Results 1 to 10 of about 50 (50)
Virtual Machine Introspection [PDF]
Cyberattacks targeted at virtualization infrastructure\ud underlying cloud computing services has become increasingly\ud sophisticated. This paper presents a novel malware and rookit detection\ud system which protects the guests against different attacks.\ud It combines system call monitoring and system call hashing on the\ud guest kernel together with
Win, Thu Yein+4 more
openaire +2 more sources
Virtual Numbers for Virtual Machines? [PDF]
Knowing the number of virtual machines (VMs) that a cloud physical hardware can (further) support is critical as it has implications on provisioning and hardware procurement. However, current methods for estimating the maximum number of VMs possible on a given hardware is usually the ratio of the specifications of a VM to the underlying cloud hardware ...
Alan Y.S. Tan+2 more
openaire +1 more source
The case for virtual register machines [PDF]
AbstractVirtual machines (VMs) are a popular target for language implementers. A long-running question in the design of virtual machines has been whether stack or register architectures can be implemented more efficiently with an interpreter. Many designers favour stack architectures since the location of operands is implicit in the stack pointer.
Gregg, David+4 more
openaire +8 more sources
The hiphop virtual machine [PDF]
The HipHop Virtual Machine (HHVM) is a JIT compiler and runtime for PHP. While PHP values are dynamically typed, real programs often have latent types that are useful for optimization once discovered. Some types can be proven through static analysis, but limitations in the ahead-of-time approach leave some types to ...
Andrew John Paroski+7 more
openaire +2 more sources
The Resource Description Framework (RDF) is a semantic network data model that is used to create machine-understandable descriptions of the world and is the basis of the Semantic Web. This article discusses the application of RDF to the representation of computer software and virtual computing machines.
openaire +3 more sources
Performance profiling of virtual machines [PDF]
Profilers based on hardware performance counters are indispensable for performance debugging of complex software systems. All modern processors feature hardware performance counters, but current virtual machine monitors (VMMs) do not properly expose them to the guest operating systems.
Du, Jiaqing+2 more
openaire +4 more sources
Cloud Virtual Machine Scheduling: Modelling the Cloud Virtual Machine Instantiation
Cloud computing provides an efficient and flexible means for various services to meet the diverse and escalating needs of IT end-users. It offers novel functionalities including the utilization of remote services in addition to the virtualization technology. The latter feature offers an efficient method to harness the cloud power by fragmenting a cloud
Sotiriadis, Stelios+3 more
openaire +2 more sources
There has been a huge growth of social network in the recent years. This trend does not only allow us to get connected and share the information in an efficient way, but also reveals some potential beneficial in dealing with several social issues, such as earthquake detection, social spam detection, flu pandemic tracking, media monitoring, etc. In this
Huynh, Loi, Stanchev, Peter
openaire +3 more sources
Virtual class support at the virtual machine level [PDF]
This paper describes how virtual classes can be supported in a virtual machine. Main-stream virtual machines such as the Java Virtual Machine and the .NET platform dominate the world today, and many languages are being executed on these virtual machines even though their embodied design choices conflict with the design choices of the virtual machine ...
Nielsen, Anders Bach, Ernst, Erik
openaire +3 more sources
Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the Cloud [PDF]
In Chapters 3 and 4, we described how a service provider can ensure that the infrastructure on which the workloads and applications are instantiated has boot integrity, and how these workloads can be placed in trusted pools with compute assets exhibiting demonstrated trust that is rooted in hardware.
Raghu Yeluri, Enrique Castro-Leon
openaire +2 more sources