Academic literature on the topic 'Virtualized platform'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Virtualized platform.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Virtualized platform"

1

Sarddar, Debabrata, and Rajesh Bose. "Secure Co-processor and Billboard Manager Based Architecture Help to Protect & Store the Citrix Xenserver Based Virtual Data." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 01 (2014): 473–79. https://doi.org/10.5281/zenodo.14620565.

Full text
Abstract:
Any discussion of Cloud computing typically begins with virtualization. Virtualization is critical to cloud computing because it simplifies the delivery of services by providing a platform for optimizing complex IT resources in a scalable manner, which is what makes cloud computing so cost effective. Desktop virtualization, often called client virtualization, is a virtualization technology used to separate a computer desktop environment from the physical computer. Desktop virtualization is considered a type of client-server computing model because the "virtualized" desktop is stored on a centralized, or remote, server and not the physical machine being virtualized. Desktop virtualization "virtualizes desktop computers" and these virtual desktop environments are "served" to users on the network. In this paper, we proposed a secure cloud data center architecture that made by an application virtualization product like citrix xenapp/citrix xen desktop and with a proposed model that help us to encrypt and store the data like virtualized desktop or virtualized application in a suitable storage area. 
APA, Harvard, Vancouver, ISO, and other styles
2

YE, Ke-Jiang, Zhao-Hui WU, Xiao-Hong JIANG, and Qin-Ming HE. "Power Management of Virtualized Cloud Computing Platform." Chinese Journal of Computers 35, no. 6 (2012): 1262. http://dx.doi.org/10.3724/sp.j.1016.2012.01262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

ZHANG, FAN, JUNWEI CAO, HONG CAI, LIANCHEN LIU, and CHENG WU. "REDUNDANT VIRTUAL MACHINES MANAGEMENT IN VIRTUALIZED CLOUD PLATFORM." International Journal of Modeling, Simulation, and Scientific Computing 02, no. 02 (2011): 151–68. http://dx.doi.org/10.1142/s1793962311000426.

Full text
Abstract:
Selecting and utilizing proper virtual machines in a virtualized cloud platform to achieve high availability, throughput, reliability, as well as low cost and makespan is very important. The importance lies in the adaptive resource provisioning to satisfy variant of workloads. An Adaptive Accessing Aware Algorithm (A5) is proposed in this paper to deal with this conflicting objective optimization problem. The main strategy of A5 is selecting adaptive upper/lower bound of service capacity to decide the time for scheduling redundant virtual machines and a Pareto-front-based multi-objective optimization method to decide the number of scheduling virtual machines. We carried out experiments in simulation, which show that A5 can achieve much higher performance improvements in four different workload testing environments, compared with other three commonly used methods.
APA, Harvard, Vancouver, ISO, and other styles
4

Hope, Denise L., Gary D. Grant, Gary D. Rogers, and Michelle A. King. "Virtualized Gamified Pharmacy Simulation during COVID-19." Pharmacy 10, no. 2 (2022): 41. http://dx.doi.org/10.3390/pharmacy10020041.

Full text
Abstract:
Extended and immersive gamified pharmacy simulation has been demonstrated to provide transformative learning in pharmacy education, preparing graduates for real-world practice. An international consortium of universities has implemented local adaptations of the Pharmacy Game into their curricula. From early 2020, pharmacy academics modified the delivery of gamified simulation in response to the COVID-19 pandemic, while still aiming to deliver the important learning outcomes of enhanced communication, collaboration, confidence and competence. Australian universities went into full lockdown from March 2020, and the critical gamified simulation at Griffith University was delivered entirely virtually in 2020. An array of synchronous and asynchronous approaches and software platforms was employed, including Microsoft Teams, Forms and Stream plus the online interview platform Big Interview. These allowed for the simulation activities, including dispensing, counselling and clinical cases, to be conducted by students online. In 2021, Griffith University conducted hybrid delivery of its Pharmacy Game, balancing student participation both in person and online. Microsoft Power Apps was added to the hosting platform to enhance the simulation interface, and Power Virtual Agent artificial intelligence chatbots, with natural language processing, were used to enable asynchronous clinical interaction. The combination of learning technologies provided the means to deliver successful gamified simulation in the virtual and hybrid environments while still achieving outstanding learning outcomes from the capstone activity. This paper details the technologies used to virtualize the Australian Pharmacy Game and the analytics available to educators to assess student participation, engagement and performance.
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Qianqiao, Vaibhawa Mishra, Jose Nunez-Yanez, and Georgios Zervas. "Reconfigurable Network Stream Processing on Virtualized FPGA Resources." International Journal of Reconfigurable Computing 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/8785903.

