330,322 Hits in 6.9 sec

Dependability Analysis of Virtual Memory Systems

L.N. Bairavasundaram, A.C. Arpaci-Dusseau, R.H. Arpaci-Dusseau
International Conference on Dependable Systems and Networks (DSN'06)  
In this paper, we examine the failure handling policies of different virtual memory systems for different classes of partial disk errors.  ...  The study identifies possible reasons for poor failure handling, which can help in the design of a failure-aware virtual memory system.  ...  Finally, we thank the Computer Systems Lab (CSL) for providing a great environment for research. This work is sponsored by NSF CCR-0133456, ITR-0325267, CNS-0509474, Network Appliance, and EMC.  ... 
doi:10.1109/dsn.2006.26 dblp:conf/dsn/BairavasundaramAA06 fatcat:r7uotjjpurdvvaonev4ie7duwq

High level extraction of SoC architectural information from generic C algorithmic descriptions

M. Mattavelli, M. Ravasi
2005 Fifth International Workshop on System-on-Chip for Real-Time Applications (IWSOC'05)  
The tool capabilities include the simulation of virtual memory architectures.  ...  can reasonably grasp from the "pencil & paper" analysis of the (software) specifications.  ...  Indeed, this analysis results to be of limited use for the system designer, as the data-transfer dependences between the functions cannot be derived from the study of the function-call tree.  ... 
doi:10.1109/iwsoc.2005.71 dblp:conf/iwsoc/MattavelliR05 fatcat:52fb2xzi7vem3mabyqc7gcmj7u

Performance Implications from Sizing a VM on Multi-core Systems: A Data Analytic Application's View

Seung-Hwan Lim, James Horey, Yanjun Yao, Edmon Begoli, Qing Cao
2013 2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum  
For example, the very first step in hosting applications in virtualized environments, requires the user to configure the number of virtual processors and the size of memory.  ...  Our measurements indicate that the performance of Cassandra for YCSB workloads does not heavily depend on the processing capacity of a system, while the size of the data set is critical to performance  ...  Department of Energy.  ... 
doi:10.1109/ipdpsw.2013.97 dblp:conf/ipps/LimHYBC13 fatcat:pfqsgi43lbeitgn23d4reguasq

High-abstraction level complexity analysis and memory architecture simulations of multimedia algorithms

M. Ravasi, M. Mattavelli
2005 IEEE transactions on circuits and systems for video technology (Print)  
The tool capabilities include the simulation of virtual memory architectures.  ...  This paper reviews the state of the art of complexity analysis methodologies oriented to the design of multimedia systems and presents an integrated tool for automatic analysis capable of producing complexity  ...  of virtual memory architecture that can be simulated with SIT).  ... 
doi:10.1109/tcsvt.2005.846414 fatcat:wxn36e32ezhbfcersb4iq265iu


Dhilung Kirat, Giovanni Vigna, Christopher Kruegel
2011 Proceedings of the 27th Annual Computer Security Applications Conference on - ACSAC '11  
Live system restore is accomplished by restoring the entire physical memory of the analysis operating system from another, small operating system that runs outside of the target OS.  ...  Because of this limitation, efficient automation of malware analysis in bare-metal systems has been a challenge.  ...  Because of these circular dependencies, it is impossible to restore physical memory of a live operating system from within the same operating system (with arbitrary physical memory content).  ... 
doi:10.1145/2076732.2076790 dblp:conf/acsac/KiratVK11 fatcat:v7cgdgtjrvfuzbumwb6qsybb64

Integrating Power Models Into Instruction Accurate Virtual Platforms For Arm-Based Mpsocs

Ralph Goergen, Kim Gruettner, Soeren Schreiner, Larry Lapides, Duncan Graham
2016 Zenodo  
In embedded systems, extra-functional requirements like power consumption have been increasing in importance. This work focuses on a power extension of an instruction accurate virtual platform.  ...  As a proof of concept, we equip an Open Virtual Platforms (OVP) Xilinx Zynq virtual platform with a dynamic voltage and frequency scaling (DVFS) compatible power model.  ...  -A static part: depending on the leaking conductance (area and technology dependent) The actual power for the dynamic and the static part depends on the switching activity and the dynamic parameters of  ... 
doi:10.5281/zenodo.836626 fatcat:dozv7ej4ozh2ni3um27yrx2tai

A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus

Zhihong Tian, Yu Cui, Lun An, Shen Su, Xiaoxia Yin, Lihua Yin, Xiang Cui
2018 IEEE Access  
C2RS leverages these captured data by incorporating them into the volatility framework to aid in simplifying the analysis of operating system memory structures.  ...  Cyber range is an adaptable virtualization platform consisting of computers, networks, and systems on which various real-world cyber threat scenarios and systems can be evaluated to provide a comprehensive  ...  C2RS leverages these captured data by incorporating them into the Volatility framework to aid in simplifying the analysis of operating system memory structures.  ... 
doi:10.1109/access.2018.2846590 fatcat:p6w54x4xyvdnbgxdlclu45hfxe

