Sciweavers

17 search results - page 1 / 4
» vee 2012
Sort
View
VEE
2012
ACM
215views Virtualization» more  VEE 2012»
12 years 2 days ago
SecondSite: disaster tolerance as a service
This paper describes the design and implementation of SecondSite, a cloud-based service for disaster tolerance. SecondSite extends the Remus virtualization-based high availability...
Shriram Rajagopalan, Brendan Cully, Ryan O'Connor,...
VEE
2012
ACM
200views Virtualization» more  VEE 2012»
12 years 2 days ago
Block storage virtualization with commodity secure digital cards
Smartphones, tablets and other mobile platforms typically accommodate bulk data storage with low-cost, FAT-formatted Secure Digital cards. When one uses a mobile device to run a f...
Harvey Tuch, Cyprien Laplace, Kenneth C. Barr, Bi ...
VEE
2012
ACM
218views Virtualization» more  VEE 2012»
12 years 2 days ago
Enhancing TCP throughput of highly available virtual machines via speculative communication
Checkpoint-recovery based virtual machine (VM) replication is an attractive technique for accommodating VM installations with high-availability. It provides seamless failover for ...
Balazs Gerofi, Yutaka Ishikawa
VEE
2012
ACM
239views Virtualization» more  VEE 2012»
12 years 2 days ago
Transparent dynamic instrumentation
Process virtualization provides a virtual execution environment within which an unmodified application can be monitored and controlled while it executes. The provided layer of co...
Derek Bruening, Qin Zhao, Saman P. Amarasinghe
VEE
2012
ACM
226views Virtualization» more  VEE 2012»
12 years 2 days ago
Protecting applications against TOCTTOU races by user-space caching of file metadata
Time Of Check To Time Of Use (TOCTTOU) race conditions for file accesses in user-space applications are a common problem in Unix-like systems. The mapping between filename and i...
Mathias Payer, Thomas R. Gross