Assigning applications to servers: a simulation study

  • Authors:
  • Jonathan Z. Sun;Shaoen Wu;Shouhuai Xu

  • Affiliations:
  • University of Southern Mississippi, Hattiesburg, MS;University of Southern Mississippi, Hattiesburg, MS;University of Texas at San Antonio, San Antonio, TX

  • Venue:
  • SpringSim '10 Proceedings of the 2010 Spring Simulation Multiconference
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

We investigate the following problem: Given a set of l different operating systems (for heterogeneous sake) that are to run on l distinct servers, {S1,..., Sl}, and n applications (e.g., in threshold crypto-systems), Ai = {A(i,1),...,A(i,mi)}1≤i≤n, where l ≥ mi for all 1 ≤ i ≤ n, we want to assign servers to applications to achieve the optimal robustness in the presence of an adversary that is able to break some operating systems. We provide the theoretic models, heuristic optimal solutions, and simulating results toward solving this problem.