Allocating Modules to Processors in a Distributed System
IEEE Transactions on Software Engineering
Journal of Parallel and Distributed Computing
Why and Where: A Characterization of Data Provenance
ICDT '01 Proceedings of the 8th International Conference on Database Theory
Chimera: AVirtual Data System for Representing, Querying, and Automating Data Derivation
SSDBM '02 Proceedings of the 14th International Conference on Scientific and Statistical Database Management
Dynamic Matching and Scheduling of a Class of Independent Tasks onto Heterogeneous Computing Systems
HCW '99 Proceedings of the Eighth Heterogeneous Computing Workshop
Scheduling with Advanced Reservations
IPDPS '00 Proceedings of the 14th International Symposium on Parallel and Distributed Processing
Proceedings of the 2003 ACM/IEEE conference on Supercomputing
Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
CCGRID '07 Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid
Peer-to-peer's most wanted: Malicious peers
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Study on equipment interoperation chain model in grid environment
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Information and knowledge management in online rich presence services
Information Systems Frontiers
Hi-index | 0.00 |
Scheduling resources in grid is an open difficult problem due to resource fluctuations. A fuzzy scheduling method using provenance information is proposed. In this method, resource dispatch probability is dynamically adjusted according to user feedback information, which is user appreciation information represented by fuzzy variables. To minimize the influence of cheating, collusive and decrying of user appreciations, provenance information is used to estimate trust factor of each user appreciation during resource dispatch probability adjustment process. Simulation results confirm capability of the proposed method to effectively reduce impacts of malicious user appreciations and increase user satisfactions.