Tesis sobre el tema "Computer virtualization"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "Computer virtualization".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Southern, Gabriel. "Symmetric multiprocessing virtualization". Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3225.
Texto completoVita: p. 77. Thesis director: David Hwang. Submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Engineering. Title from PDF t.p. (viewed Aug. 28, 20088). Includes bibliographical references (p. 73-76). Also issued in print.
Pelletingeas, Christophe. "Performance evaluation of virtualization with cloud computing". Thesis, Edinburgh Napier University, 2010. http://researchrepository.napier.ac.uk/Output/4010.
Texto completoKoppe, Jason. "Differential virtualization for large-scale system modeling /". Online version of thesis, 2008. http://hdl.handle.net/1850/7543.
Texto completoPham, Duy M. "Performance comparison between x86 virtualization technologies". Thesis, California State University, Long Beach, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1528024.
Texto completoIn computing, virtualization provides the capability to service users with different resource requirements and operating system platform needs on a single host computer system. The potential benefits of virtualization include efficient resource utilization, flexible service offering, as well as scalable system planning and expansion, all desirable whether it is for enterprise level data centers, personal computing, or anything in between. These benefits, however, involve certain costs of performance degradation. This thesis compares the performance costs between two of the most popular and widely-used x86 CPU-based virtualization technologies today in personal computing. The results should be useful for users when determining which virtualization technology to adopt for their particular computing needs.
Jensen, Deron Eugene. "System-wide Performance Analysis for Virtualization". PDXScholar, 2014. https://pdxscholar.library.pdx.edu/open_access_etds/1789.
Texto completoNarayanan, Sivaramakrishnan. "Efficient Virtualization of Scientific Data". The Ohio State University, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=osu1221079391.
Texto completoJohansson, Marcus y Lukas Olsson. "Comparative evaluation of virtualization technologies in the cloud". Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-49242.
Texto completoAthreya, Manoj B. "Subverting Linux on-the-fly using hardware virtualization technology". Thesis, Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34844.
Texto completoChen, Wei. "Light-Weight Virtualization Driven Runtimes for Big Data Applications". Thesis, University of Colorado Colorado Springs, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13862451.
Texto completoDatacenters are evolving to host heterogeneous Big Data workloads on shared clusters to reduce the operational cost and achieve higher resource utilization. However, it is challenging to schedule heterogeneous workloads with diverse resource requirements and QoS constraints. For example, when consolidating latency critical jobs and best-effort batch jobs in the same cluster, latency critical jobs may suffer from long queuing delay if their resource requests cannot be met immediately; while best-effort jobs would suffer from killing overhead when preempted. Moreover, resource contention may harm task performance running on worker nodes. Since resource requirements for diverse applications show heterogeneity and is not known before task execution, either the cluster manager has to over-provision resources for all incoming applications resulting in low cluster utilization; or applications may experience performance slowdown or even failure due to resource insufficiency. Existing approaches focus on either application awareness or system awareness and fail to address the semantic gap between the application layer and the system layer (e.g., OS scheduling mechanisms or cloud resource allocators).
To address these issues, we propose to attack these problems from a different angle. In other words, applications and underlying systems should cooperate synergistically. This this way, the resource demands of application can be exposed to the system. At the same time, application schedulers can be assisted with more runtimes of the system layer and perform more dedicated scheduling. However, the system and application co-design is challenging. First, the real resource demands for an application is hard to be predicted since its requirements vary during its lifetime. Second, there are tons of information generated from system layers (e.g., OS process schedulers or hardware counters), from which it is hard to associate these information to a dedicated task. Fortunately, with the help of lightweight virtualization, applications could run in isolated containers such that system level runtime information can be collected at the container level. The rich APIs of container based virtualization also enable to perform more advanced scheduling.
