An Efficient Memory Partitioning Approach for Multi-Pattern Data Access in STT-RAM

Author(s):  
Binbin Liu ◽  
Fan Yang ◽  
Dian Zhou ◽  
Xuan Zeng
Keyword(s):  
2019 ◽  
Vol 12 (1) ◽  
pp. 1-22
Author(s):  
Wensong Li ◽  
Fan Yang ◽  
Hengliang Zhu ◽  
Xuan Zeng ◽  
Dian Zhou

2018 ◽  
Vol 5 (1) ◽  
pp. 32
Author(s):  
I Gede Primanata ◽  
Nyoman Putra Sastra ◽  
Dewa Made Wiharta

This study aims to compare VMware server virtualization technology and Xen server that simulates hardware into the software. In order to share loads can be balanced on both virtual servers, this research used HAproxy as Load Balancing which is implemented on Apache Web Server so performance from CPU usage side, memory and access speed from VMware and Xen server virtualization can be compared. By comparing these two models, it is expected to be used as a reference for selecting virtualization models for shared resource needs on one or more physical servers. From the results of testing in this study, it was found that the performance of VMware is better than Xen when viewed from the CPU usage. CPU usage in VMware is lower than Xen with 1.57% when handling one website and 1.58% when handling two websites. In terms of memory usage Xen Server is more efficient in memory usage when compared to VMware, Xen is more efficient memory of 29.11% and 34.84% for handling one and two websites when compared to VMware. While in terms of data access speed on Xen faster than VMware, which is about 42,132 Kbps.


Author(s):  
Jincheng Su ◽  
Fan Yang ◽  
Xuan Zeng ◽  
Dian Zhou ◽  
Jie Chen

Author(s):  
P. Sudheer ◽  
T. Lakshmi Surekha

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The  Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.


2011 ◽  
Vol 34 (3) ◽  
pp. 473-481
Author(s):  
Guo-Fu XIE ◽  
Wen-Cheng WANG
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document