Multidisciplinary approaches to artificial swarm intelligence for heterogeneous computing and cloud scheduling

被引:23
作者
Wang, Jinglian [1 ,2 ]
Gong, Bin [2 ]
Liu, Hong [3 ]
Li, Shaohui [3 ]
机构
[1] Ludong Univ, Sch Informat & Elect Engn, Yantai, Peoples R China
[2] Shandong Univ, Sch Comp Sci & Technol, Jinan 250100, Peoples R China
[3] Shandong Normal Univ, Sch Informat Sci & Technol, Jinan, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
Heterogeneous computing and cloud scheduling; High performance clusters(HPC); Swarm intelligence; Multidisciplinary approaches; EVOLUTIONARY ALGORITHM; INDEPENDENT TASKS; SECURITY; HEURISTICS;
D O I
10.1007/s10489-015-0676-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Enabled to provide pervasive access to distributed resources in parallel ways, heterogeneous scheduling is extensively applied in large-scaled computing system for high performance. Conventional real-time scheduling algorithms, however, either disregard applications' security needs and thus expose the applications to security threats or run applications at inferior security levels without optimizing security performance. In recognition of high reliability, a security-aware model is firstly presented via quantization of security overheads of heterogeneous systems. Secondly, inspired by multi disciplines, the meta-heuristic is addressed based on the supercomputer hybrid architecture. On the other hand, some technological breakthroughs are achieved, including boundary conditions for different heterogeneous computing and cloud scheduling and descriptions of real-time variation of scheduling indexes (stringent timing and security constraints). Extensive simulator and simulation experiments highlight higher efficacy and better scalability for the proposed approaches compared with the other three meta-heuristics; the overall improvements achieve 8 %, 12 % and 14 % for high-dimension instances, respectively.
引用
收藏
页码:662 / 675
页数:14
相关论文
共 34 条
[1]  
Abdelzaher T, 1999, IEEE T PARALL DISTR, V10, P967
[2]   Maintaining security in firm real-time database systems [J].
Ahmed, QN ;
Vrbsky, SV .
14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, :83-90
[3]  
Ali S., 2000, Proceedings 9th Heterogeneous Computing Workshop (HCW 2000) (Cat. No.PR00556), P185, DOI 10.1109/HCW.2000.843743
[4]   XML distributed security policy for clusters [J].
Apvrille, A ;
Pourzandi, M .
COMPUTERS & SECURITY, 2004, 23 (08) :649-658
[5]   A comparison of eleven static heuristics for mapping a class of independent tasks onto heterogeneous distributed computing systems [J].
Braun, TD ;
Siegel, HJ ;
Beck, N ;
Bölöni, LL ;
Maheswaran, M ;
Reuther, AI ;
Robertson, JP ;
Theys, MD ;
Yao, B ;
Hensgen, D ;
Freund, RF .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2001, 61 (06) :810-837
[6]   Classification of energy consumption patterns for energy audit and machine scheduling in industrial manufacturing systems [J].
Cao Vinh Le ;
Pang, Chee Khiang ;
Gan, Oon Peen ;
Chee, Xiang Min ;
Zhang, Dan Hong ;
Luo, Ming ;
Chan, Hian Leng ;
Lewis, Frank L. .
TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2013, 35 (05) :583-592
[7]   Optimizing Throughput and Energy in Online Deadline Scheduling [J].
Chan, Ho-Leung ;
Chan, Joseph Wun-Tat ;
Lam, Tak-Wah ;
Lee, Lap-Kei ;
Mak, Kin-Sum ;
Wong, Prudence W. H. .
ACM TRANSACTIONS ON ALGORITHMS, 2009, 6 (01)
[8]  
Connelly Kay., 2002, P 2002 WORKSHOP NEW, P36
[9]   Biological invasion-inspired migration in distributed evolutionary algorithms [J].
De Falco, I. ;
Della Cioppa, A. ;
Maisto, D. ;
Scafuri, U. ;
Tarantino, E. .
INFORMATION SCIENCES, 2012, 207 :50-65
[10]  
George B., 1997, SIGMOD Record, V26, P462, DOI 10.1145/253262.253362