Full text
Abstract:
The software defined network and network function virtualization are proposed to address the network ossification issue in current Internet infrastructure. Network functions and services are implemented as software applications to increase the programmability of network. However, involving general purpose processors in data plane restricts the bandwidth of network services. Therefore, to keep both the bandwidth and flexibility, a FPGA platform is suggested as a reconfigurable platform to deliver high bandwidth virtual network functions on data plane. In this paper, the FPGA resource has been virtualized by interconnecting partial reconfigurable regions to deliver high bandwidth reconfigurable processing on network streams. With the help of partial reconfiguration technology, network functions on our platform can be configured without affecting other functions on the same FPGA device. The on-chip interconnect system is further evaluated by comparing with existing network-on-chip system. A reconfiguration process is also proposed and demonstrated that it can be performed on our platform. The process can happen in the real time of network services and it is able to keep the original function working during the download of partial bitstream.
APA, Harvard, Vancouver, ISO, and other styles
6

Asvija, B., R. Eswari, and M. B. Bijoy. "Bayesian attack graphs for platform virtualized infrastructures in clouds." Journal of Information Security and Applications 51 (April 2020): 102455. http://dx.doi.org/10.1016/j.jisa.2020.102455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liao, Shengquan, Chunming Wu, Xiaoyan Hong, Kai Zhu, and Shuangxi Chen. "Virtualized Platform for Multicast Services in Software Defined Networks." Chinese Journal of Electronics 26, no. 3 (2017): 453–59. http://dx.doi.org/10.1049/cje.2016.08.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hsieh, Han-Chuan, Jiann-Liang Chen, and Abderrahim Benslimane. "5G Virtualized Multi-access Edge Computing Platform for IoT Applications." Journal of Network and Computer Applications 115 (August 2018): 94–102. http://dx.doi.org/10.1016/j.jnca.2018.05.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shamsolmoali, Pourya, and M. Afshar.Alam. "Framework for Cloud Computing Platform with a Virtualized Network Infrastructure." International Journal of Computer Applications 44, no. 1 (2012): 26–28. http://dx.doi.org/10.5120/6229-8309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mu, X., J. Wu, T. Li, Y. Zhong, and X. Gao. "Making Spatial Statistics Service Accessible On Cloud Platform." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XL-6 (April 23, 2014): 73–78. http://dx.doi.org/10.5194/isprsarchives-xl-6-73-2014.

Full text
Abstract:
Web service can bring together applications running on diverse platforms, users can access and share various data, information and models more effectively and conveniently from certain web service platform. Cloud computing emerges as a paradigm of Internet computing in which dynamical, scalable and often virtualized resources are provided as services. With the rampant growth of massive data and restriction of net, traditional web services platforms have some prominent problems existing in development such as calculation efficiency, maintenance cost and data security. In this paper, we offer a spatial statistics service based on Microsoft cloud. An experiment was carried out to evaluate the availability and efficiency of this service. The results show that this spatial statistics service is accessible for the public conveniently with high processing efficiency.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Virtualized platform"

1

Gran, Mikael, and Claes Karlsson. "Survey of VMware NSX Virtualized Network Platform : Utvärdering av VMware NSX Virtualized Network Platform." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-35596.

