Academic literature on the topic 'Virtualization architecture'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Virtualization architecture.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Virtualization architecture"

1

R, Jithin, and Priya Chandran. "Secure and Dynamic Memory Management Architecture for Virtualization Technologies in IoT Devices." Future Internet 10, no. 12 (November 30, 2018): 119. http://dx.doi.org/10.3390/fi10120119.

Full text
Abstract:
The introduction of the internet in embedded devices led to a new era of technology—the Internet of Things (IoT) era. The IoT technology-enabled device market is growing faster by the day, due to its complete acceptance in diverse areas such as domicile systems, the automobile industry, and beyond. The introduction of internet connectivity in objects that are frequently used in daily life raises the question of security—how secure is the information and the infrastructure handled by these devices when they are connected to the internet? Security enhancements through standard cryptographic techniques are not suitable due to the power and performance constraints of IoT devices. The introduction of virtualization technology into IoT devices is a recent development, meant for fulfilling security and performance needs. However, virtualization augments the vulnerability present in IoT devices, due to the addition of one more software layer—namely, the hypervisor, which enables the sharing of resources among different users. This article proposes the adaptation of ASMI (Architectural Support for Memory Isolation—a general architecture available in the literature for the improvement of the performance and security of virtualization technology) on the popular MIPS (Microprocessor without Interlocked Pipeline Stages) embedded virtualization platform, which could be adopted in embedded virtualization architectures for IoT devices. The article illustrates the performance enhancement achieved by the proposed architecture with the existing architectures.
APA, Harvard, Vancouver, ISO, and other styles
2

Hu, Yuan Yuan, Lu Wang, and Xiao Dong Zhang. "Cloud Storage Virtualization Technology and its Architecture." Applied Mechanics and Materials 713-715 (January 2015): 2435–39. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.2435.

Full text
Abstract:
Based on cloud computing and cloud storage, this paper discussed three kinds of typical virtualization technology in cloud computing, that is, storage virtualization based on host or server, storage virtualization based on storage devices, and storage virtualization based on Storage Area Network (SAN). In addition, application value of storage virtualization technology was discussed. What’s more, platform architecture model of cloud storage was proposed, and the characteristics of cloud backup were discussed as an example.
APA, Harvard, Vancouver, ISO, and other styles
3

Dakroub, Husein, Adnan Shaout, and Arafat Awajan. "Connected Car Architecture and Virtualization." SAE International Journal of Passenger Cars - Electronic and Electrical Systems 9, no. 1 (April 5, 2016): 153–59. http://dx.doi.org/10.4271/2016-01-0081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Daniels, Jeff. "Server virtualization architecture and implementation." XRDS: Crossroads, The ACM Magazine for Students 16, no. 1 (September 2009): 8–12. http://dx.doi.org/10.1145/1618588.1618592.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ijaz, Qaiser, El-Bay Bourennane, Ali Kashif Bashir, and Hira Asghar. "Revisiting the High-Performance Reconfigurable Computing for Future Datacenters." Future Internet 12, no. 4 (April 6, 2020): 64. http://dx.doi.org/10.3390/fi12040064.

Full text
Abstract:
Modern datacenters are reinforcing the computational power and energy efficiency by assimilating field programmable gate arrays (FPGAs). The sustainability of this large-scale integration depends on enabling multi-tenant FPGAs. This requisite amplifies the importance of communication architecture and virtualization method with the required features in order to meet the high-end objective. Consequently, in the last decade, academia and industry proposed several virtualization techniques and hardware architectures for addressing resource management, scheduling, adoptability, segregation, scalability, performance-overhead, availability, programmability, time-to-market, security, and mainly, multitenancy. This paper provides an extensive survey covering three important aspects—discussion on non-standard terms used in existing literature, network-on-chip evaluation choices as a mean to explore the communication architecture, and virtualization methods under latest classification. The purpose is to emphasize the importance of choosing appropriate communication architecture, virtualization technique and standard language to evolve the multi-tenant FPGAs in datacenters. None of the previous surveys encapsulated these aspects in one writing. Open problems are indicated for scientific community as well.
APA, Harvard, Vancouver, ISO, and other styles
6

Yu, Ge, Ying Liu, and Guang Tian Zhou. "Crossing Materiality and Immateriality: LED Architecture and Architectural Virtualization." Advanced Materials Research 255-260 (May 2011): 1459–63. http://dx.doi.org/10.4028/www.scientific.net/amr.255-260.1459.

