Virtual Machine Application

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 33 Experts worldwide ranked by ideXlab platform

Chuliang Weng - One of the best experts on this subject based on the ideXlab platform.

  • ISPA - An Active Trusted Model for Virtual Machine Systems
    2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
    Co-Authors: Wentao Qu, Minglu Li, Chuliang Weng
    Abstract:

    Virtualization is a new area for research in recent years, and Virtualization technology can bring convenience to the management of computing resources. Together with the development of the network and the network computing, it gives the Virtualization technology more scenarios. The cloud computing technology uses the Virtualization technology as while. With the development of the technology, it meets some security problems, such as rootkit attacks and malignant tampers. Malicious programs can plug into the system, and be booted at the any time of the Virtualized system. There is little theoretical research on booting a trusted Virtualized system. We propose an active trusted model in order to give a theoretical model for not only analyzing the state of a Virtualized system, but also helping to design trusted Virtual Machine Application. TBoot is a project to boot a trusted Virtual Machine. We use our model to illustrate that TBoot can boot a trusted Virtual Machine theoretically.

  • An Active Trusted Model for Virtual Machine Systems
    2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
    Co-Authors: Wentao Qu, Minglu Li, Chuliang Weng
    Abstract:

    Virtualization is a new area for research in recent years, and Virtualization technology can bring convenience to the management of computing resources. Together with the development of the network and the network computing, it gives the Virtualization technology more scenarios. The cloud computing technology uses the Virtualization technology as while. With the development of the technology, it meets some security problems, such as rootkit attacks and malignant tampers. Malicious programs can plug into the system, and be booted at the any time of the Virtualized system. There is little theoretical research on booting a trusted Virtualized system. We propose an active trusted model in order to give a theoretical model for not only analyzing the state of a Virtualized system, but also helping to design trusted Virtual Machine Application. TBoot is a project to boot a trusted Virtual Machine. We use our model to illustrate that TBoot can boot a trusted Virtual Machine theoretically.

Wentao Qu - One of the best experts on this subject based on the ideXlab platform.

  • ISPA - An Active Trusted Model for Virtual Machine Systems
    2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
    Co-Authors: Wentao Qu, Minglu Li, Chuliang Weng
    Abstract:

    Virtualization is a new area for research in recent years, and Virtualization technology can bring convenience to the management of computing resources. Together with the development of the network and the network computing, it gives the Virtualization technology more scenarios. The cloud computing technology uses the Virtualization technology as while. With the development of the technology, it meets some security problems, such as rootkit attacks and malignant tampers. Malicious programs can plug into the system, and be booted at the any time of the Virtualized system. There is little theoretical research on booting a trusted Virtualized system. We propose an active trusted model in order to give a theoretical model for not only analyzing the state of a Virtualized system, but also helping to design trusted Virtual Machine Application. TBoot is a project to boot a trusted Virtual Machine. We use our model to illustrate that TBoot can boot a trusted Virtual Machine theoretically.

  • An Active Trusted Model for Virtual Machine Systems
    2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
    Co-Authors: Wentao Qu, Minglu Li, Chuliang Weng
    Abstract:

    Virtualization is a new area for research in recent years, and Virtualization technology can bring convenience to the management of computing resources. Together with the development of the network and the network computing, it gives the Virtualization technology more scenarios. The cloud computing technology uses the Virtualization technology as while. With the development of the technology, it meets some security problems, such as rootkit attacks and malignant tampers. Malicious programs can plug into the system, and be booted at the any time of the Virtualized system. There is little theoretical research on booting a trusted Virtualized system. We propose an active trusted model in order to give a theoretical model for not only analyzing the state of a Virtualized system, but also helping to design trusted Virtual Machine Application. TBoot is a project to boot a trusted Virtual Machine. We use our model to illustrate that TBoot can boot a trusted Virtual Machine theoretically.

Makoto Takizawa - One of the best experts on this subject based on the ideXlab platform.

  • A Model for Migration of Virtual Machines to Reduce Electric Energy Consumption
    2016 10th International Conference on Complex Intelligent and Software Intensive Systems (CISIS), 2016
    Co-Authors: Dilawaer Duolikun, Ryo Watanabe, Tomoya Enokido, Makoto Takizawa
    Abstract:

    We have to reduce the electric energy consumed by servers in a cluster in order to realize eco-society. Types of algorithms for a request process to select an energy-efficient server in a cluster of servers are proposed in our previous studies. Furthermore, algorithms for energy-efficiently migrating a process on a host server to a more energy-efficient guest server is discussed. Virtual Machines are now widely used to support Applications with Virtual computation service in cloud computing systems. Here, a Virtual Machine can migrate to a guest server, e.g. which is less loaded. By migrating a Virtual Machine, Application processes performed on the Virtual Machine can also migrate from a host server to another guest server. In this paper, we newly propose an energy-aware migration algorithm of Virtual Machines (EAMV). Here, processes on a Virtual Machine can migrate to a guest server which consumes smaller electric energy and can be energy-efficiently performed in a cluster. We evaluate the EAMV algorithm compared with non-migration algorithms in terms of the total electric energy consumption and execution time of processes. We show the electric energy consumption and average execution time can be reduced in the EAMV algorithm.