Full text
Abstract:
Atea Eskilstuna hade behovet av en plattform som kan förenkla och minska antalet konfigurationer vid implementation av kunder. Arbetet gick ut på att utvärdera plattformen VMware NSX och jämföra det mot traditionella nätverkslösningar. I dagens datacenter är virtualisering en viktig del av dess verksamhet. Användandet av virtualisering optimerar hanteringen av hårdvaru-resurser och kostnader. Virtualisering har hittills främst fokuserat på hantering av servrar och klienter, vilket har passerat nätverksutvecklingen, och därför har det uppstått vissa problem med traditionella datacenter gällande trafikflöden, säkerhet och implementering. Datacenter har tidigare varit optimerade för trafik som ska in eller ut ur datacentret. Detta har lett till att brandväggar och säkerhetspolicies ofta placerats vid datacentrets kant. I dagens datacenter har det däremot blivit en ökning på trafik mellan enheter inom datacentret som behöver skyddas. Denna typ av interna säkerhet kan uppnås av interna policies på samtliga nätverksenheter, dock blir det ohållbart vid implementation då antalet konfigurationspunkter i nätverket ökar. Dessa problem kan hanteras med hjälp av VMware NSX som virtualiserar nätverksenheter och centraliserar administration. NSX har en distribuerad brandväggs-funktion vilket medför att policies kan appliceras direkt på virtuella maskiner och virtuella routrar, från en central konfigurationspunkt. Detta ökar säkerheten och minskar implementationstiden jämfört med traditionella datacenter. Arbetet fokuserar på hur NSX arbetar till skillnad från fysiska nätverksenheter samt hur NSX hanterar frågor som trafikflöden, säkerhet och automation. För dessa ändamål byggdes en laborationsmiljö i Ravellos molntjänst med flertalet virtuella maskiner och en litteraturstudie utfördes. Laborationsmiljön användes för att sätta upp kunder med hjälp av virtuella nätverksenheter och virtuella maskiner. Laborationsmiljön användes som referens för hur implementation av NSX och dess funktioner går till. Litteraturstudien fokuserar på vad som är möjligt i NSX och vilka för- och nackdelar som finns med NSX jämfört med traditionella datacenter. Resultaten visade på att den enda nackdelen med NSX var dess licenskostnader.<br>Atea Eskilstuna had the need of a platform that simplify and reduce the number of configurations while implementing customer environments. The purpose of this thesis was to do a survey of VMware NSX networking platform and compare it to traditional networking solutions. The virtualization is an important part in data centers and its operations today. With the use of virtualization both hardware resources and costs optimizes. Virtualization has primary been focusing on servers and clients and the network evolution has been overlooked. Therefore, some problems have occurred within traditional data centers regarding traffic flows, security and management. Traditional datacenters have previously been optimized for traffic flows inbound or outbound of the datacenter. This optimization has led to implementation of firewalls and security policies at the datacenter edge. However, in the modern datacenters there’s been an increase of traffic flows between devices inside the datacenter, which needs to be secured. Securing these internal traffic flows can be accomplished through internal policies on the network devices. Implementing these policies however is not a scalable solution as the number of configuration points increases. These problems can be handled through VMware NSX which virtualize network units and centralizes administration. NSX provides a distributed firewall function that through a central management platform can be applied directly on groups of virtual machines and virtual routers. This approach increases security inside the datacenter as well as decreasing the implementation time compared to traditional datacenters. This thesis focus how NSX work unlike physical network units and how it handles issues like hairpinning, security and automation. A lab environment was built up in Ravellos cloud service with virtual machines and a literature study was made for this purpose. The lab environment was used to implement different customers with the help of virtual network components and virtual machines. This lab environment served as a reference point how implementation of NSX, its functions and components was made. The literature study focus on what is possible in NSX and which pros and cons that comes with NSX compared to traditional solutions in data centers. Results shows that the only cons with NSX is license costs.
APA, Harvard, Vancouver, ISO, and other styles
2

Antti, William. "Virtualized Functional Verification of Cross-Platform Software Applications." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74599.

