Automated Fine-Grained CPU Provisioning for Virtual Machines
نویسندگان
چکیده
منابع مشابه
Elastic Virtual Machine for Fine-grained Cloud Resource Provisioning
Elasticity is one of the distinguishing characteristics associated with Cloud computing emergence. It enables cloud resources to auto-scale to cope with workload demand. Multi-instances horizontal scaling is the common scalability architecture in Cloud; however, its current implementation is coarse-grained, while it considers Virtual Machine (VM) as a scaling unit, this implies additional scali...
متن کاملA Fine-Grained Model for Adaptive On-Demand Provisioning of CPU Shares in Data Centers
Data Centers usually host different third party applications, each of them possibly having different requirements in terms of QoS. To achieve them, sufficient resources, like CPU and memory, must be allocated to each application. However, workload fluctuations might arise, and so, resource demands will vary. Allocations based on worst/average case scenarios can lead to non-desirable results. A ...
متن کاملiBalloon: Self-Adaptive Virtual Machines Resource Provisioning
Although cloud computing has gained sufficient popularity in the last two years, there are still some key impediments to enterprise adoption. Cloud management is one of the top challenges. The ability of on-the-fly partitioning hardware resources into virtual machine(VM) instances facilitates the cloud to provide elastic computing environment to users. But the flexibility of resource provisioni...
متن کاملFine-Grained Treatment to Synchronizations in GPU-to-CPU Translation
GPU-to-CPU translation may extend Graphics Processing Units (GPU) programs executions to multi-/many-core CPUs, and hence enable cross-device task migration and promote whole-system synergy. This paper describes some of our findings in treatment to GPU synchronizations during the translation process. We show that careful dependence analysis may allow a fine-grained treatment to synchronizations...
متن کاملFine-Grained Data Security in Virtual Organizations
Controlling the access to data based on user credentials is a fundamental part of database management systems. In most cases, the level at which information is controlled extends only to a certain level of granularity. In some scenarios, however, there is a requirement to control access at a more granular way allowing the users to see only the data they are supposed to see in a database table. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on Architecture and Code Optimization
سال: 2014
ISSN: 1544-3566,1544-3973
DOI: 10.1145/2637480