6th Asia-Pacific Symposium on Information and Telecommunication Technologies 2005
DOI: 10.1109/apsitt.2005.203634
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Agents Based Load Balancing Method for Parallel Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 9 publications
0
10
0
Order By: Relevance
“…We note that the complexity of each iteration is dominated by the derivations of (16). Based on the rules of counting floating point operations (flops) [37], we obtain the complexity of ( 16) as O 1.5K 2 + 24.5K − 13 flops. Then, the total complexity of the algorithm is equal to the product of the number of iterations and the complexity of each iteration, which is given by O 1.5K 2 + 24.5K − 13 log 2…”
Section: St (15b) (15c) (15d) and (19c) (25b)mentioning
confidence: 99%
“…We note that the complexity of each iteration is dominated by the derivations of (16). Based on the rules of counting floating point operations (flops) [37], we obtain the complexity of ( 16) as O 1.5K 2 + 24.5K − 13 flops. Then, the total complexity of the algorithm is equal to the product of the number of iterations and the complexity of each iteration, which is given by O 1.5K 2 + 24.5K − 13 log 2…”
Section: St (15b) (15c) (15d) and (19c) (25b)mentioning
confidence: 99%
“…framework abstraction no framework agents based [22](*), [42], [39], [35] [16], [38](*), [24], [19] without agents [3], [2] [17], [45], [25], [34], [31] [46], [43], [44](*), [33] The above table gives another type of classification according to the criterion whether an approach uses agents or not ([11] identifies essentials of different multi-agent architectural styles (MAS) and shows how MAS can be characterized and evaluated), as well as whether an approach introduces a general framework (taking in the consideration both structured P2P and unstructured P2P net-works as well as grid). Those papers that use a very specific LB algorithm are marked with "(*)".…”
Section: Classification Of Lb Algorithmsmentioning
confidence: 99%
“…Mobile agents are suitable for applications that need [4]: code executed close to the data (e.g., for hospital legal issues [5]), fault tolerance (dealing with network failure or other issues [6]), task delegation, asynchronous processing (e.g., nomadic computing [7]), flexibility (e.g., interaction with different interfaces [8] and different environments [9]), and/or parallelism (e.g., load balancing [10]). …”
Section: Introductionmentioning
confidence: 99%
“…9 resume action IPMS ontology.Description The AMM agent issues a resume request to resume the agent execution in the remote platformTable F 10. Refuse exception predicates IPMS ontology.Set of term Protocols on the list are mandatoryprotocolcombinationSet of term Protocols on the list are the combinations allowed ma-system-notsupported String Mobile agent system indicated is not supported ma-os-notsupportedTable F.11 Failure exception predicates IPMS ontology.Table F.12 mobile-agent-description concept IPMS ontology.…”
mentioning
confidence: 99%