共查询到20条相似文献,搜索用时 15 毫秒
1.
Casey Klein Matthew Flatt Robert Bruce Findler 《Higher-Order and Symbolic Computation》2012,25(2-4):209-253
We present a PLT Redex model of a substantial portion of the Racket virtual machine and bytecode verifier (formerly known as MzScheme), along with lessons learned in developing the model. Inspired by the “warts-and-all” approach of the VLISP project, in which Wand et al. produced a verified implementation of Scheme, our model reflects many of the realities of a production system. Our methodology departs from the VLISP project’s in its approach to validation; instead of producing a proof of correctness, we explore the use of QuickCheck-style randomized testing, finding it a cheap and effective technique for discovering a variety of errors in the model—from simple typos to more fundamental design mistakes. 相似文献
2.
3.
4.
《Computer Networks (1976)》1980,4(3):125-137
The increasing diversity of resources which is becoming available to users through the introduction of computer networks has opened up new areas of investigation. One of the problems encountered is that of providing uniform and common access procedures where functionally similar facilities exist on different systems. A lack of standardization in this area can inhibit the very benefits derived through the use of networks. Another aspect is the possibility of achieving genuine resource sharing among several different systems in the network. This can lead to the development of virtual systems that embody the most desirable characteristics of the various real component systems.One approach to solving these problems is to create an agent that is able both to automate remote access procedures on the user's behalf, and provide him with the most appropriate network interface. This paper describes the design of a multi-user virtual machine that is able to perform this role. The machine is programmable by a high-level language which has been specially designed to meet the requirements of a network access environment. It is conjectured that the use of a special purpose high-level language is a most flexible and powerful means of generating particular network agents and that this technique permits the automation of a wide variety of network access procedures. 相似文献
5.
由于虚拟化技术能对多个服务有效隔离避免其相互间干扰而得到广泛应用。对于需要多个服务协同工作的大型应用,传统虚拟机监控器调度时忽视了虚拟机间的协同性,降低了虚拟机间并行工作的可能性,从而影响了服务质量。对虚拟机的协同调度进行研究,分析了调度对虚拟机协同性及服务质量的影响,提出了一种虚拟机协同调度算法。实验表明,协同调度使虚拟化平台服务器响应时间降低了1/3,且没有对调度的公平性造成明显影响。 相似文献
6.
基于网络的分布并行虚拟计算机的实现 总被引:2,自引:0,他引:2
构造了一个基于网络的分布并行虚拟计算机DPVM,它由虚拟机层、通信层和基本类层组成,包括服务器,工作机和客户机3种不同类型的机器,在简要介绍DPVM的总体结构之后,从服务器,任务通信,程序输出和消息传递并行语义的面向对象实现几方面对系统实现的关键技术进行讨论。 相似文献
7.
Leif Ibsen 《Software》1984,14(1):17-29
A portable compiler can be constructed by letting it generate code for a virtual machine, which is then implemented on the real target machines. The design of a virtual machine which is especially suitable as a target machine for compiled Ada programs is described. The main design goals, implementability on mini-computers and portability, are discussed and the resulting design is described in some detail. Some implementation strategies for the machine are proposed and the feasibility of the virtual machine approach is discussed. 相似文献
8.
9.
针对节能机制和信任驱动的资源调度机制相分离的特点,提出了一种应用到云计算数据中心中的节能及信任驱动的虚拟机资源调度TD energy-aware-Opt算法。该算法利用任务和虚拟机资源之间的信任机制进行任务和虚拟机资源之间的匹配,并通过最小化迁移算法对虚拟机进行实时迁移,以达到保证用户任务性能和数据中心节能的目的。对该算法进行大规模和多角度的仿真实验,结果表明:该算法与传统的基于信任驱动的最小完成时间TD min-min算法、基于信任驱动的最大完成时间TD max-min算法相比,能节省大量电能并且具有较优的平均信任效益、总信任效益和较低的服务等级协议违反率。 相似文献
10.
可信计算组织(TCG,trusted computing group)提出的虚拟机远程证明方案可以为云计算平台提供虚拟机完整性验证服务,而直接使用 TCG 提出的方案性能较低,并且会受到布谷鸟攻击的威胁。利用虚拟机自省技术(VMI,virtual machine introspection)设计了新的虚拟机远程证明方案。通过在虚拟机监视器(VMM,virtual machine monitor)中获取虚拟机远程验证证据的方法消除在虚拟机内执行布谷鸟攻击的路径,利用物理可信平台模块(TPM,trusted platform module)保证虚拟机远程验证证据的完整性,减少了身份证明密钥(AIK,attestation identity key)证书的产生数量,降低了私有证书颁发机构的负载。实验表明,方案可以有效验证虚拟机的完整性状态,在虚拟机数量较多的情况下,性能优于TCG提出的虚拟机远程证明方案。 相似文献
11.
物理主机工作负载的不确定性容易造成物理主机过载和资源利用率低,从而影响数据中心的能源消耗和服务质量。针对该问题,通过分析物理主机的工作负载记录与虚拟机资源请求的历史数据,提出了基于负载不确定性的虚拟机整合(WU-VMC)方法。为了稳定云数据中心各主机的工作负载,该方法首先利用虚拟机的资源请求拟合物理主机工作负载,并利用梯度下降方法计算虚拟机与物理主机的虚拟机匹配度;然后,利用匹配度进行虚拟机整合,从而解决负载不确定造成的能耗增加和服务质量下降等问题。仿真实验结果表明,WU-VMC方法降低了数据中心的能源消耗,减少了虚拟机迁移次数,提高了数据中心的资源利用率及服务质量。 相似文献
12.
