Filters








8,411 Hits in 2.7 sec

Attacking the process migration bottleneck

E. Zayas
1987 Proceedings of the eleventh ACM Symposium on Operating systems principles - SOSP '87  
Moving the contents of a large virtual address space stands out as the bottleneck in process migration, dominating all other costs and growing with the size of the program.  ...  Any attempt to make process migration a more usable and attractive facility in the presence of large address spaces must focus on this basic bottleneck. One approach is to perform a  ...  migration bottleneck.  ... 
doi:10.1145/41457.37503 dblp:conf/sosp/Zayas87 fatcat:xemulnfjdvb3jlivqfmawbjij4

Attacking the process migration bottleneck

E. Zayas
1987 ACM SIGOPS Operating Systems Review  
Moving the contents of a large virtual address space stands out as the bottleneck in process migration, dominating all other costs and growing with the size of the program.  ...  Any attempt to make process migration a more usable and attractive facility in the presence of large address spaces must focus on this basic bottleneck. One approach is to perform a  ...  migration bottleneck.  ... 
doi:10.1145/37499.37503 fatcat:bzq6cylpljg4nhkkkc7uk47v7y

Scotch

An Wang, Yang Guo, Fang Hao, T.V. Lakshman, Songqing Chen
2014 Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies - CoNEXT '14  
However, the use of centralized controllers can affect network performance if the control path between the switches and their associated controllers becomes a bottleneck.  ...  This can cause performance degradation if the switch has to handle a high traffic load, as for instance due to flash crowds or DDoS attacks.  ...  The authors thank anonymous reviewers for their constructive comments. Yang Guo would like to thank Muralidharan Kodialam for helpful discussions.  ... 
doi:10.1145/2674005.2675002 dblp:conf/conext/WangGHLC14 fatcat:hyftekm42fcydnwlxelytw2ywe

Security Management Model in Cloud Computing Environment [article]

Seyed Hossein Ahmadpanah
2016 arXiv   pre-print
and scheduling, study of which virtual machine security architecture, based on AHP (Analytic Hierarchy Process) virtual machine deployment and scheduling method, based on CUSUM (Cumulative Sum) DDoS attack  ...  In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge.  ...  machine live migration bottleneck is the physical process of dynamic equilibrium of resources and time, therefore, for the consumption of resources can with the number of virtual machines live migration  ... 
arXiv:1611.08889v1 fatcat:5viqykksxfeuzkmnawvvelcmse

A mathematical framework for modeling and analyzing migration time

Feng Luan, Mads Nygård, Thomas Mestl
2010 Proceedings of the 10th annual joint conference on Digital libraries - JCDL '10  
This paper chooses a process modeling approach to obtain estimates of upper and lower bounds for the required migration time.  ...  The advantage is that information about potential bottlenecks can be acquired.  ...  ACKNOWLEDGMENTS Research on this subject has been funded by the Norwegian Research Council and our industry partners under the LongRec project.  ... 
doi:10.1145/1816123.1816172 dblp:conf/jcdl/LuanNM10 fatcat:4fvm3s7ue5dati36ie277ayzdi

Attacking the migration bottleneck of mobile agents

Peter Braun, Steffen Kern, Ingo Müller, Ryszard Kowalczyk
2005 Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems - AAMAS '05  
Although this thesis has been proved in many application scenarios, it was also shown that the performance of mobile agents suffers from too simple migration strategies in many other scenarios.  ...  large amount of data to the client.  ...  Instead of abandoning the concept of mobile agents, we propose to improve the migration process of mobile agents.  ... 
doi:10.1145/1082473.1082712 dblp:conf/atal/BraunKMK05 fatcat:aba2vqj7e5ewnhzldpjb56z3t4

Page 129 of The Journal of Animal Ecology Vol. 74, Issue 1 [page]

2005 The Journal of Animal Ecology  
Science Publishers, USA Kersten, M. & Visser, W. (1996) The rate of food processing in oystercatchers: food intake and energy expenditure constrained by a digestive bottleneck.  ...  Foraging and processing costs estimated by the doubly labelled water method. Journal of Experimental Biology, 206, 3361-3368.  ... 

Creating a Cyber Moving Target for Critical Infrastructure Applications [chapter]

Hamed Okhravi, Adam Comella, Eric Robinson, Stephen Yannalfo, Peter Michaleas, Joshua Haines
2011 IFIP Advances in Information and Communication Technology  
By changing the platform on-the-fly, TALENT creates a cyber moving target and significantly raises the bar for a successful attack against a critical application.  ...  Despite the significant amount of effort that often goes into securing critical infrastructure assets, many systems remain vulnerable to advanced, targeted cyber attacks.  ...  Acknowledgements This work was sponsored by the U.S. Department of Defense under Air Force Contract FA8721-05-C-0002.  ... 
doi:10.1007/978-3-642-24864-1_8 fatcat:mx6uzb2znffgrm3janlbq4lyzu

