2016 International Conference on Inventive Computation Technologies (ICICT) 2016
DOI: 10.1109/inventive.2016.7824856
|View full text |Cite
|
Sign up to set email alerts
|

Resource extension techniques in enterprise architectures through cloud connectivity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…Let Amt0,j represents the amount of memory copied during 0 th iteration of migration process of jth VM, VMj, PMbwj represents the physical memory bandwidth allotted for VMj and Vmemsize shows the memory size of VMj. Thus, if the 0 th iteration which occurs between the time t0 and time t1, then Amt0,j can be represented as shown in (1).…”
Section: The Cost Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Let Amt0,j represents the amount of memory copied during 0 th iteration of migration process of jth VM, VMj, PMbwj represents the physical memory bandwidth allotted for VMj and Vmemsize shows the memory size of VMj. Thus, if the 0 th iteration which occurs between the time t0 and time t1, then Amt0,j can be represented as shown in (1).…”
Section: The Cost Modelmentioning
confidence: 99%
“…Virtualization is the technology used for enhancement of capabilities of datacenter. Usually the data center is transformed into fully fledged cloud architecture mainly through the implementation of successful virtualization of machines in processing communication and storage domains [1]. The applications and services available in cloud computing are stored in data centers that are distributed across several geographic locations.…”
Section: Introductionmentioning
confidence: 99%