David W. Sandberg 《Software》1988,18(5):415-425
The implementation of a virtual machine for X2, an object-based programming language, is presented. The X2 virtual machine, is similar to the Smalltalk-80 virtual machine, but X2 does not perform message look-up. The implementation differs from most Smalitalk-80 systems in that objects are paged and in the ability to save changes to an image instead of the whole image. These differences allow larger images to be handled. 相似文献
13.
Yi Deng Author Vitae Author Vitae Peter J. Clarke Author Vitae Author Vitae Raju Rangaswami Author Vitae Author Vitae 《Journal of Systems and Software》2008,81(10):1640-1662
The convergence of data, voice, and multimedia communication over digital networks, coupled with continuous improvement in network capacity and reliability has resulted in a proliferation of communication technologies. Unfortunately, despite these new developments, there is no easy way to build new application-specific communication services. The stovepipe approach used today for building new communication services results in rigid technology, limited utility, lengthy and costly development cycle, and difficulty in integration. In this paper, we introduce communication virtual machine (CVM) that supports rapid conception, specification, and automatic realization of new application-specific communication services through a user-centric, model-driven approach. We present the concept, architecture, modeling language, prototypical design, and implementation of CVM in the context of a healthcare application. 相似文献
14.
15.
16.
17.
Kyrre Begnum 《The Journal of supercomputing》2012,61(2):251-266
System administrators are faced with the challenge of making their existing systems power-efficient and scalable. Although cloud computing is offered as a solution to this challenge by many, we argue that having multiple interfaces and cloud providers can result in more complexity than before. This paper addresses cloud computing from a user perspective. We show how complex scenarios, such as an on-demand render farm and scaling web-service, can be achieved utilizing clouds but at the same time keeping the same management interface as for local virtual machines. Further, we demonstrate that by enabling the virtual machine to have its policy locally instead of in the underlying framework, it can move between otherwise incompatible cloud providers and sites in order to achieve its goals more efficiently. 相似文献
18.
Java supports the monitor construct for language‐level synchronization in the context of multi‐threading. This paper introduces the lightweight monitor, an efficient user‐level monitor implementation. The lightweight monitor is useful for single‐threaded Java programs as well as for multi‐threaded Java programs with little lock contention. A 32‐bit lock is embedded in each object for efficient lock access while other monitor data structures are managed using a hash table. We highly optimized the lock manipulation code, which is translated and inlined by a just‐in‐time (JIT) compiler. In the most probable cases, only nine SPARC instructions are spent for lock acquisition and five instructions are spent for lock release. Our experimental results indicate that the lightweight monitor is faster than the monitor implementation in the SUN JDK 1.2 RC1 by up to 21 times in the absence of lock contention and by up to seven times in the presence of lock contention. Copyright © 2004 John Wiley & Sons, Ltd. 相似文献
19.
N. I. Fursova P. M. Dovgalyuk I. A. Vasil’ev V. A. Makarov 《Programming and Computer Software》2017,43(5):307-313
A method for the introspection of virtual machines is proposed. The main distinctive feature of this method is that it makes it possible to obtain information about the system operation using the minimum knowledge about its internal organization. The proposed approach uses rarely changing parts of the application binary interface, such as identifiers and parameters of system calls, calling conventions, and the formats of executable files. The lightweight property of the introspection method is due to the minimization of the knowledge about the system and by its high performance. The introspection infrastructure is based on the QEMU emulator, version 2.8. Presently, monitoring the file operations, processes, and API function calls are implemented. The available introspection tools (RTKDSM, Panda, and DECAF) get data for the analysis using kernel structures. All the data obtained (addresses of structures, etc.) is written to special profiles. Since the addresses and offsets strongly depend not only on the version of the operating system but also on the parameters of its assembly, these tools have to store a large number of profiles. We propose to use parts of the application binary interface because they are rarely modified and it is often possible to use one profile for a family of OSs. The main idea underlying the proposed method is to intercept the system and library function calls and read parameters and returned values. The processor provides special instructions for calling system and user defined functions. The capabilities of QEMU are extended by an instrumentation mechanism to enable one to track each executed instruction and find the instructions of interest among them. When a system call occurs, the control is passed to the system call detector that checks the number of the call and decides to which module the job should be forwarded. In the case of an API function call, the situation is similar, but the API function detector checks the function address. An introspection tool consisting of a set of modules is developed. These modules are dynamic libraries that are plugged in QEMU. The modules can interact by exchanging data. 相似文献
20.
针对现有进程分析方法存在的缺陷,提出了一种在Windows平台虚拟环境下分析进程的方法。该方法首先在宿主机下分析虚拟机的内存,捕捉当前线程,并通过内核数据结构得到当前线程所在进程, 然后通过页目录表物理地址计算进程页面,对内存进行清零来结束进程。实例分析表明本方法在保护宿主机安全的同时,能快速监测到程序,并且可以有效地结束进程。 相似文献