart Devices." Software Networking 2016, no. 1 (2016): 75–96. http://dx.doi.org/10.13052/jsn2445-9739.2016.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Masood, Anum, Muhammad Sharif, Mussarat Yasmin, and Mudassar Raza. "Virtualization Tools and Techniques: Survey." Nepal Journal of Science and Technology 15, no. 2 (2015): 141–50. http://dx.doi.org/10.3126/njst.v15i2.12131.

Full text
Abstract:
Virtualization is a technique in which the user required services run remotely in a ubiquitous environment which gives scalable resources. Virtualization is being used in cloud computing for load balancing and aggregation of cloud resources. Virtualization provides higher hardware utilization. It is also being used for partitioning of computational resources and hence supports sharing of resources. Virtualization has different types such as Native virtualization, Full virtualization, Operating system level virtualization and Para virtualization. Other than these there is Resources virtualizati
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, Sang-Hun, Jong-Seo Kim, Jong-Soo Seok, and Hyun-Wook Jin. "Virtualization of Industrial Real-Time Networks for Containerized Controllers." Sensors 19, no. 20 (2019): 4405. http://dx.doi.org/10.3390/s19204405.

Full text
Abstract:
The virtualization technology has a great potential to improve the manageability and scalability of industrial control systems, as it can host and consolidate computing resources very efficiently. There accordingly have been efforts to utilize the virtualization technology for industrial control systems, but the research for virtualization of traditional industrial real-time networks, such as Controller Area Network (CAN), has been done in a very limited scope. Those traditional fieldbuses have distinguished characteristics from well-studied Ethernet-based networks; thus, it is necessary to st
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Shuhui, Xiangxu Meng, Lianhai Wang, Lijuan Xu, and Xiaohui Han. "Secure Virtualization Environment Based on Advanced Memory Introspection." Security and Communication Networks 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/9410278.

Full text
Abstract:
Most existing virtual machine introspection (VMI) technologies analyze the status of a target virtual machine under the assumption that the operating system (OS) version and kernel structure information are known at the hypervisor level. In this paper, we propose a model of virtual machine (VM) security monitoring based on memory introspection. Using a hardware-based approach to acquire the physical memory of the host machine in real time, the security of the host machine and VM can be diagnosed. Furthermore, a novel approach for VM memory forensics based on the virtual machine control structu
APA, Harvard, Vancouver, ISO, and other styles
7

Choi, Jin-young, Minkyoung Cho, and Jik-Soo Kim. "Employing Vertical Elasticity for Efficient Big Data Processing in Container-Based Cloud Environments." Applied Sciences 11, no. 13 (2021): 6200. http://dx.doi.org/10.3390/app11136200.

Full text
Abstract:
Recently, “Big Data” platform technologies have become crucial for distributed processing of diverse unstructured or semi-structured data as the amount of data generated increases rapidly. In order to effectively manage these Big Data, Cloud Computing has been playing an important role by providing scalable data storage and computing resources for competitive and economical Big Data processing. Accordingly, server virtualization technologies that are the cornerstone of Cloud Computing have attracted a lot of research interests. However, conventional hypervisor-based virtualization can cause pe
APA, Harvard, Vancouver, ISO, and other styles
8

V, Dr Kiran, Akshay Narayan Pai, and Gautham S. "Performance Analysis of Virtual Machine in Cloud Architecture." Journal of University of Shanghai for Science and Technology 23, no. 07 (2021): 924–29. http://dx.doi.org/10.51201/jusst/21/07210.

Full text
Abstract:
Cloud computing is a technique for storing and processing data that makes use of a network of remote servers. Cloud computing is gaining popularity due to its vast storage capacity, ease of access, and diverse variety of services. When cloud computing advanced and technologies such as virtual machines appeared, virtualization entered the scene. When customers’ computing demands for storage and servers increased, however, virtual machines were unable to match those expectations due to scalability and resource allocation limits. As a consequence, containerization became a reality. Containerizati
APA, Harvard, Vancouver, ISO, and other styles
9

Torres, Gildo, and Chen Liu. "Adaptive Virtual Machine Management in the Cloud." International Journal of Systems and Service-Oriented Engineering 4, no. 2 (2014): 28–43. http://dx.doi.org/10.4018/ijssoe.2014040103.

Full text
Abstract:
The success of cloud computing technologies heavily depends on both the underlying hardware and system software support for virtualization. In this study, we propose to elevate the capability of the hypervisor to monitor and manage co-running virtual machines (VMs) by capturing their dynamic behavior at runtime and adaptively schedule and migrate VMs across cores to minimize contention on system resources hence maximize the system throughput. Implemented at the hypervisor level, our proposed scheme does not require any changes or adjustments to the VMs themselves or the applications running in
APA, Harvard, Vancouver, ISO, and other styles
10

Bai, Jin Rong, Guo Zhong Zou, and Shi Guang Mu. "Malware Analysis Platform Based on Secondary Development of Xen." Applied Mechanics and Materials 530-531 (February 2014): 865–68. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.865.

Full text
Abstract:
The API calls reflect the functional levels of a program, analysis of the API calls would lead to an understanding of the behavior of the malware. Malware analysis environment has been widely used, but some malware already have the anti-virtual, anti-debugging and anti-tracking ability with the evolution of the malware. These analysis environments use a combination of API hooking and/or API virtualization, which are detectable by malware running at the same privilege level. In this work, we develop the fully automated platform to trace the native API calls based on secondary development of Xen
APA, Harvard, Vancouver, ISO, and other styles
11

Zhang, Yiming, Chengfei Zhang, Yaozheng Wang, Kai Yu, Guangtao Xue, and Jon Crowcroft. "KylinX." ACM Transactions on Computer Systems 37, no. 1-4 (2021): 1–27. http://dx.doi.org/10.1145/3436512.

