MOWS: Multi-objective workflow scheduling in cloud computing based on heuristic algorithm
暂无分享,去创建一个
Morteza Analoui | Hassan Takabi | Song Fu | Farzaneh Abazari | M. Analoui | Song Fu | Hassan Takabi | Farzaneh Abazari
[1] Quan Z. Sheng,et al. Science in the Cloud: Allocation and Execution of Data-Intensive Scientific Workflows , 2013, Journal of Grid Computing.
[2] A. B. M. Shawkat Ali,et al. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..
[3] Indrakshi Ray,et al. Recovering from Malicious Attacks in Workflow Systems , 2005, DEXA.
[4] Jinjun Chen,et al. A Hybrid Genetic Algorithm for Privacy and Cost Aware Scheduling of Data Intensive Workflow in Cloud , 2015, ICA3PP.
[5] Chen Junjie,et al. An optimized scheduling algorithm on a cloud workflow using a discrete particle swarm , 2014 .
[6] Yao Yan. Cloud workflow scheduling algorithm oriented to dynamic price changes , 2013 .
[7] Xiao Qin,et al. Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity , 2007, J. Parallel Distributed Comput..
[8] Shigen Shen,et al. Task Scheduling Optimization in Cloud Computing Based on Heuristic Algorithm , 2012, J. Networks.
[9] Radu Prodan,et al. A Multi-objective Approach for Workflow Scheduling in Heterogeneous Environments , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).
[10] Chase Qishi Wu,et al. On Scientific Workflow Scheduling in Clouds under Budget Constraint , 2013, 2013 42nd International Conference on Parallel Processing.
[11] Xiaorong Li,et al. ScaleStar: Budget Conscious Scheduling Precedence-Constrained Many-task Workflow Applications in Cloud , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.
[12] Babita Bhagat,et al. Secure workflow scheduling in cloud environment using modified particle swarm optimization with scout adaptation , 2017, Int. J. Model. Simul. Sci. Comput..
[13] Xiao Qin,et al. Dynamic task scheduling with security awareness in real-time systems , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[14] Robert W. Graves,et al. The SCEC Southern California Reference Three-Dimensional Seismic Velocity Model Version 2 , 2000 .
[15] Václav Snásel,et al. Swarm scheduling approaches for work-flow applications with security constraints in distributed data-intensive computing environments , 2012, Inf. Sci..
[16] Buqing Cao,et al. Scheduling workflows with privacy protection constraints for big data applications on cloud , 2020, Future Gener. Comput. Syst..
[17] Ehud Gudes,et al. Specifying application-level security in workflow systems , 1998, Proceedings Ninth International Workshop on Database and Expert Systems Applications (Cat. No.98EX130).
[18] Kakali Chatterjee,et al. Cloud security issues and challenges: A survey , 2017, J. Netw. Comput. Appl..
[19] Yang Wang,et al. On Scheduling Algorithms for MapReduce Jobs in Heterogeneous Clouds with Budget Constraints , 2013, OPODIS.
[20] Jing Liu,et al. Job Scheduling Model for Cloud Computing Based on Multi- Objective Genetic Algorithm , 2013 .
[21] M. Livny,et al. High-Throughput, Kingdom-Wide Prediction and Annotation of Bacterial Non-Coding RNAs , 2008, PloS one.
[22] Mohamed Cheriet,et al. Cloud Computing: A Risk Assessment Model , 2014, 2014 IEEE International Conference on Cloud Engineering.
[23] Manzur Murshed,et al. Energy-Aware Virtual Machine Consolidation in IaaS Cloud Computing , 2014 .
[24] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[25] Albert Y. Zomaya,et al. MPHC: Preserving Privacy for Workflow Execution in Hybrid Clouds , 2013, 2013 International Conference on Parallel and Distributed Computing, Applications and Technologies.
[26] Junwei Cao,et al. A Case Study on the Use of Workflow Technologies for Scientific Analysis: Gravitational Wave Data Analysis , 2007, Workflows for e-Science, Scientific Workflows for Grids.
