A Novel Security-Driven Scheduling Algorithm for Precedence-Constrained Tasks in Heterogeneous Distributed Systems
暂无分享,去创建一个
Kenli Li | Bharadwaj Veeravalli | Xiaoyong Tang | Zeng Zeng | Kenli Li | B. Veeravalli | Xiaoyong Tang | Zengri Zeng
[1] Xiao Qin,et al. Real-time scheduling with quality of security constraints , 2006, Int. J. High Perform. Comput. Netw..
[2] Hesham El-Rewini,et al. Scheduling Parallel Program Tasks onto Arbitrary Target Machines , 1990, J. Parallel Distributed Comput..
[3] Dongseung Kim,et al. A Two-Pass Scheduling Algorithm for Parallel Programs , 1994, Parallel Comput..
[4] Ami Marowka,et al. The GRID: Blueprint for a New Computing Infrastructure , 2000, Parallel Distributed Comput. Pract..
[5] Kenli Li,et al. Integrating Trust into Grid Economic Model Scheduling Algorithm , 2006, OTM Conferences.
[6] Kuldip Singh,et al. An Improved Duplication Strategy for Scheduling Precedence Constrained Graphs in Multiprocessor Systems , 2003, IEEE Trans. Parallel Distributed Syst..
[7] Min Xie,et al. Iterative list scheduling for heterogeneous computing , 2005, J. Parallel Distributed Comput..
[8] Salim Hariri,et al. Performance-Effective and Low-Complexity Task Scheduling for Heterogeneous Computing , 2002, IEEE Trans. Parallel Distributed Syst..
[9] Xiao Qin,et al. Scheduling security-critical real-time applications on clusters , 2006, IEEE Transactions on Computers.
[10] Ishfaq Ahmad,et al. Dynamic Critical-Path Scheduling: An Effective Technique for Allocating Task Graphs to Multiprocessors , 1996, IEEE Trans. Parallel Distributed Syst..
[11] Atakan Dogan,et al. On QoS-based scheduling of a meta-task with multiple QoS demands in heterogeneous computing , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.
[12] Xiao Qin,et al. Security-Aware Resource Allocation for Real-Time Parallel Jobs on Homogeneous and Heterogeneous Clusters , 2008, IEEE Transactions on Parallel and Distributed Systems.
[13] Edward A. Lee,et al. A Compile-Time Scheduling Heuristic for Interconnection-Constrained Heterogeneous Processor Architectures , 1993, IEEE Trans. Parallel Distributed Syst..
[14] Vladimiro Sassone,et al. A Bayesian Model for Event-based Trust , 2022 .
[15] Salim Hariri,et al. Task scheduling algorithms for heterogeneous processors , 1999, Proceedings. Eighth Heterogeneous Computing Workshop (HCW'99).
[16] Imtiaz Ahmad,et al. An Integrated Technique for Task Matching and Scheduling onto Distributed Heterogeneous Computing Systems , 2002, J. Parallel Distributed Comput..
[17] Shanshan Song,et al. Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling , 2006, IEEE Transactions on Computers.
[18] Georges Zaccour,et al. Production, Manufacturing and Logistics Retail promotions with negative brand image effects: Is cooperation possible? , 2003 .
[19] John S. Baras,et al. On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[20] Atakan Dogan,et al. LDBS: a duplication based scheduling algorithm for heterogeneous computing systems , 2002, Proceedings International Conference on Parallel Processing.
[21] Andrew A. Chien,et al. Breaking the barriers: high performance security for high performance computing , 2002, NSPW '02.
[22] Shanshan Song,et al. Security-driven heuristics and a fast genetic algorithm for trusted grid job scheduling , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[23] Arjan J. C. van Gemund,et al. Low-Cost Task Scheduling for Distributed-Memory Machines , 2002, IEEE Trans. Parallel Distributed Syst..
[24] Gregory A. Koenig,et al. Cluster Security as a Unique Problem with Emergent Properties: Issues and Techniques , 2004 .
[25] Jianwei Niu,et al. CBTM: A Trust Model with Uncertainty Quantification and Reasoning for Pervasive Computing , 2005, ISPA.
[26] Xiao Qin,et al. SAREC: a security-aware scheduling strategy for real-time applications on clusters , 2005, 2005 International Conference on Parallel Processing (ICPP'05).
[27] Gregory A. Koenig,et al. Clusters and security: distributed security for distributed systems , 2005, CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005..
[28] Mihalis Yannakakis,et al. Towards an Architecture-Independent Analysis of Parallel Algorithms , 1990, SIAM J. Comput..
[29] Jagannathan Sarangapani. Wireless Ad hoc and Sensor Networks: Protocols, Performance, and Control , 2017 .
[30] Ian Foster,et al. The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.
[31] Muthucumaru Maheswaran,et al. Integrating trust into grid resource management systems , 2002, Proceedings International Conference on Parallel Processing.
[32] Andrés Marín López,et al. TrustAC: Trust-Based Access Control for Pervasive Devices , 2005, SPC.
[33] R. Brodie,et al. The influence of brand image and company reputation where manufacturers market to small firms: A customer value perspective , 2007 .
[34] Félix Gómez Mármol,et al. Security threats scenarios in trust and reputation models for distributed systems , 2009, Comput. Secur..
[35] David A. Padua,et al. Communication contention in APN list scheduling algorithm , 2009, Science in China Series F: Information Sciences.
[36] Dharma P. Agrawal,et al. Optimal Scheduling Algorithm for Distributed-Memory Machines , 1998, IEEE Trans. Parallel Distributed Syst..
[37] Füsun Özgüner,et al. Parallelizing Existing Applications in a Distributed Heterogeneous Environment , 1995 .
[38] Muthucumaru Maheswaran,et al. A trust brokering system and its application to resource management in public-resource grids , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[39] Xiao Qin,et al. Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity , 2007, J. Parallel Distributed Comput..
[40] Nawwaf N. Kharma,et al. A high performance algorithm for static task scheduling in heterogeneous distributed computing systems , 2008, J. Parallel Distributed Comput..
[41] Young-Koo Lee,et al. A trust model for ubiquitous systems based on vectors of trust values , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).
[42] S. Ranka,et al. Applications and performance analysis of a compile-time optimization approach for list scheduling algorithms on distributed memory multiprocessors , 1992, Proceedings Supercomputing '92.
[43] Byung Kook Kim,et al. An optimal scheduling algorithm for minimizing the computing period of cyclic synchronous tasks on multiprocessors , 2001, J. Syst. Softw..
[44] Reda A. Ammar,et al. Scheduling methods for efficient utilization of cluster computing environments , 2003 .
[45] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[46] Serguei A. Mokhov. Towards Security Hardening of Scientific Demand-Driven and Pipelined Distributed Computing Systems , 2008, 2008 International Symposium on Parallel and Distributed Computing.
[47] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[48] Ishfaq Ahmad,et al. On Exploiting Task Duplication in Parallel Program Scheduling , 1998, IEEE Trans. Parallel Distributed Syst..