A Dynamic Scheduling Algorithm in Heterogeneous Computing Environments

Author(s):  
Liang-Teh Lee ◽  
Hung-Yuan Chang ◽  
Kang-Yuan Liu ◽  
Gei-Ming Chang ◽  
Chin-Chih Lien
2013 ◽  
Vol 33 (3) ◽  
pp. 862-865
Author(s):  
Shuangzhi DU ◽  
Yong WANG ◽  
Xiaoling TAO

2020 ◽  
Vol 53 (2) ◽  
pp. 15041-15046
Author(s):  
Ala Din Trabelsi ◽  
Hend Marouane ◽  
Emna Bouhamed ◽  
Faouzi Zarai

2021 ◽  
Vol 21 (3) ◽  
pp. 1-33
Author(s):  
Qianmu Li ◽  
Shunmei Meng ◽  
Xiaonan Sang ◽  
Hanrui Zhang ◽  
Shoujin Wang ◽  
...  

Volunteer computing uses computers volunteered by the general public to do distributed scientific computing. Volunteer computing is being used in high-energy physics, molecular biology, medicine, astrophysics, climate study, and other areas. These projects have attained unprecedented computing power. However, with the development of information technology, the traditional defense system cannot deal with the unknown security problems of volunteer computing . At the same time, Cyber Mimic Defense (CMD) can defend the unknown attack behavior through its three characteristics: dynamic, heterogeneous, and redundant. As an important part of the CMD, the dynamic scheduling algorithm realizes the dynamic change of the service centralized executor, which can enusre the security and reliability of CMD of volunteer computing . Aiming at the problems of passive scheduling and large scheduling granularity existing in the existing scheduling algorithms, this article first proposes a scheduling algorithm based on time threshold and task threshold and realizes the dynamic randomness of mimic defense from two different dimensions; finally, combining time threshold and random threshold, a dynamic scheduling algorithm based on multi-level queue is proposed. The experiment shows that the dynamic scheduling algorithm based on multi-level queue can take both security and reliability into account, has better dynamic heterogeneous redundancy characteristics, and can effectively prevent the transformation rule of heterogeneous executors from being mastered by attackers.


Sign in / Sign up

Export Citation Format

Share Document