期刊文献+
共找到84,763篇文章
< 1 2 250 >
每页显示 20 50 100
ApplianceBricks: A Scalable Network Appliance Architecture for Network Functions Virtualization 被引量:2
1
作者 MA Shicong WANG Baosheng +1 位作者 ZHANG Xiaozhe GAO Xianming 《China Communications》 SCIE CSCD 2016年第S1期32-42,共11页
Network Functions Virtualization(NFV) is an attempt to help operators more effectively manage their networks by implementing traditional network functions embedded in specialized hardware platforms in term of virtuali... Network Functions Virtualization(NFV) is an attempt to help operators more effectively manage their networks by implementing traditional network functions embedded in specialized hardware platforms in term of virtualized software instances. But, existing novel network appliances designed for NFV infrastructure are always architected on a general-purpose x86 server, which makes the performance of network functions limited by the hosted single server. To address this challenge, we propose ApplianceB ricks, a novel NFV-enable network appliance architecture that is used to explore the way of consolidating multiple physical network functions into a clustered network appliance, which is able to improve the processing capability of NFV-enabled network appliances. 展开更多
关键词 NFV network APPLIANCE virtualization software ROUTERS cluster-based appliances CONSOLIDATION SCALABILITY
下载PDF
A highly reliable embedding algorithm for airborne tactical network virtualization 被引量:2
2
作者 MIAO Jingcheng LYU Na +2 位作者 CHEN Kefan CHEN Zhuo GAO Weiting 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第6期1364-1374,共11页
The evolution of airborne tactical networks(ATNs)is impeded by the network ossification problem.As a solution,network virtualization(NV)can provide a flexible and scalable architecture where virtual network embedding(... The evolution of airborne tactical networks(ATNs)is impeded by the network ossification problem.As a solution,network virtualization(NV)can provide a flexible and scalable architecture where virtual network embedding(VNE)is a key part.However,existing VNE algorithms cannot be optimally adopted in the virtualization of ATN due to the complex interference in aircombat field.In this context,a highly reliable VNE algorithm based on the transmission rate for ATN virtualization(TR-ATVNE)is proposed to adapt well to the specific electromagnetic environment of ATN.Our algorithm coordinates node and link mapping.In the node mapping,transmission-rate resource is firstly defined to effectively evaluate the ranking value of substrate nodes under the interference of both environmental noises and enemy attacks.Meanwhile,a feasible splitting rule is proposed for path splitting in the link mapping,considering the interference between wireless links.Simulation results reveal that our algorithm is able to improve the acceptance ratio of virtual network requests while maintaining a high revenue-to-cost ratio under the complex electromagnetic interference. 展开更多
关键词 airborne tactical network(ATN) network virtualization(NV) resource allocation virtual network embedding(VNE) transmission rate
下载PDF
Virtualization Technology in Cloud Computing Based Radio Access Networks:A Primer 被引量:2
3
作者 ZHANG Xian PENG Mugen 《ZTE Communications》 2017年第4期47-66,共20页
Since virtualization technology enables the abstraction and sharing of resources in a flexible management way, the overall expenses of network deployment can be significantly reduced. Therefore, the technology has bee... Since virtualization technology enables the abstraction and sharing of resources in a flexible management way, the overall expenses of network deployment can be significantly reduced. Therefore, the technology has been widely applied in the core network. With the tremendous growth in mobile traffic and services, it is natural to extend virtualization technology to the cloud computing based radio access networks(CCRANs) for achieving high spectral efficiency with low cost.In this paper, the virtualization technologies in CC-RANs are surveyed, including the system architecture, key enabling techniques, challenges, and open issues. The enabling key technologies for virtualization in CC-RANs mainly including virtual resource allocation, radio access network(RAN) slicing, mobility management, and social-awareness have been comprehensively surveyed to satisfy the isolation, customization and high-efficiency utilization of radio resources. The challenges and open issues mainly focus on virtualization levels for CC-RANs, signaling design for CC-RAN virtualization, performance analysis for CC-RAN virtualization, and network security for virtualized CC-RANs. 展开更多
关键词 network virtualization CC-RAN RAN SLICING FOG computing
下载PDF
A Review in the Core Technologies of 5G: Device-to-Device Communication, Multi-Access Edge Computing and Network Function Virtualization 被引量:2
4
作者 Ruixuan Tu Ruxun Xiang +1 位作者 Yang Xu Yihan Mei 《International Journal of Communications, Network and System Sciences》 2019年第9期125-150,共26页
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ... 5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances. 展开更多
关键词 5th Generation Network virtualization Device-To-Device COMMUNICATION Base STATION Direct COMMUNICATION INTERFERENCE Multi-Access EDGE COMPUTING Mobile EDGE COMPUTING
下载PDF
A State-of-the-Art Survey on Real-Time Issues in Embedded Systems Virtualization 被引量:1
5
作者 Zonghua Gu Qingling Zhao 《Journal of Software Engineering and Applications》 2012年第4期277-290,共14页
Virtualization has gained great acceptance in the server and cloud computing arena. In recent years, it has also been widely applied to real-time embedded systems with stringent timing constraints. We present a compre... Virtualization has gained great acceptance in the server and cloud computing arena. In recent years, it has also been widely applied to real-time embedded systems with stringent timing constraints. We present a comprehensive survey on real-time issues in virtualization for embedded systems, covering popular virtualization systems including KVM, Xen, L4 and others. 展开更多
