首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
We present a PLT Redex model of a substantial portion of the Racket virtual machine and bytecode verifier (formerly known as MzScheme), along with lessons learned in developing the model. Inspired by the “warts-and-all” approach of the VLISP project, in which Wand et al. produced a verified implementation of Scheme, our model reflects many of the realities of a production system. Our methodology departs from the VLISP project’s in its approach to validation; instead of producing a proof of correctness, we explore the use of QuickCheck-style randomized testing, finding it a cheap and effective technique for discovering a variety of errors in the model—from simple typos to more fundamental design mistakes.  相似文献   

2.
3.
虚拟机动态迁移方法   总被引:1,自引:0,他引:1  
对虚拟机动态迁移方法的研究背景、研究意义以及研究现状进行综述,分别介绍了内存预拷贝迁移、内存后拷贝迁移、内存混合复制迁移和基于日志跟踪重现的迁移方法,对其算法思想、关键技术、实现机制以及性能等进行概括、分析和比较,并针对当前主流的预拷贝迁移的优化策略予以分类阐述。最后,对动态迁移方法有待深入的研究热点和发展趋势进行展望。  相似文献   

4.
The increasing diversity of resources which is becoming available to users through the introduction of computer networks has opened up new areas of investigation. One of the problems encountered is that of providing uniform and common access procedures where functionally similar facilities exist on different systems. A lack of standardization in this area can inhibit the very benefits derived through the use of networks. Another aspect is the possibility of achieving genuine resource sharing among several different systems in the network. This can lead to the development of virtual systems that embody the most desirable characteristics of the various real component systems.One approach to solving these problems is to create an agent that is able both to automate remote access procedures on the user's behalf, and provide him with the most appropriate network interface. This paper describes the design of a multi-user virtual machine that is able to perform this role. The machine is programmable by a high-level language which has been specially designed to meet the requirements of a network access environment. It is conjectured that the use of a special purpose high-level language is a most flexible and powerful means of generating particular network agents and that this technique permits the automation of a wide variety of network access procedures.  相似文献   

5.
虚拟机协同调度问题研究   总被引:1,自引:0,他引:1       下载免费PDF全文
由于虚拟化技术能对多个服务有效隔离避免其相互间干扰而得到广泛应用。对于需要多个服务协同工作的大型应用,传统虚拟机监控器调度时忽视了虚拟机间的协同性,降低了虚拟机间并行工作的可能性,从而影响了服务质量。对虚拟机的协同调度进行研究,分析了调度对虚拟机协同性及服务质量的影响,提出了一种虚拟机协同调度算法。实验表明,协同调度使虚拟化平台服务器响应时间降低了1/3,且没有对调度的公平性造成明显影响。  相似文献   

6.
基于网络的分布并行虚拟计算机的实现   总被引:2,自引:0,他引:2  
构造了一个基于网络的分布并行虚拟计算机DPVM,它由虚拟机层、通信层和基本类层组成,包括服务器,工作机和客户机3种不同类型的机器,在简要介绍DPVM的总体结构之后,从服务器,任务通信,程序输出和消息传递并行语义的面向对象实现几方面对系统实现的关键技术进行讨论。  相似文献   

7.
Leif Ibsen 《Software》1984,14(1):17-29
A portable compiler can be constructed by letting it generate code for a virtual machine, which is then implemented on the real target machines. The design of a virtual machine which is especially suitable as a target machine for compiled Ada programs is described. The main design goals, implementability on mini-computers and portability, are discussed and the resulting design is described in some detail. Some implementation strategies for the machine are proposed and the feasibility of the virtual machine approach is discussed.  相似文献   

8.
浅谈虚拟机技术在计算机教学与实验中的应用   总被引:3,自引:0,他引:3  
本文针对计算机教学与实践的现状,提出用虚拟机技术来构建教学和实验环境,可以有效地提高教学质量,达到良好的教学效果。  相似文献   

