Learn More
Virtualized data centers enable sharing of resources among hosted applications. However, it is difficult to satisfy service-level objectives(SLOs) of applications on shared infrastructure, as application workloads and resource consumption patterns change over time. In this paper, we present AutoControl, a resource control system that automatically adapts to(More)
Live migration of virtual machines (VMs) can consume excessive time and resources, and may affect application performance significantly if VM memory pages get dirtied faster than their content can be transferred to the destination. Existing approaches to this problem transfer memory content faster with high-speed networks, slow down the dirtying of memory(More)
—Existing approaches to providing high availability (HA) for virtualized environments require a backup VM for every primary running VM. These approaches are expensive in memory because the backup VM requires the same amount of memory as the primary, even though it is normally passive. In this paper, we propose a storage-based, memory-efficient HA solution(More)
Checkpoint replication is a prevalent way of maintaining virtual machine availability in the presence of host failures. Since checkpoint replication can impose heavy load on network resources, checkpoint compression has been suggested to reduce network usage. This paper presents the first detailed evaluation and characterization of the effectiveness and(More)
Cloud Computing is a flourishing technology because of its scalability, flexibility, availability of resources and other features. Resource multiplexing is done through the virtualization technology in cloud computing. Virtualization technology acts as a backbone for provisioning requirements of the cloud based solutions. At present, load balancing is one(More)
Since a traditional file system cannot account for run-time reference behavior when making data-placement decisions, performance may degrade severely when the data-access patterns that actually take place at runtime are different from the data relations that the file system has expected. This paper presents a hybrid approach to rearranging data placements(More)
A number of WSN (wireless sensor networks) applications have been deployed to monitor the environment periodically and identify anomalous events. Anomalous events occur rarely. However, when an anomaly event occurs, it often carries temporal and spatial locality. Observations of such events are improved by reducing the period of monitoring to increase the(More)
All Rights Reserved To my father. ii ACKNOWLEDGEMENTS I cannot say enough to thank my advisor, Professor Kang Shin; this thesis would not have been possible without him. He sets an example of continued pursuit of excellence, strong sense of responsibility and hard work. He has provided tremendous support all the years of my graduate study, and has shown me(More)
Low voltage ride through (LVRT) problem has become an important issue in a power system with large capacity wind power. Many running wind farms should test their LVRT capabilities. Artificial short circuit test was carried out in a regional power grid in China to test the LVRT capabilities of several wind farms. Considering both security and effectiveness(More)
  • 1