用户名: 密码: 验证码:
Multidisciplinary approaches to artificial swarm intelligence for heterogeneous computing and cloud scheduling
详细信息    查看全文
  • 作者:Jinglian Wang ; Bin Gong ; Hong Liu ; Shaohui Li
  • 关键词:Heterogeneous computing and cloud scheduling ; High performance clusters(HPC) ; Swarm intelligence ; Multidisciplinary approaches
  • 刊名:Applied Intelligence
  • 出版年:2015
  • 出版时间:October 2015
  • 年:2015
  • 卷:43
  • 期:3
  • 页码:662-675
  • 全文大小:4,076 KB
  • 参考文献:1.Abdelzaher T, Shin K (1999) Combined task and message scheduling in distributed real-time systems. IEEE Trans Parallel Distrib Syst 10(11):967-85CrossRef
    2.Ahmed Q, Vrbsky S (1998) Maintaining security in firm real-time database systems.. In: Proceedings of 14th Ann. Computer Security Application Conference, pp 83-0
    3.Ali S, Siegel HJ, Maheswaran M, Hensgen D (2000) Task execution time modeling for heterogeneous computing systems.. In: Proceedings of heterogeneous computing workshop, pp 185-99
    4.Apvrille A, Pourzandi M (2004) Xml distributed security policy for clusters. Computers & Security J 23(8):649-58CrossRef
    5.Braun TD, Siegel HJ, Beck N, Boloni LL, Maheswaran M, Reuther AI, Robertson JP, Theys MD, Yao B, Hensgen D, Freund RF (2001) A comparison of eleven static heuristics for mapping a class of independent tasks onto heterogeneous distributed computing systems. Journal of Parallel and Distributed Computing 61(6):810-37CrossRef
    6.Chan HL, Chan J (2009) Optimizing throughput and energy in online deadline scheduling. ACM Trans Algorithms 6(1):1-0CrossRef
    7.Cheng S, Huang Y (2004) Dynamic real-time scheduling for multi-processor tasks using genetic algorithm. In: Proceedings of the 28th annual international computer software and applications conference, pp 154-60
    8.Connelly K, Chien A (2002) Breaking the barriers: high performance security for high performance computing.. In: Proceedings of workshop new security paradigms, pp 36-2
    9.De Falco I, Della Cioppa A (2012) Biological invasion-inspired migration in distributed evolutionary algorithms. Inf Sci 207:50-5CrossRef
    10.Fernandez-Martinez J, Garcia-Gonzalo E (2011) Stochastic stability analysis of the linear continuous and discrete pso models. IEEE Trans Evol Comput 15(3):405-23CrossRef
    11.George B, Haritsa J (1997) Secure transaction processing in firm real-time database systems.. In: Proceedings of ACM SIGMOD Conference, pp 462-73
    12.Gurouta T, Medjiah S (2014) Quality of service modeling for green scheduling in clouds. Sustainable Computing: Informatics and Systems (4): 225-40
    13.Han X, Lam TW (2010) Deadline scheduling and power management for speed bounded processors. Theor Comput Sci 411(40-42):3587-600MathSciNet CrossRef MATH
    14.Hsieh FS, Lin JB (2014) A dynamic scheme for scheduling complex tasks in manufacturing systems based on collaboration of agents. Appl Intell 41(2):366-82MathSciNet CrossRef
    15.Irani S, Shukla S, Gupta R (2007) Algorithms for power savings. ACM Trans Algorithms 3(4):1-1MathSciNet CrossRef
    16.Jih-Yiing L, Ying-ping C (2011) Analysis on the collaboration between global search and local search in memetic computation. IEEE Trans Evol Comput 15(5):608-23CrossRef
    17.Le CV, Pang CK, Gan OP, Chee XM, Zhang DH, Luo M, Chan HL, Lewis FL (2013) Classification of energy consumption patterns for energy audit and machine scheduling in industrial manufacturing systems. Trans Inst Meas Control 35(5):583-92CrossRef
    18.Li B, Zhou Z, Zou W, Li D (2012) Quantum memetic evolutionary algorithm-based low-complexity signal detection for underwater acoustic sensor networks. IEEE Trans Syst Man Cybern Part C Appl Rev on 42(5):626-40CrossRef
