• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Lü Fang, Cui Huimin, Huo Wei, Feng Xiaobing. Survey of Scheduling Policies for Co-Run Degradation[J]. Journal of Computer Research and Development, 2014, 51(1): 17-30.
Citation: Lü Fang, Cui Huimin, Huo Wei, Feng Xiaobing. Survey of Scheduling Policies for Co-Run Degradation[J]. Journal of Computer Research and Development, 2014, 51(1): 17-30.

Survey of Scheduling Policies for Co-Run Degradation

More Information
  • Published Date: January 14, 2014
  • With the fast swelling of industry applications, new platforms, such as clusters, datacenter and cloud computing, are becoming mainstream service environments. Meanwhile, high performance chip multiprocessor (CMP) systems begin to play a role on these commercial service platforms as major allocable resources. However, shared resources of CMP architectures would lead to severe co-run performance degradation on concurrent user applications. This problem, if left untouched, would lower the resource utility even users have less demands on the quality of services (QoS). Shared resources are attracting more and more concerns. Proper software scheduling policies keep being effective to the improvement of co-run performance. The paper summarizes the development of key techniques on CMP, variations of shared resources, which are followed with a detailed presentation and analysis for the representative schedulers. Limitations of the state-of-the-art scheduling policies, new challenges are then discussed and prospects for the research trends in the future are presented at the end of the paper.
  • Related Articles

    [1]Han Bing, Wang Hao, Fang Min, Zhang Yongchao, Zhou Lu, Ge Chunpeng. Data Integrity Verification Scheme For Lightweight Devices in Cloud Storage Scenarios[J]. Journal of Computer Research and Development, 2024, 61(10): 2467-2481. DOI: 10.7544/issn1000-1239.202440489
    [2]Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J]. Journal of Computer Research and Development, 2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023
    [3]Xu Guangwei, Bai Yanke, Yan Cairong, Yang Yanbin, Huang Yongfeng. Check Algorithm of Data Integrity Verification Results in Big Data Storage[J]. Journal of Computer Research and Development, 2017, 54(11): 2487-2496. DOI: 10.7544/issn1000-1239.2017.20160825
    [4]Wang Huifeng, Li Zhanhuai, Zhang Xiao, Sun Jian, Zhao Xiaonan. A Self-Adaptive Audit Method of Data Integrity in the Cloud Storage[J]. Journal of Computer Research and Development, 2017, 54(1): 172-183. DOI: 10.7544/issn1000-1239.2017.20150900
    [5]Qin Zhiguang, Wang Shiyu, Zhao Yang, Xiong Hu, Wu Songyang. An Auditing Protocol for Data Storage in Cloud Computing with Data Dynamics[J]. Journal of Computer Research and Development, 2015, 52(10): 2192-2199. DOI: 10.7544/issn1000-1239.2015.20150509
    [6]Tan Shuang, He Li, Chen Zhikun, Jia Yan. A Method of Provable Data Integrity Based on Lattice in Cloud Storage[J]. Journal of Computer Research and Development, 2015, 52(8): 1862-1872. DOI: 10.7544/issn1000-1239.2015.20140610
    [7]Li Hui, Sun Wenhai, Li Fenghua, Wang Boyang. Secure and Privacy-Preserving Data Storage Service in Public Cloud[J]. Journal of Computer Research and Development, 2014, 51(7): 1397-1409.
    [8]Fu Yingxun, Luo Shengmei, Shu Jiwu. Survey of Secure Cloud Storage System and Key Technologies[J]. Journal of Computer Research and Development, 2013, 50(1): 136-145.
    [9]Xiao Da, Shu Jiwu, Chen Kang, Zheng Weimin. A Practical Data Possession Checking Scheme for Networked Archival Storage[J]. Journal of Computer Research and Development, 2009, 46(10): 1660-1668.
    [10]Wang Dan, Feng Dengguo, and Xu Zhen. An Approach to Data Sealing Based on Trusted Virtualization Platform[J]. Journal of Computer Research and Development, 2009, 46(8): 1325-1333.

Catalog

    Article views (792) PDF downloads (623) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return