Skip to main content
Erschienen in: Mobile Networks and Applications 4/2020

18.12.2019

Cloud Marginal Resource Allocation: A Decision Support Model

verfasst von: Walayat Hussain, Osama Sohaib, Mohsen Naderpour, Honghao Gao

Erschienen in: Mobile Networks and Applications | Ausgabe 4/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

One of the significant challenges for cloud providers is how to manage resources wisely and how to form a viable service level agreement (SLA) with consumers to avoid any violation or penalties. Some consumers make an agreement for a fixed amount of resources, these being the required resources that are needed to execute its business. Consumers may need additional resources on top of these fixed resources, known as– marginal resources that are only consumed and paid for in case of an increase in business demand. In such contracts, both parties agree on a pricing model in which a consumer pays upfront only for the fixed resources and pays for the marginal resources when they are used. A marginal resource allocation is a challenge for service provider particularly small- to medium-sized service providers as it can affect the usage of their resources and consequently their profits. This paper proposes a novel marginal resource allocation decision support model to assist cloud providers to manage the cloud SLAs before its execution, covering all possible scenarios, including whether a consumer is new or not, and whether the consumer requests the same or different marginal resources. The model relies on the capabilities of the user-based collaborative filtering method with an enhanced top-k nearest neighbor algorithm and a fuzzy logic system to make a decision. The proposed framework assists cloud providers manage their resources in an optimal way and avoid violations or penalties. Finally, the performance of the proposed model is shown through a cloud scenario which demonstrates that our proposed approach can assists cloud providers to manage their resources wisely to avoid violations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Gartner (2019) Gartner forecasts worldwide public cloud revenue to grow 17.5 percent in 2019. Gartner, Stratford Gartner (2019) Gartner forecasts worldwide public cloud revenue to grow 17.5 percent in 2019. Gartner, Stratford
2.
Zurück zum Zitat Statista (2019) Spending on public cloud IT services (SaaS/PaaS) worldwide 2015-2020, Hamburg Statista (2019) Spending on public cloud IT services (SaaS/PaaS) worldwide 2015-2020, Hamburg
3.
Zurück zum Zitat Hussain W, Hussain FK, Hussain OK (2014) Maintaining trust in cloud computing through SLA monitoring. In: Neural information processing. Springer Hussain W, Hussain FK, Hussain OK (2014) Maintaining trust in cloud computing through SLA monitoring. In: Neural information processing. Springer
4.
Zurück zum Zitat Son S et al (2016) Adaptive trade-off strategy for bargaining-based multi-objective SLA establishment under varying cloud workload. J Supercomput 72(4):1597–1622 Son S et al (2016) Adaptive trade-off strategy for bargaining-based multi-objective SLA establishment under varying cloud workload. J Supercomput 72(4):1597–1622
5.
Zurück zum Zitat Silaghi GC, ŞErban LD, Litan CM (2012) A time-constrained SLA negotiation strategy in competitive computational grids. Futur Gener Comput Syst 28(8):1303–1315 Silaghi GC, ŞErban LD, Litan CM (2012) A time-constrained SLA negotiation strategy in competitive computational grids. Futur Gener Comput Syst 28(8):1303–1315
6.
Zurück zum Zitat Gwak J, Sim KM (2013) A novel method for coevolving PS-optimizing negotiation strategies using improved diversity controlling EDAs. Appl Intell 38(3):384–417 Gwak J, Sim KM (2013) A novel method for coevolving PS-optimizing negotiation strategies using improved diversity controlling EDAs. Appl Intell 38(3):384–417
7.
Zurück zum Zitat Sim KM (2010) Grid resource negotiation: survey and new directions. IEEE Trans Syst Man Cybern Part C Appl Rev 40(3):245–257 Sim KM (2010) Grid resource negotiation: survey and new directions. IEEE Trans Syst Man Cybern Part C Appl Rev 40(3):245–257
8.
Zurück zum Zitat Gao H et al (2018) Toward service selection for workflow reconfiguration: an interface-based computing solution. Futur Gener Comput Syst 87:298–311 Gao H et al (2018) Toward service selection for workflow reconfiguration: an interface-based computing solution. Futur Gener Comput Syst 87:298–311
9.
