Academic literature on the topic 'Virtualization architecture'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Virtualization architecture.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Virtualization architecture"
R, Jithin, and Priya Chandran. "Secure and Dynamic Memory Management Architecture for Virtualization Technologies in IoT Devices." Future Internet 10, no. 12 (November 30, 2018): 119. http://dx.doi.org/10.3390/fi10120119.
Full textHu, Yuan Yuan, Lu Wang, and Xiao Dong Zhang. "Cloud Storage Virtualization Technology and its Architecture." Applied Mechanics and Materials 713-715 (January 2015): 2435–39. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.2435.
Full textDakroub, Husein, Adnan Shaout, and Arafat Awajan. "Connected Car Architecture and Virtualization." SAE International Journal of Passenger Cars - Electronic and Electrical Systems 9, no. 1 (April 5, 2016): 153–59. http://dx.doi.org/10.4271/2016-01-0081.
Full textDaniels, Jeff. "Server virtualization architecture and implementation." XRDS: Crossroads, The ACM Magazine for Students 16, no. 1 (September 2009): 8–12. http://dx.doi.org/10.1145/1618588.1618592.
Full textIjaz, Qaiser, El-Bay Bourennane, Ali Kashif Bashir, and Hira Asghar. "Revisiting the High-Performance Reconfigurable Computing for Future Datacenters." Future Internet 12, no. 4 (April 6, 2020): 64. http://dx.doi.org/10.3390/fi12040064.
Full textYu, Ge, Ying Liu, and Guang Tian Zhou. "Crossing Materiality and Immateriality: LED Architecture and Architectural Virtualization." Advanced Materials Research 255-260 (May 2011): 1459–63. http://dx.doi.org/10.4028/www.scientific.net/amr.255-260.1459.
Full textKumar, M. Sandeep, and Prabhu J. "Analysis of Network Function Virtualization and Software Defined Virtualization." JOIV : International Journal on Informatics Visualization 1, no. 4 (November 4, 2017): 122. http://dx.doi.org/10.30630/joiv.1.4.40.
Full textMcDougall, Richard, and Jennifer Anderson. "Virtualization performance." ACM SIGOPS Operating Systems Review 44, no. 4 (December 13, 2010): 40–56. http://dx.doi.org/10.1145/1899928.1899933.
Full textBurcea, Ioana, Stephen Somogyi, Andreas Moshovos, and Babak Falsafi. "Predictor virtualization." ACM SIGOPS Operating Systems Review 42, no. 2 (March 25, 2008): 157–67. http://dx.doi.org/10.1145/1353535.1346301.
Full textDall, Christoffer, Shih-Wei Li, Jin Tack Lim, and Jason Nieh. "ARM Virtualization." ACM SIGOPS Operating Systems Review 52, no. 1 (August 28, 2018): 45–56. http://dx.doi.org/10.1145/3273982.3273987.
Full textDissertations / Theses on the topic "Virtualization architecture"
Köhler, Fredrik. "Network Virtualization in Multi-hop Heterogeneous Architecture." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-38696.
Full textKorotich, Elena. "A Service Virtualization Architecture for Efficient Multimedia Delivery." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/23608.
Full textMetzker, Martin. "A network QoS management architecture for virtualization environments." Diss., Ludwig-Maximilians-Universität München, 2014. http://nbn-resolving.de/urn:nbn:de:bvb:19-177848.
