the National Key Research and Development Program of China under Grant No.2019YFB1802600;the National Natural Science Foundation of China under Grant Nos.61420106013,61702480,61672499,and 61802365;the Youth Innovation Promotion Association of Chinese Academy of Sciences under Grant Nos.2013073 and 2020105;the Guangdong Province Key Laboratory of Popular High Performance Computers under Grant No.2017B030314073.
With the advent of virtualization techniques and software-defined networking(SDN),network function virtualization(NFV)shifts network functions(NFs)from hardware implementations to software appliances,between which exi...
The work was supported by the National Key Research and Development Program of China under Grant No.2018YFB1003604;the National Natural Science Foundation of China under Grant Nos.61472008,61672053 and U1611461,Shenzhen Key Research Project under Grant No.JCYJ20170412150946024,the National Science Foundation of USA under Grant No.CSR-1618384,Beijing Technological Program under Grant No.Z181100008918015.
With the rapid increase of memory consumption by applications running on cloud data centers,we need more efficient memory management in a virtualized environment.Exploiting huge pages becomes more critical for a virtu...
The work is supported by the National Natural Science Foundation of China under Grant Nos. 61572137 and 61728202, and Shanghai Innovation Action Project under Grant No. 16DZ1100200.
Currently, different kinds of security devices are deployed in the cloud datacenter environment and tenants may choose their desired security services such as firewall and IDS (intrusion detection system). At the sa...
The cloud operating system (cloud OS) is used for managing the cloud resources such that they can be used effectively and efficiently. And also it is the duty of cloud OS to provide convenient interface for users an...
ETL (Extract-Transform-Load) usually includes three phases: extraction, transformation, and loading. In building data warehouse, it plays the role of data injection and is the most time-consuming activity. Thus it ...
supported by the National Nature Science Foundation of China under Grant Nos. 61003002 and 90818015;the Science and Technology Commission of Shanghai under Grant No. 10511500100;Fundamental Research Funds for the Central Universities in China;Shanghai Leading Academic Discipline Project under Grant No. B114
Virtualization has recently gained popularity largely due to its promise in increasing utilization, improving availability and enhancing security. Very often, the role of computer systems needs to change as the busine...
supported by the Korea Research Foundation Grant funded by the Korean Government (MOEHRD) under Grant No. KRF2007-210-D00006
Demands on software reliability and availability have increased tremendously due to the nature of present day applications. We focus on the aspect of software for the high availability of application servers since the...
Supported by the National Natural Science Foundation of China (Grant No. 90412010), the National Basic Research 973 Program of China (Grant Nos. 2003CB317008 and 2005CB321807), and the National High Technology Development 863 Program of China (Grant No. 2004AA104330). thank the members of Vega The authors would like to Center of Institute of Computing Technology, CAS. It is their feedbacks and supports that have been inspiring and advancing the BEAP paradigm to grow up and make continuous progresses. We also feel grateful for the anonymous referees' comments.
Business applications are subject to changes with technology trends or market demands. However, quick response to these changes is still a challenging issue. Most of the existing architectures (e.g., CORBA, Web Servi...