Zurück zum Zitat Abts D, Felderman BJQ (2012) A guided tour through data-center networking. Queue 10(5):10 Abts D, Felderman BJQ (2012) A guided tour through data-center networking. Queue 10(5):10
10.
Zurück zum Zitat Luong NC et al (2017) Resource management in cloud networking using economic analysis and pricing models: a survey. IEEE Commun Surv Tutorials 19(2):954–1001 Luong NC et al (2017) Resource management in cloud networking using economic analysis and pricing models: a survey. IEEE Commun Surv Tutorials 19(2):954–1001
11.
Zurück zum Zitat Aazam M, Huh E-N (2014) Advance resource reservation and QoS based refunding in cloud federation. In: 2014 IEEE Globecom Workshops (GC Wkshps). IEEE Aazam M, Huh E-N (2014) Advance resource reservation and QoS based refunding in cloud federation. In: 2014 IEEE Globecom Workshops (GC Wkshps). IEEE
12.
Zurück zum Zitat Shen H, Li Z (2016) New bandwidth sharing and pricing policies to achieve a win-win situation for cloud provider and tenants. IEEE Trans Parallel Distrib Syst 27(9):2682–2697 Shen H, Li Z (2016) New bandwidth sharing and pricing policies to achieve a win-win situation for cloud provider and tenants. IEEE Trans Parallel Distrib Syst 27(9):2682–2697
13.
Zurück zum Zitat Prasad KH et al (2010) Resource allocation and SLA determination for large data processing services over cloud. In: 2010 IEEE international conference on services computing. IEEE Prasad KH et al (2010) Resource allocation and SLA determination for large data processing services over cloud. In: 2010 IEEE international conference on services computing. IEEE
14.
Zurück zum Zitat Altmann J, Kashef MM (2014) Cost model based service placement in federated hybrid clouds. Futur Gener Comput Syst 41:79–90 Altmann J, Kashef MM (2014) Cost model based service placement in federated hybrid clouds. Futur Gener Comput Syst 41:79–90
15.
Zurück zum Zitat Shepherd WG (1992) Ramsey pricing: its uses and limits. Util Policy 2(4):296–298 Shepherd WG (1992) Ramsey pricing: its uses and limits. Util Policy 2(4):296–298
16.
Zurück zum Zitat Hadji M, Zeghlache D (2017) Mathematical programming approach for revenue maximization in cloud federations. IEEE Trans Cloud Comput 5(1):99–111 Hadji M, Zeghlache D (2017) Mathematical programming approach for revenue maximization in cloud federations. IEEE Trans Cloud Comput 5(1):99–111
17.
Zurück zum Zitat Dilip KSM, Sadashiv N, Goudar R (2014) Priority based resource allocation and demand based pricing model in peer-to-peer clouds. In: 2014 international conference on advances in computing, communications and informatics (ICACCI). IEEE Dilip KSM, Sadashiv N, Goudar R (2014) Priority based resource allocation and demand based pricing model in peer-to-peer clouds. In: 2014 international conference on advances in computing, communications and informatics (ICACCI). IEEE
18.
Zurück zum Zitat Hussain W et al (2016) Provider-based optimized personalized viable SLA (OPV-SLA) framework to prevent SLA violation. British Computer Society Hussain W et al (2016) Provider-based optimized personalized viable SLA (OPV-SLA) framework to prevent SLA violation. British Computer Society
19.
Zurück zum Zitat Hussain W, Hussain FK, Hussain OK (2016) SLA management framework to avoid violation in cloud. In: International conference on neural information processing. Springer Hussain W, Hussain FK, Hussain OK (2016) SLA management framework to avoid violation in cloud. In: International conference on neural information processing. Springer
20.
Zurück zum Zitat Hussain W et al (2016) Provider-based optimized personalized viable SLA (OPV-SLA) framework to prevent SLA violation. Comput J 59(12):1760–1783 Hussain W et al (2016) Provider-based optimized personalized viable SLA (OPV-SLA) framework to prevent SLA violation. Comput J 59(12):1760–1783
21.