Full textVerwaltungsaufgaben für Netzdienstgüte umfassen das Bereitstellen, Sichern und Berichten von Flusseigenschaften in Rechnernetzen. Während der letzen zwei Jahrzehnte entwickelte sich Virtualisierung zu einer Schlüsseltechnologie für Rechenzentren, bisher ohne Möglichkeiten zum Verwalten der Netzdienstgüte. Der Einsatz von Virtualisierung verschiebt den Fokus beim Betrieb von Rechenzentren weg von physischen Komponenten und Netzen, hin zu virtuellen Infrastrukturen (VI) und ihren Einsatzzwecken. VIs werden als unabhängige, voneinander isolierte Einheiten entwickelt und verwaltet. Ohne Netzdienstgüte, sind VIs nicht so vielseitig und effizient einsetzbar wie physische Aufbauten. Diese Arbeit schließt diese Lücke mit der Entwicklung einer Managementarchitektur zur Verwaltung der Netzdienstgüte in Virtualisierungsumgebungen. Zunächst werden Anforderungen aus realen Szenarios abgeleitet, mit denen Architekturen bewertet werden können. Zur Abgrenzung der speziellen Aufgabe Netzdienstgüteverwaltung innerhalb des allgemeinen Managementproblems, wird anschließend ein Lebenszyklusmodell für VIs vorgestellt. Die Entwicklung einer Taxonomie für Kopplungen und Komponenten ermöglicht technologiespezifische Adaptoren zur Integration von in Virtualisierungsumgebungen eingesetzten Technologien. Kerngedanke hinter der entwickelten Architektur ist eine Rückkopplungsschleife und ihre einhergehende Methode zur Strukturierung und Anordnung von Teilproblemen. Abschließend zeigt eine prototypische Implementierung, dass dieser Ansatz für Verwaltung und Durchsetzung von Netzdienstgüte in Virtualisierungsumgebungen geeignet ist. Die Architektur kann ihren Zweck sowie die gestellten Anforderungen erfüllen. Schlussendlich ist Netzdienstgüte ein Bereich von vielen beim Betrieb von Virtualisierungsumgebungen. Die Architektur zeigt Schnittstellen zu anderen Bereichen auf, deren Integration zukünftigen Arbeiten überlassen bleibt.
Barros, Bruno Medeiros de. "Security architecture for network virtualization in cloud computing." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-18012017-094453/.
Full textVirtualização de redes é uma área de pesquisa que tem ganho bastante atenção nos últimos anos, motivada pela necessidade de se implementar sistemas de comunicação seguros e de alta performance em infraestruturas de computação em nuvem. Em particular, os esforços de pesquisa nesta área têm levado ao desenvolvimento de soluções de segurança que visam aprimorar o isolamento entre os múltiplos inquilinos de sistemas de computação em nuvem públicos, uma demanda reconhecidamente crítica tanto pela comunidade acadêmica quanto pela indústria de tecnologia. Mais recentemente, o advento das Redes Definidas por Software (do inglês Software-Defined Networks - SDN) e da Virtualização de Funções de Rede (do inglês Network Function Virtualization - NFV) introduziu novos conceitos e técnicas que podem ser utilizadas para abordar questões de isolamento de redes virtualizadas em sistemas de computação em nuvem com múltiplos inquilinos, enquanto aprimoram a capacidade de gerenciamento e a flexibilidade de suas redes. Similarmente, tecnologias de virtualização assistida por hardware como Single Root I/O Virtualization - SR-IOV permitem a implementação do isolamento de recursos de hardware, melhorando o desempenho de redes físicas e virtualizadas. Com o intuito de implementar uma solução de virtualização de redes que aborda de maneira eficiente o problema de isolamento entre múltiplos inquilinos, nós apresentamos três estratégias complementares para o isolamento de recursos de rede em sistemas computação em nuvem. As estratégias apresentadas são então aplicadas na avaliação de arquiteturas de virtualização de rede existentes, revelando lacunas de segurança associadas às tecnologias utilizadas atualmente, e abrindo caminho para o desenvolvimento de novas soluções. Nós então propomos uma arquitetura de segurança que utiliza as estratégias apresentadas, e tecnologias como SDN, NFV e SR-IOV, para implementar domínios de rede seguros. As análises teórica e experimental da arquitetura proposta mostram considerável redução das superfícies de ataque em redes virtualizadas, com um pequeno impacto sobre o desempenho da comunicação entre máquinas virtuais de inquilinos da nuvem.
Montanari, Luca. "A Network Function Virtualization Architecture for Distributed IoT Gateways." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13345/.
Full textOprescu, Mihaela Iuniana. "Virtualization and distribution of the BGP control plane." Phd thesis, Institut National Polytechnique de Toulouse - INPT, 2012. http://tel.archives-ouvertes.fr/tel-00785007.
Full textAthreya, Manoj B. "Subverting Linux on-the-fly using hardware virtualization technology." Thesis, Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34844.
Full textMcBride, Daniel C. "Mapping, awareness, and virtualization network administrator training tool (MAVNATT) architecture and framework." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45900.
