[1] |
LIU L , ZHANG M , BUYYA R ,et al. Deadline-constrained coevolutionary genetic algorithm for scientific workflow scheduling in cloud computing[J]. Concurrency and Computation:Practice and Experience, 2017,29(5): 1-12.
|
[2] |
RODRIGUEZ M A , BUYYA R . A taxonomy and survey on scheduling algorithms for scientific workflows in IaaS cloud computing environments[J]. Concurrency and Computation:Practice and Experience, 2017,29(8): 1-23.
|
[3] |
WANG M , ZHU L , Chen J . Risk-aware checkpoint selection in cloud-based scientific workflow[C]// 2012 Second International Conference on Cloud and Green Computing. 2012: 137-144.
|
[4] |
ABRISHAMI S , NAGHIBZADEH M , EPEMA D H J . Deadline-constrained workflow scheduling algorithms for infrastructure as a service clouds[J]. Future Generation Computer Systems, 2013,29(1): 158-169.
|
[5] |
WU Q , ISHIKAWA F , ZHU Q ,et al. Deadline-constrained cost optimization approaches for workflow scheduling in clouds[J]. IEEE Transactions on Parallel and Distributed Systems, 2017,28(12): 3401-3412.
|
[6] |
CALHEIROS R N , BUYYA R . Meeting deadlines of scientific workflows in public clouds with tasks replication[J]. IEEE Transactions on Parallel and Distributed Systems, 2013,25(7): 1787-1796.
|
[7] |
VERMA A , KAUSHAL S . Deadline constraint heuristic-based genetic algorithm for workflow scheduling in cloud[J]. International Journal of Grid and Utility Computing, 2014,5(2): 96-106.
|
[8] |
DELDARI A , NAGHIBZADEH M , ABRISHAMI S . CCA:a deadline-constrained workflow scheduling algorithm for multicore resources on the cloud[J]. The journal of Supercomputing, 2017,73(2): 756-781.
|
[9] |
LIN B , GUO W , LIN X . Online optimization scheduling for scientific workflows with deadline constraint on hybrid clouds[J]. Concurrency and Computation:Practice and Experience, 2016,28(11): 3079-3095.
|
[10] |
ZHENG W , HUANG S . An adaptive deadline constrained energy‐efficient scheduling heuristic for workflows in clouds[J]. Concurrency and Computation:Practice and Experience, 2015,27(18): 5590-5605.
|
[11] |
SAHNI J , VIDYARTHI D P . A cost-effective deadline-constrained dynamic scheduling algorithm for scientific workflows in a cloud environment[J]. IEEE Transactions on Cloud Computing, 2015,6(1): 2-18.
|
[12] |
YAO G , DING Y , REN L ,et al. An immune system-inspired rescheduling algorithm for workflow in cloud systems[J]. Knowledge-Based Systems, 2016,99: 39-50.
|
[13] |
DING Y , YAO G , HAO K . Fault-tolerant elastic scheduling algorithm for workflow in cloud systems[J]. Information Sciences, 2017,393: 47-65.
|
[14] |
WANG Y , WU J , GUO Y ,et al. Scientific workflow execution system based on mimic defense in the cloud environment[J]. Frontiers of Information Technology & Electronic Engineering, 2018,19(12): 1522-1536.
|
[15] |
POOLA D , RAMAMOHANARAO K , BUYYA R . Fault-tolerant workflow scheduling using spot instances on clouds[J]. Procedia Computer Science, 2014,29: 523-533.
|
[16] |
POOLA D , RAMAMOHANARAO K , BUYYA R . Enhancing reliability of workflow execution using task replication and spot instances[J]. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 2016,10(4):30.
|
[17] |
YAO G , DING Y , HAO K . Using imbalance characteristic for fault-tolerant workflow scheduling in cloud systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2017,28(12): 3671-3683.
|
[18] |
ZHENG Z , ZHOU T C , LYU M R ,et al. Component ranking for fault-tolerant cloud applications[J]. IEEE Transactions on Services Computing, 2011,5(4): 540-550.
|
[19] |
TOPCUOGLU H , HARIRI S , WU M . Performance-effective and low-complexity task scheduling for heterogeneous computing[J]. IEEE transactions on parallel and distributed systems, 2002,13(3): 260-274.
|
[20] |
VERMA A , MITTAL M , CHHABRA B . The mutual authentication scheme to detect virtual side channel attack in cloud computing[J]. International Journal of Computer Science and Information Security (IJCSIS), 2017,15(3).
|
[21] |
GROBAUER B , WALLOSCHEK T , Stocker E . Understanding cloud computing vulnerabilities[J]. IEEE Security & privacy, 2010,9(2): 50-57.
|
[22] |
MISHRA P , PILLI E S , VARADHARAJAN V ,et al. Intrusion detection techniques in cloud environment:A survey[J]. Journal of Network and Computer Applications, 2017,77: 18-47.
|
[23] |
STEWIN P , BYSTROV I . Understanding DMA malware[C]// International Conference on Detection of Intrusions and Malware,and Vulnerability Assessment. 2012: 21-41.
|
[24] |
CHEN W , DEELMAN E . WorkflowSim:a toolkit for simulating scientific workflows in distributed environments[C]// 2012 IEEE 8th International Conference on E-Science. 2012: 1-8.
|
[25] |
JUVE G , CHERVENAK A , DEELMAN E ,et al. Characterizing and profiling scientific workflows[J]. Future Generation Computer Systems, 2013,29(3): 682-692.
|
[26] |
DEELMAN E , VAHI K , JUVE G ,et al. Pegasus,a workflow management system for science automation[J]. Future Generation Computer Systems, 2015,46: 17-35.
|