6,358 resources related to Virtual machining
- Topics related to Virtual machining
- IEEE Organizations related to Virtual machining
- Conferences related to Virtual machining
- Periodicals related to Virtual machining
- Most published Xplore authors for Virtual machining
The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted full papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions,will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.
The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.
AMC2020 is the 16th in a series of biennial international workshops on Advanced Motion Control which aims to bring together researchers from both academia and industry and to promote omnipresent motion control technologies and applications.
The International Conference on Robotics and Automation (ICRA) is the IEEE Robotics and Automation Society’s biggest conference and one of the leading international forums for robotics researchers to present their work.
The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.
The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...
Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.
Part I will now contain regular papers focusing on all matters related to fundamental theory, applications, analog and digital signal processing. Part II will report on the latest significant results across all of these topic areas.
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...
Assured Cloud Computing, None
The growth of cloud computing has spurred many entities, both small and large, to use cloud services in order to achieve cost savings. Public cloud computing has allowed for quick, dynamic scalability without much overhead or long‐term commitments. However, there are some disincentives to using cloud services, and one of the biggest is the inherent and unknown danger stemming from ...
International Multi Topic Conference, 2002. Abstracts. INMIC 2002., 2002
IEEE Access, 2015
Cloud computing is developing so fast that more and more data centers have been built every year. This naturally leads to high-power consumption. Virtual machine (VM) consolidation is the most popular solution based on resource utilization. In fact, much more power can be saved if we know the power consumption of each VM. Therefore, it is significant to measure the ...
Assured Cloud Computing, None
In this chapter, we discuss methods to address some of the challenges in achieving resilient cloud computing. The issues and potential solutions are brought about by examples of (i) active and passive monitoring as a way to provide situational awareness about a system and users' state and behavior; (ii) automated reasoning about system/application state based on observations from monitoring tools; ...
IEEE Conference Anthology, 2013
Cache plays an important role in multilevel storage system. It can greatly reduce the memory access latency. So the cache hit rate has a significant impact on the performance of the application. Many processors provide cache locking mechanism, which can lock the certain lines in cache. It enables an application to affect the cache replacement decisions under software control. This ...
Virtual World Symposium - Virtual World at Intel
Virtual World Symposium - Educational Work
Virtual World Symposium - Moon World
Virtual World Symposium - Second Life Tech Tour
Virtual World Symposium 2011 - Collaborative Work
Virtual World Symposium - Welcome Address
Virtual World Symposium - IEEE Islands
Virtual World Symposium 2011 - CoLab and Mars
Reconstructed Brain Models for Virtual Bodies and Robots
Virtual World Symposium - Project Direct
IMS 2012 Microapps - Virtual Flight Testing of Radar System Performance Daren McClearnon, Agilent EEsof
IEEE Cloud Computing for Emerging Markets: Buyya
Virtual World Symposium - SciLands
EMBC 2011-Course-Virtual Reality and Robotics in Neurorehabilitation-William Zev Rymer
EMBC 2011-Course-Virtual Reality and Robotics in Neurorehabilitation-Susan Fasoli
Virtual Reality Support for Teleoperation Using Online Grasp Planning
EMBC 2011-Course-Virtual Reality and Robotics in Neurorehabilitation-Steven L. Wolf
Building Worlds in Virtual Reality: Exploring Careers in Engineering and Technology
IEEE's Room-Scale VR Experience at SXSW 2017!
The growth of cloud computing has spurred many entities, both small and large, to use cloud services in order to achieve cost savings. Public cloud computing has allowed for quick, dynamic scalability without much overhead or long‐term commitments. However, there are some disincentives to using cloud services, and one of the biggest is the inherent and unknown danger stemming from a shared platform – namely, the hypervisor. An attacker who compromises a virtual machine (VM) and then goes on to compromise the hypervisor can readily compromise all virtual machines on that hypervisor. That brings into play the game‐theoretic problem of negative externalities, in which the security of one player affects the security of another. Using game theory to model and solve these externalities, we show that there are multiple Nash equilibriums. Furthermore, we demonstrate that the VM allocation type can adversely affect the role that externality plays in the cloud security game. Finally, we propose an allocation method based on a Nash equilibrium such that the negative externality imposed on other players can be significantly lowered compared to that found with other common VM allocation methods.
Cloud computing is developing so fast that more and more data centers have been built every year. This naturally leads to high-power consumption. Virtual machine (VM) consolidation is the most popular solution based on resource utilization. In fact, much more power can be saved if we know the power consumption of each VM. Therefore, it is significant to measure the power consumption of each VM for green cloud data centers. Since there is no device that can directly measure the power consumption of each VM, modeling methods have been proposed. However, current models are not accurate enough when multi-VMs are competing for resources on the same server. One of the main reasons is that the resource features for modeling are correlated with each other, such as CPU and cache. In this paper, we propose a tree regression- based method to accurately measure the power consumption of VMs on the same host. The merits of this method are that the tree structure will split the data set into partitions, and each is an easy-modeling subset. Experiments show that the average accuracy of our method is about 98% for different types of applications running in VMs.