In this thesis, we focus on efficient and scalable techniques in datacenter scheduling by leveraging lightweight virtualization. Our thesis is two folds. First, we focus on profiling and optimizing the performance of Big Data applications. In this aspect, we built a tool to trace the scheduling delay for low-latency online data analytics workloads. We further built a map execution engine to address the performance heterogeneity for MapReduce. Second, we focus on leveraging OS containers to build advanced cluster scheduling mechanisms. In that, we built a preemptive cluster scheduler, an elastic memory manager and an OOM killer for Big Data applications. We also conducted a supplementary research on tracing the performance of Big Data training on TensorFlow.
We conducted extensive evaluations of the proposed projects in a real-world cluster. The experimental results demonstrate the effectiveness of proposed approaches in terms of improving performance and utilization of Big Data clusters.
WENG, LI. "Automatic and efficient data virtualization system for scientific datasets". The Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=osu1154717945.
Texto completoLe, Duy. "Understanding and Leveraging Virtualization Technology in Commodity Computing Systems". W&M ScholarWorks, 2012. https://scholarworks.wm.edu/etd/1539623603.
Texto completoSemnanian, Amir Ali. "A study on virtualization technology and its impact on computer hardware". Thesis, California State University, Long Beach, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=1523065.
Texto completoUnderutilization of hardware is one of the challenges that large organizations have been trying to overcome. Most of today's computer hardware is designed and architected for hosting a single operating system and application. Virtualization is the primary solution for this problem. Virtualization is the capability of a system to host multiple virtual computers while running on a single hardware platform. This has both advantages and disadvantages. This thesis concentrates on introducing virtualization technology and comparing different techniques through which virtualization is achieved. It will examine how computer hardware can be virtualized and the impact virtualization would have on different parts of the system. This study evaluates the changes necessary to hardware architectures when virtualization is used. This thesis provides an analysis of the benefits of this technology which conveys to the computer industry and the disadvantages which accompany this new solution. Finally the future of virtualization technology and how it can affect the infrastructure of an organization is evaluated.
Isenstierna, Tobias y Stefan Popovic. "Computer systems in airborne radar : Virtualization and load balancing of nodes". Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18300.
Texto completoWei, Junyi. "QoS-aware joint power and subchannel allocation algorithms for wireless network virtualization". Thesis, University of Essex, 2017. http://repository.essex.ac.uk/20142/.
Texto completoSaleh, Mehdi. "Virtualization and self-organization for utility computing". Master's thesis, University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5026.
Texto completoID: 029809025; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Thesis (M.S.)--University of Central Florida, 2011.; Includes bibliographical references (p. 65-68).
M.S.
Masters
Electrical Engineering and Computer Science
Engineering and Computer Science
Electrical Engineering
Köhler, Fredrik. "Network Virtualization in Multi-hop Heterogeneous Architecture". Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-38696.
Texto completoMcAdams, Sean. "Virtualization Components of the Modern Hypervisor". UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/599.
Texto completoGhodke, Ninad Hari. "Virtualization techniques to enable transparent access to peripheral devices across networks". [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0005684.
Texto completoRaj, Himanshu. "Virtualization services scalable methods for virtualizing multicore systems /". Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/22677.
Texto completoCommittee Chair: Schwan, Karsten; Committee Member: Ahamad, Mustaq; Committee Member: Fujimoto, Richard; Committee Member: Gavrilovska, Ada; Committee Member: Owen, Henry; Committee Member: Xenidis, Jimi.
Coogan, Kevin Patrick. "Deobfuscation of Packed and Virtualization-Obfuscation Protected Binaries". Diss., The University of Arizona, 2011. http://hdl.handle.net/10150/202716.
Texto completoOljira, Dejene Boru. "Telecom Networks Virtualization : Overcoming the Latency Challenge". Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-67243.
Texto completoHITS, 4707
Oliveira, Diogo. "Multi-Objective Resource Provisioning in Network Function Virtualization Infrastructures". Scholar Commons, 2018. http://scholarcommons.usf.edu/etd/7206.
Texto completoPaladi, Nicolae. "Trusted Computing and Secure Virtualization in Cloud Computing". Thesis, Security Lab, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24035.
Texto completoTESPEV
CNS
Zahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding". Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.
