Sciweavers

64 search results - page 5 / 13
» Using a virtual machine to protect sensitive Grid resources
Sort
View
HPDC
2008
IEEE
14 years 3 months ago
Combining batch execution and leasing using virtual machines
As cluster computers are used for a wider range of applications, we encounter the need to deliver resources at particular times, to meet particular deadlines, and/or at the same t...
Borja Sotomayor, Kate Keahey, Ian T. Foster
GPC
2009
Springer
14 years 1 months ago
Achieving Co-allocation through Virtualization in Grid Environment
A typical grid application requires several processors for execution that may not be fulfilled by single cluster at times. Co-allocation is the concept of aggregating computing res...
Thamarai Selvi Somasundaram, Balachandar R. Amarna...
DRM
2006
Springer
14 years 6 days ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
CLOUD
2010
ACM
14 years 1 months ago
Differential virtual time (DVT): rethinking I/O service differentiation for virtual machines
This paper investigates what it entails to provide I/O service diļ¬€erentiation and performance isolation for virtual machines on individual multicore nodes in cloud platforms. Sh...
Mukil Kesavan, Ada Gavrilovska, Karsten Schwan
JVM
2004
118views Education» more  JVM 2004»
13 years 10 months ago
Java, Peer-to-Peer, and Accountability: Building Blocks for Distributed Cycle Sharing
The increased popularity of grid systems and cycle sharing across organizations leads to the need for scalable systems that provide facilities to locate resources, to be fair in t...
Ali Raza Butt, Xing Fang, Y. Charlie Hu, Samuel P....