2014 International Conference on Computer and Communication Technology (ICCCT) 2014
DOI: 10.1109/iccct.2014.7001473
|View full text |Cite
|
Sign up to set email alerts
|

Game theoretic approaches for job scheduling in cloud computing: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Unlike traditional grid schedulers, CRB solves a wide range of application scheduling issues, including the lack of adequate computing nodes in a cluster and the lack of a software execution environment in any grid resources. In this chain, the authors also presented a game-theoretic paradigm for real-time cloud job scheduling (Ananth and Sekaran, 2014). In this approach, the job takes on a player's role, while the VM takes on the part of a strategy.…”
Section: Related Workmentioning
confidence: 99%
“…Unlike traditional grid schedulers, CRB solves a wide range of application scheduling issues, including the lack of adequate computing nodes in a cluster and the lack of a software execution environment in any grid resources. In this chain, the authors also presented a game-theoretic paradigm for real-time cloud job scheduling (Ananth and Sekaran, 2014). In this approach, the job takes on a player's role, while the VM takes on the part of a strategy.…”
Section: Related Workmentioning
confidence: 99%
“…. , 1 3 ], means that user of the resource number 1 should declare the lowest possible computing capacity with probability 1 4 , next consecutive computing capacity with probability 1 6 , and so on, and maximum computing capacity with probability 1 3 .…”
Section: Main Game Modelmentioning
confidence: 99%
“…Task scheduling in the dynamic cloud environments is a complex process of contains multiple stages. Tasks may be scheduled as batch with (dependent) or without (independent) correlations among them [1]. In the scheduling process, the following special security-related users' requirements may be taken into account: selection of an appropriate amount of resources for utilization, safety, security, and intrusion detection.…”
Section: Introductionmentioning
confidence: 99%
“…However, unlike [12], we do not consider the realized priority as a given and fixed function of the priority of the principal and interests of the agent, but as a design parameter for the agent to maximize his own utility. Although there is a vast literature on multi-agent task scheduling literature (see, e.g., [13]- [15]), prior work does not consider either information asymmetry between the agents and the principal or the design of incentives. To the best of our knowledge, this paper is the first work to adopt a game-theoretic approach to analyzing priority misalignments between task senders and task receivers.…”
Section: Introductionmentioning
confidence: 99%