dc.contributor.author | Liu, Hongbo | |
dc.contributor.author | Abraham, Ajith | |
dc.contributor.author | Snášel, Václav | |
dc.contributor.author | McLoone, Seán | |
dc.date.accessioned | 2012-05-11T11:34:22Z | |
dc.date.available | 2012-05-11T11:34:22Z | |
dc.date.issued | 2012 | |
dc.identifier.citation | Information Sciences. 2012, vol. 192, p. 228-243. | cs |
dc.identifier.issn | 0020-0255 | |
dc.identifier.uri | http://hdl.handle.net/10084/90437 | |
dc.description.abstract | The scheduling problem in distributed data-intensive computing environments has become an active research topic due to the tremendous growth in grid and cloud computing environments. As an innovative distributed intelligent paradigm, swarm intelligence provides a novel approach to solving these potentially intractable problems. In this paper, we formulate the scheduling problem for work-flow applications with security constraints in distributed data-intensive computing environments and present a novel security constraint model. Several meta-heuristic adaptations to the particle swarm optimization algorithm are introduced to deal with the formulation of efficient schedules. A variable neighborhood particle swarm optimization algorithm is compared with a multi-start particle swarm optimization and multi-start genetic algorithm. Experimental results illustrate that population based meta-heuristics approaches usually provide a good balance between global exploration and local exploitation and their feasibility and effectiveness for scheduling work-flow applications. | cs |
dc.language.iso | en | cs |
dc.publisher | Elsevier | cs |
dc.relation.ispartofseries | Information Sciences | cs |
dc.relation.uri | http://dx.doi.org/10.1016/j.ins.2011.12.032 | cs |
dc.subject | swarm intelligence | cs |
dc.subject | particle swarm | cs |
dc.subject | scheduling problem | cs |
dc.subject | work-flow | cs |
dc.subject | security constraints | cs |
dc.subject | distributed data-intensive computing environments | cs |
dc.title | Swarm scheduling approaches for work-flow applications with security constraints in distributed data-intensive computing environments | cs |
dc.type | article | cs |
dc.identifier.location | Není ve fondu ÚK | cs |
dc.identifier.doi | 10.1016/j.ins.2011.12.032 | |
dc.type.status | Peer-reviewed | cs |
dc.description.source | Web of Science | cs |
dc.description.volume | 192 | cs |
dc.description.lastpage | 243 | cs |
dc.description.firstpage | 228 | cs |
dc.identifier.wos | 000302511900017 | |