Full text
Abstract:
LED building means that the LED screen covers building surface mostly, which could real-time reflect information, while forgetting the concept of “wall”. The information materialized itself. At the same time, information approaches the relationship between the architects and the popularity, so that confuses the difference. The space will not “be pushed” by the architects, while “being fetched” by the popularity. This visual space not only “analogs”, “translates”, or “amplifies” the real images, but also the other kind of existence. Virtual building expands the controlling mode in the physical world. It is a new way of travel, communication, control, and express. With the development of popular consuming culture and visual culture, and the exploring of LED expression and development of virtual technology by architects and artists, the LED buildings and virtual buildings will the indispensable existence with us. As a new kind of architectural design innovation, will they reveal the future the architecture development?
APA, Harvard, Vancouver, ISO, and other styles
7

Kumar, M. Sandeep, and Prabhu J. "Analysis of Network Function Virtualization and Software Defined Virtualization." JOIV : International Journal on Informatics Visualization 1, no. 4 (November 4, 2017): 122. http://dx.doi.org/10.30630/joiv.1.4.40.

Full text
Abstract:
Network function virtualization (NFV) has played important role in both industry and academic change in telecommunication services. NFV has the ability to handle reduction on OPEX and CAPEX; it provides new service and also increases quickly in getting a time value. NFV has an opportunity in doing research in developing new innovation in architecture, framework, and measures some of the technology used in deploying in NVF. In this paper, the author describes the relation between NFV, SDV and cloud computing. The architecture of NVF its advantage in using network function virtualization and some activity used in NFV and adoption of NVF and future direction of NFV, issues, and difference in NFV and SDV.
APA, Harvard, Vancouver, ISO, and other styles
8

McDougall, Richard, and Jennifer Anderson. "Virtualization performance." ACM SIGOPS Operating Systems Review 44, no. 4 (December 13, 2010): 40–56. http://dx.doi.org/10.1145/1899928.1899933.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Burcea, Ioana, Stephen Somogyi, Andreas Moshovos, and Babak Falsafi. "Predictor virtualization." ACM SIGOPS Operating Systems Review 42, no. 2 (March 25, 2008): 157–67. http://dx.doi.org/10.1145/1353535.1346301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dall, Christoffer, Shih-Wei Li, Jin Tack Lim, and Jason Nieh. "ARM Virtualization." ACM SIGOPS Operating Systems Review 52, no. 1 (August 28, 2018): 45–56. http://dx.doi.org/10.1145/3273982.3273987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Virtualization architecture"

1

Köhler, Fredrik. "Network Virtualization in Multi-hop Heterogeneous Architecture." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-38696.

Full text
Abstract:
Software Defined Networking is a technology that introduces modular and programmable networks that uses separated control- and data-planes. Traditional networks use mostly proprietary protocols and devices that needs to communicate with each other and share information about routes and paths in the network. SDN on the other hand uses a controller that communicates with devices through an open source protocol called OpenFlow. The routing rules of flows can be inserted into the networking devices by the controller. This technology is still new and it requires more research to provide evidence that it can perform better, or at least as good as, the conventional networks. By doing some experiments on different topologies, this thesis aims at discovering how delays of flows are affected by having OpenFlow in the network, and identifying overhead of using such technology. The results show that, the overhead can be to large for time and noise sensitive applications and average delay is comparable to conventional networks.
APA, Harvard, Vancouver, ISO, and other styles
2

Korotich, Elena. "A Service Virtualization Architecture for Efficient Multimedia Delivery." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/23608.