In this chapter, we discuss methods to address some of the challenges in achieving resilient cloud computing. The issues and potential solutions are brought about by examples of (i) active and passive monitoring as a way to provide situational awareness about a system and users' state and behavior; (ii) automated reasoning about system/application state based on observations from monitoring tools; (iii) coordination of monitoring and system activities to provide a robust response to accidental failures and malicious attacks; and (iv) use of smart access control methods to reduce the attack surface and limit the likelihood of an unauthorized access to the system. Case studies covering different application domains, for example, cloud computing, large computing infrastructure for scientific applications, and industrial control systems, are used to show both the practicality of the proposed approaches and their capabilities, for example, in terms of detection coverage and performance cost.
Cache plays an important role in multilevel storage system. It can greatly reduce the memory access latency. So the cache hit rate has a significant impact on the performance of the application. Many processors provide cache locking mechanism, which can lock the certain lines in cache. It enables an application to affect the cache replacement decisions under software control. This paper presents a novel method, which uses cache locking mechanism to reduce the run-time of java virtual machine (JVM). JVM often uses just-in-time compiler (JIT) to improve the performance. JIT compiles the method that has been invoked certain times, and then JVM executes the compiled method when invoking this method the next time. This paper analyzes the calling situation of the compiled method in JVM, and then proposes a heuristic approach to lock the compiled method in cache for an appropriate period. It can reduce cache miss rate when JVM executes the compiled method. The algorithm has been implemented in HotSpot based on Loongson-3A. Also, it can be implemented in other run-time systems. Experiment results show that the cache locking heuristic algorithm averagely reduces the cache miss rate by 8.5%, and improves the performance by 4% on the benchmark SPECjvm2008.
Cloud computing has gained enormous popularity both in business and academia due its on demand service over Internet to the customers on pay-as-you-go model. Task scheduling in cloud computing is a well known problem that has been paid enormous attention. This is even more challenging, particularly for multi-cloud environment. Due to its NP-Hardness, many heuristics have been developed recently. In this paper, we also present a task scheduling algorithm which is based on the popular Min-Max normalization technique in data mining. We refer our proposed algorithm as Normalized Multi-Objective Min-Min Max-Min Scheduling (NMOMXS). Through simulation, the algorithm is shown to outperform two well known existing algorithms in terms of makespan and resource utilization.
In Cloud computing applications, data and computing resources are provided as a service to the clients over the Internet. Task scheduling plays a vital role in assigning the tasks to different virtual machines in cloud computing. The ultimate goal of cloud task scheduling is to curtail the make span. Discrete Symbiotic Organism Search (DSOS) is a meta heuristic algorithm which provides optimal solution to cloud scheduling problems. Local search procedure will move from one solution to another improved solution. In this paper we propose an algorithm named as DSOS with Local search (DSOSLS). In DSOSLS the local search technique has been applied to the solution which is obtained from the DSOS algorithm. DSOSLS algorithm moves the task from the high make span virtual machine to low make span virtual machine. The experimental analysis shows that the DSOSLS algorithm reduces the make span at a higher level.
Embedded Soft PLC is a new high technology in industrial control area, which gets over the defects of traditional PLC and has come to general attention in this area. Virtual machine system is the kernel of embedded Soft PLC system. This article narrates carefully the design and implementation of virtual machine system with the example of an embedded Soft PLC system product-ESDDC. The virtual machine designed in this paper will put forward a new plan of Soft PLC programming, and at the same time it also provides a new thinking of software design for software developers.
In recent years cloud computing emerged as the next generation technology by offering numerous services over the internet in resource management. Resource allocation in cloud environment is a challenging task, since there is a disparity between the number of requests for the services and the number of available resources. Hence an effective mechanism is essential to evenly share the load among the available resources. A technique based on Roulette Wheel Selection method is proposed to map the virtual machines (VMs) to physical machines (PMs). The Roulette Wheel is divided into segments based on the probability of assigning VMs to a PM. Fitness values of the individual resources are computed and resource allocation is done accordingly. The performance of the proposed algorithm is evaluated based on the utilization rate of the physical machines. The proposed method shows notable improvements when compared to the First Come First Serve (FCFS) and Stochastic Hill Climbing (SHC) algorithms.
Summary form only given. Since its inception in the mid 1990's Java has steadily gained acceptance by programmers, supplanting both C and C++ as the language of choice. NASA chose to use Java for processing Mars mission data because of increased productivity by their programmers. Other companies cite Java's portability, robustness, and well defined APIs as reasons for change. The December 2006 TIOBE Survey of software developers shows Java to be the top language in use by 20% of programmers, followed by C with 17%, and C++ with 10%). The performance gap between virtual-machine run byte code and native executables has narrowed to the point where it is only an issue for very strict real-time applications. This move to virtual machine architectures was affirmed by Microsoft's release of the .NET systems employing the Windows Virtual Machine. C and C++ are still valuable languages in wide use by programmers. There is a growing body of work examining Java's capabilities to support functions traditionally thought to be the exclusive domain of C and C++. This paper will attempt to add to that body of work by examining the Java 1.5 Network API's performance capabilities with regard to supporting both peer-to-Peer (P2P) and Client/Server applications.
No standards are currently tagged "Virtual machining"
Customer Service Engineer
JVM Frameworks Software Engineer
JVM Frameworks Software Engineer
Schweitzer Engineering Laboratories, Inc.
Schweitzer Engineering Laboratories, Inc.
Instructor, Computer Service Technology (Cybersecurity)
Coastline Community College