Full textTactical networks are becoming more critical in maintaining centers of gravity for military operations as cyberspace becomes contested at all levels of war. As a result, the growth of network centric operations and increased operational tempo in the cyber domain has created a significant training gap for tactical network administrators. This research suggests that a computer-based environment can integrate the operational network and a training network into the same system to allow tactical network administrators to concurrently administer the network and conduct realistic training on an identical virtual network. A review of commercial and open-source tools identifies the baseline for an architecture and framework for this system. The architecture consists of a modular design comprised of mapping, awareness, and virtualization modules. The framework integrates these modules by defining a network topology format, programming language, graphical user interface solution, and virtualization solution. This research concludes by providing an implementation that demonstrates desired capabilities. While we demonstrate that the project goals are attainable, there is a need for further research and development to deploy this capability to fleet units.
Korikawa, Tomohiro. "Parallel Memory System Architectures for Packet Processing in Network Virtualization." Doctoral thesis, Kyoto University, 2021. http://hdl.handle.net/2433/263787.
Full textWagner, Ralf [Verfasser], and Bernhard [Akademischer Betreuer] Mitschang. "Integration management : a virtualization architecture for adapter technologies / Ralf Wagner. Betreuer: Bernhard Mitschang." Stuttgart : Universitätsbibliothek der Universität Stuttgart, 2015. http://d-nb.info/106910650X/34.
Full textBooks on the topic "Virtualization architecture"
Kee, Tan Nam, ed. Private cloud computing: Consolidation, virtualization, and service-oriented infrastructure. Waltham, MA: Morgan Kaufmann, 2012.
Find full textRunning Xen: A hands-on guide to the art of virtualization. Upper Saddle River, NJ: Prentice Hall, 2008.
Find full textGermany), SVM (2008 Munich. Systems and virtualization management: Standards and new technologies : second international workshop, SVM 2008, Munich, Germany, October 21-22, 2008, proceedings. Berlin: Springer, 2008.
Find full textGermany), SVM (2008 Munich. Systems and virtualization management: Standards and new technologies : second international workshop, SVM 2008, Munich, Germany, October 21-22, 2008, proceedings. Berlin: Springer, 2008.
Find full textRedbooks, IBM. Advanced Power Virtualization on IBM eserver p5 Servers: Architecture And Performance Considerations. 2nd ed. Vervante, 2005.
Find full textBiedermann, Alexander. Design Concepts for a Virtualizable Embedded MPSoC Architecture: Enabling Virtualization in Embedded Multi-Processor Systems. Springer Vieweg, 2014.
Find full textSoftware Networks: Virtualization, SDN, 5G and Security. Wiley & Sons, Incorporated, John, 2015.
Find full textPujolle, Guy. Software Networks: Virtualization, SDN, 5G, and Security. Wiley & Sons, Incorporated, John, 2020.
Find full textPujolle, Guy. Software Networks: Virtualization, SDN, 5G and Security. Wiley & Sons, Incorporated, John, 2015.
Find full textBook chapters on the topic "Virtualization architecture"
Jaramillo, David, Borko Furht, and Ankur Agarwal. "Mobile Virtualization Reference Architecture." In Virtualization Techniques for Mobile Systems, 37–53. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05741-5_5.
Full textMa, Shicong, Baosheng Wang, Xiaozhe Zhang, and Tao Li. "An Evolving Architecture for Network Virtualization." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 379–86. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13326-3_36.
Full textKirischian, Lev. "Virtualization of Reconfigurable Computing System Architecture." In Reconfigurable Computing Systems Engineering, 259–308. Boca Raton : Taylor & Francis Group, 2016.: CRC Press, 2017. http://dx.doi.org/10.1201/9781315374697-10.
Full textDai, Fenglin, Qixun Zhang, Yuhang Sun, and Mengyuan Liu. "LTE-WLAN Integrated Virtualization Network Architecture." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 517–28. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72823-0_48.
Full textRusek, Marian, Grzegorz Dwornicki, and Arkadiusz Orłowski. "Swarm of Mobile Virtualization Containers." In Information Systems Architecture and Technology: Proceedings of 36th International Conference on Information Systems Architecture and Technology – ISAT 2015 – Part III, 75–85. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-28564-1_7.
Full textKirischian, Lev. "Configuration Memory and Architecture Virtualization in RCS." In Reconfigurable Computing Systems Engineering, 147–59. Boca Raton : Taylor & Francis Group, 2016.: CRC Press, 2017. http://dx.doi.org/10.1201/9781315374697-6.
Full textPark, Byungyeon, Wonhyuk Lee, TaeYeon Kim, and HyunCheol Kim. "A Virtualization and Management Architecture of Micro-Datacenter." In Lecture Notes in Electrical Engineering, 181–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46578-3_22.