Full text
Abstract:
This thesis provides a novel architecture for the creation and management of virtual multimedia adaptation services offered by a multimedia-enabled cloud. The aim of the proposed scheme is to provide an optimal yet a transparent user access to adapted media contents while isolating them from the heterogeneity of the utilized devices, diversity of media formats, as well as the details of the adaptation services and performance variations of the underlying network. This goal is achieved through the development of service virtualization models that provide various levels of abstraction of the actual physical services and their performance parameters. Such virtual models offer adaptation functions by comprising adaptation services with accordance to their parameters. Additionally, parameters describing the functional specifics of the adaptation functions, as well as multimedia content features, are organized into a hierarchical structure that facilitates extraction of the virtual models capable of satisfying the conditions expressed by the user requests. At the same time the paramter/feature organization structure itself is flexible enough to allow users to specify media delivery requests at various levels of request details (e.g., summarize video vs. drop specific frames). As a result, in response to a user request for a multimedia content, an optimal virtual service adaptation path is calculated, describing the needed media adaptation operations as well as the appropriate mapping to the physical resources capable of executing such functions. The selection of the adaptation path is done with the use of a novel performance-history based selection mechanism that takes into account the performance variations and relations of the services in a dynamically changing environment of multimedia clouds. A number of experiments are conducted to demonstrate the potential of the proposed work in terms of the enhanced processing time and service quality.
APA, Harvard, Vancouver, ISO, and other styles
3

Metzker, Martin. "A network QoS management architecture for virtualization environments." Diss., Ludwig-Maximilians-Universität München, 2014. http://nbn-resolving.de/urn:nbn:de:bvb:19-177848.

Full text
Abstract:
Network quality of service (QoS) and its management are concerned with providing, guaranteeing and reporting properties of data flows within computer networks. For the past two decades, virtualization has been becoming a very popular tool in data centres, yet, without network QoS management capabilities. With virtualization, the management focus shifts from physical components and topologies, towards virtual infrastructures (VI) and their purposes. VIs are designed and managed as independent isolated entities. Without network QoS management capabilities, VIs cannot offer the same services and service levels as physical infrastructures can, leaving VIs at a disadvantage with respect to applicability and efficiency. This thesis closes this gap and develops a management architecture, enabling network QoS management in virtulization environments. First, requirements are dervied, based on real world scenarios, yielding a validation reference for the proposed architecture. After that, a life cycle for VIs and a taxonomy for network links and virtual components are introduced, to arrange the network QoS management task with the general management of virtualization environments and enabling the creation of technology specific adaptors for integrating the technologies and sub-services used in virtualization environments. The core aspect, shaping the proposed management architecture, is a management loop and its corresponding strategy for identifying and ordering sub-tasks. Finally, a prototypical implementation showcases that the presented management approach is suited for network QoS management and enforcement in virtualization environments. The architecture fulfils its purpose, fulfilling all identified requirements. Ultimately, network QoS management is one amongst many aspects to management in virtualization environments and the herin presented architecture shows interfaces to other management areas, where integration is left as future work.
Verwaltungsaufgaben für Netzdienstgüte umfassen das Bereitstellen, Sichern und Berichten von Flusseigenschaften in Rechnernetzen. Während der letzen zwei Jahrzehnte entwickelte sich Virtualisierung zu einer Schlüsseltechnologie für Rechenzentren, bisher ohne Möglichkeiten zum Verwalten der Netzdienstgüte. Der Einsatz von Virtualisierung verschiebt den Fokus beim Betrieb von Rechenzentren weg von physischen Komponenten und Netzen, hin zu virtuellen Infrastrukturen (VI) und ihren Einsatzzwecken. VIs werden als unabhängige, voneinander isolierte Einheiten entwickelt und verwaltet. Ohne Netzdienstgüte, sind VIs nicht so vielseitig und effizient einsetzbar wie physische Aufbauten. Diese Arbeit schließt diese Lücke mit der Entwicklung einer Managementarchitektur zur Verwaltung der Netzdienstgüte in Virtualisierungsumgebungen. Zunächst werden Anforderungen aus realen Szenarios abgeleitet, mit denen Architekturen bewertet werden können. Zur Abgrenzung der speziellen Aufgabe Netzdienstgüteverwaltung innerhalb des allgemeinen Managementproblems, wird anschließend ein Lebenszyklusmodell für VIs vorgestellt. Die Entwicklung einer Taxonomie für Kopplungen und Komponenten ermöglicht technologiespezifische Adaptoren zur Integration von in Virtualisierungsumgebungen eingesetzten Technologien. Kerngedanke hinter der entwickelten Architektur ist eine Rückkopplungsschleife und ihre einhergehende Methode zur Strukturierung und Anordnung von Teilproblemen. Abschließend zeigt eine prototypische Implementierung, dass dieser Ansatz für Verwaltung und Durchsetzung von Netzdienstgüte in Virtualisierungsumgebungen geeignet ist. Die Architektur kann ihren Zweck sowie die gestellten Anforderungen erfüllen. Schlussendlich ist Netzdienstgüte ein Bereich von vielen beim Betrieb von Virtualisierungsumgebungen. Die Architektur zeigt Schnittstellen zu anderen Bereichen auf, deren Integration zukünftigen Arbeiten überlassen bleibt.
APA, Harvard, Vancouver, ISO, and other styles
4