Full text
Abstract:
With so many developers writing code, so many choose to become a developer every day, using tools to aid in the work process is needed. With all the testing being done for multiple different devices and sources there is a need to make it better and more efficient. In this thesis connecting the variety of different tools such as version control, project management, issue tracking and test systems is explored as a possible solution. A possible solution was implemented and then analyzed through a questionnaire that were answered by developers. For an example results as high as 75\% answering 5 if they liked the connection between the issue tracking system and the test results. 75\% also gave a 5 when asked about if they liked the way the test results were presented. The answers they gave about the implementation made it possible to conclude that it is possible to achieve a solution that can solve some of the presented problems. A better way to connect various tools to present and analyze the test results coming from multiple different sources.
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Chunyu. "VIRTUALIZED CLOUD PLATFORM MANAGEMENT USING A COMBINED NEURAL NETWORK AND WAVELET TRANSFORM STRATEGY." CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/615.

Full text
Abstract:
This study focuses on implementing a log analysis strategy that combines a neural network algorithm and wavelet transform. Wavelet transform allows us to extract the important hidden information and features of the original time series log data and offers a precise framework for the analysis of input information. While neural network algorithm constitutes a powerfulnonlinear function approximation which can provide detection and prediction functions. The combination of the two techniques is based on the idea of using wavelet transform to denoise the log data by decomposing it into a set of coefficients, then feed the denoised data into a neural network. The experimental outputs reveal that this strategy can have a better ability to identify the patterns among problems in a log dataset, and make predictions with a better accuracy. This strategy can help the platform maintainers to adopt corresponding actions to eliminate risks before the occurrence of serious damages.
APA, Harvard, Vancouver, ISO, and other styles
4

Alonso, López Javier. "Proactive software rejuvenation solution for web enviroments on virtualized platforms." Doctoral thesis, Universitat Politècnica de Catalunya, 2011. http://hdl.handle.net/10803/32034.

Full text
Abstract:
The availability of the Information Technologies for everything, from everywhere, at all times is a growing requirement. We use information Technologies from common and social tasks to critical tasks like managing nuclear power plants or even the International Space Station (ISS). However, the availability of IT infrastructures is still a huge challenge nowadays. In a quick look around news, we can find reports of corporate outage, affecting millions of users and impacting on the revenue and image of the companies. It is well known that, currently, computer system outages are more often due to software faults, than hardware faults. Several studies have reported that one of the causes of unplanned software outages is the software aging phenomenon. This term refers to the accumulation of errors, usually causing resource contention, during long running application executions, like web applications, which normally cause applications/systems to hang or crash. Gradual performance degradation could also accompany software aging phenomena. The software aging phenomena are often related to memory bloating/ leaks, unterminated threads, data corruption, unreleased file-locks or overruns. We can find several examples of software aging in the industry. The work presented in this thesis aims to offer a proactive and predictive software rejuvenation solution for Internet Services against software aging caused by resource exhaustion. To this end, we first present a threshold based proactive rejuvenation to avoid the consequences of software aging. This first approach has some limitations, but the most important of them it is the need to know a priori the resource or resources involved in the crash and the critical condition values. Moreover, we need some expertise to fix the threshold value to trigger the rejuvenation action. Due to these limitations, we have evaluated the use of Machine Learning to overcome the weaknesses of our first approach to obtain a proactive and predictive solution. Finally, the current and increasing tendency to use virtualization technologies to improve the resource utilization has made traditional data centers turn into virtualized data centers or platforms. We have used a Mathematical Programming approach to virtual machine allocation and migration to optimize the resources, accepting as many services as possible on the platform while at the same time, guaranteeing the availability (via our software rejuvenation proposal) of the services deployed against the software aging phenomena. The thesis is supported by an exhaustive experimental evaluation that proves the effectiveness and feasibility of our proposals for current systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Babatunde, John Oluwole. "Evaluating the impact of security measures on performance of secure web applications hosted on virtualised platforms." Thesis, University of East London, 2015. http://roar.uel.ac.uk/4771/.

