2006
DOI: 10.1109/tpds.2006.38
|View full text |Cite
|
Sign up to set email alerts
|

Multiprocessor scheduling and rescheduling with use of cellular automata and artificial immune system support

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
27
0
23

Year Published

2007
2007
2016
2016

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 64 publications
(52 citation statements)
references
References 18 publications
1
27
0
23
Order By: Relevance
“…Many scheduling algorithms (other than the most trivial) utilize knowledge of the available system resources and the tasks to be processed when deciding to allocate a task to a processor [3,8,10,28,33,36,37,42]. How to best generate this knowledge is an open problem [37], which is dealt with in different ways.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…Many scheduling algorithms (other than the most trivial) utilize knowledge of the available system resources and the tasks to be processed when deciding to allocate a task to a processor [3,8,10,28,33,36,37,42]. How to best generate this knowledge is an open problem [37], which is dealt with in different ways.…”
Section: Introductionmentioning
confidence: 99%
“…The accuracy of these estimations becomes particularly important in distributed systems, where users must pay for processing, where demand for computational resources outstrips supply, or where a problem must be processed as quickly as possible. The most common form of estimating task execution times is by benchmarking a task or set of tasks offline in advance [3,8,33,36,37]. The heterogeneous and non-dedicated nature of the resources in a loosely-coupled distributed system means that this type of estimation can introduce a large amount of error, between the actual execution time and the estimated execution time of a set of tasks.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Due to the self-organizing, cooperative and robust characteristics of the immune system its applicability to various areas, such as pattern recognition, network security and anomaly detection has been actively studied in the past decade [2,3,4]. However, only recently immune system based scheduling algorithms have been developed by researchers to target different instances of the problem [5,6,7,8].…”
Section: Introductionmentioning
confidence: 99%