Barros, Bruno Medeiros de. "Security architecture for network virtualization in cloud computing." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-18012017-094453/.

Full text
Abstract:
Network virtualization has been a quite active research area in the last years, aiming to tackle the increasing demand for high performance and secure communication in cloud infrastructures. In special, such research eforts have led to security solutions focused on improving isolation among multiple tenant of public clouds, an issue recognized as critical both by the academic community and by the technology Industry. More recently, the advent of Software-Defined Networks (SDN) and of Network Function Virtualization (NFV) introduced new concepts and techniques for addressing issues related to the isolation of network resources in multi-tenant clouds while improving network manageability and flexibility. Similarly, hardware technologies such as Single Root I/O Virtualization (SR-IOV) enable network isolation in the hardware level while improving performance in physical and virtual networks. Aiming to provide a cloud network environment that effciently tackles multi-tenant isolation, we present three complementary strategies for addressing the isolation of resources in cloud networks. These strategies are then applied in the evaluation of existing network virtualization architectures, exposing the security gaps associated to current technologies, and paving the path for novel solutions. We then propose a security architecture that builds upon the strategies presented, as well as upon SDN, NFV and SR-IOV technologies, to implement secure cloud network domains. The theoretical and experimental analyses of the resulting architecture show a considerable reduction of the attack surface in tenant networks, with a small impact over tenants\' intra-domain and inter-domain communication performance.
Virtualização de redes é uma área de pesquisa que tem ganho bastante atenção nos últimos anos, motivada pela necessidade de se implementar sistemas de comunicação seguros e de alta performance em infraestruturas de computação em nuvem. Em particular, os esforços de pesquisa nesta área têm levado ao desenvolvimento de soluções de segurança que visam aprimorar o isolamento entre os múltiplos inquilinos de sistemas de computação em nuvem públicos, uma demanda reconhecidamente crítica tanto pela comunidade acadêmica quanto pela indústria de tecnologia. Mais recentemente, o advento das Redes Definidas por Software (do inglês Software-Defined Networks - SDN) e da Virtualização de Funções de Rede (do inglês Network Function Virtualization - NFV) introduziu novos conceitos e técnicas que podem ser utilizadas para abordar questões de isolamento de redes virtualizadas em sistemas de computação em nuvem com múltiplos inquilinos, enquanto aprimoram a capacidade de gerenciamento e a flexibilidade de suas redes. Similarmente, tecnologias de virtualização assistida por hardware como Single Root I/O Virtualization - SR-IOV permitem a implementação do isolamento de recursos de hardware, melhorando o desempenho de redes físicas e virtualizadas. Com o intuito de implementar uma solução de virtualização de redes que aborda de maneira eficiente o problema de isolamento entre múltiplos inquilinos, nós apresentamos três estratégias complementares para o isolamento de recursos de rede em sistemas computação em nuvem. As estratégias apresentadas são então aplicadas na avaliação de arquiteturas de virtualização de rede existentes, revelando lacunas de segurança associadas às tecnologias utilizadas atualmente, e abrindo caminho para o desenvolvimento de novas soluções. Nós então propomos uma arquitetura de segurança que utiliza as estratégias apresentadas, e tecnologias como SDN, NFV e SR-IOV, para implementar domínios de rede seguros. As análises teórica e experimental da arquitetura proposta mostram considerável redução das superfícies de ataque em redes virtualizadas, com um pequeno impacto sobre o desempenho da comunicação entre máquinas virtuais de inquilinos da nuvem.
APA, Harvard, Vancouver, ISO, and other styles
5

