期刊文献+

蚁群算法在网格资源发现中的应用 被引量:3

Ant colony algorithm in application of grid resource discovery
下载PDF
导出
摘要 利用RDF(resource description framework,资源描述框架)屏蔽网格资源的异构性和地理分布性,并采用布隆过滤器将资源描述转换为位向量以实现资源发现的高速匹配;将转换后的资源索引根据分层组织模型在顶层节点进行整合。最后利用蚁群算法进行搜索,高效可靠地找到满足用户服务质量(quality of service,QoS)需求的资源。实验结果表明该方法可行且搜索效率较好,查询的资源和次数越多,ACA越具有优势。 This paper introduced ACA into grid resource discovery. Firstly,it shield the heterogeneity of grid resources using RDF, changed the description of resources to bit maps for high-speed matching simultaneously using Bloom filter. Secondly, it integrated the transformed resource index on the top-level nodes based on the model of the hierarchical organization. Finally, it met user' s QoS requirements efficiently and reliably using ACA search resources. Experimental results demonstrate the effec- tiveness of the proposed approach, simultaneously with the increase in the number of resources and inquiries, ACA has more ad- vantages.
出处 《计算机应用研究》 CSCD 北大核心 2013年第5期1492-1494,共3页 Application Research of Computers
关键词 网格资源发现 资源描述框架 布隆过滤器 分层组织模型 蚁群算法 双重资源发现机制 grid resource discovery RDF Bloom filter hierarchical organization model ant colony algorithm (ACA) mixed resource discovery mechanism
  • 相关文献

参考文献10

二级参考文献52

共引文献25

同被引文献27

  • 1彭艳兵,龚俭,刘卫江,杨望.Bloom Filter哈希空间的元素还原[J].电子学报,2006,34(5):822-827. 被引量:7
  • 2RajaramanA,UIImanJD.大数据互联网大规模数据挖掘与分布式处理[M].王斌.译.7版.北京:人民邮电出版社,2012:96-98.
  • 3Honoroff J. An examination of Bloom Fihers and their applications [ EB/OL]. (2006-03-16). http://www. cs. jhu. edu/ fabian/courses/CS600. 624/slides/bloomslides, pdf.
  • 4Broder A, Mitzenmacher M. Network applications of bloom filters : A Survey [ J ]. Intemet Mathematics, 2003, 1 (4) : 485-509.
  • 5CSDN.海量数据处理算法[EB/OL].(2012-08-14).http://blog.csdn.net/hguistr/artiele/details/7866173.
  • 6Wikipedia. Bloom Filter [ DB/OL ]. ( 2013-11-12 ). http ://en. wikipedia, org/wiki.
  • 7Dinh HT, Lee C, Niyato D, et al. A survey of mobile cloud computing: architecture, applications, and approaches. Wireless Communications and Mobile Computing, 2013, 13(18): 1587-1611.
  • 8Stolfo S J, Salem MB, Keromytis AD. Fog computing: Mitigating insider data theft attacks in the cloud. Security and Privacy Workshops (SPW), 2012 IEEE Symposium on. IEEE 2012: 125-128.
  • 9Mokhtar BS, Kaul A, Georgantas N, et al. Efficient semantic service discovery in pervasive computing environments. Proc. of the ACM/IFIP/USENIX 2006 International Conference on Middleware. Springer-Verlag New York, Inc. 2006. 240-259.
  • 10Sara H, Koteiche Z. Service discovery in mobile ad-hoc networks. Next Generation Mobile Networks and Ubiquitous Computing, 2011: 217.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部