2001
DOI: 10.1006/jpdc.2001.1753
|View full text |Cite
|
Sign up to set email alerts
|

Heuristics for Scheduling Data Requests Using Collective Communications in a Distributed Communication Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2005
2005
2023
2023

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…In [4], the authors introduce a wide range of algorithmic techniques for scheduling data transfers in tree networks. Several heuristic methods for data request scheduling were presented in [5]. A scheduling model based on bandwidth reservations for critical data transfers was introduced in [6].…”
Section: Related Work and Conclusionmentioning
confidence: 99%
“…In [4], the authors introduce a wide range of algorithmic techniques for scheduling data transfers in tree networks. Several heuristic methods for data request scheduling were presented in [5]. A scheduling model based on bandwidth reservations for critical data transfers was introduced in [6].…”
Section: Related Work and Conclusionmentioning
confidence: 99%
“…Several extensions of the FAP have been studied for static networks such as the data allocation problem (DAP) [1], the data replication problem (DRP) [27], the data staging problem (DSP) [35,36], and video allocation problem (VAP) [25]. All of the above mentioned methods and problem formulations are related to the ADRP, because all address the improvement of data accessibility by replicating data items.…”
Section: Related Workmentioning
confidence: 99%
“…One technical objective of the MSHN project was to design, prototype, and refine a mapping system as part of a distributed resource management system that leverages the heterogeneity of resources and workload to deliver the requested qualities of service [20,59]. One aspect of the AICE and BADD programs involved designing a scheduling system for forwarding data items prior to their use as inputs to a local application in a wide area network distributed computing environment [79,78]. The AICE, BADD, and MSHN environments are similar in that, in some situations, not all applications or communication requests can be completed with their most preferred qualities of service by their deadlines.…”
mentioning
confidence: 99%