[1]Rajkumar B,Shin Y C,Broberg V S,et al. Cloud computing and emerging IT platforms:Vision,hype,and reality for delivering computing as the 5th utility[J]. Future Generation Computer Systems,2009,25(6):599616.
[2]Darbha S, Agrawal D P. Optimal scheduling algorithm for distributed memory machines[J].IEEE Transactions on Parallel and Distributed Systems,2002,9(1):8795.
[3]Lee Y C,Zomaya A Y. A novel state transition method for metaheuristicbased scheduling in heterogeneous computing systems[J].IEEE Transactions on Parallel and Distributed Systems,2008,19 (9):12151223.
[4]Zhu D,Mosse D,Melhem R. Poweraware scheduling for and/or graphs in realtime systems[J].IEEE Transactions on Parallel and Distributed Systems,2004,15(9):849864.
[5]Kim K H,Buyya R,Kim J. Power aware scheduling of bagoftasks applications with deadline constraints on DVSenabled clusters[C]∥Proc of the 7th IEEE International Symposium on Cluster Computing and the Grid,2007:541548.
[6]Bunde D P. Poweraware scheduling for makespan and flow[J].Journal of Scheduling,2009,12 (5):489500.
[7]Li M S,Yang S B,Fu Q F,et al. A grid resource transaction model based on compensation[J].Journal of Software,2006,17(3):472480.
[8]Xu B M,Zhao C Y,Hua E Z,et al. Job scheduling algorithm based on Berger model in cloud environment[J]. Advances in Engineering Software,2011,42(3):419425.
[9]Buyya R,Murshed M M,Abramson D,et al. Scheduling parameter sweep applications on global grids:A deadline and budget constrained costtime optimization algorithm[J]. Software Practice and Experience,2005,35(5):491512.
[10]Blanco C V,Huedo E,Montero R S,et al. Dynamic provision of computing resources from grid infrastructures and cloud providers[C]∥Proc of Grid and Pervasive Computing Conference,2009:113120.
[11]Topcuoglu H,Hariri S,Wu M Y. Performanceeffective and low complexity task scheduling for heterogeneous computing[J].IEEE Transactions on Parallel and Distributed Systems,2002,13(3):260274.
[12]Mezmaz M,Melab N,Kessaci Y,et al. A parallel biobjective hybrid metaheuristic for energyaware scheduling for cloud computing systems[J].Journal of Parallel and Distributed Computing,2011,71(10):14971508.
[13]Dogan A,Ozguner F. Reliable matching and scheduling of precedence constrained tasks in heterogeneous distributed computing[C]∥Proc of the 29th International Conference on Parallel Processing,2000:307314.
[14]Dogan A,Ozguner F. Matching and scheduling algorithms for minimizing execution time and failure probability of applications in heterogeneous computing[J].IEEE Transactions on Parallel and Distributed Systems,2002,13(3),308323.
[15]Dai Yuansun,Xie Min. Reliability of grid service systems[J]. Computers and Industrial Engineering,2006,50(1/2):130147.
[16]Levitin G ,Dai Yuansun. Service reliability and performance in grid system with star topology[J]. Reliability Engineering and System Safety,2007,92(1):4046.
[17]Foster I,Zhao Y,Raicu I,et al. Cloud computing and grid computing 360degree compared[J].IEEE Grid Computing Environments (GCE 2008),2008:1.
[18]Blaze M, Feigenbaum J, Lucy J. Decentralized trust management [C]∥Proc of the IEEE Computer Society Symposium on Research in Security and Privacy, 1996:164173.
[19]Josang A. Trustbased decision making for electronic transactions[C]∥Proc of the 4th Nordic Workshop on Secure Computer Systems(NORDSEC’99), 1999:1.
[20]Josang A. A logic for uncertain probabilities [J].International Journal of Uncertainty,Fuzziness and KnowledgeBased Systems,2001,9(3):279311.
[21]Wang W,Zeng G S,Yuan L L.A reputation multiagent system in semantic web[C]∥Proc of the 9th Pacific Rim International Workshop on MultiAgents,2006:211219.
[22]Wang W,Zeng G S,Tang D Z,et al. CloudDLS:Dynamic trusted scheduling for cloud computing[J].Expert Systems with Applications,2012,39(5):23212329.
[23]Mui L,Mohtashemi M, Halberstadt M. A computational model of trust and reputation[C]∥Proc of the 35th Hawaii International Conference on System Sciences,2002:1.
[24]Thomas L,John S J. Bayesian methods:An analysis of statisticians and interdisciplinary[M].New York:Cambridge University Press,1999.
[25]Jameel H,Hung L X,Kalim U,et al. A trust model for ubiquitous systems based on vectors of trust values[C]∥Proc of the 7th IEEE International Symposium on Multimedia,2005:674679.
[26]Shi Jinqiao,Cheng Xiaoming. Research on penalty mechanism against selfish behaviors in anonymous communication system[J]. Journal on Communication,2006,27(2):8086.(in Chinese)
[27]Josang A,Ismail R. The beta reputation system[C]∥Proc of the Bled Conference on Electronic Commerce,2002:1.
[28]Sih G C,Lee E A. A compiletime scheduling heuristic for interconnectionconstraint heterogeneous processor architectures[J].IEEE Transactions on Parallel and Distributed Systems,1993,4(2):175187.
[29]Peterson L,Bavier A,Fiuczynski M,et al. Towards a comprehensive PlanetLab architecture[R].Technical Report PDN05030. New Jersey:PlanetLab Consortium,2005.
[30]Calheiros R N,Ranjan R,De Rose C A F,et al. CloudSim:A novel framework for modeling and simulation of cloud computing infrastructures and services[R].Technical Report GRIDSTR20091.Australia:Grid Computing and Distributed Systems Laboratory,The University of Melbourne,2009.
附中文参考文献:
[26]时金桥,程晓明.匿名通信系统中自私行为的惩罚机制研究[J].通信学报,2006,27(2):8086. |