关键词 virtualization Embedded Systems REAL-TIME SCHEDULING
下载PDF
Multiple attacks on virtualization-based security monitoring
6
作者 闫广禄 罗森林 +1 位作者 韦伟 潘丽敏 《Journal of Beijing Institute of Technology》 EI CAS 2016年第2期254-263,共10页
Three kinds of vulnerabilities that may exist in some of current virtualization-based security monitoring systems were proposed: page mapping problem,lack of overall protection,and inherent limitations. Aiming at thes... Three kinds of vulnerabilities that may exist in some of current virtualization-based security monitoring systems were proposed: page mapping problem,lack of overall protection,and inherent limitations. Aiming at these vulnerabilities,relative attack methods were presented in detail. Our experiments show that the attack methods,such as page mapping attack,data attack,and non-behavior detection attack,can attack simulated or original security monitors successfully. Defenders,who need to effectively strengthen their security monitors,can get an inspiration from these attack methods and find some appropriate solutions. 展开更多
关键词 virtualization VULNERABILITY ATTACK method security THREAT virtual machine MONITOR
下载PDF
Storage System Design Scheme in Virtualization Construction
7
作者 Si Zhen-yu 《Journal of Northeast Agricultural University(English Edition)》 CAS 2012年第4期79-82,共4页
In order to improve resource utilization, it is necessary to integrate storage and data, and the emergence of cloud computing makes it possible. This paper analyzed the study of virtualization and cloud computing, pro... In order to improve resource utilization, it is necessary to integrate storage and data, and the emergence of cloud computing makes it possible. This paper analyzed the study of virtualization and cloud computing, proposed a new scheme based on virtualization, and established a shared storage platform, which made a good complement and perfected the centralized storage platform. 展开更多
关键词 virtualization analysis cloud computing storage platform
下载PDF
Enhancing the Performance of Current Online Education System—A Study of Cloud Computing and Virtualization
8
作者 Basheer Riskhan Raza Muhammed 《Journal of Computer and Communications》 2015年第10期43-51,共9页
Online Education (OE) system is an effective and efficient way to perform the education in all sectors of government and non-government educational organization. Low performance and minimum speed are major overhead in... Online Education (OE) system is an effective and efficient way to perform the education in all sectors of government and non-government educational organization. Low performance and minimum speed are major overhead in the current ongoing OE system due to the increase of users and some system issues. Base on the previous study and recent practical issues, a model is proposed to Enhancing the Performance of Online Education System (EPOES) to examine the bare metal virtualization, isolation and virtual machine templates. Bare metal virtualization has led the native execution, isolation isolated the running application and Virtual Machine Template has help to increase efficiency, avoiding the repetitive installation and operate the server in less time. The proposed model boosts the performance of the current OE system, and examines the benefits of the adaptation of cloud computing and virtualization which can be used to overcome the existing challenges and barriers of the current OE System. 展开更多
关键词 BARE Metal virtualization Cloud Computing ISOLATION Virtual Machine TEMPLATE
下载PDF
Data Virtualization with SAP HANA Smart Data Access
9
作者 Abani Pattanayak 《Journal of Computer and Communications》 2017年第8期62-68,共7页
Digital transformation has been corner stone of business innovation in the last decade, and these innovations have dramatically changed the definition and boundaries of enterprise business applications. Introduction o... Digital transformation has been corner stone of business innovation in the last decade, and these innovations have dramatically changed the definition and boundaries of enterprise business applications. Introduction of new products/ services, version management of existing products/ services, management of customer/partner connections, management of multi-channel service delivery (web, social media, web etc.), merger/acquisitions of new businesses and adoption of new innovations/technologies will drive data growth in business applications. These datasets exist in different sharing nothing business applications at different locations and in various forms. So, to make sense of this information and derive insight, it is essential to break the data silos, streamline data retrieval and simplify information access across the entire organization. The information access framework must support just-in-time processing capabilities to bring data from multiple sources, be fast and powerful enough to transform and process huge amounts of data quickly, and be agile enough to accommodate new data sources per user needs. This paper discusses the SAP HANA Smart Data Access data-virtualization technology to enable unified access to heterogenous data across the organization and analysis of huge volume of data in real-time using SAP HANA in-memory platform. 展开更多
关键词 SAP HANA In-Memory Computing SMART DATA Access (SDA) DATA virtualization & DATA FEDERATION Virtual DATA Model And Big DATA
下载PDF
Virtualization Security, Strategy and Management
10
作者 Simon Tran Stuart Gold 《International Journal of Communications, Network and System Sciences》 2014年第10期423-429,共7页
The purpose of this quantitative study was to determine the relationship between the security management framework of organizations and the security condition of the virtualized environment.