Full text
Abstract:
The use of web applications has drastically increased over the years, and so has the need to secure these applications with effective security measures to ensure security and regulatory compliance. The problem arises when the impact and overheads associated with these security measures are not adequately quantified and factored into the design process of these applications. Organizations often resort to trading-off security compliance in order to achieve the required system performance. The aim of this research work is to quantify the impact of security measures on system performance of web applications and improve design decision-making in web application design process. This research work examines the implications of compliance and security measures on web applications and explores the possibility of extending the existing Queueing Network (QN) based models to predict the performance impact of security on web applications. The intention is that the results of this research work will assist system and web application designers in specifying adequate system capacity for secure web applications, hence ensuring acceptable system performance and security compliance. This research work comprises three quantitative studies organized in a sequential flow. The first study is an exploratory survey designed to understand the extent and importance of the security measures on system performance in organizations. The survey data was analyzed using descriptive statistics and Factor Analysis. The second study is an experimental study with a focus on causation. The study provided empirical data through sets of experiments proving the implications of security measures on a multi-tiered state-of-the-art web application - Microsoft SharePoint 2013. The experimental data were analyzed using the ANCOVA model. The third study is essentially a modeling-based study aimed at using the insights on the security implications provided by the second study. In the third study, using a well-established QN result - Mean Value Analysis (MVA) for closed networks, the study demonstrated how security measures could be incorporated into a QN model in an elegant manner with limited calculations. The results in this thesis indicated significant impact of security measures on web application with respect to response time, disk queue length, SQL latches and SQL database wait times. In a secure three-tiered web application the results indicated greater impacts on the web tier and database tier primarily due to encryption requirements dictated by several compliance standards, with smaller impact seen at the application tier. The modeling component of this thesis indicated a potential benefit in extending QN models to predict secure web application performance, although more work is needed to enhance the accuracy of the model. Overall, this research work contributes to professional practice by providing performance evaluation and predictive techniques for secure web applications that could be used in system design. From performance evaluations and QN modeling perspective, although three-tiered web application modeling has been widely studied, the view in this thesis is that this is the first attempt to look at security compliance in a three-tiered web application modeling on virtualized platforms.
APA, Harvard, Vancouver, ISO, and other styles
6

TSAI, MENG-CHIAO, and 蔡孟橋. "Design of Network Addressing for virtualized OPMDC based on OpenvSwitch Platform." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/3543ag.

Full text
Abstract:
碩士<br>國立交通大學<br>電信工程研究所<br>104<br>Network virtualization builds logical virtual networks that are abstracted from the underlying network hardware. Such abstraction not only improves resource efficiently, but also allows different tenants to efficiently access data center network resources on a secured and independent manner. The prevailing network virtualization solutions for data center are VXLAN and NVGRE. And most Cloud OSs also provide network virtualization in their system. Our study is based on the Optical Pyramid Data Center Network architecture (OPMDC) [3], which is built on three types of WSS-based optical switching nodes in three tiers. Because OPMDC doesn’t have layer 3 electrical network devices (e.g., router), the L2-L3 encapsulation mechanism of VLXAN and NVGRE can’t bring its layer 3 benefits to OPMDC but cause more packet overhead and more cost. And the multicast tenant address learning traffic of VXLAN and NVGRE will lead to low efficiency in optical path utilization. Aside from VXLAN and NVGRE, most cloud OSs also provide network virtualization. But most cloud OSs require a management network, which costs certain amount of optical channels and is inefficient for OPMDC. In this thesis, we design two network virtualization modules in host server based on OpenvSwitch. The first module we designed is called Mapping module, which improves the encapsulation and addressing mechanism to reduce the packet overhead. This module also handles the mapping of virtual IP address to physical IP address. The second module is called Communication module. This module mainly communicate with pod controller to update tenant information, and communication module will send updated tenant information to Mapping module. Communication module improves low optical path efficiency that cause by multicast address learning or by cloud OS management network. These two module makes virtualization more efficient in OPMDC. To demonstrate the functionality of our module, this thesis will take two different scenario to explain how this module work and its advantages. In this network virtualization system, we reduce the packet header overhead by 27.5% of packet compare to VXLAN, and 14.7% compare to NVGRE. And this system also improves the inefficient wavelength assignment by using out-of-band control.
APA, Harvard, Vancouver, ISO, and other styles
7

CHOU, CHUAN-HSIN, and 周傳欣. "Design Dynamic Virtualized Bandwidth Allocation Scheme to Improve Networking Performance in Cloud Platform." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/36806877297043781898.

