VNToR: Network Virtualization at the Top-of-Rack Switch
Related publications (31)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services offer a range of access control mechanisms to protect users privacy. As it is not in the b ...
Recently, European Union advocates the smart Solid-State Lighting (SSL). The key factors are a smart-control scheme and an interaction with other networks, such as communication networks and traffic monitoring sensor networks. Public lighting represents a ...
Implementing and promoting more sustainable forms of urban transport are key policies of Local Authorities throughout the UK. Park and Ride (P&R) is one such system implemented widely in the UK, especially in historic towns and cities with limited road and ...
Virtualizing resources – servers, storage, networks – is now part of every IT departments life. The benefits of virtualization no longer need to be demonstrated and, when played upon in a large scale, provide both the saddle and spurs with which the Cloud ...
With the availability of user oriented software tools, dedicated architectures, such as the parallel computing platform and programming model CUDA (Compute Unified Device Architecture) released by NVIDIA, one of the main producers of graphics cards, and of ...
With the prosperity of cloud computing, an increasing number of Small and Medium-sized Enterprises (SMEs) move their business to public clouds such as Amazon EC2. To help tenants deploy services in the cloud, researchers either conduct performance evaluati ...
User identification and access control have become a high demand feature on mobile devices because those devices are wildly used by employees in corporations and government agencies for business and store increasing amount of sensitive data. This paper des ...
Cloud computing in general, and Infrastructure-as-a-Service (IaaS) in particular, are becoming ever more popular. Unfortunately, performance interference (and the resulting unpredictability in the delivered performance) across virtual machines (VMs) co-loc ...
Ensuing from the deteriorating conditions of road networks, traffic forecasting techniques with mathematical and computer-theory methods have been employed to address the real-time prediction of traffic conditions and their dynamic control, with the optimu ...
Profilers based on hardware performance counters are indispensable for performance debugging of complex software systems. All modern processors feature hardware performance counters, but current virtual machine monitors (VMMs) do not properly expose them t ...