Full textJyoti, Snehi, Snehi Manish, and Gill Rupali. "Virtualization as an Engine to Drive Cloud Computing Security." In High Performance Architecture and Grid Computing, 62–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22577-2_9.
Full textPetrides, Panayiotis, George Nicolaides, and Pedro Trancoso. "HPC Performance Domains on Multi-core Processors with Virtualization." In Architecture of Computing Systems – ARCS 2012, 123–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28293-5_11.
Full textKonorski, Jerzy, Piotr Pacyna, Grzegorz Kolaczek, Zbigniew Kotulski, Krzysztof Cabaj, and Pawel Szalachowski. "A Virtualization-Level Future Internet Defense-in-Depth Architecture." In Communications in Computer and Information Science, 283–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34135-9_29.
Full textConference papers on the topic "Virtualization architecture"
Schaffrath, Gregor, Laurent Mathy, Christoph Werle, Panagiotis Papadimitriou, Anja Feldmann, Roland Bless, Adam Greenhalgh, Andreas Wundsam, Mario Kind, and Olaf Maennel. "Network virtualization architecture." In the 1st ACM workshop. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1592648.1592659.
Full textAkiba, Tatsuya, Hisashi Matsukawa, Hiromi Narimatsu, Shin-ichiro Eitoku, and Kazuo Kitamura. "Device functions virtualization architecture." In 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE). IEEE, 2017. http://dx.doi.org/10.1109/gcce.2017.8229322.
Full textSaquetti, Mateus, Guilherme Bueno, Weverton Cordeiro, and Jose Rodrigo Azambuja. "VirtP4: An Architecture for P4 Virtualization." In 2019 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW). IEEE, 2019. http://dx.doi.org/10.1109/ipdpsw.2019.00021.
Full textMishra, Mahim, and Seth C. Goldstein. "Virtualization on the Tartan Reconfigurable Architecture." In 2007 International Conference on Field Programmable Logic and Applications. IEEE, 2007. http://dx.doi.org/10.1109/fpl.2007.4380667.
Full textYao Qing, Chen Xingyuan, Du Xuehui, Yang Yan, and Guo Lei. "Virtualization based grid resource management architecture." In 2011 International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2011. http://dx.doi.org/10.1109/iccsnt.2011.6182177.
Full textLakshmi, J., and S. K. Nandy. "I/O Virtualization Architecture for Security." In 2010 IEEE 10th International Conference on Computer and Information Technology (CIT). IEEE, 2010. http://dx.doi.org/10.1109/cit.2010.391.
Full textVilanova, Lluís, Nadav Amit, and Yoav Etsion. "Using SMT to accelerate nested virtualization." In ISCA '19: The 46th Annual International Symposium on Computer Architecture. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3307650.3322261.
Full textShah, Munam Ali, Muhammad Kamran, Hikmat Khan, and Qaisar Javaid. "Vdroid: A lightweight virtualization architecture for smartphones." In 2016 Future Technologies Conference (FTC). IEEE, 2016. http://dx.doi.org/10.1109/ftc.2016.7821766.
Full textPinto, S., A. Oliveira, J. Pereira, J. Cabral, J. Monteiro, and A. Tavares. "Lightweight multicore virtualization architecture exploiting ARM TrustZone." In IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society. IEEE, 2017. http://dx.doi.org/10.1109/iecon.2017.8216603.
Full textNavarro, Monica, Marcello Antonucci, Lambros Sarakis, and Theodore Zahariadis. "VITRO Architecture: Bringing Virtualization to WSN World." In 2011 IEEE 8th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS). IEEE, 2011. http://dx.doi.org/10.1109/mass.2011.96.
Full textReports on the topic "Virtualization architecture"
Black, D., J. Hudson, L. Kreeger, M. Lasserre, and T. Narten. An Architecture for Data-Center Network Virtualization over Layer 3 (NVO3). RFC Editor, December 2016. http://dx.doi.org/10.17487/rfc8014.
Full textGhosh, Anup K., and Angelos Stavrou. DARPA MobiVisor: An Architecture for High Assurance for Untrusted Applications on Wireless Handheld Devices via Lightweight Virtualization. Fort Belvoir, VA: Defense Technical Information Center, November 2010. http://dx.doi.org/10.21236/ada548297.
Full text