Montanari, Luca. "A Network Function Virtualization Architecture for Distributed IoT Gateways." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13345/.

Full text
Abstract:
La virtualizzazione permette a diverse applicazioni di condividere lo stesso dispositivo IoT. Tuttavia, in ambienti eterogenei, reti di dispositivi IoT virtualizzati fanno emergere nuove sfide, come la necessità di fornire on-the-fly e in maniera dinamica, elastica e scalabile, gateway. NFV è un paradigma progettato per affrontare queste nuove sfide. Esso sfrutta tecnologie di virtualizzazione standard per consolidare specifici elementi di rete su generico hardware commerciale. Questa tesi presenta un'architettura NFV per gateway IoT distribuiti, nella quale istanze software dei moduli dei gateway sono ospitate su un'infrastruttura NFV distribuita, la quale è operata e gestita da un IoT gateway Provider. Considereremo diversi IoT Provider, ciascuno con le proprie marche, o loro combinazioni, di sensori e attuatori/robot. Ipotizzeremo che gli ambienti dei provider siano geograficamente distribuiti, per un'efficiente copertura di regioni estese. I sensori e gli attuatori possono essere utilizzati da una varietà di applicazioni, ciascuna delle quali può avere diversi requisiti per interfacce e QoS (latenza, throughput, consumi, ecc...). L'infrastruttura NFV consente di effettuare un deployment elastico, dinamico e scalabile dei moduli gateway in questo ambiente eterogeneo e distribuito. Inoltre, l'architettura proposta è in grado di riutilizzare moduli il cui deployment è stato precedentemente compiuto. Ciò è ottenuto attraverso Service Function Chaining e un'orchestrazione dinamica a runtime. Infine, presenteremo un prototipo basato sulla piattaforma OpenStack.
APA, Harvard, Vancouver, ISO, and other styles
6

Oprescu, Mihaela Iuniana. "Virtualization and distribution of the BGP control plane." Phd thesis, Institut National Polytechnique de Toulouse - INPT, 2012. http://tel.archives-ouvertes.fr/tel-00785007.

