The University of Texas-Pan American

Displaying 1-5 of 5 results

  • White Papers // Dec 2012

    Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors

    The authors discuss how to recover RSA secret keys from noisy key bits with erasures and errors. There are two known algorithms recovering original secret keys from noisy keys. At Crypto 2009, Heninger and Shacham proposed a method for the case where an erroneous version of secret keys contains only...

    Provided By The University of Texas-Pan American

  • White Papers // Jul 2012

    A Fast Virtual Machine Storage Migration Technique Using Data Deduplication

    In this paper, the authors proposed a fast Virtual Machine (VM) storage migration technique. Virtual machine storage migration can migrate entire VM states to other hosts, including VM disk images. It is widely used for cross-data-center load management. However, VM disk images generally have large file sizes (typically 1-30GB). Thus,...

    Provided By The University of Texas-Pan American

  • White Papers // Feb 2012

    Enhancing TCP Throughput of Highly Available Virtual Machines via Speculative Communication

    Checkpoint-recovery based Virtual Machine (VM) replication is an attractive technique for accommodating VM installations with high-availability. It provides seamless failover for the entire soft-ware stack executed in the VM regardless the application or the underlying Operating System (OS), it runs on commodity hardware, and it is inherently capable of dealing...

    Provided By The University of Texas-Pan American

  • White Papers // Sep 2011

    Workload Adaptive Checkpoint Scheduling of Virtual Machine Replication

    Checkpoint-recovery based Virtual Machine (VM) replication is an emerging approach towards accommodating VM installations with high availability, especially, due to its inherent capability of tackling with Symmetric Multi-Processing (SMP) virtual machines, i.e. VMs with multiple virtual CPUs (vCPUs). However, it comes with the price of significant performance degradation of the...

    Provided By The University of Texas-Pan American

  • White Papers // Feb 2010

    CONIC: Content-Oriented Network with Indexed Caching

    In this paper, the authors present Content-Oriented Network with Indexed Caching (CONIC), a deployable and self-scaling architecture to exploit spare storage and bandwidth from end-systems to eliminate redundant traffic and enable efficient and fast access to content. Their trace-driven simulation indicates that CONIC can reduce 25% to 50% traffic volume...

    Provided By The University of Texas-Pan American

  • White Papers // Feb 2010

    CONIC: Content-Oriented Network with Indexed Caching

    In this paper, the authors present Content-Oriented Network with Indexed Caching (CONIC), a deployable and self-scaling architecture to exploit spare storage and bandwidth from end-systems to eliminate redundant traffic and enable efficient and fast access to content. Their trace-driven simulation indicates that CONIC can reduce 25% to 50% traffic volume...

    Provided By The University of Texas-Pan American

  • White Papers // Sep 2011

    Workload Adaptive Checkpoint Scheduling of Virtual Machine Replication

    Checkpoint-recovery based Virtual Machine (VM) replication is an emerging approach towards accommodating VM installations with high availability, especially, due to its inherent capability of tackling with Symmetric Multi-Processing (SMP) virtual machines, i.e. VMs with multiple virtual CPUs (vCPUs). However, it comes with the price of significant performance degradation of the...

    Provided By The University of Texas-Pan American

  • White Papers // Feb 2012

    Enhancing TCP Throughput of Highly Available Virtual Machines via Speculative Communication

    Checkpoint-recovery based Virtual Machine (VM) replication is an attractive technique for accommodating VM installations with high-availability. It provides seamless failover for the entire soft-ware stack executed in the VM regardless the application or the underlying Operating System (OS), it runs on commodity hardware, and it is inherently capable of dealing...

    Provided By The University of Texas-Pan American

  • White Papers // Jul 2012

    A Fast Virtual Machine Storage Migration Technique Using Data Deduplication

    In this paper, the authors proposed a fast Virtual Machine (VM) storage migration technique. Virtual machine storage migration can migrate entire VM states to other hosts, including VM disk images. It is widely used for cross-data-center load management. However, VM disk images generally have large file sizes (typically 1-30GB). Thus,...

    Provided By The University of Texas-Pan American

  • White Papers // Dec 2012

    Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors

    The authors discuss how to recover RSA secret keys from noisy key bits with erasures and errors. There are two known algorithms recovering original secret keys from noisy keys. At Crypto 2009, Heninger and Shacham proposed a method for the case where an erroneous version of secret keys contains only...

    Provided By The University of Texas-Pan American