Zurück zum Zitat Hussain W, Hussain FK, Hussain O (2015) Comparative analysis of consumer profile-based methods to predict SLA violation. In: IEEE (ed) FUZZ-IEEE. IEEE, Istanbul Hussain W, Hussain FK, Hussain O (2015) Comparative analysis of consumer profile-based methods to predict SLA violation. In: IEEE (ed) FUZZ-IEEE. IEEE, Istanbul
22.
Zurück zum Zitat Emeakaroha VC et al (2010) Low level metrics to high level SLAs-LoM2HiS framework: bridging the gap between monitored metrics and SLA parameters in cloud environments. In: 2010 international conference on high performance computing and simulation (HPCS). IEEE Emeakaroha VC et al (2010) Low level metrics to high level SLAs-LoM2HiS framework: bridging the gap between monitored metrics and SLA parameters in cloud environments. In: 2010 international conference on high performance computing and simulation (HPCS). IEEE
23.
Zurück zum Zitat Emeakaroha VC et al (2012) Towards autonomic detection of SLA violations in Cloud infrastructures. Futur Gener Comput Syst 28(7):1017–1029 Emeakaroha VC et al (2012) Towards autonomic detection of SLA violations in Cloud infrastructures. Futur Gener Comput Syst 28(7):1017–1029
24.
Zurück zum Zitat Zhang Y, Zheng Z, Lyu MR (2011) Exploring latent features for memory-based QoS prediction in cloud computing. In: 2011 30th IEEE symposium on reliable distributed systems (SRDS). IEEE Zhang Y, Zheng Z, Lyu MR (2011) Exploring latent features for memory-based QoS prediction in cloud computing. In: 2011 30th IEEE symposium on reliable distributed systems (SRDS). IEEE
25.
Zurück zum Zitat Kamel A, Al-Fuqaha A, Guizani M (2015) Exploiting client-side collected measurements to perform QoS assessment of IaaS. IEEE Trans Mob Comput 14(9):1876–1887 Kamel A, Al-Fuqaha A, Guizani M (2015) Exploiting client-side collected measurements to perform QoS assessment of IaaS. IEEE Trans Mob Comput 14(9):1876–1887
26.
Zurück zum Zitat Redl C et al (2012) Automatic SLA matching and provider selection in grid and cloud computing markets. In: Proceedings of the 2012 ACM/IEEE 13th international conference on grid computing. IEEE Computer Society Redl C et al (2012) Automatic SLA matching and provider selection in grid and cloud computing markets. In: Proceedings of the 2012 ACM/IEEE 13th international conference on grid computing. IEEE Computer Society
27.
Zurück zum Zitat Joshi KP, Pearce C (2015) Automating cloud service level agreements using semantic technologies. In: 2015 IEEE international conference on cloud engineering (IC2E). IEEE Joshi KP, Pearce C (2015) Automating cloud service level agreements using semantic technologies. In: 2015 IEEE international conference on cloud engineering (IC2E). IEEE
28.
Zurück zum Zitat Hussain W et al (2018) Comparing time series with machine learning-based prediction approaches for violation management in cloud SLAs. Futur Gener Comput Syst 89:464–477 Hussain W et al (2018) Comparing time series with machine learning-based prediction approaches for violation management in cloud SLAs. Futur Gener Comput Syst 89:464–477
29.
Zurück zum Zitat Dastjerdi AV et al (2015) CloudPick: a framework for QoS-aware and ontology-based service deployment across clouds. Softw Pract Exp 45(2):197–231 Dastjerdi AV et al (2015) CloudPick: a framework for QoS-aware and ontology-based service deployment across clouds. Softw Pract Exp 45(2):197–231
30.
Zurück zum Zitat Gao H et al (2018) Applying improved particle swarm optimization for dynamic service composition focusing on quality of service evaluations under hybrid networks. Int J Distrib Sens Netw 14(2):1550147718761583 Gao H et al (2018) Applying improved particle swarm optimization for dynamic service composition focusing on quality of service evaluations under hybrid networks. Int J Distrib Sens Netw 14(2):1550147718761583
31.
