期刊文献+

支持跨地理分布式数据中心大规模数据分析研究

Research on supporting large-scale data analysis across geographically distributed data centers
在线阅读 下载PDF
导出
摘要 文章提出了一种基于分布式约束优化问题(Distributed Constraint Optimization Problem,DCOP)框架的地理分布数据中心(Geographically Distributed Data Center,GDDC)分布式优化方法,开发了一个新的GDDC模型DCOP。其中,每个中数中心(Data Centers,DC)算子由一个代理表示。其次,由于传统的DCOP方法不适用于这类大规模问题,每个代理赋予多个变量和全局约束。经试验,结果表明了新方法的优点。 The goal of this article is to optimize workload allocation between a set of DCs to minimize energy costs while respecting limitations such as data center capacity and virtual machine migration.This article proposes a GDDC distributed optimization method based on the distributed constraint optimization(DCOP)framework.A new GDDC model DCOP has been developed,where each DC operator is represented by a proxy.Secondly,due to the traditional DCOP method not being suitable for such large-scale problems,each agent is assigned multiple variables and global constraints.The experimental results demonstrate the advantages of the new method.
作者 陈一航 李卓晖 李逸谦 杨子江 裴欢 Chen Yihang;Li Zhuohui;Li Yiqian;Yang Zijiang;Pei Huan(China Energy Construction Group Guangdong Electric Power Design and Research Institute Co.,Ltd.,Guangzhou 510663,China)
出处 《无线互联科技》 2023年第22期128-130,164,共4页 Wireless Internet Technology
关键词 跨地理分布 数据中心 优化分析 全局约束 cross geographical distribution data center optimization analysis global constraints
  • 相关文献

参考文献1

二级参考文献79

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2樊亚军,刘久文.TPM安全芯片设计与实现[J].信息安全与通信保密,2007,29(6):136-137. 被引量:5
  • 3张旻晋 桂文明 苏递生 等.从终端到网络的可信计算技术.信息技术快报,2006,4(2):21-34.
  • 4Garg V K.Elements of Distributed Computing.Wiley-IEEE Press,2002.
  • 5Foster I,Kesselman C,Tuecke S.The anatomy of the grid:Enabling scalable virtual organizations.International Journal of High Performance Computing Applications,2001,15(3):200-222.
  • 6Schoder D,Fischbach K.Peer-to-peer prospects.Communications of the ACM,2003,46(2):27-29.
  • 7Mell P,Grance T.The NIST definition of cloud computing (draft).NIST Special Publication,2011,800:145.
  • 8Almorsy M,Grundy J,Müller I.An analysis of the cloud computing security problem//Proceedings of the 2010 Asia Pacific Cloud Workshop,Collocated with APSEC2010.Sydney,Australia,2010:1-10.
  • 9Chen Y,Paxson V,Katz R H.What' s new about cloud computing security? University of California,Berkeley Report No.UCB/EECS 2010-5,January,2010.
  • 10Ristenpart T,Tromer E,Shacham H,et al.Hey,you,get off of my cloud:exploring information leakage in third-party compute clouds//Proceedings of the 16th ACM Conference on Computer and Communications Security.Chicago,USA,2009:199-212.

共引文献321

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部