关键词 virtualization Technology VIRTUAL MACHINE SECURITY ISSUES SECURITY MANAGEMENT Framework
下载PDF
Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment
11
作者 Gabriel Cephas Obasuyi Arif Sari 《International Journal of Communications, Network and System Sciences》 2015年第7期260-273,共14页
The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of informati... The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of information technology infrastructure creates the enablement of IT resources to be shared and used on several other devices and applications;this increases the growth of business needs. The environment created by virtualization is not restricted to any configuration physically or execution. The resources of a computer are shared logically. Hypervisors help in virtualization of hardware that is a software interact with the physical system, enabling or providing virtualized hardware environment to support multiple running operating system simultaneously utilizing one physical server. This paper explores the benefits, types and security issues of Virtualization Hypervisor in virtualized hardware environment. 展开更多
关键词 virtualization Hypervisors VIRTUAL MACHINE VIRTUAL MACHINE MONITOR SECURITY
下载PDF
Lightweight Virtualization Cluster How to Overcome Cloud Vendor Lock-In
12
作者 Nane Kratzke 《Journal of Computer and Communications》 2014年第12期1-7,共7页
To overcome vendor lock-in obstacles in public cloud computing, the capability to define transferable cloud-based services is crucial but has not yet been solved satisfactorily. This is especially true for small and m... To overcome vendor lock-in obstacles in public cloud computing, the capability to define transferable cloud-based services is crucial but has not yet been solved satisfactorily. This is especially true for small and medium sized enterprises being typically not able to operate a vast staff of cloud service and IT experts. Actual state of the art cloud service design does not systematically deal with how to define, deploy and operate cross-platform capable cloud services. This is mainly due to inherent complexity of the field and differences in details between a plenty of existing public and private cloud infrastructures. One way to handle this complexity is to restrict cloud service design to a common subset of commodity features provided by existing public and private cloud infrastructures. Nevertheless these restrictions raise new service design questions and have to be answered in ongoing research in a pragmatic manner regarding the limited IT-operation capabilities of small and medium sized enterprises. By simplifying and harmonizing the use of cloud infrastructures using lightweight virtualization approaches, the transfer of cloud deployments between a variety of cloud service providers will become possible. This article will discuss several aspects like high availability, secure communication, elastic service design, transferability of services and formal descriptions of service deployments which have to be addressed and are investigated by our ongoing research. 展开更多
关键词 CLOUD Computing VENDOR LOCK-IN CROSS-PLATFORM LIGHTWEIGHT virtualization Container
下载PDF
Performance Analysis and Improvement of Storage Virtualization in an OS-Online System
13
作者 Yuan Gao Yaoxue Zhang Yuezhi Zhou 《Journal of Software Engineering and Applications》 2012年第11期912-922,共11页
An OS-online system called TransCom is based on a virtual storage system that supports heterogeneous services of the operating system and applications online. In TransCom, OS and software which run in the client are s... An OS-online system called TransCom is based on a virtual storage system that supports heterogeneous services of the operating system and applications online. In TransCom, OS and software which run in the client are stored on the centralized servers, while computing tasks are carried out by the clients, so the server is the bottleneck of the system performance. This paper firstly analyzes the characteristics of its real usage workload and builds a queuing model to locate the system bottlenecks. According to the study, the disk is the primary bottleneck, so an optimal two-level cache arrangement policy is developed on both the server and the client, which aims to avoid most of the server disk accesses. LRU algorithm is used in the client-side cache. A cache management algorithm called Frequency-based Multi-Priority Queues (FMPQ) proposed in this paper is used in the server-side cache. Experiment results show that the appropriate cache arrangement can significantly improve the capability of the TransCom server. 展开更多
关键词 STORAGE virtualization PERFORMANCE ANALYSIS CACHE STRATEGY
下载PDF
Intelligent virtualization of crane lifting using laser scanning technology
14
作者 Lihui HUANG Souravik DUTTA Yiyu CAI 《Virtual Reality & Intelligent Hardware》 2020年第2期87-103,共17页