Texto completoNimgaonkar, Satyajeet. "Secure and Energy Efficient Execution Frameworks Using Virtualization and Light-weight Cryptographic Components". Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699986/.
Texto completoChen, Yu-hsin M. Eng Massachusetts Institute of Technology. "Dynamic binary translation from x86-32 code to x86-64 code for virtualization". Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/53095.
Texto completoIncludes bibliographical references (p. 95).
The goal of this project is to enhance performance of virtual machines and simplify the design of the virtual machine monitor by running 32-bit x86 operating systems in x86-64 mode. In order to do so, 32-bit operating system binary code is translated into x86-64 binary code via "widening binary translation"; x86-32 code is "widened" into x86-64 code. The main challenge of widening BT is emulating x86-32 legacy segmentation in x86-64 mode. Widening BT's solution is to emulate segmentation in software. Most of the overhead for software segmentation can be optimized away. The main contribution of widening BT is simplification of the VMM, which reduces the human cost of maintaining a complicated VMM. Widening BT also improves performance of 32-bit guest operating systems running in virtual machines and demonstrates the independence of virtual machines from physical hardware. With widening BT, legacy hardware mechanisms like segmentation can be dropped. Therefore widening BT reduces hardware's burden of backwards-compatibility, encouraging software/hardware co-design.
by Yu-hsin Chen.
M.Eng.
Oprescu, Mihaela Iuniana. "Virtualization and distribution of the BGP control plane". Phd thesis, Institut National Polytechnique de Toulouse - INPT, 2012. http://tel.archives-ouvertes.fr/tel-00785007.
Texto completoNemati, Hamed. "Secure System Virtualization : End-to-End Verification of Memory Isolation". Doctoral thesis, KTH, Teoretisk datalogi, TCS, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-213030.
Texto completoQC 20170831
PROSPER
HASPOC
Young, Bobby Dalton. "MPI WITHIN A GPU". UKnowledge, 2009. http://uknowledge.uky.edu/gradschool_theses/614.
Texto completoAnwer, Muhammad Bilal. "Enhancing capabilities of the network data plane using network virtualization and software defined networking". Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54422.
Texto completoSvärd, Petter. "Live VM Migration : Principles and Performance". Licentiate thesis, Umeå universitet, Institutionen för datavetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-87246.
Texto completoYousif, Wael K. Yousif. "EXAMINING ENGINEERING & TECHNOLOGY STUDENTS ACCEPTANCE OF NETWORK VIRTUALIZATION TECHNOLOGY USING THE TECHNOLOGY ACCEPTANCE MODE". Doctoral diss., University of Central Florida, 2010. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3039.
Texto completoEd.D.
Department of Educational Research, Technology and Leadership
Education
Education EdD
Färlind, Filip y Kim Ottosson. "Servervirtualisering idag : En undersökning om servervirtualisering hos offentliga verksamheter i Sverige". Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-37032.
Texto completoAt present, there’s no summary of how server virtualization is implemented and how it works in different companies in Sweden. This work will therefore, through a survey, try to answer the question: "How is server virtualization implemented by municipality and county councils in Sweden?" Our results show that server virtualization is well implemented by municipality and county councils in Sweden. The results are also very similar between these organizations. Finalized work provides different types of companies support in planning and implementation of server virtualization.
Vellanki, Mohit. "Performance Evaluation of Cassandra in a Virtualized Environment". Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14032.
Texto completoWilcox, David Luke. "Packing Virtual Machines onto Servers". BYU ScholarsArchive, 2010. https://scholarsarchive.byu.edu/etd/2798.
Texto completoKotikela, Srujan D. "Secure and Trusted Execution Framework for Virtualized Workloads". Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1248514/.
Texto completoPham, Khoi Minh. "NEURAL NETWORK ON VIRTUALIZATION SYSTEM, AS A WAY TO MANAGE FAILURE EVENTS OCCURRENCE ON CLOUD COMPUTING". CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/670.
Texto completoSu, Yu. "Big Data Management Framework based on Virtualization and Bitmap Data Summarization". The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1420738636.
