
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Xiaoyong Tang, Kenli Li, Zeng Zeng, Bharadwaj Veeravalli, "A Novel SecurityDriven Scheduling Algorithm for PrecedenceConstrained Tasks in Heterogeneous Distributed Systems," IEEE Transactions on Computers, vol. 60, no. 7, pp. 10171029, July, 2011.  
BibTex  x  
@article{ 10.1109/TC.2010.117, author = {Xiaoyong Tang and Kenli Li and Zeng Zeng and Bharadwaj Veeravalli}, title = {A Novel SecurityDriven Scheduling Algorithm for PrecedenceConstrained Tasks in Heterogeneous Distributed Systems}, journal ={IEEE Transactions on Computers}, volume = {60}, number = {7}, issn = {00189340}, year = {2011}, pages = {10171029}, doi = {http://doi.ieeecomputersociety.org/10.1109/TC.2010.117}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Computers TI  A Novel SecurityDriven Scheduling Algorithm for PrecedenceConstrained Tasks in Heterogeneous Distributed Systems IS  7 SN  00189340 SP1017 EP1029 EPD  10171029 A1  Xiaoyong Tang, A1  Kenli Li, A1  Zeng Zeng, A1  Bharadwaj Veeravalli, PY  2011 KW  Directed acyclic graphs KW  scheduling algorithm KW  security overheads KW  heterogeneous distributed systems KW  securitydriven KW  precedenceconstrained tasks. VL  60 JA  IEEE Transactions on Computers ER   
[1] A.A. Alhamdan, "Scheduling Methods for Efficient Utilization of Clusters Computing Environments," PhD thesis, Univ. of Connecticut, 2003.
[2] I. Foster and C. Kesselman, The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann Publishers, 1999.
[3] J. Sarangapani, Wireless Ad Hoc and Sensor Networks: Protocols, Performance, and Control. CRC Press, Apr. 2007.
[4] A. Dogan and F. Özgüner, "LDBS: A Duplication Based Scheduling Algorithm for Heterogeneous Computing Systems," Proc. Int'l Conf. Parallel Processing, pp. 352359, 2002.
[5] G. Donoho, "Building a Web Service to Provide RealTime Stock Quotes," MCAD.Net, Feb. 2004.
[6] S. Song, Y.K. Kwok, and K. Hwang, "Trusted Job Scheduling in Open Computational Grids: SecurityDriven Heuristics and A Fast Genetic Algorithms," Proc. Int'l Symp. Parallel and Distributed Processing, 2005.
[7] W. Yurcik, X. Meng, G. Koenig, and J. Greenseid, "Cluster Security as a Unique Problem with Emergent Properties," Proc. Fifth LCI Int'l Conf. Linux Clusters: The HPC Revolution, May 2004.
[8] K. Connelly and A.A. Chien, "Breaking the Barriers: High Performance Security for High Performance Computing," Proc. Workshop New Security Paradigms, Sept. 2002.
[9] H. ElRewini and T.G. Lewis, "Scheduling Parallel Program Tasks onto Arbitrary Target Machines," J. Parallel and Distributed Computing, vol. 9, no. 2, pp. 138153, 1990.
[10] G.C. Sih and E.A. Lee, "A CompileTime Scheduling Heuristic for InterconnectionConstrained Heterogeneous Machine Architectures," IEEE Trans. Parallel and Distributed Systems, vol. 4, no. 2, pp. 175187, Feb. 1993.
[11] M. Iverson, F. Ozuner, and G. Follen, "Parallelizing Existing Applications in a Distributed Heterogeneous Environment," Proc. Heterogeneous Computing Workshop, pp. 93100, 1995.
[12] Y.K. Kwok and I. Ahmad, "Dynamic CriticalPath Scheduling: An Effective Technique for Allocating Task Graphs onto Multiprocessors," IEEE Trans. Parallel and Distributed Systems, vol. 7, no. 5, pp. 506521, May 1996.
[13] H. Topcuoglu, S. Hariri, and M.Y. Wu, "PerformanceEffective and Low Complexity Task Scheduling for Heterogeneous Computing," IEEE Trans. Parallel and Distributed Systems, vol. 13, no. 3, pp. 260274, Mar. 2002.