Background This paper presents an intelligent path planner for lifting tasks by tower cranes in highly complex environments,such as old industrial plants that were built many decades ago and sites used as tentative st... Background This paper presents an intelligent path planner for lifting tasks by tower cranes in highly complex environments,such as old industrial plants that were built many decades ago and sites used as tentative storage spaces.Generally,these environments do not have workable digital models and 3 D representations are impractical.Methods The current investigation introduces the use of cutting edge laser scanning technology to convert real environments into virtualized versions of the construction sites or plants in the form of point clouds.The challenge is in dealing with the large point cloud datasets from the multiple scans needed to produce a complete virtualized model.The tower crane is also virtualized for the purpose of path planning.A parallelized genetic algorithm is employed to achieve intelligent path planning for the lifting task performed by tower cranes in complicated environments taking advantage of graphics processing unit technology,which has high computing performance yet low cost.Results Optimal lifting paths are generate d in several seconds. 展开更多
关键词 Laser scanning Point cloud Intelligent modeling virtualization of complex environments Virtual tower crane Automatic lifting path planning RASTERIZATION
下载PDF
Discussion and Research on Information Security Attack and Defense Platform Construction in Universities Based on Cloud Computing and Virtualization
15
作者 Xiancheng Ding 《Journal of Information Security》 2016年第5期297-303,共7页
This paper puts forward the plan on constructing information security attack and defense platform based on cloud computing and virtualization, provides the hardware topology structure of the platform and technical fra... This paper puts forward the plan on constructing information security attack and defense platform based on cloud computing and virtualization, provides the hardware topology structure of the platform and technical framework of the system and the experimental process and technical principle of the platform. The experiment platform can provide more than 20 attack classes. Using the virtualization technology can build hypothesized target of various types in the laboratory and diversified network structure to carry out attack and defense experiment. 展开更多
关键词 Information Security Network Attack and Defense virtualization Experiment Platform
下载PDF
Service-Oriented Network Virtualization Architecture for Internet of Things 被引量:4
16
作者 Yongan Guo Hongbo Zhu Longxiang Yang 《China Communications》 SCIE CSCD 2016年第9期163-172,共10页
As a key technology to realize smart services of Internet of Things(Io T),network virtualization technology can support the network diversification and ubiquity,and improve the utilization rate of network resources.Th... As a key technology to realize smart services of Internet of Things(Io T),network virtualization technology can support the network diversification and ubiquity,and improve the utilization rate of network resources.This paper studies the service-oriented network virtualization architecture for Io T services.Firstly the semantic description method for Io T services is proposed,then the resource representation model and resource management model in the environment of network virtualization are presented.Based on the above models,the service-oriented virtual network architecture for Io T is established.Finally,a smart campus system is designed and deployed based on the service-oriented virtual network architecture.Moreover,the proposed architecture and models are verified in experiments. 展开更多
关键词 虚拟化技术 面向服务 物联网 架构 资源管理模型 网络体系结构 网络资源 智能服务
下载PDF
Virtual XML:a New Approach to an XML-based Virtualization of Data Resources
17
作者 吴吉义 《四川大学学报(工程科学版)》 CSCD 北大核心 2007年第S1期-,共4页
Virtual XML is a new approach to virtualise data resources and thus enable applications to access both XML and non-XML sources,which can benefit a variety of general-purpose software products and tools and applica- ti... Virtual XML is a new approach to virtualise data resources and thus enable applications to access both XML and non-XML sources,which can benefit a variety of general-purpose software products and tools and applica- tions dealing with stationary data and data streams.After the architectural components that enable virtual XML—a toolbox that includes a cursor model,Data Format Description Language(DFDL),and XML processing languages were illustrated,the architecture of virtual XML Documents was put forward. 展开更多
关键词 XML Virtual XML DOM ARCHITECTURE
下载PDF
Enhanced Reliability in Network Function Virtualization by Hybrid Hexagon-Cost Efficient Algorithm
18