Full text
Abstract:
L'Internet est organisé sous la forme d'une multitude de réseaux appelés Systèmes Autonomes (AS). Le Border Gateway Protocol (BGP) est le langage commun qui permet à ces domaines administratifs de s'interconnecter. Grâce à BGP, deux utilisateurs situés n'importe o'u dans le monde peuvent communiquer, car ce protocole est responsable de la propagation des messages de routage entre tous les réseaux voisins. Afin de répondre aux nouvelles exigences, BGP a dû s'améliorer et évoluer à travers des extensions fréquentes et de nouvelles architectures. Dans la version d'origine, il était indispensable que chaque routeur maintienne une session avec tous les autres routeurs du réseau. Cette contrainte a soulevé des problèmes de scalabilité, puisque le maillage complet des sessions BGP internes (iBGP) était devenu difficile à réaliser dans les grands réseaux. Pour couvrir ce besoin de connectivité, les opérateurs de réseaux font appel à la réflection de routes (RR) et aux confédérations. Mais si elles résolvent un problème de scalabilité, ces deux solutions ont soulevé des nouveaux défis car elles sont accompagnées de multiples défauts; la perte de diversité des routes candidates au processus de séléction BGP ou des anomalies comme par exemple des oscillations de routage, des déflections et des boucles en font partie. Les travaux menés dans cette thèse se concentrent sur oBGP, une nouvelle architecture pour redistribuer les routes externes à l'intérieur d'un AS. à la place des classiques sessions iBGP, un réseau de type overlay est responsable (I) de l'échange d'informations de routage avec les autres AS, (II) du stockage distribué des routes internes et externes, (III) de l'application de la politique de routage au niveau de l'AS et (IV) du calcul et de la redistribution des meilleures routes vers les destinations de l'Internet pour tous les routeurs
APA, Harvard, Vancouver, ISO, and other styles
7

Athreya, Manoj B. "Subverting Linux on-the-fly using hardware virtualization technology." Thesis, Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34844.

Full text
Abstract:
In this thesis, we address the problem faced by modern operating systems due to the exploitation of Hardware-Assisted Full-Virtualization technology by attackers. Virtualization technology has been of growing importance these days. With the help of such a technology, multiple operating systems can be run on a single piece of hardware, with little or no modification to the operating system. Both Intel and AMD have contributed to x86 full-virtualization through their respective instruction set architectures. Hardware virtualization extensions can be found in almost all x86 processors these days. Hardware virtualization technologies have opened a whole new frontier for a new kind of attack. A system hacker can abuse hardware virualization technology to gain control over an operating system on-the-fly (i.e., without a system restart) by installing a thin Virtual Machine Monitor (VMM) below the native operating system. Such a VMM based malware is termed a Hardware-Assisted Virtual Machine (HVM) rootkit. We discuss the technique used by a rootkit named Blue Pill to subvert the Windows Vista operating system by exploiting the AMD-V (codenamed "Pacifica") virtualization extensions. HVM rootkits do not hook any operating system code or data regions; hence detecting the existence of such malware using conventional techniques becomes extremely difficult. This thesis discusses existing methods to detect such rootkits and their inefficiencies. In this work, we implement a proof-of-concept HVM rootkit using Intel-VT hardware virtualization technology and also discuss how such an attack can be defended against by using an autonomic architecture called SHARK, which was proposed by Vikas et al., in MICRO 2008.
APA, Harvard, Vancouver, ISO, and other styles
8

McBride, Daniel C. "Mapping, awareness, and virtualization network administrator training tool (MAVNATT) architecture and framework." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45900.

Full text
Abstract:
Approved for public release; distribution is unlimited
Tactical networks are becoming more critical in maintaining centers of gravity for military operations as cyberspace becomes contested at all levels of war. As a result, the growth of network centric operations and increased operational tempo in the cyber domain has created a significant training gap for tactical network administrators. This research suggests that a computer-based environment can integrate the operational network and a training network into the same system to allow tactical network administrators to concurrently administer the network and conduct realistic training on an identical virtual network. A review of commercial and open-source tools identifies the baseline for an architecture and framework for this system. The architecture consists of a modular design comprised of mapping, awareness, and virtualization modules. The framework integrates these modules by defining a network topology format, programming language, graphical user interface solution, and virtualization solution. This research concludes by providing an implementation that demonstrates desired capabilities. While we demonstrate that the project goals are attainable, there is a need for further research and development to deploy this capability to fleet units.
APA, Harvard, Vancouver, ISO, and other styles
9

