2019
DOI: 10.1186/s13638-019-1557-3
|View full text |Cite
|
Sign up to set email alerts
|

An IoT-based task scheduling optimization scheme considering the deadline and cost-aware scientific workflow for cloud computing

Abstract: Large-scale applications of Internet of things (IoT), which require considerable computing tasks and storage resources, are increasingly deployed in cloud environments. Compared with the traditional computing model, characteristics of the cloud such as pay-as-you-go, unlimited expansion, and dynamic acquisition represent different conveniences for these applications using the IoT architecture. One of the major challenges is to satisfy the quality of service requirements while assigning resources to tasks. In t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
67
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 122 publications
(72 citation statements)
references
References 44 publications
0
67
0
Order By: Relevance
“…CoAP is designed to support application in resource-based web services with simple methods like Get, Put, Post and Delete, typical from HTTP, but simple enough for monitoring application through constrained devices [65]. Scheduling algorithms like the one offered in [66] for cloud services are not considered in this work. The above-described protocols are all designed to achieve the lower communication time for devices allowing the system to use the minimum transmission power and maximizing the system throughput.…”
Section: A Network Descriptionmentioning
confidence: 99%
“…CoAP is designed to support application in resource-based web services with simple methods like Get, Put, Post and Delete, typical from HTTP, but simple enough for monitoring application through constrained devices [65]. Scheduling algorithms like the one offered in [66] for cloud services are not considered in this work. The above-described protocols are all designed to achieve the lower communication time for devices allowing the system to use the minimum transmission power and maximizing the system throughput.…”
Section: A Network Descriptionmentioning
confidence: 99%
“…Attention mechanisms have achieved immense success in speech recognition, computer vision, natural language processing and exploration of the hierarchical attention mechanism [1,2,22,31,35,37]. The key idea of soft attention is to learn to assign attentive weights (normalized by summing to 1) for a set of features: higher (lower) weights indicate that the corresponding features are informative (less informative) for the end task, which learns and determines the focus areas and enables the model to focus on the most effective information with limited resources.…”
Section: Related Workmentioning
confidence: 99%
“…Hamming-loss [27], Micro-F1 [28] and Macro-averaging are used indicators in multilabel classification tasks [29].…”
Section: Evaluation Metricsmentioning
confidence: 99%