期刊文献+

云控制系统并行任务分配优化算法与并联控制 被引量:11

Parallel Task Assignment Optimization Algorithm and Parallel Control for Cloud Control Systems
下载PDF
导出
摘要 利用Petri网模拟云控制系统的并行处理过程,引入并行处理系统的时钟周期、吞吐率和任务完成时间性能指标,运用极大–加代数方法分析和优化云控制系统并行处理性能.采用子过程细分的优化方式,通过求解一类最优控制问题,设计并行任务分配优化方案,以保证任务完成时间最短,并给出计算最短任务完成时间的有效算法.同时,采用重复设置多套瓶颈段并联的方式提高并行处理能力,并运用Petri网实现瓶颈子过程的并联控制,且给出并联控制在协同云控制系统中的一个应用. We use Petri nets to simulate the parallel processing arising in cloud control systems. We introduce perfor- mance indexes called clock period, through-put rate and task completion time, and use the max-plus algebra to analyze and optimize the parallel processing performance of cloud control systems. By using the method of segmenting sub-processes and solving the optimal control problem, we design tile optimization scheme for parallel task assignment to minimize tile completion time, and develop an effective algorithm to compute such a ininimum time. Computer performances can be improved through parlel connection of bottle-neck roads. We use the Petri nets to realize the parallel control of bottle-neck sub-processes and present an application of the parallel control in cooperative cloud control systems.
出处 《自动化学报》 EI CSCD 北大核心 2017年第11期1973-1983,共11页 Acta Automatica Sinica
基金 国家自然科学基金(60774007 61305101)资助~~
关键词 云控制系统 并行处理 任务分配 最优控制 并联控制 PETRI网 Cloud control system, parallel processing, task assignmeut, optimal control, parallel control, Petri nets
  • 相关文献

参考文献4

二级参考文献97

  • 1王龙,全国控制理与学术讨论会论文集,1988年
  • 2王龙,全国离散事件动态系统理论与应用学术讨论会论文集,1988年
  • 3王龙,信息与控制,1988年,5卷,1页
  • 4Backes M, Kopf B, Rybalchenko A. Automatic discovery and quantification of information leaks. In Proc. the 30th IEEE Symposium on Security and Privacy, May 2009, pp.141-153.
  • 5Borders K, Prakash A. Quantifying information leaks in outbound Web traffic. In Proc. the sou. IEEE Symposium on Security and Privacy, May 2009, pp.129-140.
  • 6Jung J, Sheth A, Greenstein B, Wetherall D, Maganis G, Kohno T. Privacy oracle: A system for finding application leaks with black box differential testing. In Proc. the 15th ACM Conference on Computer and Communications Security, Oct. 2008, pp.279-288.
  • 7Egele M, Kruegel C, Kirda E, Vigna G. PiOS: Detecting privacy leaks in lOS applications. In Proc. the 18th Annual Network & Distributed System Security Symposium, Feb. 2011.
  • 8Enck W, Gilbert P, Chun B G, Cox L P, Jung J, McDaniel P, Sheth A. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proc. the 9th USENIX Symposium on Operating Systems Design and Implementation, Oct. 2010, pp.393-407.
  • 9Kirda E, Kruegel C. Behavior-based spyware detection. In Proc. the 15th USENIX Security Symposium, July 31- August 4, 2006.
  • 10Egele M, Kruegel C, Kirda E, Yin H, Song D. Dynamic spyware analysis. In Proc. the 2007 USENIX Annual Technical Conference, June 2007, pp.233-246.

共引文献50

同被引文献79

引证文献11

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部