Texto completoKlemperer, Peter Friedrich. "Efficient Hypervisor Based Malware Detection". Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/466.
Texto completoAl, burhan Mohammad. "Differences between DockerizedContainers and Virtual Machines : A performance analysis for hosting web-applications in a virtualized environment". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-19816.
Texto completoKieu, Le Truong Van. "Container Based Virtualization Techniques on Lightweight Internet of Things Devices : Evaluating Docker container effectiveness on Raspberry Pi computers". Thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-42745.
Texto completoDet finns för närvarande inget sätt att skapa digitala tvillingar ochöverföra den mellan nätverk, men containerbaserad virtualisering kanvara en möjlig lösning. En av containerbaserad virtualisering tekniker ärDocker, som är en motor för att isolera en programvara och kanframbringa fördelar för att förbättra arbetsflödet för programutveckling.Att göra ändringar med Docker är mycket snabbt tack vare användningav copy-on-write-modellen. Denna studie kommer att utforma ettscenario med två enheter som skickar ett datapaket mellan varandra fratt simulera överföringsprocessen. Mätresultat från studien bliranalyserad för att besvara frågan om containerbaserad virtualisering kanvara en möjlig lösning för att skapa och skicka digitala tvillingar.Resultatet från scenariot är att Docker fungerar lika eller sämre när detanvänds med en låg kostnad datorhårdvara jämfört med endatorhårdvara. Det spekuleras att resurserna som används i datapaketetär en faktor som kan påverka prestandan, men hårdvaran är också enannan faktor som påverkar det.
Lee, Min. "Memory region: a system abstraction for managing the complex memory structures of multicore platforms". Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/50398.
Texto completoIndukuri, Pavan Sutha Varma. "Performance comparison of Linux containers(LXC) and OpenVZ during live migration : An experiment". Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-13540.
Texto completoHudzina, John Stephen. "An Enhanced MapReduce Workload Allocation Tool for Spot Market Resources". NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/34.
Texto completoArvidsson, Jonas. "Utvärdering av containerbaserad virtualisering för telekomsignalering". Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-67721.
Texto completoCraig, Kyle. "Exploration and Integration of File Systems in LlamaOS". University of Cincinnati / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1418910310.
Texto completoEriksson, Magnus y Staffan Palmroos. "Comparative Study of Containment Strategies in Solaris and Security Enhanced Linux". Thesis, Linköping University, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9078.
Texto completoTo minimize the damage in the event of a security breach it is desirable to limit the privileges of remotely available services to the bare minimum and to isolate the individual services from the rest of the operating system. To achieve this there is a number of different containment strategies and process privilege security models that may be used. Two of these mechanisms are Solaris Containers (a.k.a. Solaris Zones) and Type Enforcement, as implemented in the Fedora distribution of Security Enhanced Linux (SELinux). This thesis compares how these technologies can be used to isolate a single service in the operating system.
As these two technologies differ significantly we have examined how the isolation effect can be achieved in two separate experiments. In the Solaris experiments we show how the footprint of the installed zone can be reduced and how to minimize the runtime overhead associated with the zone. To demonstrate SELinux we create a deliberately flawed network daemon and show how this can be isolated by writing a SELinux policy.
We demonstrate how both technologies can be used to achieve isolation for a single service. Differences between the two technologies become apparent when trying to run multiple instances of the same service where the SELinux implementation suffers from lack of namespace isolation. When using zones the administration work is the same regardless of the services running in the zone whereas SELinux requires a separate policy for each service. If a policy is not available from the operating system vendor the administrator needs to be familiar with the SELinux policy framework and create the policy from scratch. The overhead of the technologies is small and is not a critical factor for the scalability of a system using them.
Modig, Dennis. "Assessing performance and security in virtualized home residential gateways". Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-9966.
Texto completoStruhar, Vaclav. "Improving Soft Real-time Performance of Fog Computing". Licentiate thesis, Mälardalens högskola, Inbyggda system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-55679.
Texto completoSvantesson, Björn. "Software Defined Networking : Virtual Router Performance". Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-13417.
Texto completo