[14] X. Tang, L. Kenli, and D. Padua, "Communication Contention in APN List Scheduling Algorithm," Science in China Series F: Information Sciences, vol. 52, no. 1, pp. 5969, 2009.
[15] M.R. Gary and D.S. Johnson, Computers and Intractability: A Guide to the Theory of NPCompleteness. W.H. Freeman, 1979.
[16] I. Ahmad and Y.K. Kwok, "On Exploiting Task Duplication in Parallel Program Scheduling," IEEE Trans. Parallel and Distributed Systems, vol. 9, no. 9, pp. 872892, Sept. 1998.
[17] S. Darbha and D.P. Agrawal, "Optimal Scheduling Algorithm for DistributedMemory Machines," IEEE Trans. Parallel and Distributed Systems, vol. 9, no. 1, pp. 8795, Jan. 1998.
[18] C.H. Papadimitriou and M. Yannakakis, "Towards An ArchitectureIndependent Analysis of Parallel Algorithms," SIAM J. Computing, vol. 19, no. 2, pp. 322328, 1990.
[19] M.K. Dhodhi, I. Ahmad, A. Yatama, and I. Ahmad, "An Integrated Technique for Task Matching and Scheduling onto Distributed Heterogeneous Computing System," J. Parallel and Distributed Computing, vol. 62, no. 9, pp. 13381361, 2002.
[20] H. Topcuoglu, S. Hariri, and M.Y. Wu, "Task Scheduling Algorithms for Heterogeneous Machines," Proc. Heterogeneous Computing Workshop, pp. 314, 1999.
[21] A. Radulescu and A.J.C. van Gemund, "LowCost Task Scheduling for DistributedMemory Machines," IEEE Trans. Parallel and Distributed Systems, vol. 13, no. 6, pp. 648658, June 2002.
[22] H.J. Park and B.K. Kim, "An Optimal Scheduling Algorithm for Minimizing the Computing Period of Cyclic Synchronous Tasks on Multiprocessors," J. Systems and Software, vol. 56, no. 3, pp. 213229, 2001.
[23] D. Kim and B.G. Yi, "A TwoPass Scheduling Algorithm for Parallel Programs," Parallel Computing, vol. 20, no. 6, pp. 869885, 1994.
[24] A. Dogan and F. Özgüner, "On QoSBased Scheduling of a MetaTask with Multiple QoS Demands in Heterogeneous Computing," Proc. Int'l Parallel and Distributed Processing Symp. (IPDPS), pp. 5055, 2002.
[25] T. Xie, X. Qin, and A. Sung, "SAREC: A SecurityAware Scheduling Strategy for RealTime Application on Clusters," Proc. Int'l Conf. Parallel Processing (ICPP '05), pp. 512, 2005.
[26] T. Xie and X. Qin, "Scheduling SecurityCritical RealTime Applications on Clusters," IEEE Trans. Computers, vol. 55, no. 7, pp. 864879, July 2006.
[27] T. Xie, X. Qin, A. Sung, M. Lin, and L.T. Yang, "RealTime Scheduling with Quality of Security Constraints," Int'l J. High Performance Computing and Networking, vol. 4, nos. 3/4, pp. 188197, 2006.
[28] T. Xie and X. Qin, "Performance Evaluation of a New Scheduling Algorithm for Distributed Systems with Security Heterogeneity," J. Parallel and Distributed Computing, vol. 67, no. 6, pp. 10671081, 2007.
[29] T. Xie and X. Qin, "SecurityAware Resource Allocation for RealTime Parallel Jobs on Homogeneous and Heterogeneous Clusters," IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 5, pp. 682697, May 2008.
[30] F. Azzedin and M. Maheswaran, "A Trust Brokering System and Its Application to Resource Management in PublicResource Grids," Proc. Parallel and Distributed Processing Symp., pp. 2630, 2004.
[31] F. Azzedin and M. Maheswaran, "Integrating Trust into Grid Resource Management Systems," Int'l Conf. Parallel Processing (ICPP '02), pp. 4754, 2002.
