• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wu Xiuguo, Su Wei. Task Completion Prediction Method in Cloud Scientific Workflow[J]. Journal of Computer Research and Development, 2018, 55(3): 602-612. DOI: 10.7544/issn1000-1239.2018.20160899
Citation: Wu Xiuguo, Su Wei. Task Completion Prediction Method in Cloud Scientific Workflow[J]. Journal of Computer Research and Development, 2018, 55(3): 602-612. DOI: 10.7544/issn1000-1239.2018.20160899

Task Completion Prediction Method in Cloud Scientific Workflow

More Information
  • Published Date: February 28, 2018
  • Cloud scientific workflow supplies a collaborative research platform for scholars in different regions in order to implement tasks, such as scientific computing, using various kinds of resources and services provided by cloud computing environment. Aimed to the uncertainty of task completion before a cloud scientific workflow instance starts, a novel task completion prediction model based on data availability/unavailability is proposed in this paper, together with the data availability relationship among them, called the data availability of positive/negative. In this way, the possibility of task completion can be acquired in advance using the data availability/unavailability propagation rules, therefore improves cloud scientific workflow task completion cognition to a large extent. Furthermore, the proposed task completion prediction model has some advantages, such as excellent description and judgement ability. In addition, some experiments have shown that the proposed task completion prediction method can reflect the task accomplishments in practice, and avoid the influence of early task failure to subsequent tasks as far as possible. In other words, it improves the task completion rate while reduces the resource rental expenses in cloud scientific workflow system.
  • Related Articles

    [1]Yang Yongpeng, Jiang Dejun. A Method for Solving the wandering B+ tree Problem[J]. Journal of Computer Research and Development, 2023, 60(3): 539-554. DOI: 10.7544/issn1000-1239.202220555
    [2]Chen Yewang, Shen Lianlian, Zhong Caiming, Wang Tian, Chen Yi, Du Jixiang. Survey on Density Peak Clustering Algorithm[J]. Journal of Computer Research and Development, 2020, 57(2): 378-394. DOI: 10.7544/issn1000-1239.2020.20190104
    [3]Zhang Ming, Hua Yu, Liu Lurong, Hu Rong, Li Ziyi. A Write-Optimized Re-computation Scheme for Non-Volatile Memory[J]. Journal of Computer Research and Development, 2020, 57(2): 243-256. DOI: 10.7544/issn1000-1239.2020.20190524
    [4]Gao Peng, Wang Dongsheng, Wang Haixia. Extending PCM Lifetime by Redirecting Writes from the Most Modified Byte[J]. Journal of Computer Research and Development, 2019, 56(12): 2733-2743. DOI: 10.7544/issn1000-1239.2019.20180267
    [5]Niu Dejiao, He Qingjian, Cai Tao, Wang Jie, Zhan Yongzhao, Liang Jun. APMSS: The New Solid Storage System with Asymmetric Interface[J]. Journal of Computer Research and Development, 2018, 55(9): 2083-2093. DOI: 10.7544/issn1000-1239.2018.20180198
    [6]Cui Yu, Zhang Hongli, Tian Zhihong, and Fang Binxing. Multi-Addresses Amplification DoS Attacks by Native IPv6 and IPv6Tunnels[J]. Journal of Computer Research and Development, 2014, 51(7): 1594-1603.
    [7]Sun Zhizhuo, Zhang Quanxin, Li Yuanzhang, Tan Yu'an, Liu Jingyu, Ma Zhongmei. Write Optimization for RAID5 in Sequential Data Storage[J]. Journal of Computer Research and Development, 2013, 50(8): 1604-1612.
    [8]Hu Chaojian, Li Zhoujun, Guo Tao, Shi Zhiwei. Detecting the Vulnerability Pattern of Writing Tainted Value to Tainted Address[J]. Journal of Computer Research and Development, 2011, 48(8): 1455-1463.
    [9]Qiu Yuanjie and Liu Xinsong. Writing Mechanism in Digital Organism File System[J]. Journal of Computer Research and Development, 2010, 47(12).
    [10]Huan Dandan, Li Zusong, Hu Weiwu, Liu Zhiyong. A Cache Adaptive Write Allocate Policy[J]. Journal of Computer Research and Development, 2007, 44(2): 348-354.
  • Cited by

    Periodical cited type(0)

    Other cited types(5)

Catalog

    Article views (1160) PDF downloads (611) Cited by(5)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return