Zurück zum Zitat Haq IU, Brandic I, Schikuta E (2010) Sla validation in layered cloud infrastructures. In: Economics of grids, clouds, systems, and services. Springer, pp 153–164 Haq IU, Brandic I, Schikuta E (2010) Sla validation in layered cloud infrastructures. In: Economics of grids, clouds, systems, and services. Springer, pp 153–164
32.
Zurück zum Zitat Yin Y, Chen L, Wan J (2018) Location-aware service recommendation with enhanced probabilistic matrix factorization. IEEE Access 6:62815–62825 Yin Y, Chen L, Wan J (2018) Location-aware service recommendation with enhanced probabilistic matrix factorization. IEEE Access 6:62815–62825
33.
Zurück zum Zitat Yin Y et al (2017) Network location-aware service recommendation with random walk in cyber-physical systems. Sensors 17(9):2059 Yin Y et al (2017) Network location-aware service recommendation with random walk in cyber-physical systems. Sensors 17(9):2059
34.
Zurück zum Zitat Yin Y et al (2016) QoS prediction for web service recommendation with network location-aware neighbor selection. Int J Softw Eng Knowl Eng 26(04):611–632 Yin Y et al (2016) QoS prediction for web service recommendation with network location-aware neighbor selection. Int J Softw Eng Knowl Eng 26(04):611–632
35.
Zurück zum Zitat Yin Y et al (2019) QoS prediction for service recommendation with deep feature learning in edge computing environment. Mob Netw Appl Yin Y et al (2019) QoS prediction for service recommendation with deep feature learning in edge computing environment. Mob Netw Appl
36.
Zurück zum Zitat Romano L et al (2011) A novel approach to QoS monitoring in the cloud. In: 2011 first international conference on data compression, communications and processing (CCP). IEEE Romano L et al (2011) A novel approach to QoS monitoring in the cloud. In: 2011 first international conference on data compression, communications and processing (CCP). IEEE
37.
Zurück zum Zitat Cicotti G et al (2015) How to monitor QoS in cloud infrastructures: the QoSMONaaS approach. Int J Comput Sci Eng 11(1):29–45 Cicotti G et al (2015) How to monitor QoS in cloud infrastructures: the QoSMONaaS approach. Int J Comput Sci Eng 11(1):29–45
38.
Zurück zum Zitat Cicotti G et al (2011) QoS monitoring in a cloud services environment: the SRT-15 approach. In: European conference on parallel processing. Springer Cicotti G et al (2011) QoS monitoring in a cloud services environment: the SRT-15 approach. In: European conference on parallel processing. Springer
39.
Zurück zum Zitat Leitner P et al (2010) Runtime prediction of service level agreement violations for composite services. In: Service-oriented computing. ICSOC/ServiceWave 2009 workshops. Springer Leitner P et al (2010) Runtime prediction of service level agreement violations for composite services. In: Service-oriented computing. ICSOC/ServiceWave 2009 workshops. Springer
40.
Zurück zum Zitat Ciciani B et al (2012) Automated workload characterization in cloud-based transactional data grids. In: 2012 IEEE 26th international parallel and distributed processing symposium workshops & PhD Forum (IPDPSW). IEEE Ciciani B et al (2012) Automated workload characterization in cloud-based transactional data grids. In: 2012 IEEE 26th international parallel and distributed processing symposium workshops & PhD Forum (IPDPSW). IEEE
41.
Zurück zum Zitat Hussain W et al (2017) Formulating and managing viable SLAs in cloud computing from a small to medium service provider’s viewpoint: a state-of-the-art review. Inf Syst 71:240–259 Hussain W et al (2017) Formulating and managing viable SLAs in cloud computing from a small to medium service provider’s viewpoint: a state-of-the-art review. Inf Syst 71:240–259
42.
Zurück zum Zitat Gao H et al (2018) Applying probabilistic model checking to financial production risk evaluation and control: a case study of Alibaba’s Yu’e Bao. IEEE Access 99:1–11 Gao H et al (2018) Applying probabilistic model checking to financial production risk evaluation and control: a case study of Alibaba’s Yu’e Bao. IEEE Access 99:1–11
43.
