Filters








12 Hits in 4.5 sec

Compatibility Is Not Transparency: VMM Detection Myths and Realities

Tal Garfinkel, Keith Adams, Andrew Warfield, Jason Franklin
2007 USENIX Workshop on Hot Topics in Operating Systems  
We conclude that building a transparent VMM is fundamentally infeasible, as well as impractical from a performance and engineering standpoint.  ...  We survey anomalies between real and virtual hardware and consider methods for detecting such anomalies, as well as possible countermeasures.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the Department of Homeland Security.  ... 
dblp:conf/hotos/GarfinkelAWF07 fatcat:xwwhhadslzet3imzgannklltm4

Cloud Computing Uncovered: A Research Landscape [chapter]

Mohammad Hamdaqa, Ladan Tahvildari
2012 Advances in Computers  
It is important to learn from what already exists, and to be able to distinguish between what is new and what can be reused.  ...  Today, many research areas and projects under the cloud umbrella need to be sorted and classified.  ...  This technique is very efficient both in terms of performance and in terms of compatibility with the guest OS, which does not need to know that it is virtualized.  ... 
doi:10.1016/b978-0-12-396535-6.00002-8 fatcat:bux7fshrvnez7fijeufxzw4fpa

Effective resource and workload management in data centers

Lei Lu, Evgenia Smirni
2014 2014 IEEE Network Operations and Management Symposium (NOMS)  
In the unlikely even t that the author did not send a com plete m anuscript and there are missing pages, these will be noted. Also, if m aterial had to be rem oved, a note will indicate the deletion.  ...  All rights reserved IN F O R M A T IO N T O A LL U S E R S T h e quality of this reproduction is dependent upon the quality of the copy submitted.  ...  Achieving application-centric performance targets via consolida tion on multicores: myth or reality?  ... 
doi:10.1109/noms.2014.6838287 dblp:conf/noms/LuS14 fatcat:nk2l6njvzbhkfmhg6f5ewimf6m

Challenges in real-time virtualization and predictable cloud computing

Marisol García-Valls, Tommaso Cucinotta, Chenyang Lu
2014 Journal of systems architecture  
such as online video streaming, cloud-based gaming, and telecommunication management.  ...  This paper identifies the technical challenges in supporting real-time applications in the cloud, surveys recent advancement in real-time virtualization and cloud computing technology, and offers research  ...  Programme for International Research Stays funded by the Spanish Ministry of Education under contract PRX12/00252; by the Spanish National Project REM4VSS (TIN2011-28339); by the US ONR award N000141310800; and  ... 
doi:10.1016/j.sysarc.2014.07.004 fatcat:ksxq4ufrc5fuhluo4uw6rbowhi

SoK: Understanding BFT Consensus in the Age of Blockchains [article]

Gang Wang
2021 IACR Cryptology ePrint Archive  
Its decentralization, immutability, and transparency have attracted many applications to adopt the design philosophy of blockchain and customize various replicated solutions.  ...  And later, this communication complexity is reduced by removing the term n 3 when the input is small [125] .  ...  an ongoing attack is not detected), but also is not resilient to crashes.  ... 
dblp:journals/iacr/Wang21c fatcat:wggbkbi25fg43fieebp4qzlk3m

Intel SGX Explained [article]

Victor Costan, Srinivas Devadas
2016 IACR Cryptology ePrint Archive  
Intel's Software Guard Extensions (SGX) is a set of extensions to the Intel architecture that aims to provide integrity and confidentiality guarantees to securitysensitive computation performed on a computer  ...  where all the privileged software (kernel, hypervisor, etc) is potentially malicious.  ...  Memory The TLB is transparent to application software. However, kernels and hypervisors must make sure that the TLBs do not get out of sync with the page tables and EPTs.  ... 
dblp:journals/iacr/CostanD16 fatcat:vzg7uthif5fqfbx5pdz3ocs7va

CLOUD COMPUTING 2010 Committee CLOUD COMPUTING Advisory Chairs CLOUD COMPUTING 2010 Technical Program Committee