  • CISIS - A Model for Migration of Virtual Machines to Reduce Electric Energy Consumption
    2016 10th International Conference on Complex Intelligent and Software Intensive Systems (CISIS), 2016
    Co-Authors: Dilawaer Duolikun, Ryo Watanabe, Tomoya Enokido, Makoto Takizawa
    Abstract:

    We have to reduce the electric energy consumed by servers in a cluster in order to realize eco-society. Types of algorithms for a request process to select an energy-efficient server in a cluster of servers are proposed in our previous studies. Furthermore, algorithms for energy-efficiently migrating a process on a host server to a more energy-efficient guest server is discussed. Virtual Machines are now widely used to support Applications with Virtual computation service in cloud computing systems. Here, a Virtual Machine can migrate to a guest server, e.g. which is less loaded. By migrating a Virtual Machine, Application processes performed on the Virtual Machine can also migrate from a host server to another guest server. In this paper, we newly propose an energy-aware migration algorithm of Virtual Machines (EAMV). Here, processes on a Virtual Machine can migrate to a guest server which consumes smaller electric energy and can be energy-efficiently performed in a cluster. We evaluate the EAMV algorithm compared with non-migration algorithms in terms of the total electric energy consumption and execution time of processes. We show the electric energy consumption and average execution time can be reduced in the EAMV algorithm.

Minglu Li - One of the best experts on this subject based on the ideXlab platform.

  • ISPA - An Active Trusted Model for Virtual Machine Systems
    2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
    Co-Authors: Wentao Qu, Minglu Li, Chuliang Weng
    Abstract:

    Virtualization is a new area for research in recent years, and Virtualization technology can bring convenience to the management of computing resources. Together with the development of the network and the network computing, it gives the Virtualization technology more scenarios. The cloud computing technology uses the Virtualization technology as while. With the development of the technology, it meets some security problems, such as rootkit attacks and malignant tampers. Malicious programs can plug into the system, and be booted at the any time of the Virtualized system. There is little theoretical research on booting a trusted Virtualized system. We propose an active trusted model in order to give a theoretical model for not only analyzing the state of a Virtualized system, but also helping to design trusted Virtual Machine Application. TBoot is a project to boot a trusted Virtual Machine. We use our model to illustrate that TBoot can boot a trusted Virtual Machine theoretically.

  • An Active Trusted Model for Virtual Machine Systems
    2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
    Co-Authors: Wentao Qu, Minglu Li, Chuliang Weng
    Abstract:

    Virtualization is a new area for research in recent years, and Virtualization technology can bring convenience to the management of computing resources. Together with the development of the network and the network computing, it gives the Virtualization technology more scenarios. The cloud computing technology uses the Virtualization technology as while. With the development of the technology, it meets some security problems, such as rootkit attacks and malignant tampers. Malicious programs can plug into the system, and be booted at the any time of the Virtualized system. There is little theoretical research on booting a trusted Virtualized system. We propose an active trusted model in order to give a theoretical model for not only analyzing the state of a Virtualized system, but also helping to design trusted Virtual Machine Application. TBoot is a project to boot a trusted Virtual Machine. We use our model to illustrate that TBoot can boot a trusted Virtual Machine theoretically.

Dilawaer Duolikun - One of the best experts on this subject based on the ideXlab platform.

  • A Model for Migration of Virtual Machines to Reduce Electric Energy Consumption
    2016 10th International Conference on Complex Intelligent and Software Intensive Systems (CISIS), 2016
    Co-Authors: Dilawaer Duolikun, Ryo Watanabe, Tomoya Enokido, Makoto Takizawa
    Abstract:

    We have to reduce the electric energy consumed by servers in a cluster in order to realize eco-society. Types of algorithms for a request process to select an energy-efficient server in a cluster of servers are proposed in our previous studies. Furthermore, algorithms for energy-efficiently migrating a process on a host server to a more energy-efficient guest server is discussed. Virtual Machines are now widely used to support Applications with Virtual computation service in cloud computing systems. Here, a Virtual Machine can migrate to a guest server, e.g. which is less loaded. By migrating a Virtual Machine, Application processes performed on the Virtual Machine can also migrate from a host server to another guest server. In this paper, we newly propose an energy-aware migration algorithm of Virtual Machines (EAMV). Here, processes on a Virtual Machine can migrate to a guest server which consumes smaller electric energy and can be energy-efficiently performed in a cluster. We evaluate the EAMV algorithm compared with non-migration algorithms in terms of the total electric energy consumption and execution time of processes. We show the electric energy consumption and average execution time can be reduced in the EAMV algorithm.

  • CISIS - A Model for Migration of Virtual Machines to Reduce Electric Energy Consumption
    2016 10th International Conference on Complex Intelligent and Software Intensive Systems (CISIS), 2016
    Co-Authors: Dilawaer Duolikun, Ryo Watanabe, Tomoya Enokido, Makoto Takizawa
    Abstract:

    We have to reduce the electric energy consumed by servers in a cluster in order to realize eco-society. Types of algorithms for a request process to select an energy-efficient server in a cluster of servers are proposed in our previous studies. Furthermore, algorithms for energy-efficiently migrating a process on a host server to a more energy-efficient guest server is discussed. Virtual Machines are now widely used to support Applications with Virtual computation service in cloud computing systems. Here, a Virtual Machine can migrate to a guest server, e.g. which is less loaded. By migrating a Virtual Machine, Application processes performed on the Virtual Machine can also migrate from a host server to another guest server. In this paper, we newly propose an energy-aware migration algorithm of Virtual Machines (EAMV). Here, processes on a Virtual Machine can migrate to a guest server which consumes smaller electric energy and can be energy-efficiently performed in a cluster. We evaluate the EAMV algorithm compared with non-migration algorithms in terms of the total electric energy consumption and execution time of processes. We show the electric energy consumption and average execution time can be reduced in the EAMV algorithm.