A task scheduling algorithm considering game theory designed for energy management in cloud computing
Tài liệu tham khảo
Ge, 2016, Survey on key revocation mechanisms in wireless sensor networks, J. Netw. Comput. Appl., 63, 24, 10.1016/j.jnca.2016.01.012
Buyya, 2009, Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility, Future Gener. Comput. Syst., 25, 599, 10.1016/j.future.2008.12.001
Jiang, 2014, Generating trusted graphs for trust evaluation in online social networks, Future Gener. Comput. Syst., 31, 48, 10.1016/j.future.2012.06.010
Quick, 2016, Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data, Softw. Pract. Exper., 10.1002/spe.2429
Corradi, 2014, Vm consolidation: A real case based on openstack cloud, Future Gener. Comput. Syst., 32, 118, 10.1016/j.future.2012.05.012
Matijasevic, 2003, Design and evaluation of a multi-user virtual audio chat, Future Gener. Comput. Syst., 19, 229, 10.1016/S0167-739X(02)00149-8
Fortino, 2014, Bodycloud: A saas approach for community body sensor networks, Future Gener. Comput. Syst., 35, 62, 10.1016/j.future.2013.12.015
Botta, 2016, Integration of cloud computing and Internet of things: A survey, Future Gener. Comput. Syst., 56, 684, 10.1016/j.future.2015.09.021
Wei, 2014, Security and privacy for storage and computation in cloud computing, Inform. Sci., 258, 371, 10.1016/j.ins.2013.04.028
Tao, 2014, Cciot-cmfg: Cloud computing and Internet of things-based cloud manufacturing service system, IEEE Trans. Ind. Inf., 10, 1435, 10.1109/TII.2014.2306383
Xiao, 2014, Accountable mapreduce in cloud computing, Future Gener. Comput. Syst., 30, 1, 10.1016/j.future.2013.07.001
Ali, 2015, Security in cloud computing: Opportunities and challenges, Inform. Sci., 305, 357, 10.1016/j.ins.2015.01.025
Baek, 2015, A secure cloud computing based framework for big data information management of smart grid, IEEE Trans. Cloud Comput., 3, 233, 10.1109/TCC.2014.2359460
B. Li, J. Li, J. Huai, T. Wo, Q. Li, L. Zhong, Enacloud: An energy-saving application live placement approach for cloud computing environments, in: IEEE International Conference on Cloud Computing, Cloud 2009, Bangalore, India, 21–25 September, 2009, pp. 17–24.
Samimi, 2014, A combinatorial double auction resource allocation model in cloud computing, Inform. Sci., 357, 201, 10.1016/j.ins.2014.02.008
Zhou, 2014, Secure administration of cryptographic role-based access control for large-scale cloud storage systems, J. Comput. System Sci., 80, 1518, 10.1016/j.jcss.2014.04.019
Heilig, 2014, A scientometric analysis of cloud computing literature, IEEE Trans. Cloud Comput., 2, 266, 10.1109/TCC.2014.2321168
Saleem, 2015, Integration of cognitive radio technology with unmanned aerial vehicles: issues, opportunities, and future research challenges, J. Netw. Comput. Appl., 50, 15, 10.1016/j.jnca.2014.12.002
Sadooghi, 2015, Understanding the performance and potential of cloud computing for scientific applications, IEEE Trans. Cloud Comput., 1
Wang, 2013, Adaptive mobile cloud computing to enable rich mobile multimedia applications, IEEE Trans. Multimedia, 15, 870, 10.1109/TMM.2013.2240674
Kimball, 2016, Low bandwidth desktop and video streaming for collaborative tiled display environments, Future Gener. Comput. Syst., 54, 336, 10.1016/j.future.2015.07.009
Wu, 2014, A symmetric image cipher using wave perturbations, Signal Process., 102, 122, 10.1016/j.sigpro.2014.03.015
Hu, 2014, Semantic link network-based model for organizing multimedia big data, IEEE Trans. Emerging Top. Comput., 2, 376, 10.1109/TETC.2014.2316525
Czaplewski, 2015, Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia, Signal Process., 111, 150, 10.1016/j.sigpro.2014.12.026
Rawat, 2012, A blind watermarking algorithm based on fractional Fourier transform and visual cryptography, Signal Process., 92, 1480, 10.1016/j.sigpro.2011.12.006
Younis, 2014, An access control model for cloud computing, J. Inf. Secur. Appl., 19, 45
Zhou, 2013, Image encryption using a new parametric switching chaotic system, Signal Process., 93, 3039, 10.1016/j.sigpro.2013.04.021
N. Bari, R. Vichr, K. Kowsari, S.Y. Berkovich, Novel metaknowledge-based processing technique for multimedia big data clustering challenges, arXiv preprint arXiv:1503.00245.
Chang, 2015, Mobile cloud-based depression diagnosis using an ontology and a Bayesian network, Future Gener. Comput. Syst., 43, 87, 10.1016/j.future.2014.05.004
Yang, 2015, Accessing medical image file with co-allocation hdfs in cloud, Future Gener. Comput. Syst., 43, 61, 10.1016/j.future.2014.08.008
Esposito, 2016, Smart cloud storage service selection based on fuzzy logic, theory of evidence and game theory, IEEE Trans. Comput., 65, 2348, 10.1109/TC.2015.2389952
Zhou, 2014, Gm-phd-based multi-target visual tracking using entropy distribution and game theory, IEEE Trans. Ind. Inf., 10, 1064, 10.1109/TII.2013.2294156
Dextreit, 2014, Game theory controller for hybrid electric vehicles, IEEE Trans. Control Syst. Technol., 22, 652, 10.1109/TCST.2013.2254597
Pillai, 2016, Resource allocation in cloud computing using the uncertainty principle of game theory, IEEE Syst. J., 10, 637, 10.1109/JSYST.2014.2314861
Liu, 2014, Spectrum sharing in mimo cognitive radio networks based on cooperative game theory, IEEE Trans. Wireless Commun., 13, 4807, 10.1109/TWC.2014.2331287
Kumari, 2016, On the design of a secure user authentication and key agreement scheme for wireless sensor networks, Wirel. Pers. Commun., 1
Aburumman, 2014
Aburumman, 2016, A secure and resilient cross domain sip solution for manets using dynamic clustering and joint spatial and temporal redundancy, Concurr. Comput.: Pract. Exp.
Gao, 2014, Constructing gazetteers from volunteered big geo-data based on hadoop, Comput. Environ. Urban Syst., 61, 172, 10.1016/j.compenvurbsys.2014.02.004
Guan, 2004, Modeling adaptable multimedia and self-modifying protocol execution, Future Gener. Comput. Syst., 20, 123, 10.1016/S0167-739X(03)00127-4
Khan, 2003, Optimal quality of service routing and admission control using the utility model, Future Gener. Comput. Syst., 19, 1063, 10.1016/S0167-739X(03)00110-9
Vázquez, 2004, Bandwidth reduction for remote navigation systems through view prediction and progressive transmission, Future Gener. Comput. Syst., 20, 1251, 10.1016/j.future.2004.05.030