Cloud Computing Spain, Wolfgang Gentzsch, Deisa Eu Project, Ogf Board Of Directors Of, Germany Teemu Kanstren, Vtt, Finland Koschel, Fachhochschule Hannover
2010 Editors Ali Beklen   unpublished
Also, this event could not have been a reality without the support of many individuals, organizations, and sponsors.  ...  The creation of such a broad and high quality conference program would not have been possible without their involvement.  ...  We also implicate cloud computing technology and services will be more diversity, hybrid and suitable for their services usage and contexts. This paper is limited to the four company cases analysis.  ... 
fatcat:uzjn7zcaobgyroub3k43ugiltu

Data Protection in Personalized AI Services: A Decentralized Approach

Christian Meurisch
2021
While approaches to data protection are manifold, each of them makes a certain tradeoff between personalization, privacy, and applicability -- there is no practical one-size-fits-all solution.  ...  As a result, this work comprises seven (7) major contributions, two for the systematic understanding of data protection and privacy requirements in AI services, and five technical contributions -- of the  ...  Last but not least, PDSProxy++ works on access-restricted devices (A.4), which is well-suited for such open infrastructures and compatible with their (standard) security mechanisms.  ... 
doi:10.26083/tuprints-00019355 fatcat:5yhxebta4jeo7bhfxrgbhfn324

Special Issue Editorial Using Classification and Roadmapping techniques for Smart City viability's realization

Frank Bannister, Walter Castelnovo, Leonidas Anthopoulos, Panos Fitsilis
unpublished
The result is a valuable framework and a couple of hypotheses, namely that not all smart technologies are suitable for all cities and not all approaches need rely on technological solutions.  ...  This is a rich paper which it is not possible to summarise in a few sentences; for anybody who would like a good introduction to this field and an excellent overview of the challenges of implementing such  ...  Acknowledgements This paper is supported by the "Enterprise Architecture for Digital Cities (EADIC)" research project, which is being developed between 2012 and 2014, and funded by the Greek General Secretary  ... 
fatcat:r7ykj6zcibcu5exqfa5wxkhisa

Dagstuhl Reports, Volume 5, Issue 10, October 2015, Complete Issue [article]

2016
in dynamic routing, experience different travel times between common origin and destination.  ...  A comparison of travel times with simulation tools like MATSim and VISSIM demonstrates the applicability of our approach.  ...  as common ancestry and genetic compatibility tests.  ... 
doi:10.4230/dagrep.5.10 fatcat:u44u5pkszbayti24uerfh3wifu

The Synergy Between Programming Languages and Cryptography (Dagstuhl Seminar 14492) Programming Languages for Big Data (PlanBig) (Dagstuhl Seminar 14511) Collective Adaptive Systems: Qualitative and Quantitative Modelling and Analysis (Dagstuhl Seminar 14512)

Dieter Gollmann, Cormac Herley, Vincent Koenig, Wolter Pieters, Martina Angela, Gilles Barthe, Michael Hicks, Florian Kerschbaum, Dominique Unruh, James Cheney, Torsten Grust, Dimitrios (+4 others)
2014 unpublished
Finally, we are interested in the question of whether the design cycle is an effective methodology to use in the development of these metrics, rather than just the evaluation.  ...  We would like to thank Jonathan Katz for his initial involvement in organizing the seminar and Matthew Hammer for his help in preparing this report. References  ...  Reality gap: out of the security policies covering processes and operations in an organisation -how many and to which degree are these actually fulfilled in reality?  ... 
fatcat:7wtqx2fytzaafjgvthawub66h4

The boy from Bundaberg: Studies in Melanesian linguistics in honour of Tom Dutton

Pawley, Andrew (Ed.), Ross, Malcolm (Ed.), Tryon, Darrell (Ed.), CRCL, CRCL, Pacific Linguistics And/Or The Author(S)
2001
with either singular or plural reference, the -ora suffix is compatible only with a singular referent.  ...  The first, and sometimes most difficult to detect, is that one may easily record a Tok Pisin (TP) term mistaking it for one in the local vernacular.  ...  All that is reasonably clear is that Bilua is not Austronesian.  ... 
doi:10.15144/pl-514 fatcat:w3cjg3bljbdtjezqjc5jpeq3gu