期刊文献+
共找到51篇文章
< 1 2 3 >
每页显示 20 50 100
Modeling and performance evaluation of QoS-aware job scheduling of computational grids
1
作者 单志广 林闯 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期425-430,共6页
To achieve high quality of service (QoS) on computational grids, the QoS-aware job scheduling is investigated for a hierarchical decentralized grid architecture that consists of multilevel schedulers. An integrated ... To achieve high quality of service (QoS) on computational grids, the QoS-aware job scheduling is investigated for a hierarchical decentralized grid architecture that consists of multilevel schedulers. An integrated QoS-aware job dispatching policy is proposed, which correlates priorities of incoming jobs used for job selecting at the local scheduler of the grid node with the job dispatching policies at the global scheduler for computational grids. The stochastic high-level Petri net (SHLPN) model of a two-level hierarchy computational grid architecture is presented, and a model refinement is made to reduce the complexity of the model solution. A performance analysis technique based on the SHLPN is proposed to investigate the QoS-aware job scheduling policy. Numerical results show that the QoS-aware job dispatching policy outperforms the QoS-unaware job dispatching policy in balancing the high-priority jobs, and thus enables priority-based QoS. 展开更多
关键词 computational grids job scheduling quality of service (QoS) performance evaluation MODELING stochastic high-level Petri net (SHLPN)
下载PDF
Improved algorithmic mechanism based on game theory in computational grids
2
作者 林雯 郁松年 肖齐 《Journal of Shanghai University(English Edition)》 CAS 2007年第1期68-73,共6页
Computational grids (CGs) aim to offer pervasive access to a diverse collection of geographically distributed resources owned by different serf-interested agents or organizations. These agents may manipulate the res... Computational grids (CGs) aim to offer pervasive access to a diverse collection of geographically distributed resources owned by different serf-interested agents or organizations. These agents may manipulate the resource allocation algorithm in their own benefit, and their selfish behavior may lead to severe performance degradation and poor efficiency. In this paper, game theory is introduced to solve the problem of barging for resource collection in heterogeneous distributed systems. By using the Cournot model that is an important model in static and complete information games, the algorithm is optimized in order to maximize the benefit. It can be seen that the approach is more suitable to the real situation and has practical use. Validity of the solutions is shown. 展开更多
关键词 computational grids game theory mechanism design Cournot model resource collection
下载PDF
A novel deadline and budget constrained scheduling heuristics for computational grids
3
作者 王勇 R.M.BAHATI M.A.BAUER 《Journal of Central South University》 SCIE EI CAS 2011年第2期465-472,共8页
The conventional deadline and budget constrained (DBC) scheduling heuristics for economic-based computational grids does not take the inconsistency of grid heterogeneity into account, which can lead to decline of ap... The conventional deadline and budget constrained (DBC) scheduling heuristics for economic-based computational grids does not take the inconsistency of grid heterogeneity into account, which can lead to decline of application completion ratios. Motivated by this fact, a novel DI3C scheduling heuristics was proposed to deal with sequential workflow applications. In order to valuate the inconsistency, the relative cost (RC) metric was introduced, which was used to indicate the task-starving degree for resources. The new algorithm assigns tasks to resources, considering completion time, budget and RC together. The GridSim toolkit and the benchmark suites of the standard performance evaluation corporation (SPEC) were used to simulate the heterogeneous grid environment and applications. The experimental results show that the task and workflow completion ratios of the new heuristics are higher than those of the conventional heuristics. 展开更多
关键词 computional grids economic-based grid grid brocker grid scheduling simulation
下载PDF
A New Method for Out-of-core Applications on Computational Grids
4
作者 唐剑琪 Fang +2 位作者 Binxing Hu Mingzeng 《High Technology Letters》 EI CAS 2003年第4期88-90,共3页
More and more out of core problems that involve solving large amounts of data are researched by scientists. The computational grid provides a wide and scalable environment for those large scale computations. A new met... More and more out of core problems that involve solving large amounts of data are researched by scientists. The computational grid provides a wide and scalable environment for those large scale computations. A new method supporting out of core computations on grids is presented in this paper. The framework and the data storage strategy are described, based on which an easy and efficient out of core programming interface is provided for the programmers. 展开更多
关键词 computational grid out of core computation out of core array MPI
下载PDF
Fine-grained grid computing model for Wi-Fi indoor localization in complex environments
5
作者 Yan Liang Song Chen +1 位作者 Xin Dong Tu Liu 《Journal of Electronic Science and Technology》 EI CAS CSCD 2024年第1期42-52,共11页
