期刊文献+

一种云计算环境下基于面向服务架构的数字图书馆虚拟机部署与应用策略 被引量:2

A Virtual Machine Deployment and Application Strategy for Digital Library under Cloud Computing Environment Based on Service-Oriented Architecture
下载PDF
导出
摘要 为了提高云计算环境下数字图书馆虚拟机资源利用率与服务可用性,文章提出了一种云计算环境下基于面向服务架构的数字图书馆虚拟机部署与应用策略。该策略可达到负载均衡和满足服务等级协议的需求。 In order to enhance the resources utilization and services availability of the virtual machine deployment and application for digital library under cloud computing environment, this paper designed a virtual machine deploy- ment and application'strategy for digital library under cloud computing environment based on service -oriented ar- chitecture. It can achieve load balancing and meet service level agreement requirements.
作者 陶明翠
出处 《四川图书馆学报》 2014年第2期37-39,共3页 Journal of The Library Science Society of Sichuan
关键词 云计算 数字图书馆 虚拟机 部署与应用 cloud computing digital library virtual machine deployment and application
  • 相关文献

参考文献5

二级参考文献67

  • 1季拥政.开放存取:一种获取信息资源的全新途径[J].攀登(哲学社会科学版),2007,26(1):167-169. 被引量:4
  • 2Armbrust M,Fox A,Griffith R,et al.Above the clouds:a berkeley view of cloud computing[EB/OL].(2009-02-10)[2011-07-25].http:∥www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf.
  • 3Clark C,Fraser K,Hand S,et al.Live migration of vir-tual machines[C] ∥Proceedings of the Second Symposi-um on Networked Systems Design and Implementation(NSDI’05).Boston:USENIX ASSOC,2005:273-286.
  • 4Nelson M,Lim B,Hutchins G.Fast transparent migra-tion for virtual machines[C] ∥Proceedings of the USE-NIX Annual Technical Conference(USENIX’05).Ana-heim:USENIX ASSOC,2005:391-394.
  • 5Jin Hai,Gao Wei,Wu Song,et al.Optimizing the live migration of virtual machine by CPU scheduling[J].Journal of Network and Computer Applications,2010,34(4):1088-1096.
  • 6Wood T,Shenoy P,Venkataramani A,et al.Sandpiper:black-box and gray-box resource management for virtual machines[J].Computer Networks,2009,53(17):2923-2938.
  • 7BINU A,KUMAR G S.Virtualization techniques:a methodical reviewof Xen and KVM[C]//Proc of the 1st International Conference onAdvances in Computing and Communications.Berlin:Springer-Verlag,2011:399-410.
  • 8WANG Xi,CHENG Chuan.Access control using trusted virtual ma-chine based on Xen[C]//Proc of International Conference on AppliedInformatics and Communication.Berlin:Springer-Verlag,2011:94-101.
  • 9SALAUN M.Practical overview of a Xen covert channel[J].Journalin Computer Virology,2010,6(4):317-328.
  • 10PRICE M.The paradox of security in virtual environments[J].Com-puter,2008,41(11):22-28.

共引文献71

同被引文献4

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部