Supporting Dynamic Migration in Tightly Coupled Grid Applications

Liang Chen, Qian Zhu, Gagan Agrawal
2006 ACM/IEEE SC 2006 Conference (SC'06)  
We have extensively evaluated our implementation using three stream data processing applications, and show that the use of LSS allows efficient process migration.  ...  Our implementation and evaluation of LSS based process migration has been in the context of the GATES (Grid-based Adap-Tive Execution on Streams) middleware that we have been developing.  ...  Realtor [19] is a protocol for supporting survivability and information assurance by migrating components to safe locations under circumstances of external attack, malfunction, or lack of resources.  ... 
doi:10.1109/sc.2006.58 fatcat:hdr74xp5b5bs5noctiyck2oo4a

UCYMICRA: Distributed Indexing of the Web Using Migrating Crawlers [chapter]

Odysseas Papapetrou, Stavros Papastavrou, George Samaras
2003 Lecture Notes in Computer Science  
The traditional crawling methods are no longer able to catch up with the constantly updating and growing Web.  ...  Realizing the problem, in this paper we suggest an alternative distributed crawling method with the use of mobile agents.  ...  More specifically, the traditional crawling model fails for the following reasons: • The task of processing the crawled data introduces a vast processing bottleneck at the search engine site.  ... 
doi:10.1007/978-3-540-39403-7_12 fatcat:2mgtbf57c5gndo4jqhjlxdag4a

Intrusion Detection and Countermeasure of Virtual Cloud Systems - State of the Art and Current Challenges

Andrew Carlin, Mohammad Hammoudeh, Omar Aldabbas
2015 International Journal of Advanced Computer Science and Applications  
Distributed Denial of Service (DDoS) attacks are becoming more frequent and effective over the past few years, since the widely publicised DDoS attacks on the financial services industry that came to light  ...  in September and October 2012 and resurfaced in the past two years.  ...  A common response to an attack is to migrate users to new VMs through either physical or logical migration. This uses the strengths of VMs and helps to enforce the principles of isolation.  ... 
doi:10.14569/ijacsa.2015.060601 fatcat:4qci2ag4sngjjdkgh36uhboxde

Detection of Performance Anomalies in Cloud Services: A Correlation Analysis Approach

Ghodai M. Abdelrahman
2016 International Journal Of Mechanical Engineering And Information Technology  
The changes are only present on specific time points to testify the detection rate.  ...  Second, the same benchmark is executed again but with changing the workload characteristics through injecting additional queries or changing the computing resources configuration values of the virtual  ...  process. d.  ... 
doi:10.18535/ijmeit/v4i9.06 fatcat:z45pyklkszdhhlfoc6iocyjome

An end-to-end approach to host mobility

Alex C. Snoeren, Hari Balakrishnan
2000 Proceedings of the 6th annual international conference on Mobile computing and networking - MobiCom '00  
Our architecture is secure--name updates are effected via the secure DNS update protocol, while TCP connection migration uses a novel set of Migrate options--and provides a pure end-system altemative to  ...  Our performance experiments show that handoff times are governed by TCP migrate latencies, and are on the order of a round-trip time of the communicating peers.  ...  We are indebted to David Andersen, who helped improve the security of our initial Migrate scheme, and David Mazieres, who suggested we use Elliptic Curve Diffie-Hellman key exchange for additional key  ... 
doi:10.1145/345910.345938 dblp:conf/mobicom/SnoerenB00 fatcat:46rswej7hvee7i3kjiuonorhp4

Multi Scheduling Reactive Resource Sharing for Dynamic Dataflow in Cloud Environment

L. Gokila, V. Poongodi, Dr.K. Thangadurai
2016 Bonfring International Journal of Data Mining  
In recent years cloud parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds.  ...  The problem can be addressed by replacing with more energy efficient infrastructures, but the process of switching to new infrastructure is not only costly but also time consuming.  ...  Especially, with only one bottleneck resource, the number of servers in use is bounded by the optimal value. We also prove that the number of VM migrations is bounded as well.  ... 
doi:10.9756/bijdm.8307 fatcat:rxw5tqleircvvdg5teoqc6d5z4

A new form of DOS attack in a cloud and its avoidance mechanism

Huan Liu
2010 Proceedings of the 2010 ACM workshop on Cloud computing security workshop - CCSW '10  
In this paper, we describe a new form of DOS attack, which exploits the network under-provisioning in a cloud infrastructure.  ...  We have verified that such an attack could be carried out in practice in one cloud infrastructure. We also describe a mechanism to detect and avoid this new form of attack.  ...  To perform such an attack, an adversary must first identify a bottleneck link in the network to attack.  ... 
doi:10.1145/1866835.1866849 dblp:conf/ccs/Liu10 fatcat:ir2xvipatvbrxlo5uk6syltope
« Previous Showing results 1 — 15 out of 8,411 results