2016 International Conference on Computing, Communication and Automation (ICCCA) 2016
DOI: 10.1109/ccaa.2016.7813911
|View full text |Cite
|
Sign up to set email alerts
|

An intensify deadline aware credit based cloud task scheduling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 4 publications
0
4
0
1
Order By: Relevance
“…Step 2 Build the non-base column (8) For k � 2 to Jdo (9) Begin (10) 14) End (15) Step 3 Add 1 to ai, j (16) 1 ≤ i ≤ row and 1 ≤ j ≤ Ele 5. e outcomes of performance measures are reported as mean values.…”
Section: Evaluation and Analysis Of Algorithm Performance Indexmentioning
confidence: 99%
See 1 more Smart Citation
“…Step 2 Build the non-base column (8) For k � 2 to Jdo (9) Begin (10) 14) End (15) Step 3 Add 1 to ai, j (16) 1 ≤ i ≤ row and 1 ≤ j ≤ Ele 5. e outcomes of performance measures are reported as mean values.…”
Section: Evaluation and Analysis Of Algorithm Performance Indexmentioning
confidence: 99%
“…e concept of real-time updating of inertia weight [14] is used to govern the speed of particles in the search process to prevent sliding into a local optimum. In this work, an orthogonal matrix is also used to start the particle swarm [15] so that the particle swarm may attain an ordered starting solution, which is more efficient while searching the solution space. e three optimization methodologies listed above are employed in this study to increase the quality of the solution produced by the PSO algorithm in the search process, as well as the particle's search ability, culminating in the optimal solution.…”
Section: Introductionmentioning
confidence: 99%
“…O hipervisor também monitora todas as máquinas virtuais em execução para que os ataques possam ser minimizados [20]. O trabalho de Chauhan, Jaglan e Dabas [21] elenca comunicação apenas de máquinas virtuais ou físicas autorizadas como meios de segurança, além da utilização de firewall virtual e também criar switch virtual (para interligar máquinas virtuais) com configurações de tráfego de dados. Já Liu et al [22], comentam a integração por mecanismo de controle de acesso por meio de Smack do Linux (módulo de segurança no sistema operacional Linux) e canal de migração confiável no gerenciamento e implementação de máquinas virtuais, além de isolamento de segurança baseado por MAC (Mandatory Access Control -Controle de Acesso Obrigatório).…”
Section: Apresentar Técnicas De Proteção Dos Dados Armazenados Em Nuvemunclassified
“…The result of the proposed method was compared with the round robin algorithm and produces a better result. Pankaj et al [8] proposed a scheduling mechanism that takes into account the deadline of task. The proposed method allocates credit to respective tasks based on their lengths and deadlines.…”
Section: Literature Surveymentioning
confidence: 99%