Zurück zum Zitat Hussain W et al (2015) Profile-based viable service level agreement (sla) violation prediction model in the cloud. In: 2015 10th international conference on P2P, parallel, grid, cloud and internet computing (3PGCIC). IEEE, Krakow, pp 268–272 Hussain W et al (2015) Profile-based viable service level agreement (sla) violation prediction model in the cloud. In: 2015 10th international conference on P2P, parallel, grid, cloud and internet computing (3PGCIC). IEEE, Krakow, pp 268–272
44.
Zurück zum Zitat Hussain W et al (2016) Provider-based optimized personalized viable SLA (OPV-SLA) framework to prevent SLA violation. Comput J 59(12):1760–1783 Hussain W et al (2016) Provider-based optimized personalized viable SLA (OPV-SLA) framework to prevent SLA violation. Comput J 59(12):1760–1783
45.
Zurück zum Zitat Mustafa S et al (2018) SLA-aware energy efficient resource management for cloud environments. IEEE Access 6:15004–15020 Mustafa S et al (2018) SLA-aware energy efficient resource management for cloud environments. IEEE Access 6:15004–15020
46.
Zurück zum Zitat Cheetham W, Varma A, Goebel K (2001) Case-based reasoning at general electric. In: FLAIRS Conference Cheetham W, Varma A, Goebel K (2001) Case-based reasoning at general electric. In: FLAIRS Conference
47.
Zurück zum Zitat Meland PH et al (2014) Expressing cloud security requirements for slas in deontic contract languages for cloud brokers. Int J Cloud Comput 3(1):69–93 Meland PH et al (2014) Expressing cloud security requirements for slas in deontic contract languages for cloud brokers. Int J Cloud Comput 3(1):69–93
48.
Zurück zum Zitat Hussain W et al (2018) Comparing time series with machine learning-based prediction approaches for violation management in cloud SLAs. Futur Gener Comput Syst 89:464–477 Hussain W et al (2018) Comparing time series with machine learning-based prediction approaches for violation management in cloud SLAs. Futur Gener Comput Syst 89:464–477
49.
Zurück zum Zitat Hussain W et al (2018) Risk-based framework for SLA violation abatement from the cloud service provider’s perspective. Comput J 61(9):1306–1322 Hussain W et al (2018) Risk-based framework for SLA violation abatement from the cloud service provider’s perspective. Comput J 61(9):1306–1322
50.
Zurück zum Zitat Brandic I et al (2010) Laysi: a layered approach for sla-violation propagation in self-manageable cloud infrastructures. In: 2010 IEEE 34th annual computer software and applications conference workshops (COMPSACW). IEEE Brandic I et al (2010) Laysi: a layered approach for sla-violation propagation in self-manageable cloud infrastructures. In: 2010 IEEE 34th annual computer software and applications conference workshops (COMPSACW). IEEE
51.
Zurück zum Zitat Emeakaroha VC et al (2012) Casvid: Application level monitoring for sla violation detection in clouds. In: 2012 IEEE 36th annual computer software and applications conference (COMPSAC). IEEE Emeakaroha VC et al (2012) Casvid: Application level monitoring for sla violation detection in clouds. In: 2012 IEEE 36th annual computer software and applications conference (COMPSAC). IEEE
52.
Zurück zum Zitat Mosallanejad A, Atan R (2013) HA-SLA: a hierarchical autonomic SLA model for SLA monitoring in cloud computing. J Softw Eng Appl 6(03):114 Mosallanejad A, Atan R (2013) HA-SLA: a hierarchical autonomic SLA model for SLA monitoring in cloud computing. J Softw Eng Appl 6(03):114
53.
Zurück zum Zitat Katsaros G et al (2012) A self-adaptive hierarchical monitoring mechanism for Clouds. J Syst Softw 85(5):1029–1041 Katsaros G et al (2012) A self-adaptive hierarchical monitoring mechanism for Clouds. J Syst Softw 85(5):1029–1041
54.