作者 D.Jeyakumar C.Rajabhushanam 《Computer Systems Science & Engineering》 SCIE EI 2022年第12期1131-1144,共14页
In this,communication world, the Network Function Virtualization concept is utilized for many businesses, small services to virtualize the network nodefunction and to build a block that may connect the chain, communi... In this,communication world, the Network Function Virtualization concept is utilized for many businesses, small services to virtualize the network nodefunction and to build a block that may connect the chain, communication services.Mainly, Virtualized Network Function Forwarding Graph (VNF-FG) has beenused to define the connection between the VNF and to give the best end-to-endservices. In the existing method, VNF mapping and backup VNF were proposedbut there was no profit and reliability improvement of the backup and mapping ofthe primary VNF. As a consequence, this paper offers a Hybrid Hexagon-CostEfficient algorithm for determining the best VNF among multiple VNF and backing up the best VNF, lowering backup costs while increasing dependability. TheVNF is chosen based on the highest cost-aware important measure (CIM) rate,which is used to assess the relevance of the VNF forwarding graph.To achieveoptimal cost-efficiency, VNF with the maximum CIM is selected. After the selection process, updating is processed by three steps which include one backup VNFfrom one SFC, two backup VNF from one Service Function Chain (SFC),and twobackup VNF from different SFC. Finally, this proposed method is compared withCERA, MinCost, MaxRbyInr based on backup cost, number of used PN nodes,SFC request utility, and latency. The simulation result shows that the proposedmethod cuts down the backup cost and computation time by 57% and 45% compared with the CER scheme and improves the cost-efficiency. As a result, this proposed system achieves less backup cost, high reliability, and low timeconsumption which can improve the Virtualized Network Function operation. 展开更多
关键词 Network function virtualized(NFV) hybrid hexagon-cost efficient algorithm(HH-CE) cost-aware important measure(CIM) RELIABILITY network services
下载PDF
Virtualization of Real Estate Industry and Housing Bubbles --Empirical Evidence from China
19
作者 Beibei Yan Yizhen Wang 《经济管理学刊(中英文版)》 2019年第1期22-31,共10页
In the last twenty years, China has experienced a rapid development in the real estate industry. The continuous rising house price causes many social and economic problems and draws a lot of attentions from academia, ... In the last twenty years, China has experienced a rapid development in the real estate industry. The continuous rising house price causes many social and economic problems and draws a lot of attentions from academia, business world and government. Many researchers shed light on this problem from different angles, but till today, it hasn’t been fully resolved. In this paper, we try to examine the real estate bubble from a virtual economic perspective. We think that the virtual feature of real estate alters its economic role from a purely living and working place to a financing instrument. We use the newest monthly data of China real estate market from 2006 to 2018 and estimate the relationship between the housing bubble and real estate industry virtualization. We identify a significant positive association between house price index and the purchase price of land in real estate investment. This result suggests that virtual feature of real estate has deepen the bubble problem in the industry and its virtualization degree appears to be closely related to the virtual feature of land and its price proportion to real estate investment. 展开更多
关键词 Real ESTATE BUBBLES Virtual ECONOMY China HOUSING
下载PDF
Research on the Teaching Model of Experimental Virtualization in Digital Logic and Digital System Design Course
20
作者 Pan Liu Qing Wang +2 位作者 Huipeng Chen Lei Xu Yanhang Zhang 《国际计算机前沿大会会议论文集》 2019年第2期372-374,共3页
By stating the problems faced by the experiment of digital logic design course in traditional laboratory, the necessity of hardware experiment virtualization is analyzed, and then two virtual experiment methods are in... By stating the problems faced by the experiment of digital logic design course in traditional laboratory, the necessity of hardware experiment virtualization is analyzed, and then two virtual experiment methods are introduced. The pilot implementation of remote virtual experimental platform and virtual component library shows that the virtualization of hardware experiment can effectively break the time and space limitation of traditional hardware experiment, and improves the learning enthusiasm and autonomy of students, which is worth further promoted. 展开更多
关键词 VIRTUAL EXPERIMENT DIGITAL LOGIC FPGA platform VIRTUAL component LIBRARY
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部