9.
针对节能机制和信任驱动的资源调度机制相分离的特点,提出了一种应用到云计算数据中心中的节能及信任驱动的虚拟机资源调度TD energy-aware-Opt算法。该算法利用任务和虚拟机资源之间的信任机制进行任务和虚拟机资源之间的匹配,并通过最小化迁移算法对虚拟机进行实时迁移,以达到保证用户任务性能和数据中心节能的目的。对该算法进行大规模和多角度的仿真实验,结果表明:该算法与传统的基于信任驱动的最小完成时间TD min-min算法、基于信任驱动的最大完成时间TD max-min算法相比,能节省大量电能并且具有较优的平均信任效益、总信任效益和较低的服务等级协议违反率。  相似文献   

10.
可信计算组织(TCG,trusted computing group)提出的虚拟机远程证明方案可以为云计算平台提供虚拟机完整性验证服务,而直接使用 TCG 提出的方案性能较低,并且会受到布谷鸟攻击的威胁。利用虚拟机自省技术(VMI,virtual machine introspection)设计了新的虚拟机远程证明方案。通过在虚拟机监视器(VMM,virtual machine monitor)中获取虚拟机远程验证证据的方法消除在虚拟机内执行布谷鸟攻击的路径,利用物理可信平台模块(TPM,trusted platform module)保证虚拟机远程验证证据的完整性,减少了身份证明密钥(AIK,attestation identity key)证书的产生数量,降低了私有证书颁发机构的负载。实验表明,方案可以有效验证虚拟机的完整性状态,在虚拟机数量较多的情况下,性能优于TCG提出的虚拟机远程证明方案。  相似文献   

11.
物理主机工作负载的不确定性容易造成物理主机过载和资源利用率低,从而影响数据中心的能源消耗和服务质量。针对该问题,通过分析物理主机的工作负载记录与虚拟机资源请求的历史数据,提出了基于负载不确定性的虚拟机整合(WU-VMC)方法。为了稳定云数据中心各主机的工作负载,该方法首先利用虚拟机的资源请求拟合物理主机工作负载,并利用梯度下降方法计算虚拟机与物理主机的虚拟机匹配度;然后,利用匹配度进行虚拟机整合,从而解决负载不确定造成的能耗增加和服务质量下降等问题。仿真实验结果表明,WU-VMC方法降低了数据中心的能源消耗,减少了虚拟机迁移次数,提高了数据中心的资源利用率及服务质量。  相似文献   

12.
David W. Sandberg 《Software》1988,18(5):415-425
The implementation of a virtual machine for X2, an object-based programming language, is presented. The X2 virtual machine, is similar to the Smalltalk-80 virtual machine, but X2 does not perform message look-up. The implementation differs from most Smalitalk-80 systems in that objects are paged and in the ability to save changes to an image instead of the whole image. These differences allow larger images to be handled.  相似文献   

13.
The convergence of data, voice, and multimedia communication over digital networks, coupled with continuous improvement in network capacity and reliability has resulted in a proliferation of communication technologies. Unfortunately, despite these new developments, there is no easy way to build new application-specific communication services. The stovepipe approach used today for building new communication services results in rigid technology, limited utility, lengthy and costly development cycle, and difficulty in integration. In this paper, we introduce communication virtual machine (CVM) that supports rapid conception, specification, and automatic realization of new application-specific communication services through a user-centric, model-driven approach. We present the concept, architecture, modeling language, prototypical design, and implementation of CVM in the context of a healthcare application.  相似文献   

14.
分析了基于处理器硬件虚拟化技术实现的KVM子系统的架构.针对KVM跟踪独立事件信息的局限性,提出一种新的KVM事件跟踪机制(kvmtrnee)来达到性能调节的目的,并使用relayfs接口进行了设计与实现.同时探讨了Linux kernel Markers实现机制及其在kvmtraee的实际应用.  相似文献   

15.
虚拟机系统安全综述   总被引:1,自引:0,他引:1  
随着云计算的广泛应用,虚拟机技术得到了复苏和长足的发展,但同时也带来了新的安全威胁,因此对于虚拟机的安全威胁和防御的研究成为目前计算机安全界的研究热点。以目前广泛应用的虚拟机Xen为例,针对虚拟机的技术特征分析了所存在的漏洞和威胁,并从计算机安全学的角度提出了相应的防御和保护方法。较为全面地总结了目前国内外针对虚拟机安全各方面相关的研究成果,通过系统的比较分析,指出了目前存在的问题,探讨了下一步的研究方向。  相似文献   

