2020
DOI: 10.1080/17517575.2020.1730445
|View full text |Cite
|
Sign up to set email alerts
|

Utility maximisation for resource allocation of migrating enterprise applications into the cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 56 publications
0
13
0
Order By: Relevance
“…Besides resource pricing schemes, reputation-based mechanisms are also used to promote cooperation between selfish peers and achieve reasonable resource allocation for peers. For example, Satsiou and Tassiulas ( 2010 ) assumed each peer could earn its reputation analogous to its contributions and presented a reputation-based resource allocation scheme. Later, Gupta et al.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Besides resource pricing schemes, reputation-based mechanisms are also used to promote cooperation between selfish peers and achieve reasonable resource allocation for peers. For example, Satsiou and Tassiulas ( 2010 ) assumed each peer could earn its reputation analogous to its contributions and presented a reputation-based resource allocation scheme. Later, Gupta et al.…”
Section: Related Workmentioning
confidence: 99%
“…Since the utility functions of elastic services are usually concave, then the resource allocation problem for elastic services is a convex optimization problem, which can be solved through the first order Lagrangian method. Besides resource pricing mechanisms, reputation-based methods are also used to encourage cooperation amongst selfish peers so as to promote each peer to provide resource for others and achieve efficient resource allocation, e.g., Satsiou and Tassiulas ( 2010 ), Gupta et al. ( 2016 ) and Goswami et al.…”
Section: Introductionmentioning
confidence: 99%
“…In the above Equation (2), refers to the willingness to pay (WTP) of customer for processing the tasks with low requirement on latency and high requirement on processing capacity [ 46 , 47 ]. In the above Equation (3).…”
Section: Resource Allocation Model Of Edge Computing Without Usingmentioning
confidence: 99%
“…Under the various attacks, the effect of the experiment is shown in Table 8. It Standardization of service type data: service type (assignment) http (1) smtp 2Fingers 3Eco_i 4ftp_data (5) ftp (6) Domain_u (7) Hostnames (8) Imap4 (9) mtp (10) Netstat (11) Private (12) Systat (13) Telnet (14) ecr_i (15) Time (16) uucp (17) Login (18) urp_i (19) Pop_3 20Auth (21) Other (21) URP_I (22) Others 23Standardization of property data: property type (assignment) REJ 1S1 2…”
Section: Simulation Backgroundmentioning
confidence: 99%
“…Nowadays, the Internet is dramatically growing with the proliferation of a wide variety of network-connected devices everywhere. As increasing numbers of applications are continuously migrated from these devices to the cloud [1], current cloud infrastructure has become too overwhelmed to provide guaranteed services. For instance, the massive multisource data and resource-consuming computing tasks generated from these devices go far beyond the ability of cloud computing technologies [2].…”
Section: Introductionmentioning
confidence: 99%