[32] R. He, J.W. Niu, and G.W. Zhang, "CBTM: A Trust Model with Uncertainty Quantification and Reasoning for Pervasive Computing," Lecture Notes in Computer Science, pp. 541552, SpringerVerlag, 2005.
[33] M. Nielsen, K. Krukow, and V. Sassone, "A Bayesian Model for EventBased Trust," Electronic Notes in Theoretical Computer Science, vol. 172, no. 1, pp. 499521, 2007.
[34] S. Song, Y.K. Kwok, and K. Hwang, "RiskResilient Heuristics and Genetic Algorithms for SecurityAssured Grid Job Scheduling," IEEE Trans. Computers, vol. 55, no. 6, pp. 703719, June 2006.
[35] F.G. Marmol and G.M. Peréz, "Security Threats Scenarios in Trust and Reputation Models for Distributed Systems," Computers & Security, vol. 28, no. 7, pp. 545556, 2009.
[36] S.D. Kamvar, M.T. Schlosser, and H. GarciaMolina, "The EigenTrust Algorithm for Reputation Management in P2P Networks," Proc. 12th Int'l Conf. World Wide Web, 2003.
[37] S.A. Mokhov, "Towards Security Hardening of Scientific DemandDriven and Pipelined Distributed Computing Systems," Proc. Int'l Symp. Parallel and Distributed Computing (ISPDC '08), pp. 375382, 2008.
[38] M. Pourzandi, D. Gordon, W. Yurcik, and G.A. Koenig, "Clusters and Security: Distributed Security for Distributed Systems," Proc. Fifth IEEE Int'l Symp. Cluster Computing and the Grid (CCGrid '05), pp. 96104, 2005.
[39] S. Jorgensen, S. Taboubi, and G. Zaccour, "Retail Promotions with Negative Brand Image Effects: Is Cooperation Possible?" European J. Operational Research, vol. 150, no. 2, pp. 395405, 2003.
[40] G.Q. Liu, K.L. Poh, and M. Xie, "Iterative List Scheduling for Heterogeneous Computing," J. Parallel and Distributed Computing, vol. 65, no. 5, pp. 654665, 2005.
[41] M.I. Daoud and N. Kharma, "A High Performance Algorithm for Static Task Scheduling in Heterogeneous Distributed Computing Systems," J. Parallel and Distributed Computing, vol. 68, no. 4, pp. 399409, 2008.
[42] S. Bansal, P. Kumar, and K. Singh, "An Improved Duplication Strategy for Scheduling Precedence Constrained Graphs in Multiprocessor Systems," IEEE Trans. Parallel and Distributed Systems, vol. 14, no. 6, pp. 533544, June 2003.
[43] C. Zhu, X. Tang, and K. Li, "Integrating Trust into Grid Economic Model Scheduling Algorithm," Proc. Int'l Conf. Grid Computing, HighPerformance and Distributed Applications (GADA '06), pp. 12631272, 2006.
[44] Y. Chung and S. Ranka, "Application and Performance Analysis of a CompileTime Optimization Approach for List Scheduling Algorithms on Distributed Memory Multiprocessors," Proc. Super computing, pp. 512521, 1992.
[45] A.E. Cretu and R.J. Brodie, "The Influence of Brand Image and Company Reputation Where Manufacturers Market to Small Firms: A Customer Value Perspective," Industrial Marketing Management, vol. 36, no. 2, pp. 230240, 2007.
[46] F. Almenarez, A. Marin, C. Campo, and R.C. Garcia, "TrustAC: TrustBased Access Control for Pervasive Devices," Lecture Notes in Computer Science, pp. 225238, SpringerVerlag, 2005.
[47] H. Jameel, L.X. Hung, U. Kalim, A. Sajjad, S.Y. Lee, and Y.K. Lee, "A Trust Model for Ubiquitous Systems Based on Vectors of Trust Values," Proc. Seventh IEEE Int'l Symp. Multimedia, pp. 674679, 2005.
[48] G. Theodorakopoulos and J.S. Baras, "On Trust Models and Trust Evaluation Metrics for AdHoc Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 318328, Feb. 2006.