16.
Java卡是一个基于Java的智能卡操作系统,Java卡能够动态更新。着重介绍了在Java卡系统实现过程中需要关注的各种基于Java卡虚拟机的安全点,研究了Java卡虚拟机运行过程中的脆弱性,总结了其在安全方面面临的各种威胁,并进一步研究了这些安全威胁可能产生的影响。最后针对可能出现的不同的安全攻击,提出并完成了相应的安全防御措施。实验证明,这些防御措施能够有效地保障Java卡系统的安全性。  相似文献   

17.
System administrators are faced with the challenge of making their existing systems power-efficient and scalable. Although cloud computing is offered as a solution to this challenge by many, we argue that having multiple interfaces and cloud providers can result in more complexity than before. This paper addresses cloud computing from a user perspective. We show how complex scenarios, such as an on-demand render farm and scaling web-service, can be achieved utilizing clouds but at the same time keeping the same management interface as for local virtual machines. Further, we demonstrate that by enabling the virtual machine to have its policy locally instead of in the underlying framework, it can move between otherwise incompatible cloud providers and sites in order to achieve its goals more efficiently.  相似文献   

18.
Java supports the monitor construct for language‐level synchronization in the context of multi‐threading. This paper introduces the lightweight monitor, an efficient user‐level monitor implementation. The lightweight monitor is useful for single‐threaded Java programs as well as for multi‐threaded Java programs with little lock contention. A 32‐bit lock is embedded in each object for efficient lock access while other monitor data structures are managed using a hash table. We highly optimized the lock manipulation code, which is translated and inlined by a just‐in‐time (JIT) compiler. In the most probable cases, only nine SPARC instructions are spent for lock acquisition and five instructions are spent for lock release. Our experimental results indicate that the lightweight monitor is faster than the monitor implementation in the SUN JDK 1.2 RC1 by up to 21 times in the absence of lock contention and by up to seven times in the presence of lock contention. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   

19.
A method for the introspection of virtual machines is proposed. The main distinctive feature of this method is that it makes it possible to obtain information about the system operation using the minimum knowledge about its internal organization. The proposed approach uses rarely changing parts of the application binary interface, such as identifiers and parameters of system calls, calling conventions, and the formats of executable files. The lightweight property of the introspection method is due to the minimization of the knowledge about the system and by its high performance. The introspection infrastructure is based on the QEMU emulator, version 2.8. Presently, monitoring the file operations, processes, and API function calls are implemented. The available introspection tools (RTKDSM, Panda, and DECAF) get data for the analysis using kernel structures. All the data obtained (addresses of structures, etc.) is written to special profiles. Since the addresses and offsets strongly depend not only on the version of the operating system but also on the parameters of its assembly, these tools have to store a large number of profiles. We propose to use parts of the application binary interface because they are rarely modified and it is often possible to use one profile for a family of OSs. The main idea underlying the proposed method is to intercept the system and library function calls and read parameters and returned values. The processor provides special instructions for calling system and user defined functions. The capabilities of QEMU are extended by an instrumentation mechanism to enable one to track each executed instruction and find the instructions of interest among them. When a system call occurs, the control is passed to the system call detector that checks the number of the call and decides to which module the job should be forwarded. In the case of an API function call, the situation is similar, but the API function detector checks the function address. An introspection tool consisting of a set of modules is developed. These modules are dynamic libraries that are plugged in QEMU. The modules can interact by exchanging data.  相似文献   

20.
高勇  范明钰 《计算机应用》2010,30(5):1327-1330
针对现有进程分析方法存在的缺陷,提出了一种在Windows平台虚拟环境下分析进程的方法。该方法首先在宿主机下分析虚拟机的内存,捕捉当前线程,并通过内核数据结构得到当前线程所在进程, 然后通过页目录表物理地址计算进程页面,对内存进行清零来结束进程。实例分析表明本方法在保护宿主机安全的同时,能快速监测到程序,并且可以有效地结束进程。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号