PIEtrace: Platform independent executable trace

Yonghwi Kwon, Xiangyu Zhang, Dongyan Xu
2013 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE)  
Many of them are difficult to apply in practice because their system and library requirements are incompatible with those of the subject software.  ...  To improve software dependability, a large number of software engineering tools have been developed over years.  ...  Any opinions, findings, and conclusions in this paper are those of the authors only and do not necessarily reflct the views of DARPA and NSF.  ... 
doi:10.1109/ase.2013.6693065 dblp:conf/kbse/KwonZX13 fatcat:cfuni7rcvngzdimrk4tb4kuvcm

Integrated Data Management System for Data Center

Debasis Dash, Juthika Dash, Younghee Park, Jerry Gao
2016 Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering  
The multiplicity of available platforms for end users makes it very inconvenient for service providers to manage, calling for a unified approach for resource management and security in virtualized data  ...  Our service manages disparate virtual environments using a single interface.  ...  Figure 4 -Memory utilization vs memory allocation Figure 5 -Datacenter utilization (based on number of VMs) The proposed system monitors system resource utilization in terms of CPU, memory, disk, IO  ... 
doi:10.18293/seke2016-128 dblp:conf/seke/DashDPG16 fatcat:bdhqomezgre35edua2yg5xafv4

PiCO QL: A software library for runtime interactive queries on program data

Marios Fragkoulis, Diomidis Spinellis, Panos Louridas
2016 SoftwareX  
PiCO QL is an open source C/C++ software whose scientific scope is real-time interactive analysis of in-memory data through SQL queries.  ...  PiCO QL makes a good candidate for ad-hoc data analysis in applications and for diagnostics in systems settings.  ...  Motivation and problem description Many software applications depend on efficient data processing and analysis.  ... 
doi:10.1016/j.softx.2016.07.002 fatcat:u2vtrdmitvdvbbfx7ggbm2dwju

Deobfuscation of virtualization-obfuscated software

Kevin Coogan, Gen Lu, Saumya Debray
2011 Proceedings of the 18th ACM conference on Computer and communications security - CCS '11  
This task has been made more difficult in recent years as researchers have seen an increasing use of virtualization-obfuscated malware code.  ...  This inside-out approach requires fewer assumptions, and aims to complement existing techniques by broadening the domain of obfuscated programs eligible for automated analysis.  ...  CNS-1016058, as well as by a GAANN fellowship from the Department of Education award no. P200A070545.  ... 
doi:10.1145/2046707.2046739 dblp:conf/ccs/CooganLD11 fatcat:g5a56ojclfbj3o7v3hd567bmk4

Containers vs. virtual machines: performance comparison

2021 Journal of Scientific and Technical Applications  
This document provides performance evaluation of Docker containers and virtual machines using standard benchmark tools such as Sysbench, Phoronix, and Apache, including CPU performance, memory performance  ...  Server virtualization is a technological innovation widely used in information technology (IT) companies. Virtualization provides a platform to run different operating system services in the cloud.  ...  The results mainly depend on the number of virtual CPU cores that are allocated to the server.  ... 
doi:10.35429/jsta.2021. fatcat:sbav5y434jafhougfns3h2jhym

Performance Analysis of Live and Offline VM Migration Using KVM

Garima Rastogi, Rama Sushil
2016 International Journal of Modern Education and Computer Science  
of Virtual Machines (VMs).  ...  Virtualization is a core technology used for the implementation of cloud computing.  ...  ACKNOWLEDGMENT We want to offer our sincere thanks to all the members of Computer Service Center of IIT Delhi and especially to Dr Gopal Krishan for his extraordinary support and guidance.  ... 
doi:10.5815/ijmecs.2016.11.07 fatcat:23zvj47fnjcktji6qyrqxun744

Dynamic trace-based sampling algorithm for memory usage tracking of enterprise applications

Houssem Daoud, Naser Ezzati-jivan, Michel R. Dagenais
2017 2017 IEEE High Performance Extreme Computing Conference (HPEC)  
Dynamic analysis through execution tracing is a solution for the detailed run time analysis of such systems.  ...  Table I shows the mapping between library functions and system calls. The behavior of the allocator differs depending on the size of the allocation.  ... 
doi:10.1109/hpec.2017.8091061 dblp:conf/hpec/DaoudJD17 fatcat:ppstoy2uwnaqja6vamms7ty624

Shared resources high-level modeling in embedded systems using virtual nodes

Chafic Jaber, Andreas Kanstein, Ludovic Apvrille, Amer Baghdadi, Renaud Pacalet
2009 2009 Joint IEEE North-East Workshop on Circuits and Systems and TAISA Conference  
This paper presents the virtual node concept for modeling the shared resources of a system-on-chip, therefore specifically dedicated to the study of the impact of shared resources contention on the overall  ...  The increasing complexity of system-on-chip design and shorter time to market constraints has stimulated systems designers to investigate performance characteristics of the final system implementation  ...  This simple example shows clearly how the overall performance of the system depends significantly on shared resources access control and contention.  ... 
doi:10.1109/newcas.2009.5290506 fatcat:7afn4pjfkra3temhp7dru2idfi
« Previous Showing results 1 — 15 out of 330,322 results