A Survey Report On Software Aging and Rejuvenation studies in Virtualized Environment
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 5
Abstract
Software aging is a phenomenon that occurs in a long running complex software system that tends to decrease in performance or increase in failure rate. This phenomenon lead to performance degradation and crash/hang failure. To counteract software aging a technique named as software rejuvenation has been proposed, which remove aging related failures and its effects. Nowadays, virtualized platform has become the popular choice to deploy complex and long running application. Critical and long running applications are always expected to be available but these applications are more prone to suffer from software aging phenomenon. To counteract this phenomenon software rejuvenation technique has been used. To eliminate downtime outages due to rejuvenation we have combined rejuvenation manager component with two aging indicators application-specific indicator and system-wide indicator. The idea behind our paper is to propose a algorithm which will choose the correct rejuvenation technique for virtual machine(VM) and virtual machine monitor(VMM) according to its aging effect. Through this method we can save both time and cost.
Authors and Affiliations
SUBHASHREE BARADA , SANTOSH KUMAR SWAIN
HCI and Eye Tracking : Emotion Recognition Using Hidden Markov Model
Recognition of Emotion can be identified using Eye Tracking methods which may be non-intrusive. SVD and HMM are used for eye tracking to recognize emotions, which classifies six different emotions with less correlation c...
A Secure Image Steganography Method Based on Neural Network
Steganography is the term used to describe the hiding of data in images to avoid detection by attackers. Steganalysis is the method used by attackers to determine if images have hidden data and to recover that data. By m...
Performance Evaluation of Edge-based Video Error Concealment using H.264 Flexible Macroblock Ordering
This paper evaluates the directional interpolation scheme used widely for spatial error concealment in the H.264/AVC video coding standard using Flexible Macroblock Ordering (FMO). A mathematical analysis of FMO is prese...
An Approach of Zero Correlation Linear Cryptanalysis
Differential and Linear Cryptanalysis are two most popular techniques that have been widely used to attacks block ciphers to reveal its weakness in substitution and permutation network. Most of the block ciphers which ar...
Modified Booth Dadda Multiplier using Carry Look ahead adder Design and Implementation
This paper proposes a novel 8X8 bit Modified Booth Dadda Multiplier architecture which is an improved version of Modified Booth Wallace Multiplier. The idea involves the generation of partial products using Modified Boot...