The fingerprinting-based approach using the wireless local area network(WLAN)is widely used for indoor localization.However,the construction of the fingerprint database is quite time-consuming.Especially when the posi... The fingerprinting-based approach using the wireless local area network(WLAN)is widely used for indoor localization.However,the construction of the fingerprint database is quite time-consuming.Especially when the position of the access point(AP)or wall changes,updating the fingerprint database in real-time is difficult.An appropriate indoor localization approach,which has a low implementation cost,excellent real-time performance,and high localization accuracy and fully considers complex indoor environment factors,is preferred in location-based services(LBSs)applications.In this paper,we proposed a fine-grained grid computing(FGGC)model to achieve decimeter-level localization accuracy.Reference points(RPs)are generated in the grid by the FGGC model.Then,the received signal strength(RSS)values at each RP are calculated with the attenuation factors,such as the frequency band,three-dimensional propagation distance,and walls in complex environments.As a result,the fingerprint database can be established automatically without manual measurement,and the efficiency and cost that the FGGC model takes for the fingerprint database are superior to previous methods.The proposed indoor localization approach,which estimates the position step by step from the approximate grid location to the fine-grained location,can achieve higher real-time performance and localization accuracy simultaneously.The mean error of the proposed model is 0.36 m,far lower than that of previous approaches.Thus,the proposed model is feasible to improve the efficiency and accuracy of Wi-Fi indoor localization.It also shows high-accuracy performance with a fast running speed even under a large-size grid.The results indicate that the proposed method can also be suitable for precise marketing,indoor navigation,and emergency rescue. 展开更多
关键词 Fine-grained grid computing (FGGC) Indoor localization Path loss Random forest Reference points(RPs)
下载PDF
Systematic Cloud-Based Optimization: Twin-Fold Moth Flame Algorithm for VM Deployment and Load-Balancing
6
作者 Umer Nauman Yuhong Zhang +1 位作者 Zhihui Li Tong Zhen 《Intelligent Automation & Soft Computing》 2024年第3期477-510,共34页
Cloud computing has gained significant recognition due to its ability to provide a broad range of online services and applications.Nevertheless,existing commercial cloud computing models demonstrate an appropriate des... Cloud computing has gained significant recognition due to its ability to provide a broad range of online services and applications.Nevertheless,existing commercial cloud computing models demonstrate an appropriate design by concentrating computational assets,such as preservation and server infrastructure,in a limited number of large-scale worldwide data facilities.Optimizing the deployment of virtual machines(VMs)is crucial in this scenario to ensure system dependability,performance,and minimal latency.A significant barrier in the present scenario is the load distribution,particularly when striving for improved energy consumption in a hypothetical grid computing framework.This design employs load-balancing techniques to allocate different user workloads across several virtual machines.To address this challenge,we propose using the twin-fold moth flame technique,which serves as a very effective optimization technique.Developers intentionally designed the twin-fold moth flame method to consider various restrictions,including energy efficiency,lifespan analysis,and resource expenditures.It provides a thorough approach to evaluating total costs in the cloud computing environment.When assessing the efficacy of our suggested strategy,the study will analyze significant metrics such as energy efficiency,lifespan analysis,and resource expenditures.This investigation aims to enhance cloud computing techniques by developing a new optimization algorithm that considers multiple factors for effective virtual machine placement and load balancing.The proposed work demonstrates notable improvements of 12.15%,10.68%,8.70%,13.29%,18.46%,and 33.39%for 40 count data of nodes using the artificial bee colony-bat algorithm,ant colony optimization,crow search algorithm,krill herd,whale optimization genetic algorithm,and improved Lévy-based whale optimization algorithm,respectively. 展开更多
关键词 Optimizing cloud computing deployment of virtual machines LOAD-BALANCING twin-fold moth flame algorithm grid computing computational resource distribution data virtualization
下载PDF
A novel resource co-allocation model with constraints to budget and deadline in computational grid 被引量:1
7
作者 胡志刚 肖鹏 《Journal of Central South University》 SCIE EI CAS 2009年第3期458-466,共9页
To address the issue of resource co-allocation with constraints to budget and deadline in grid environments, a novel co-allocation model based on virtual resource agent was proposed. The model optimized resources depl... To address the issue of resource co-allocation with constraints to budget and deadline in grid environments, a novel co-allocation model based on virtual resource agent was proposed. The model optimized resources deployment and price scheme through a three-side co-allocation mechanism, and applied queuing system to model the work of grid resources for providing quantitative deadline guarantees for grid applications. The validity and solutions of the model were presented theoretically. Extensive simulations were conducted to examine the effectiveness and the performance of the model by comparing with other co-allocation policies in terms of deadline violation rate, resource benefit and resource utilization. Experimental results show that compared with the three typical co-allocation policies, the proposed model can reduce the deadline violation rate to about 3.5% for the grid applications with constraints to budget and deadline. Also, the system benefits can be increased by about 30% compared with the those widely-used co-allocation policies. 展开更多
关键词 CO-ALLOCATION computational grid grid economy queuing theory DEADLINE
下载PDF
Multiple QoS modeling and algorithm in computational grid 被引量:1
8
作者 Li Chunlin Feng Meilai Li Layuan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第2期412-417,共6页
Multiple QoS modeling and algorithm in grid system is considered. Grid QoS requirements can be formulated as a utility function for each task as a weighted sum of its each dimensional QoS utility functions. Multiple Q... Multiple QoS modeling and algorithm in grid system is considered. Grid QoS requirements can be formulated as a utility function for each task as a weighted sum of its each dimensional QoS utility functions. Multiple QoS constraint resource scheduling optimization in computational grid is distributed to two subproblems: optimization of grid user and grid resource provider. Grid QoS scheduling can be achieved by solving sub problems via an iterative algorithm. 展开更多
关键词 QoS modeling computational grid Scheduling algorithm.