[27] Xiaorong Li,et al. SABA: A security-aware and budget-aware workflow scheduling strategy in clouds , 2015, J. Parallel Distributed Comput..
[28] Vijayan Sugumaran,et al. FFBAT: A security and cost‐aware workflow scheduling approach combining firefly and bat algorithms , 2017, Concurr. Comput. Pract. Exp..
[29] Jinjun Chen,et al. Research on Workflow Scheduling Algorithms in the Cloud , 2014 .
[30] Vijay Varadharajan,et al. Security as a Service Model for Cloud Environment , 2014, IEEE Transactions on Network and Service Management.
[31] Meikang Qiu,et al. Security-aware optimization for ubiquitous computing systems with SEAT graph approach , 2013, J. Comput. Syst. Sci..
[32] Kenli Li,et al. A Novel Security-Driven Scheduling Algorithm for Precedence-Constrained Tasks in Heterogeneous Distributed Systems , 2011, IEEE Transactions on Computers.
[33] Jin-Soo Kim,et al. Cost optimized provisioning of elastic resources for application workflows , 2011, Future Gener. Comput. Syst..
[34] Helen J. Wang,et al. Enabling Security in Cloud Storage SLAs with CloudProof , 2011, USENIX ATC.
[35] Mohammad Masdari,et al. Towards workflow scheduling in cloud computing: A comprehensive analysis , 2016, J. Netw. Comput. Appl..
[36] Lyes Khoukhi,et al. Malicious virtual machines detection through a clustering approach , 2015, 2015 International Conference on Cloud Technologies and Applications (CloudTech).
[37] Xiaomin Zhu,et al. Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in Clouds , 2017, IEEE Transactions on Parallel and Distributed Systems.
[38] Morteza Analoui,et al. Effect of anti-malware software on infectious nodes in cloud environment , 2016, Comput. Secur..
[39] Paul Watson. A multi-level security model for partitioning workflows over federated clouds , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[40] Bertrand Granado,et al. Multi-Objective Approach for Energy-Aware Workflow Scheduling in Cloud Computing Environments , 2013, TheScientificWorldJournal.
[41] Roberto Di Pietro,et al. Secure virtualization for cloud computing , 2011, J. Netw. Comput. Appl..
[42] Eddy Caron,et al. Improving Users' Isolation in IaaS: Virtual Machine Placement with Security Constraints , 2014, 2014 IEEE 7th International Conference on Cloud Computing.
[43] Yong Zhao,et al. Opportunities and Challenges in Running Scientific Workflows on the Cloud , 2011, 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[44] Rajkumar Buyya,et al. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..
[45] Luke M. Leslie,et al. Optimizing Scientific Workflows in the Cloud: A Montage Example , 2014, 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing.
[46] Nelson Luis Saldanha da Fonseca,et al. Workflow specification and scheduling with security constraints in hybrid clouds , 2013, 2nd IEEE Latin American Conference on Cloud Computing and Communications.
[47] Wei Du,et al. Security-aware intermediate data placement strategy in scientific cloud workflows , 2014, Knowledge and Information Systems.
[48] Claudio Fabiano Motta Toledo,et al. Genetic-based algorithms applied to a workflow scheduling algorithm with security and deadline constraints in clouds , 2017, Comput. Electr. Eng..
[49] Ewa Deelman,et al. WorkflowSim: A toolkit for simulating scientific workflows in distributed environments , 2012, 2012 IEEE 8th International Conference on E-Science.
[50] D. Katz,et al. The Montage architecture for grid-enabled science processing of large, distributed datasets , 2004 .
[51] E. M. Mohamed,et al. Enhanced data security model for cloud computing , 2012, 2012 8th International Conference on Informatics and Systems (INFOS).
[52] Keqin Li,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems Multi-objective Scheduling of Many Tasks in Cloud Platforms , 2022 .
[53] Salim Hariri,et al. Performance-Effective and Low-Complexity Task Scheduling for Heterogeneous Computing , 2002, IEEE Trans. Parallel Distributed Syst..
[54] Sandeep K. Sood,et al. A combined approach to ensure data security in cloud computing , 2012, J. Netw. Comput. Appl..