Full text
Abstract:
Unikernel specializes a minimalistic LibOS and a target application into a standalone single-purpose virtual machine (VM) running on a hypervisor, which is referred to as (virtual) appliance . Compared to traditional VMs, Unikernel appliances have smaller memory footprint and lower overhead while guaranteeing the same level of isolation. On the downside, Unikernel strips off the process abstraction from its monolithic appliance and thus sacrifices flexibility, efficiency, and applicability. In this article, we examine whether there is a balance embracing the best of both Unikernel appliances (
APA, Harvard, Vancouver, ISO, and other styles
12

Okunev, Boris V., Alexey I. Lazarev, and Pavel S. Kharlamov. "Virtualization of information object vulnerability testing container based on DeX technology and deep learning neural networks." Journal Of Applied Informatics 16, no. 4 (2021): 96–109. http://dx.doi.org/10.37791/2687-0649-2021-16-4-96-109.

Full text
Abstract:
The modern development of information security tools, along with the improvement of remote access methods, allows software and hardware to be audited without the need for direct access to the system under test. One of its components is related to the implementation of software on mobile ARM processor architectures. Within this direction of development, the approach that allows integrating Linux kernel-based distributions by introducing a virtual container chroot (change root) into the Android OS- based system and, consequently, performing penetration testing without the need to use personal co
APA, Harvard, Vancouver, ISO, and other styles
13

Vhatkar, Kapil Netaji, and Girish P. Bhole. "Improved rider optimization for optimal container resource allocation in cloud with security assurance." International Journal of Pervasive Computing and Communications 16, no. 3 (2020): 235–58. http://dx.doi.org/10.1108/ijpcc-12-2019-0094.

Full text
Abstract:
Purpose The containerization application is one among the technologies that enable microservices architectures, which is observed to be the model for operating system (OS) virtualization. Containers are the virtual instances of the OS that are structured as the isolation for the OS atmosphere and its file system, which are executed on the single kernel and a single host. Hence, every microservice application is evolved in a container without launching the total virtual machine. The system overhead is minimized in this way as the environment is maintained in a secured manner. The exploitation o
APA, Harvard, Vancouver, ISO, and other styles
14

LIU, Bo-wen, Nai-jie GU, and De-he GU. "A Lightweight OS-Level Virtualization Architecture Based on Android." DEStech Transactions on Computer Science and Engineering, cnsce (May 5, 2017). http://dx.doi.org/10.12783/dtcse/cnsce2017/8866.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Tellabi, Asmaa, Christoph Ruland, Karl Waedt, and Abdelbast Sabri. "Self Diagnostics and Isolation Mechanisms for Mixed Criticality Systems." Journal of Communications Software and Systems 15, no. 4 (2019). http://dx.doi.org/10.24138/jcomss.v15i4.810.

Full text
Abstract:
Virtualization is a technology that is frequently employed in computers and servers to provide isolation for execution environments, and to support the execution of multiple Operating Systems (OS) on the same hardware platform. In the embedded systems´ world, virtualization has been a rising trend, essentially because it offers an isolation mechanism that provides hardware manufacturer´ independence and it avoids obsolescence issues. The isolation mechanism supports safety and security measures, and assists in the certification of safety-critical systems. Virtualization offers improved perform
APA, Harvard, Vancouver, ISO, and other styles
16

"Research Scope and Tools for Workflow Scheduling in Cloud Environment." International Journal of Engineering and Advanced Technology 8, no. 6S3 (2019): 1967–68. http://dx.doi.org/10.35940/ijeat.f1380.0986s319.

Full text
Abstract:
Workflow is a prototype that executes the behavior of scientific and engineering applications for which the sequence of tasks needs to be automated based on the input parameters specified. Difficulties arise for CSPs primarily during the execution environment due to its direct impact on various QoS parameters. Existing workflow scheduling techniques has research focus with dimensions that include undetermined demands, task failure,l delay cost, ambiguous deadlines, bandwidth, cache inclusion, scheduler policies, VM cycles, QoS impact, OS support, fault-tolerant and virtualization level. The co
APA, Harvard, Vancouver, ISO, and other styles
17

"Log Analyzer for Update Manager." International Journal of Engineering and Advanced Technology 9, no. 5 (2020): 328–30. http://dx.doi.org/10.35940/ijeat.e9360.069520.

Full text
Abstract:
Performing System updates is a very tricky and complicated task. You have to update new software on the same old hardware. This may introduce many errors in the system. For example a windows update on a single PC is generally prone to failures. Further updating a server is more challenging job. As a server can support many Operating systems their components, firmware’s and software’s etc, there are many possibilities that a server update may initiate many errors in the system. Thus, this paper proposes a tool that can go through all those thousands of log files generated during an update of a
APA, Harvard, Vancouver, ISO, and other styles
18

"Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Technology." 2013 1, no. 2013 (2020): 61–67. http://dx.doi.org/10.47277/ijcncs/1(2)4.

Full text
Abstract:
Cloud computing, the utility base computing, is going to become the mainstream of IT future. Governments and enterprises are realizing that by immigrating into the cloud they can significantly enhance their current infrastructure or application services with minimum cost and maximum elasticity. But securing cloud user digital assets and addressing privacy concerns of cloud costumers has become serious challenge. Providing security in cloud always has to consider performance. Employing high secure methods with massive complexity will increase overall service cost, to address this problem in thi
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!