下载PDF
Task-and-role-based access-control model for computational grid
9
作者 龙涛 《Journal of Chongqing University》 CAS 2007年第4期249-255,共7页
Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained poli... Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained policies. We established a task-and-role-based access-control model for computational grid (CG-TRBAC model), integrating the concepts of role-based access control (RBAC) and task-based access control (TBAC). In this model, condition restrictions are defined and concepts specifically tailored to Workflow Management System are simplified or omitted so that role assignment and security administration fit computational grid better than traditional models; permissions are mutable with the task status and system variables, and can be dynamically controlled. The CG-TRBAC model is proved flexible and extendible. It can implement different control policies. It embodies the security principle of least privilege and executes active dynamic authorization. A task attribute can be extended to satisfy different requirements in a real grid system. 展开更多
关键词 computational grid task-and-role-based access control grid security role assignment
下载PDF
Using Hash Tree for Delegation Revocation in Grids
10
作者 Chi-Tung Chen Ming-Tsun Lin Iuon-Chang Lin 《Journal of Electronic Science and Technology》 CAS 2012年第3期256-262,共7页
Grid security infrastructure (GSI) provides the security in grids by using proxy certificates to delegate the work of authentication. At present, revocation proxy certificate has two kinds of methods, one is using c... Grid security infrastructure (GSI) provides the security in grids by using proxy certificates to delegate the work of authentication. At present, revocation proxy certificate has two kinds of methods, one is using certificate revocation list (CRL) and the other is giving the certificate a short period of validity. However, when a lot of certifications are revoked, CRL will be the burden in the system. If the certificate has a short period of validity, entities should be often updating the certificate. In this paper, we propose a scheme for proxy certificate revocation using hash tree. Our scheme only needs hash value comparisons to achieve the purpose of certificate revocation. Previous two methods have to wait the expiration of the certificate. Therefore, our scheme is more flexible than previous methods. 展开更多
关键词 DELEGATION grid computing gridsecurity hash tree.
下载PDF
A scheduling strategy for finite element analysis on the computational grid
11
作者 Weng Chuliang(翁楚良) Lu Xinda Yue Ying 《High Technology Letters》 EI CAS 2005年第3期268-273,共6页
The computational grid provides a promising platform for the deployment of various high-performance computing applications. A grid system consists of heterogeneous resource domains, while the computational tasks of fi... The computational grid provides a promising platform for the deployment of various high-performance computing applications. A grid system consists of heterogeneous resource domains, while the computational tasks of finite element analysis may differ in demand of computing power. The cost-effective utilization of resources in the grid can be obtained through scheduling tasks to optimal resource domains. Firstly, a cost-effective scheduling strategy is presented for finite element applications. Secondly, aiming at the conjugate gradient solver stemming from finite element analysis, a performance evaluation formula is presented for determining optimal resouree domains, which is derived from phase parallel model and takes the heterogeneous characteristic of resource domains into account. Finally, experimental results show that the presented formula delivers a good estimation of the actual execution time, and indicate that the presented formula can be used to determine optimal resource domains in the grid environment. 展开更多
关键词 computational grid scheduling algorithm performance evaluation conjugate gradient method
下载PDF
A hybrid differential evolution algorithm for meta-task scheduling in grids
12
作者 康钦马 Jiang Changiun +1 位作者 He Hong Huang Qiangsheng 《High Technology Letters》 EI CAS 2009年第3期261-266,共6页
Task scheduling is one of the core steps to effectively exploit the capabilities of heterogeneous re-sources in the grid.This paper presents a new hybrid differential evolution(HDE)algorithm for findingan optimal or n... Task scheduling is one of the core steps to effectively exploit the capabilities of heterogeneous re-sources in the grid.This paper presents a new hybrid differential evolution(HDE)algorithm for findingan optimal or near-optimal schedule within reasonable time.The encoding scheme and the adaptation ofclassical differential evolution algorithm for dealing with discrete variables are discussed.A simple but ef-fective local search is incorporated into differential evolution to stress exploitation.The performance of theproposed HDE algorithm is showed by being compared with a genetic algorithm(GA)on a known staticbenchmark for the problem.Experimental results indicate that the proposed algorithm has better perfor-mance than GA in terms of both solution quality and computational time,and thus it can be used to de-sign efficient dynamic schedulers in batch mode for real grid systems. 展开更多
关键词 Hybrid differential evolution grid computing task scheduling genetic algorithm
下载PDF
Construction of overlay network based on P2P technology in Grid environment 被引量:2
13
作者 庄艳艳 刘业 《Journal of Southeast University(English Edition)》 EI CAS 2007年第1期57-62,共6页
Based on the advantages of both Grid and peer-to-peer (P2P) networks, an overlay network in the Grid environment is constructed by P2P technologies by a modified version of the Chord protocol. In this mechanism, dif... Based on the advantages of both Grid and peer-to-peer (P2P) networks, an overlay network in the Grid environment is constructed by P2P technologies by a modified version of the Chord protocol. In this mechanism, different nodes' accesses to different resources are determined by their contribution. Therefore, the heterogeneous resources of virtual organizations in large-scale Grid can be effectively integrated, and the key node failure as well as system bottleneck in the traditional Grid environment is eliminated. The experimental results indicate that this management mechanism can achieve better average performance in the Grid environment and maintain the P2P characteristics as well. 展开更多
关键词 resource management Grid computing peer-to-peer environments overlay network
下载PDF
ADAPTIVE FLOW SOLUTION BASED ON MATRIX ERROR
14
作者 欧阳绍修 刘学强 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2010年第3期199-204,共6页
An adaptive method for the solution of compressible flows is described. The idea results from the desire for an efficient grid system,and an accurate and robust solution method are used to resolve flow features of the... An adaptive method for the solution of compressible flows is described. The idea results from the desire for an efficient grid system,and an accurate and robust solution method are used to resolve flow features of the interest. The adaptation flow solution is proposed,including the detection of flow features based on the matrix error; the mesh adaptation using the mesh movement,the mesh refinement,the mesh coarsening,and their combination. The feature detection based on the matrix error can maintain the high resolution property for shock waves of the one-dimensional approximate Riemann solver and the higher order reconstruction scheme. The high grid efficiency is obtained with the anisotropically directional grid corresponding to feature directions,and the error of the flow-field is averaged. The procedure and its application to flow solutions of shock waves are described. Results validate that the method is reliable. 展开更多
关键词 grid computing adaptive algorithm matrix errors fluid dynamics
下载PDF
A SELF-ADAPTIVE FINITE ELEMENT METHOD FOR SOLVING 2-D EULER EQUATIONS ON THE UNSTRUCTURED MESHES
15
作者 Zhou Chunhua Yang Zuosheng(Nanjing University of Aeronautics and Astronautics, Nanjing, China, 210016) 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 1995年第1期1-8,共8页
ASELF-ADAPTIVEFINITEELEMENTMETHODFORSOLVING2-DEULEREQUATIONSONTHEUNSTRUCTUREDMESHESZhouChunhua;YangZuosheng(... ASELF-ADAPTIVEFINITEELEMENTMETHODFORSOLVING2-DEULEREQUATIONSONTHEUNSTRUCTUREDMESHESZhouChunhua;YangZuosheng(NanjingUniversity... 展开更多
关键词 adaptive control computational grids finite element method Eulerequations of motion
下载PDF
A Parallel Genetic Simulated Annealing Hybrid Algorithm for Task Scheduling 被引量:12
16
作者 SHU Wanneng ZHENG Shijue 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1378-1382,共5页
In this paper combined with the advantages of genetic algorithm and simulated annealing, brings forward a parallel genetic simulated annealing hybrid algorithm (PGSAHA) and applied to solve task scheduling problem i... In this paper combined with the advantages of genetic algorithm and simulated annealing, brings forward a parallel genetic simulated annealing hybrid algorithm (PGSAHA) and applied to solve task scheduling problem in grid computing. It first generates a new group of individuals through genetic operation such as reproduction, crossover, mutation, etc, and than simulated anneals independently all the generated individuals respectively. When the temperature in the process of cooling no longer falls, the result is the optimal solution on the whole. From the analysis and experiment result, it is concluded that this algorithm is superior to genetic algorithm and simulated annealing. 展开更多
关键词 grid computing task scheduling genetic algorithm simulated annealing PGSAHA algorithm
下载PDF
An Improved Grid Security Infrastructure by Trusted Computing 被引量:3
17
作者 YAN Fei ZHANG Huanguo +3 位作者 SUN Qi SHEN Zhidong ZHANG Liqiang QIANG Weizhong 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1805-1808,共4页
Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled ... Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled GSI is discussed in this paper. With TC-enabled GSI, a practical delegation solution is proposed in this paper through enforcing fine granularity policy over distributed platforms with the emerging trusted computing technologies. Here trusted platform module is treated as a tamper-resistance module to improve grid security infrastructure. With the implement of Project Daonity, it is demonstrated that the solution could gain dynamic and distributed security in grid environment. 展开更多
关键词 trusted computing grid computing grid security trusted platform module
下载PDF
Analysis of Hot Topics in Cloud Computing 被引量:5
18
作者 Li Deyi Chen Guisheng Zhang Haisu 《ZTE Communications》 2010年第4期1-5,共5页
In the field of cloud computing, topics such as computing resource virtualization, differences between grid and cloud computing, relationship between high-performance computers and cloud computing centers, and cloud s... In the field of cloud computing, topics such as computing resource virtualization, differences between grid and cloud computing, relationship between high-performance computers and cloud computing centers, and cloud security and standards have attracted much research interest. This paper analyzes these topics and highlights that resource virtualization allows information services to be scalable, intensive, and specialized; grid computing involves using many computers for large-scale computing tasks, while cloud computing uses one platform for multiple services; high-performance computers may not be suitable for a cloud computing; security in cloud computing focuses on trust management between service suppliers and users; and based on the existing standards, standardization of cloud computing should focus on interoperability between services. 展开更多
关键词 cloud computing VIRTUALIZATION grid computing security of cloud computing standards of cloud computing
下载PDF
Remote Sensing Image Deblurring Based on Grid Computation 被引量:2
19
作者 LI Sheng-yang ZHU Chong-guang GE Ping-ju 《Journal of China University of Mining and Technology》 EI 2006年第4期409-412,共4页
In general, there is a demand for real-time processing of mass quantity remote sensing images. However, the task is not only data-intensive but also computating-intensive. Distributed processing is a hot topic in remo... In general, there is a demand for real-time processing of mass quantity remote sensing images. However, the task is not only data-intensive but also computating-intensive. Distributed processing is a hot topic in remote sensing processing and image deblurring is also one of the most important needs. In order to satisfy the demand for quick proc- essing and deblurring of mass quantity satellite images, we developed a distributed, grid computation-based platform as well as a corresponding middleware for grid computation. Both a constrained power spectrum equalization algorithm and effective block processing measures, which can avoid boundary effect, were applied during the processing. The re- sult is satisfactory since computation efficiency and visual effect were greatly improved. It can be concluded that the technology of spatial information grids is effective for mass quantity remote sensing image processing. 展开更多
关键词 grid computation image deblurring power spectrum equalization remote sensing image
下载PDF
History-based trust negotiation model 被引量:1
20
作者 赵贻竹 赵彦华 鲁宏伟 《Journal of Shanghai University(English Edition)》 CAS 2009年第2期150-154,共5页
Trust negotiation (TN) is an approach to establish trust between strangers through iterative disclosure of digital credentials. Speeding up subsequent negotiations between the same negotiators is a problem worth of ... Trust negotiation (TN) is an approach to establish trust between strangers through iterative disclosure of digital credentials. Speeding up subsequent negotiations between the same negotiators is a problem worth of research. This paper introduces the concept of visiting card, and presents a history-based trust negotiation (HBTN) model. HBTN creates an account for a counterpart at the first negotiation and records valid credentials that the counterpart disclosed during each trust negotiation in his historical information base (HIB). For the following negotiation, no more credentials need to be disclosed for both parties. HBTN speeds up subsequent negotiations between the entities that interact with each other frequently without impairing the privacy preservation. 展开更多
关键词 trust negotiation (TN) subsequent negotiation access control grid compute network security
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部