Korikawa, Tomohiro. "Parallel Memory System Architectures for Packet Processing in Network Virtualization." Doctoral thesis, Kyoto University, 2021. http://hdl.handle.net/2433/263787.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wagner, Ralf [Verfasser], and Bernhard [Akademischer Betreuer] Mitschang. "Integration management : a virtualization architecture for adapter technologies / Ralf Wagner. Betreuer: Bernhard Mitschang." Stuttgart : Universitätsbibliothek der Universität Stuttgart, 2015. http://d-nb.info/106910650X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Virtualization architecture"

1

Kee, Tan Nam, ed. Private cloud computing: Consolidation, virtualization, and service-oriented infrastructure. Waltham, MA: Morgan Kaufmann, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Running Xen: A hands-on guide to the art of virtualization. Upper Saddle River, NJ: Prentice Hall, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Germany), SVM (2008 Munich. Systems and virtualization management: Standards and new technologies : second international workshop, SVM 2008, Munich, Germany, October 21-22, 2008, proceedings. Berlin: Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Germany), SVM (2008 Munich. Systems and virtualization management: Standards and new technologies : second international workshop, SVM 2008, Munich, Germany, October 21-22, 2008, proceedings. Berlin: Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Redbooks, IBM. Advanced Power Virtualization on IBM eserver p5 Servers: Architecture And Performance Considerations. 2nd ed. Vervante, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Biedermann, Alexander. Design Concepts for a Virtualizable Embedded MPSoC Architecture: Enabling Virtualization in Embedded Multi-Processor Systems. Springer Vieweg, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Network Virtualization (Networking Technology). Cisco Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Software Networks: Virtualization, SDN, 5G and Security. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pujolle, Guy. Software Networks: Virtualization, SDN, 5G, and Security. Wiley & Sons, Incorporated, John, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pujolle, Guy. Software Networks: Virtualization, SDN, 5G and Security. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Virtualization architecture"

1

Jaramillo, David, Borko Furht, and Ankur Agarwal. "Mobile Virtualization Reference Architecture." In Virtualization Techniques for Mobile Systems, 37–53. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05741-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ma, Shicong, Baosheng Wang, Xiaozhe Zhang, and Tao Li. "An Evolving Architecture for Network Virtualization." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 379–86. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13326-3_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kirischian, Lev. "Virtualization of Reconfigurable Computing System Architecture." In Reconfigurable Computing Systems Engineering, 259–308. Boca Raton : Taylor & Francis Group, 2016.: CRC Press, 2017. http://dx.doi.org/10.1201/9781315374697-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dai, Fenglin, Qixun Zhang, Yuhang Sun, and Mengyuan Liu. "LTE-WLAN Integrated Virtualization Network Architecture." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 517–28. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72823-0_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rusek, Marian, Grzegorz Dwornicki, and Arkadiusz Orłowski. "Swarm of Mobile Virtualization Containers." In Information Systems Architecture and Technology: Proceedings of 36th International Conference on Information Systems Architecture and Technology – ISAT 2015 – Part III, 75–85. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-28564-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kirischian, Lev. "Configuration Memory and Architecture Virtualization in RCS." In Reconfigurable Computing Systems Engineering, 147–59. Boca Raton : Taylor & Francis Group, 2016.: CRC Press, 2017. http://dx.doi.org/10.1201/9781315374697-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Park, Byungyeon, Wonhyuk Lee, TaeYeon Kim, and HyunCheol Kim. "A Virtualization and Management Architecture of Micro-Datacenter." In Lecture Notes in Electrical Engineering, 181–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46578-3_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jyoti, Snehi, Snehi Manish, and Gill Rupali. "Virtualization as an Engine to Drive Cloud Computing Security." In High Performance Architecture and Grid Computing, 62–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22577-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Petrides, Panayiotis, George Nicolaides, and Pedro Trancoso. "HPC Performance Domains on Multi-core Processors with Virtualization." In Architecture of Computing Systems – ARCS 2012, 123–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28293-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Konorski, Jerzy, Piotr Pacyna, Grzegorz Kolaczek, Zbigniew Kotulski, Krzysztof Cabaj, and Pawel Szalachowski. "A Virtualization-Level Future Internet Defense-in-Depth Architecture." In Communications in Computer and Information Science, 283–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34135-9_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Virtualization architecture"