Full text
Abstract:
碩士<br>東吳大學<br>資訊管理學系<br>105<br>Virtualization is necessary first step in realizing cloud computing. Most studies so far have only focused on CPU usage, memory and disk resources managements in the cloud environment. There is still not efficient tuning mechanism for virtualized bandwidth resource allocation, it cannot be flexibly adjusted in real time due to various types of applications and increasing number of packets. Therefore, this paper proposes a new virtualized mechanism for allocating and managing bandwidth resource, called Dynamic Virtualized Bandwidth Allocation (DVBA). In this paper, the DVBA scheme can employ the basis of SDN/OpenFlow centralized management architecture and also fix the inadequacies in static and fair bandwidth resource allocation of NETSHARE for virtualized bandwidth in a cloud platform. Hence, the proposed DVBA that allocates bandwidth resources from the perspective of Weighted Fair Queueing, in addition to providing corresponding resources to cloud users, and also considering loading status, quality of services, packet size and the usage of bandwidth queues. Then, we perform simulations to compare DVBA with NETSHARE using KPIs in terms of Throughput, Average Processing Time, and the Packet Latency. Finally, the experimental results indicate that DVBA has higher Throughput, lower Average Processing Time and Packet Latency in total averaging about 18.51%, 15.57%, and 47.96% for different cloud users, respectively. In the future, we will perform more simulations with other KPIs such like packet loss ratio to prove that the DVBA can dynamically adjust bandwidth allocation and enable easy tuning network resource for many more users cross the cloud platforms.
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Sheng-Lung, and 劉昇龍. "Application Tracing on Virtualized Firefox OS Platforms." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/05468867562627913826.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊工程學研究所<br>102<br>On a modern mobile device, the performance of a complex application may depend on a combination of several factors including operating system events, I/O devices and the application itself. Profiling and program analysis tools can help developers observe the behavior of an application. However, doing a system-wide execution profile is difficult for traditional profiling tools as it requires an integrated analysis of both kernel space and user space activities. The complexity of program analysis is even higher if application execution involves middleware like JavaScript engine or virtual machines. In this thesis, we describe an innovative static instrumentation and dynamic trigger method, called Smart Event Tracer(SET) Annotation, which is based on our previous work VPA. SET Annotation enables the users not only collect a complete trace of system activities and performance data but also collect the user-defined events with a little instrumentation overhead. User can insert SET Annotation into C/C++ program which is a popular programming language of developing middleware for JavaScript applications to get more profiling data. We integrate the SET Annotation framework into the Firefox OS emulator to collect JavaScript functions information for profiling web-applications. Comparing to the Firefox OS build-in profiler, our framework can monitor application behavior more realistically and provide more information. The experimental results show that the instrusiveness with SET Annotation is very light weight and much smaller than a general way.
APA, Harvard, Vancouver, ISO, and other styles
9

Liang, Fu-Tien, and 梁福田. "Power Estimation and Energy Saving of Smartphone Applications on Virtualized Platforms." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/59068504601808814876.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊工程學研究所<br>99<br>Energy-saving has become a major challenge for both hardware designers and software developers of mobile systems due to limited battery capacities. Analysis of the power consumption in such a system and employment of energy-saving techniques as early as possible is key to competitive products design. In the early design stage, virtualized platforms may help hardware designers in verifying the functional correctness of a design, as well as provide an environment for software developers to test their applications before the hardware is ready. In this thesis, we propose a framework, called Virtual Performace Evaluation (VPE) framework, which augments functional emulators to assist hardware and software developers in analyzing the performance and power of a target system. For power modeling, we provide two models: the processor-only model aims at the analysis of dynamic voltage and frequency scaling effects on the processor cores and the peripherals model targets at the power consumption of a full system. Our experimental results show that our VPE framework can reflect the performance and power behavior of smartphones and help hardware/software designers in reducing the energy consumption on these systems.
APA, Harvard, Vancouver, ISO, and other styles
10

VINUEZA, NARANJO PAOLA GABRIELA. "Energy Saving in QoS Fog-supported Data Centers." Doctoral thesis, 2018. http://hdl.handle.net/11573/1081356.

