Search Results - ping+yang

2 Results Sort By:
Recovering Virtual Machine from Failure of Post-Copy Live Migration
New approach to recover a Virtual Machine during post-copy live migration Background: Post-copy is one of the two key techniques (besides pre-copy) for live migration of virtual machines in data centers. Post-copy provides deterministic total migration time and low downtime for write-intensive VMs. However, if post-copy migration fails for any...
Published: 12/28/2023   |   Inventor(s): Kartik Gopalan, Ping Yang, Dinuni Fernando, Jonathan Terner
Keywords(s):  
Category(s): Technology Classifications > Computers, Campus > Binghamton University
Security and Privacy Aware Virtual Machine Checkpointing
A security and privacy aware checkpointing mechanism that enables users to selectively exclude processes and terminal applications that contain sensitive data from being checkpointed. Background: Virtual Machine (VM) checkpointing enables a user to capture a snapshot of a running VM on persistent storage. VM checkpoints can be used to roll back...
Published: 7/22/2024   |   Inventor(s): Ping Yang, Kartik Gopalan
Keywords(s): #SUNYresearch, Technologies
Category(s): Technology Classifications > Computers, Campus > Binghamton University
© 2024. All Rights Reserved. Powered by Inteum