ABSTRACT: This paper studies the preemption between programs running in different virtual machines on the same computer. One of the current monitoring methods consist of updating the average steal time through collaboration with the hypervisor. However, the average is insufficient to diagnose abnormal latencies in time-sensitive applications. Moreover, the added latency is not directly visible from the virtual machine point of view. The main challenge is to recover the cause of preemption of a task running in a virtual machine, whether it is a task on the host computer or in another virtual machine. We propose a new method to study thread preemption crossing virtual machines boundaries using kernel tracing. The host computer and each monito...
This article proposes an automata-based model for describing and verifying the behavior of thread ma...
A major theme of IT in the past decade has been the shift from on-premise hardware to cloud computin...
We describe the design and implementation of Deep-Dive, a system for transparently identifying and m...
ABSTRACT: This paper studies interactions between virtual machines and their host through the sharin...
ABSTRACT: Cloud computing offers to the end user the ability of accessing a pool of resources with t...
ABSTRACT: With the consolidation of computer services in large cloud-based data centers, almost all ...
ABSTRACT: Detecting latency-related problems in production environments is usually carried out at th...
ABSTRACT: The performance of applications remains a major concern to programmers. An unexpected late...
ABSTRACT: Nowadays, nested VMs are often being used to address compatibility issues, security concer...
ABSTRACT: Debugging and profiling tools can alter the execution flow or timing, can induce heisenbug...
ABSTRACT: This article proposes a novel approach to synchronize a posteriori the detailed execution ...
This article proposes an automata-based model for describing and validating sequences of kernel even...
This article proposes an automata-based model for describing and validating the behavior of threads ...
ABSTRACT: We propose a new class of profiler for distributed and heterogeneous systems. In these sys...
Modern cloud data centers indicate the frequent existence of complex failure manifestation. Failures...
This article proposes an automata-based model for describing and verifying the behavior of thread ma...
A major theme of IT in the past decade has been the shift from on-premise hardware to cloud computin...
We describe the design and implementation of Deep-Dive, a system for transparently identifying and m...
ABSTRACT: This paper studies interactions between virtual machines and their host through the sharin...
ABSTRACT: Cloud computing offers to the end user the ability of accessing a pool of resources with t...
ABSTRACT: With the consolidation of computer services in large cloud-based data centers, almost all ...
ABSTRACT: Detecting latency-related problems in production environments is usually carried out at th...
ABSTRACT: The performance of applications remains a major concern to programmers. An unexpected late...
ABSTRACT: Nowadays, nested VMs are often being used to address compatibility issues, security concer...
ABSTRACT: Debugging and profiling tools can alter the execution flow or timing, can induce heisenbug...
ABSTRACT: This article proposes a novel approach to synchronize a posteriori the detailed execution ...
This article proposes an automata-based model for describing and validating sequences of kernel even...
This article proposes an automata-based model for describing and validating the behavior of threads ...
ABSTRACT: We propose a new class of profiler for distributed and heterogeneous systems. In these sys...
Modern cloud data centers indicate the frequent existence of complex failure manifestation. Failures...
This article proposes an automata-based model for describing and verifying the behavior of thread ma...
A major theme of IT in the past decade has been the shift from on-premise hardware to cloud computin...
We describe the design and implementation of Deep-Dive, a system for transparently identifying and m...