Full text
Abstract:
One of the most important challenges that cloud providers face in the explosive growth of data is to reduce the energy consumption of their designed, modern data centers. The majority of current research focuses on energy-efficient resources management in the infrastructure as a service (IaaS) model through "resources virtualization" - virtual machines and physical machines consolidation. However, actual virtualized data centers are not supporting communication–computing intensive real-time applications, big data stream computing (info-mobility applications, real-time video co-decoding). Indeed, imposing hard-limits on the overall per-job computing-plus-communication delays forces the overall networked computing infrastructure to quickly adopt its resource utilization to the (possibly, unpredictable and abrupt) time fluctuations of the offered workload. Recently, Fog Computing centers are as promising commodities in Internet virtual computing platform that raising the energy consumption and making the critical issues on such platform. Therefore, it is expected to present some green solutions (i.e., support energy provisioning) that cover fog-supported delay-sensitive web applications. Moreover, the usage of traffic engineering-based methods dynamically keep up the number of active servers to match the current workload. Therefore, it is desirable to develop a flexible, reliable technological paradigm and resource allocation algorithm to pay attention the consumed energy. Furthermore, these algorithms could automatically adapt themselves to time-varying workloads, joint reconfiguration, and orchestration of the virtualized computing-plus-communication resources available at the computing nodes. Besides, these methods facilitate things devices to operate under real-time constraints on the allowed computing-plus-communication delay and service latency. The purpose of this thesis is: i) to propose a novel technological paradigm, the Fog of Everything (FoE) paradigm, where we detail the main building blocks and services of the corresponding technological platform and protocol stack; ii) propose a dynamic and adaptive energy-aware algorithm that models and manages virtualized networked data centers Fog Nodes (FNs), to minimize the resulting networking-plus-computing average energy consumption; and, iii) propose a novel Software-as-a-Service (SaaS) Fog Computing platform to integrate the user applications over the FoE. The emerging utilization of SaaS Fog Computing centers as an Internet virtual computing commodity is to support delay-sensitive applications. The main blocks of the virtualized Fog node, operating at the Middleware layer of the underlying protocol stack and comprises of: i) admission control of the offered input traffic; ii) balanced control and dispatching of the admitted workload; iii) dynamic reconfiguration and consolidation of the Dynamic Voltage and Frequency Scaling (DVFS)-enabled Virtual Machines (VMs) instantiated onto the parallel computing platform; and, iv) rate control of the traffic injected into the TCP/IP connection. The salient features of this algorithm are that: i) it is adaptive and admits distributed scalable implementation; ii) it has the capacity to provide hard QoS guarantees, in terms of minimum/maximum instantaneous rate of the traffic delivered to the client, instantaneous goodput and total processing delay; and, iii) it explicitly accounts for the dynamic interaction between computing and networking resources in order to maximize the resulting energy efficiency. Actual performance of the proposed scheduler in the presence of: i) client mobility; ii) wireless fading; iii) reconfiguration and two-thresholds consolidation costs of the underlying networked computing platform; and, iv) abrupt changes of the transport quality of the available TCP/IP mobile connection, is numerically tested and compared to the corresponding ones of some state-of-the-art static schedulers, under both synthetically generated and measured real-world workload traces.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Virtualized platform"

