Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 240100120-7.doi: 10.11896/jsjkx.240100120
• Network & Communication • Previous Articles Next Articles
LIU Zhimin, CHEN Jianer
CLC Number:
[1]ARMBRUST M,FOX A,GRIFFITH R,et al.A view of cloud computing[J].Communications of ACM,2010,53(4):50-58. [2]RITTINGHOUSE J,RANSOME J.Cloud Computing:Imple-mentation,Management,and Security[M].CRC press,2017. [3]ZHANG Y,ZHOU Y.TransOS:a transparent computing-based operating system for the cloud[J].International Journal of Cloud Computing,2012,1(4):287-301. [4]ZHANG Y,DUAN S,ZHANG D,et al.Transparent Computing:Development and Current Status[J].Chinese Journal of Electronics,2020,29(5):793-811. [5]ZHANG Y,ZHOU Y.Separating computation and storage with storage virtualization[J].Computer Communications,2011,34(13):1539-1548. [6]POTTS C,STRUSEVICH V.Fifty years of scheduling:a survey of milestones[J].Journal of the Operational Research Society,2009,60(1):S41-S68. [7]JOHNSON S.Optimal two- and three-stageproduction schedules with setup times included[J].Naval Research Logistics Quarterly,1954,1(1):61-68. [8]GAREY M,JOHNSON D.Computers andIntractability:AGuide to the Theory of NP-Completeness.[M].San Francisco:Freeman,1979. [9]KOVALYOV M.Efficient epsilon-approximation algorithm for minimizing the makespan in a parallel two-stage system[J].Vesti Academii navuk Belaruskai SSR,Ser.Phiz.-Mat.Navuk,1985,3:119. [10]DONG J,TONG W,LUO T,et al.An FPTAS for the parallel two-stage flowshop problem[J].Theoretical Computer Science,2017,657:64-72. [11]WU G,CHEN,J,WANG J.Scheduling two-stage jobs on multiple flowshops[J].Theoretical Computer Science,2019,776:117-124. [12]WU G,CHEN J,WANG J.On scheduling multiple two-stageflowshops[J].Theoretical Computer Science,2020,818:74-82. [13]WU G,CHEN J,WANG J.On scheduling inclined jobs on multiple two-stage flowshops[J].Theoretical Computer Science,2019,786:67-77. [14]WU G,CHEN J,WANG J.Improved approximation algorithms for two-stage flowshops scheduling problem[J].Theoretical Computer Science,2020,806:509-515. [15]DONG J,JIN R,LUO T,et al.A polynomial-time approximationscheme for an arbitrary number of parallel two-stage flow-shops[J].European Journal of Operational Research,2020,281(1):16-24. [16]CONWAY R,MAXWELL W,MILLER L.Theory of scheduling[M].Courier Corporation,2003. [17]CHEKURI C,KHANNA S.A polynomial time approximationscheme for the multiple knapsack problem[J].SIAM Journal on Computing,2005,35(3):713-728. [18]CHEN L,ZHANG G.Packing groups of items into multipleknapsacks[J].ACM Transactions on Algorithms(TALG),2018,14(4):1-24. [19]CROCE F,GUPTA J,TADEI R.Minimizing tardy jobs in aflowshop with common due date[J].European Journal of Ope-rational Research,2000,120(2):375-381. [20]DAWANDE M,GAVIRNENI S,RACHAMADUGU R.Sche-duling a two-stage flowshop under makespan constraint[J].Mathematical and Computer Modelling,2006,44(1/2):73-84. [21]CHEN J,HUANG M,GUO Y.Scheduling multipletwo-Stageflowshops with a deadline[J].Theoretical Computer Science,2022,921:100-111. [22]TONG W,XU Y,ZHANG H.A polynomial-time approximationscheme for parallel two-stage flowshops under makespan constraint[J].Theoretical Computer Science,2022,922:438-446. |
[1] | LI Zhi, LIN Sen, ZHANG Qiang. Edge Cloud Computing Approach for Intelligent Fault Detection in Rail Transit [J]. Computer Science, 2024, 51(9): 331-337. |
[2] | TANG Xin, DI Nongyu, YANG Hao, LIU Xin. Optimum Proposal to secGear Based on Skiplist [J]. Computer Science, 2024, 51(6A): 230700030-5. |
[3] | WANG Tian, SHEN Wei, ZHANG Gongxuan, XU Linli, WANG Zhen, YUN Yu. Soft Real-time Cloud Service Request Scheduling and Multiserver System Configuration for ProfitOptimization [J]. Computer Science, 2024, 51(6A): 230900099-10. |
[4] | LIU Daoqing, HU Hongchao, HUO Shumin. N-variant Architecture for Container Runtime Security Threats [J]. Computer Science, 2024, 51(6): 399-408. |
[5] | HAN Yujie, XU Zhijie, YANG Dingyu, HUANG Bo, GUO Jianmei. CDES:Data-driven Efficiency Evaluation Methodology for Cloud Database [J]. Computer Science, 2024, 51(6): 111-117. |
[6] | CHEN Juan, WANG Yang, WU Zongling, CHEN Peng, ZHANG Fengchun , HAO Junfeng. Cloud-Edge Collaborative Task Transfer and Resource Reallocation Optimization Based on Deep Reinforcement Learning [J]. Computer Science, 2024, 51(11A): 231100170-10. |
[7] | YAN Li, YIN Tian, LIU Peishun, FENG Hongxin, WANG Gaozhou, ZHANG Wenbin, HU Hailin, PAN Fading. Overview of Attribute-based Searchable Encryption [J]. Computer Science, 2024, 51(11A): 231100137-12. |
[8] | LIU Yuanlong, DAI Hua, LI Zhangchen, ZHOU Qian, YI Xun, YANG Geng. Research on Semantic-aware Ciphertext Rtrieval in Cloud Environments:A Survey [J]. Computer Science, 2024, 51(11): 298-306. |
[9] | WANG Zheng, WANG Jingwei, YIN Xinchun. Attribute-based Sanitizable and Collaborative Data Sharing Scheme in Medical Scenarios [J]. Computer Science, 2024, 51(10): 416-424. |
[10] | LIU Xuanyu, ZHANG Shuai, HUO Shumin, SHANG Ke. Microservice Moving Target Defense Strategy Based on Adaptive Genetic Algorithm [J]. Computer Science, 2023, 50(9): 82-89. |
[11] | LI Yinghao, GUO Haogong, LIU Panpan, XIANG Yihao, LIU Chengming. Cloud Platform Load Prediction Method Based on Temporal Convolutional Network [J]. Computer Science, 2023, 50(7): 254-260. |
[12] | ZAHO Peng, ZHOU Jiantao, ZHAO Daming. Cloud Computing Load Prediction Method Based on Hybrid Model of CEEMDAN-ConvLSTM [J]. Computer Science, 2023, 50(6A): 220300272-9. |
[13] | LI Jinliang, LIN Bing, CHEN Xing. Reliability Constraint-oriented Workflow Scheduling Strategy in Cloud Environment [J]. Computer Science, 2023, 50(10): 291-298. |
[14] | GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321. |
[15] | MA Xin-yu, JIANG Chun-mao, HUANG Chun-mei. Optimal Scheduling of Cloud Task Based on Three-way Clustering [J]. Computer Science, 2022, 49(11A): 211100139-7. |
|