期刊文献+

云计算环境下任务调度的趋势分析

Trends analysis of task scheduling in cloud computing environment
下载PDF
导出
摘要 云计算应用大规模和虚拟化的资源,通过计算机网络随时随地向用户提供基于不同需求的服务。作为影响云服务的关键因素,任务调度被许多专家学者所研究。研究了云计算中的任务调度算法的新特性,如何降低用户成本和云计算中心的能耗,以及实现效率与公平最大化和安全等目标。 Cloud computing uses very large scalable and virtualized resources to provide services based on different requirement via computer network in any time and at any place. As a crucial factor affecting cloud services, task scheduling was researched by many experts and scholars. In this paper, the author studied some new characteristics of the task scheduling algorithm in cloud computing, and how to reduce use cost and the energy consumption of data centers, realize objectives such as maximization between efficiency and fairness and security.
作者 梁桂才
出处 《计算机应用》 CSCD 北大核心 2014年第A02期70-72,77,共4页 journal of Computer Applications
基金 广西教育厅科研项目(2013LX189)
关键词 云计算 任务调度 虚拟机 有向无环图 cloud computing task scheduling virtual machine Directed Acyclic Graph (DAG)
  • 相关文献

参考文献19

  • 1刘鹏.云计算的定义和特点[EB/OL].(2009-02-15)[2009-06-16].http://www.chinacloud.cn/show.aspx?id=741&cid=17. 被引量:14
  • 2ABDEYAZDAN M, PARSA S, RAHMANI A M. Task graph pre- scheduling, using Nash equilibrium in game theory[ J]. The Journal of Supereomputing, 2013, 64(1) : 177 -203. 被引量:1
  • 3张希翔,李陶深.云计算下适应用户任务动态变更的调度算法[J].华中科技大学学报(自然科学版),2012,40(S1):165-169. 被引量:5
  • 4林伟伟,齐德昱.云计算资源调度研究综述[J].计算机科学,2012,39(10):1-6. 被引量:126
  • 5LIU K, JIN H, CHEN J, et al. A compromised-time-cost scheduling algorithm in swindew-c for instance-intensive cost-constrained work- flows on a cloud computing platform[ J]. International Journal of High Performance Computing Applications, 2010, 24 (4) : 445 - 456. 被引量:1
  • 6帅志伟..一种改进型Min-Min调度算法[D].华东交通大学,2009:
  • 7PANDEY S, WU L, GURU S M, et al. A particle swarm optimization- based heuristic for scheduling workflow applications in cloud computing environments [ C ]// Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications. Piscataway: IEEE, 2010:400-407. 被引量:1
  • 8BUYYA R, YEO C S, VENUGOPAL S. Market-oriented cloud computing: vision, hype, and reality for delivering it services as computing utilities [ C ]// Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications. Piscataway: IEEE, 2008 : 5 - 13. 被引量:1
  • 9SU S, LI J, HUANG Q, et al. Cost-efficient task scheduling for executing large programs in the cloud [ J ]. Parallel Computing, 2013, 39(4) : 177 -188. 被引量:1
  • 10李洁.绿色数据中心节能技术和标准规范发展状况[EB/OL]. [ 2013-06-19 ]. http://www, cnii. com. cn/cloud/content/ 2013-06/19/content_1166701. htm. 被引量:1

二级参考文献105

  • 1杜晓丽,蒋昌俊,徐国荣,丁志军.一种基于模糊聚类的网格DAG任务图调度算法[J].软件学报,2006,17(11):2277-2288. 被引量:48
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3米勒.云计算[M].史美林,姜进磊,孙瑞志,等译.北京:机械工业出版社,2009:125-128. 被引量:13
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/. 被引量:1
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home. 被引量:1
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org. 被引量:1
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7. 被引量:1
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396. 被引量:1
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11]. 被引量:1
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf. 被引量:1

共引文献1413

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部