1

Lee, Seung-Que, and Jinup Kim. "Evolving Toward Virtualized Mobile Access Platform for Service Flexibility." In Lecture Notes in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67380-6_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tao, Dan, Bingxu Wang, Zhaowen Lin, and Tin-Yu Wu. "Resource Scheduling and Data Locality for Virtualized Hadoop on IaaS Cloud Platform." In Big Data Computing and Communications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42553-5_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Yi, and Sheng Cao. "Discussion on the Construction of Power 3D Design Platform for Nested Virtualized Hybrid Cloud." In Communications in Computer and Information Science. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-8743-2_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Uwanpriya, S. D. L. S., W. H. Rankothge, N. D. U. Gamage, D. Jayasinghe, T. C. T. Gamage, and D. A. Amarasinghe. "Experimental Study on Resource Allocation for a Software-Defined Network-Based Virtualized Security Functions Platform." In Advances in Intelligent Systems and Computing. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-4676-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Yu-Kang, Ning Huang, and Yu-Ming Zhang. "Modeling of Human Welder Response Against 3D Weld Pool Surface Using Machine-Human Cooperative Virtualized Welding Platform." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18997-0_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barrett/Norris, Kenneth/Stephen. "Deploying Virtualized Mainframe Environments." In Running Mainframe z on Distributed Platforms. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6431-6_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Barrett/Norris, Kenneth/Stephen. "Creating a Mainframe Virtualized Environment: Requirements and Choices." In Running Mainframe z on Distributed Platforms. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6431-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sodhi, Balwinder, and T. V. Prabhakar. "Performance Characteristics of Virtualized Platforms from Applications Perspective." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32344-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cabuk, Serdar, Liqun Chen, David Plaquin, and Mark Ryan. "Trusted Integrity Measurement and Reporting for Virtualized Platforms." In Trusted Systems. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14597-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vasudevan, Amit. "Integrity-Protected Micro-Hypervisor on x86 and ARM Hardware Virtualized Platforms." In Practical Security Properties on Commodity Computing Platforms. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25049-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Virtualized platform"

1

Sladek, Predrag. "Comparative review of the surround speaker virtualizers on DSP platform." In 2024 32nd Telecommunications Forum (TELFOR). IEEE, 2024. https://doi.org/10.1109/telfor63250.2024.10819149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ruan, Anbang, Qingni Shen, and Yuanyou Yin. "A Generalized Trusted Virtualized Platform Architecture." In 2008 9th International Conference for Young Computer Scientists (ICYCS). IEEE, 2008. http://dx.doi.org/10.1109/icycs.2008.508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lauer, Hagen, Amin Sakzad, Carsten Rudolph, and Surya Nepal. "Bootstrapping Trust in a "Trusted" Virtualized Platform." In the 1st ACM Workshop. ACM Press, 2019. http://dx.doi.org/10.1145/3338511.3357347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chadha, Vineet, Ramesh Illiikkal, Ravi Iyer, Jaideep Moses, Donald Newell, and Renato J. Figueiredo. "I/O processing in a virtualized platform." In the 3rd international conference. ACM Press, 2007. http://dx.doi.org/10.1145/1254810.1254827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lentisco, Carlos M., Miguel Aguayo, Luis Bellido, Encarna Pastor, David De-Antonio-Monte, and Alejandro Garcia Bolivar. "A virtualized platform for analyzing LTE broadcast services." In 2015 European Conference on Networks and Communications (EuCNC). IEEE, 2015. http://dx.doi.org/10.1109/eucnc.2015.7194128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xia, Mingyuan, Miao Yu, Qian Lin, Zhengwei Qi, and Haibing Guan. "Enhanced Privilege Separation for Commodity Software on Virtualized Platform." In 2010 IEEE 16th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2010. http://dx.doi.org/10.1109/icpads.2010.96.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Been, Jae Man, Woo Seok Yang, Jung Ho Kim, and Jae-Oh Lee. "Management of IoT traffic using a virtualized IMS platform." In 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, 2015. http://dx.doi.org/10.1109/apnoms.2015.7275387.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rensaa, Jens-Andreas Hanssen, Danilo Gligoroski, Katina Kralevska, Anton Hasselgren, and Arild Faxvaag. "VerifyMed-A blockchain platform for transparent trust in virtualized healthcare." In IECC 2020: 2020 2nd International Electronics Communication Conference. ACM, 2020. http://dx.doi.org/10.1145/3409934.3409946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Yong, Li Su, Depeng Jin, and Lieguang Zeng. "TUNIE: A virtualized platform for network experiment on programmable infrastructure." In 2011 19th IEEE International Conference on Network Protocols (ICNP). IEEE, 2011. http://dx.doi.org/10.1109/icnp.2011.6089036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dlamini, Thembelihle, and Angel Fernandez Gambin. "Adaptive Resource Management for a Virtualized Computing Platform within Edge Computing." In 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). IEEE, 2019. http://dx.doi.org/10.1109/sahcn.2019.8824927.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!