1

Schaffrath, Gregor, Laurent Mathy, Christoph Werle, Panagiotis Papadimitriou, Anja Feldmann, Roland Bless, Adam Greenhalgh, Andreas Wundsam, Mario Kind, and Olaf Maennel. "Network virtualization architecture." In the 1st ACM workshop. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1592648.1592659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Akiba, Tatsuya, Hisashi Matsukawa, Hiromi Narimatsu, Shin-ichiro Eitoku, and Kazuo Kitamura. "Device functions virtualization architecture." In 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE). IEEE, 2017. http://dx.doi.org/10.1109/gcce.2017.8229322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saquetti, Mateus, Guilherme Bueno, Weverton Cordeiro, and Jose Rodrigo Azambuja. "VirtP4: An Architecture for P4 Virtualization." In 2019 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW). IEEE, 2019. http://dx.doi.org/10.1109/ipdpsw.2019.00021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mishra, Mahim, and Seth C. Goldstein. "Virtualization on the Tartan Reconfigurable Architecture." In 2007 International Conference on Field Programmable Logic and Applications. IEEE, 2007. http://dx.doi.org/10.1109/fpl.2007.4380667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yao Qing, Chen Xingyuan, Du Xuehui, Yang Yan, and Guo Lei. "Virtualization based grid resource management architecture." In 2011 International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2011. http://dx.doi.org/10.1109/iccsnt.2011.6182177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lakshmi, J., and S. K. Nandy. "I/O Virtualization Architecture for Security." In 2010 IEEE 10th International Conference on Computer and Information Technology (CIT). IEEE, 2010. http://dx.doi.org/10.1109/cit.2010.391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vilanova, Lluís, Nadav Amit, and Yoav Etsion. "Using SMT to accelerate nested virtualization." In ISCA '19: The 46th Annual International Symposium on Computer Architecture. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3307650.3322261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shah, Munam Ali, Muhammad Kamran, Hikmat Khan, and Qaisar Javaid. "Vdroid: A lightweight virtualization architecture for smartphones." In 2016 Future Technologies Conference (FTC). IEEE, 2016. http://dx.doi.org/10.1109/ftc.2016.7821766.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pinto, S., A. Oliveira, J. Pereira, J. Cabral, J. Monteiro, and A. Tavares. "Lightweight multicore virtualization architecture exploiting ARM TrustZone." In IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society. IEEE, 2017. http://dx.doi.org/10.1109/iecon.2017.8216603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Navarro, Monica, Marcello Antonucci, Lambros Sarakis, and Theodore Zahariadis. "VITRO Architecture: Bringing Virtualization to WSN World." In 2011 IEEE 8th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS). IEEE, 2011. http://dx.doi.org/10.1109/mass.2011.96.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Virtualization architecture"

1

Black, D., J. Hudson, L. Kreeger, M. Lasserre, and T. Narten. An Architecture for Data-Center Network Virtualization over Layer 3 (NVO3). RFC Editor, December 2016. http://dx.doi.org/10.17487/rfc8014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ghosh, Anup K., and Angelos Stavrou. DARPA MobiVisor: An Architecture for High Assurance for Untrusted Applications on Wireless Handheld Devices via Lightweight Virtualization. Fort Belvoir, VA: Defense Technical Information Center, November 2010. http://dx.doi.org/10.21236/ada548297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography