期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Dynamic and Integrated Load-Balancing Scheduling Algorithm for Cloud Data Centers 被引量:6
1
作者 田文洪 赵勇 +2 位作者 仲元椋 徐敏贤 景晨 《China Communications》 SCIE CSCD 2011年第6期117-126,共10页
One of the challenging scheduling problems in Cloud data centers is to take the allocation and migration of reconfigurable virtual machines as well as the integrated features of hosting physical machines into consider... One of the challenging scheduling problems in Cloud data centers is to take the allocation and migration of reconfigurable virtual machines as well as the integrated features of hosting physical machines into consideration. We introduce a Dynamic and Integrated Resource Scheduling algorithm (DAIRS) for Cloud data centers. Unlike traditional load-balance scheduling algorithms which often consider only one factor such as the CPU load in physical servers, DAIRS treats CPU, memory and network bandwidth integrated for both physical machines and virtual machines. We develop integrated measurement for the total imbalance level of a Cloud datacenter as well as the average imbalance level of each server. Simulation results show that DAIRS has good performance with regard to total imbalance level, average imbalance level of each server, as well as overall running time. 展开更多
关键词 cloud computing load balance dynamic and integrated resource scheduling algorithm cloud datacenter
下载PDF
A Distributed User Association and Resource Allocation Method in Cache-Enabled Small Cell Networks 被引量:2
2
作者 Gongye Ren Hua Qu +2 位作者 Jihong Zhao Shuyuan Zhao Zhirong Luan 《China Communications》 SCIE CSCD 2017年第10期95-107,共13页
Cache-enabled small cell networks have been regarded as a promising approach for network operators to cope with the explosive data traffic growth in future 5 G networks. However, the user association and resource allo... Cache-enabled small cell networks have been regarded as a promising approach for network operators to cope with the explosive data traffic growth in future 5 G networks. However, the user association and resource allocation mechanism has not been thoroughly studied under given content placement situation. In this paper, we formulate the joint optimization problem of user association and resource allocation as a mixed integer nonlinear programming(MINLP) problem aiming at deriving a balance between the total utility of data rates and the total data rates retrieved from caches. To solve this problem, we propose a distributed relaxing-rounding method. Simulation results demonstrate that the distributed relaxing-rounding method outperforms traditional max-SINR method and range-expansion method in terms of both total utility of data rates and total data rates retrieved from caches in practical scenarios. In addition, effects of storage and backhaul capacities on the performance are also studied. 展开更多
关键词 proactive caching user association resource allocation distributed algorithm dual decomposition small cell networks
下载PDF
Enhancing Navigability:An Algorithm for Constructing Tag Trees 被引量:1
3
作者 Chong Chen Pengcheng Luo 《Journal of Data and Information Science》 CSCD 2017年第2期56-75,共20页
Purpose: This study introduces an algorithm to construct tag trees that can be used as a userfriendly navigation tool for knowledge sharing and retrieval by solving two issues of previous studies, i.e. semantic drift... Purpose: This study introduces an algorithm to construct tag trees that can be used as a userfriendly navigation tool for knowledge sharing and retrieval by solving two issues of previous studies, i.e. semantic drift and structural skew.Design/methodology/approach: Inspired by the generality based methods, this study builds tag trees from a co-occurrence tag network and uses the h-degree as a node generality metric. The proposed algorithm is characterized by the following four features:(1) the ancestors should be more representative than the descendants,(2) the semantic meaning along the ancestor-descendant paths needs to be coherent,(3) the children of one parent are collectively exhaustive and mutually exclusive in describing their parent, and(4) tags are roughly evenly distributed to their upper-level parents to avoid structural skew. Findings: The proposed algorithm has been compared with a well-established solution Heymann Tag Tree(HTT). The experimental results using a social tag dataset showed that the proposed algorithm with its default condition outperformed HTT in precision based on Open Directory Project(ODP) classification. It has been verified that h-degree can be applied as a better node generality metric compared with degree centrality.Research limitations: A thorough investigation into the evaluation methodology is needed, including user studies and a set of metrics for evaluating semantic coherence and navigation performance.Practical implications: The algorithm will benefit the use of digital resources by generating a flexible domain knowledge structure that is easy to navigate. It could be used to manage multiple resource collections even without social annotations since tags can be keywords created by authors or experts, as well as automatically extracted from text.Originality/value: Few previous studies paid attention to the issue of whether the tagging systems are easy to navigate for users. The contributions of this study are twofold:(1) an algorithm was developed to construct tag trees with consideration given to both semanticcoherence and structural balance and(2) the effectiveness of a node generality metric, h-degree, was investigated in a tag co-occurrence network. 展开更多
关键词 Semantic coherence Structural balance Tag tree resources navigation algorithm
下载PDF
Randomized MILP framework for Securing Virtual Machines from Malware Attacks
4
作者 R.Mangalagowri Revathi Venkataraman 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1565-1580,共16页
Cloud computing involves remote server deployments with public net-work infrastructures that allow clients to access computational resources.Virtual Machines(VMs)are supplied on requests and launched without interacti... Cloud computing involves remote server deployments with public net-work infrastructures that allow clients to access computational resources.Virtual Machines(VMs)are supplied on requests and launched without interactions from service providers.Intruders can target these servers and establish malicious con-nections on VMs for carrying out attacks on other clustered VMs.The existing system has issues with execution time and false-positive rates.Hence,the overall system performance is degraded considerably.The proposed approach is designed to eliminate Cross-VM side attacks and VM escape and hide the server’s position so that the opponent cannot track the target server beyond a certain point.Every request is passed from source to destination via one broadcast domain to confuse the opponent and avoid them from tracking the server’s position.Allocation of SECURITY Resources accepts a safety game in a simple format as input andfinds the best coverage vector for the opponent using a Stackelberg Equilibrium(SSE)technique.A Mixed Integer Linear Programming(MILP)framework is used in the algorithm.The VM challenge is reduced by afirewall-based controlling mechanism combining behavior-based detection and signature-based virus detection.The pro-posed method is focused on detecting malware attacks effectively and providing better security for the VMs.Finally,the experimental results indicate that the pro-posed security method is efficient.It consumes minimum execution time,better false positive rate,accuracy,and memory usage than the conventional approach. 展开更多
关键词 Virtualization technology security cross-VM channel attack VM-escape R-VM-MILP algorithm(randomized VM allocation of security resources) Mixed Integer Linear Programming(MILP) SSE strategy firewall-based monitoring method
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部