Results 81 to 90 of about 5,262 (215)
Tracing ext3 file system operations in the QEMU emulator
The paper proposes an approach to monitoring file operations through capturing virtual disk accesses in the emulator. This method allows obtaining information about file operations in the OS-agnostic manner but requires a separate implementation for each
V. M. Stepanov +2 more
doaj
Sharing physical resources among virtual instances introduces time overhead in comparison with direct access to hardware. Such lag is not significant for most of the everyday tasks however it can influence much more in dealing with time-critical ...
Korniichuk Mykola +6 more
doaj +1 more source
PTfuzz: Guided Fuzzing With Processor Trace Feedback
Greybox fuzzing, such as american fuzzy lop (AFL), is very efficient in finding software vulnerability, which makes it the state-of-the-art fuzzing technology.
Gen Zhang +4 more
doaj +1 more source
Predicting financial markets with Google Trends and not so random keywords
We check the claims that data from Google Trends contain enough data to predict future financial index returns. We first discuss the many subtle (and less subtle) biases that may affect the backtest of a trading strategy, particularly when based on such ...
Ayed, Ahmed Bel Hadj, Challet, Damien
core +3 more sources
Building Resilient Cloud Over Unreliable Commodity Infrastructure
Cloud Computing has emerged as a successful computing paradigm for efficiently utilizing managed compute infrastructure such as high speed rack-mounted servers, connected with high speed networking, and reliable storage.
Bansal, Sorav +3 more
core +1 more source
QLOOP: Linux driver to mount QCOW2 virtual disks [PDF]
Development of a Linux module that converts a QCOW2 file (a disk image format employed by QEMU and KVM projects) into a block ...
Zacarias Ribot, Francesc
core
More Accurate Estimation of Working Set Size in Virtual Machines
Accurate working set size estimation is important to increase the consolidation ratio of data centers and to improve the efficiency of live migration. Thus, it is important to come up with a technique that provides an accurate estimation of the working ...
Ahmed A. Harby +2 more
doaj +1 more source
Virtual TPM for a secure cloud: fallacy or reality? [PDF]
The cloud technology has dramatically increased the virtualisation usage during the last years. Nevertheless, the virtualisation has also imposed some challenges on the security of the cloud.
Cucurull, Jordi, Guasch, Sandra
core
Network operators are facing significant challenges meeting the demand for more bandwidth, agile infrastructures, innovative services, while keeping costs low.
Lombardo, Francesco +6 more
core +1 more source
Automatic uninitialized value usage detection during full-system emulation
Developed method, which is described in this paper, is capable of automated detection of uninitialized values within the scope of full-system emulation.
N. A. Belov
doaj +1 more source