    19.Liu C, Layland J (1973) Scheduling algorithms for multiprogramming in a hard real-time environment. J ACM 20(1):46-1MathSciNet CrossRef MATH
    20.Luo P (2007) A revisit of fast greedy heuristics for mapping a class of independent tasks onto heterogeneous computing systems. Journal of Parallel and Distributed Computing 67(6):695-14CrossRef MATH
    21.Ma Y, Gong B, Sugihara R, Gupta R (2012) Energy-efficient deadline scheduling for heterogeneous systems. J Parallel Distrib Comput 72(12):1725-740CrossRef MATH
    22.Nesmachnow S, Cancela H, Alba E (2012) A parallel micro evolutionary algorithm for heterogeneous computing and grid scheduling. Appl Soft Comput 12(2):626-39MathSciNet CrossRef
    23.Pant A, Jafri H (2004) Communicating efficiently on cluster based grids with mpich-vmi.. In: Proceedings of IEEE international conference on cluster computing, pp 23-3
    24.Poli R (2008) Dynamics and stability of the sampling distribution of particle swarm optimisers via moment analysis. Journal of Artificial Evolution & Applications 2008(2008):1-0
    25.Ramamritham K, Stankovic J (1984) Dynamic task scheduling in distributed hard real-time system. IEEE Softw 1(3):46-1CrossRef
    26.Son S, Mukkamala R, David R (2000a) Integrating security and real-time requirements using covert channel capacity. IEEE Trans Knowl Data Eng 12(6):865-79CrossRef
    27.Son S, Zimmerman R, Hansson J (2000b) An adaptable security manager for real-time transactions.. In: Proceedings of 12th Euromicro Conf. Real-Time Systems, pp 63-0
    28.Stankovic JA, Spuri M, Ramamritham K, Buttazzo GC (1998) Deadline scheduling for real-time systems-EDF and related algorithms. Springer, pp 72-5
    29.Subramani V, Kettimuthu R, Srinivasan S, Johnston J, Saday
  • 作者单位:Jinglian Wang (1) (2)
    Bin Gong (2)
    Hong Liu (3)
    Shaohui Li (3)

    1. School of Information and Electrical Engineering, Ludong University, Yantai, China
    2. School of Computer Science and Technology, Shandong University, Jinan, China
    3. School of Information Science and Technology, Shandong Normal University, Jinan, China
  • 刊物类别:Computer Science
  • 刊物主题:Artificial Intelligence and Robotics
    Mechanical Engineering
    Manufacturing, Machines and Tools
  • 出版者:Springer Netherlands
  • ISSN:1573-7497
文摘
Enabled to provide pervasive access to distributed resources in parallel ways, heterogeneous scheduling is extensively applied in large-scaled computing system for high performance. Conventional real-time scheduling algorithms, however, either disregard applications-security needs and thus expose the applications to security threats or run applications at inferior security levels without optimizing security performance. In recognition of high reliability, a security-aware model is firstly presented via quantization of security overheads of heterogeneous systems. Secondly, inspired by multi disciplines, the meta-heuristic is addressed based on the supercomputer hybrid architecture. On the other hand, some technological breakthroughs are achieved, including boundary conditions for different heterogeneous computing and cloud scheduling and descriptions of real-time variation of scheduling indexes (stringent timing and security constraints). Extensive simulator and simulation experiments highlight higher efficacy and better scalability for the proposed approaches compared with the other three meta-heuristics; the overall improvements achieve 8 %, 12 % and 14 % for high-dimension instances, respectively. Keywords Heterogeneous computing and cloud scheduling High performance clusters(HPC) Swarm intelligence Multidisciplinary approaches

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700