Zurück zum Zitat Sun Y et al (2013) SLA detective control model for workflow composition of cloud services. In: 2013 IEEE 17th international conference on computer supported cooperative work in design (CSCWD). IEEE Sun Y et al (2013) SLA detective control model for workflow composition of cloud services. In: 2013 IEEE 17th international conference on computer supported cooperative work in design (CSCWD). IEEE
55.
Zurück zum Zitat Cardellini V et al (2011) Sla-aware resource management for application service providers in the cloud. In: 2011 first international symposium on network cloud computing and applications (NCCA). IEEE Cardellini V et al (2011) Sla-aware resource management for application service providers in the cloud. In: 2011 first international symposium on network cloud computing and applications (NCCA). IEEE
56.
Zurück zum Zitat Schmieders, E., et al., Combining SLA prediction and cross layer adaptation for preventing SLA violations. 2011 Schmieders, E., et al., Combining SLA prediction and cross layer adaptation for preventing SLA violations. 2011
57.
Zurück zum Zitat Noor TH, Sheng QZ (2011) Trust as a service: a framework for trust management in cloud environments. In: Web information system engineering–WISE 2011. Springer, pp 314–321 Noor TH, Sheng QZ (2011) Trust as a service: a framework for trust management in cloud environments. In: Web information system engineering–WISE 2011. Springer, pp 314–321
58.
Zurück zum Zitat Fan W, Perros H (2013) A reliability-based trust management mechanism for cloud services. In: 2013 12th IEEE international conference on trust, security and privacy in computing and communications (TrustCom). IEEE Fan W, Perros H (2013) A reliability-based trust management mechanism for cloud services. In: 2013 12th IEEE international conference on trust, security and privacy in computing and communications (TrustCom). IEEE
59.
Zurück zum Zitat Hussain W, Hussain FK, Hussain OK (2015) Comparative analysis of consumer profile-based methods to predict SLA violation. In: 2015 IEEE international conference on Fuzzy systems (FUZZ-IEEE). IEEE Hussain W, Hussain FK, Hussain OK (2015) Comparative analysis of consumer profile-based methods to predict SLA violation. In: 2015 IEEE international conference on Fuzzy systems (FUZZ-IEEE). IEEE
60.
Zurück zum Zitat Hussain W, Hussain F, Hussain O (2016) Allocating optimized resources in the cloud by a viable SLA model. In: 2016 IEEE international conference on Fuzzy systems (FUZZ-IEEE). IEEE Hussain W, Hussain F, Hussain O (2016) Allocating optimized resources in the cloud by a viable SLA model. In: 2016 IEEE international conference on Fuzzy systems (FUZZ-IEEE). IEEE
61.
Zurück zum Zitat Hussain W, Hussain FK, Hussain OK (2016) Risk management framework to avoid SLA violation in cloud from a provider’s perspective. In: International conference on P2P, parallel, grid, cloud and internet computing. Springer Hussain W, Hussain FK, Hussain OK (2016) Risk management framework to avoid SLA violation in cloud from a provider’s perspective. In: International conference on P2P, parallel, grid, cloud and internet computing. Springer
62.
Zurück zum Zitat Naderpour M, Lu J, Zhang G (2014) An intelligent situation awareness support system for safety-critical environments. Decis Support Syst 59:325–340 Naderpour M, Lu J, Zhang G (2014) An intelligent situation awareness support system for safety-critical environments. Decis Support Syst 59:325–340
63.
Zurück zum Zitat Markowski AS et al (2011) Application of fuzzy logic to explosion risk assessment. J Loss Prev Process Ind 24(6):780–790 Markowski AS et al (2011) Application of fuzzy logic to explosion risk assessment. J Loss Prev Process Ind 24(6):780–790
64.
Zurück zum Zitat Breese JS, Heckerman D, Kadie C (1998) Empirical analysis of predictive algorithms for collaborative filtering. In: Proceedings of the fourteenth conference on uncertainty in artificial intelligence. Morgan Kaufmann Publishers Inc Breese JS, Heckerman D, Kadie C (1998) Empirical analysis of predictive algorithms for collaborative filtering. In: Proceedings of the fourteenth conference on uncertainty in artificial intelligence. Morgan Kaufmann Publishers Inc
65.
Zurück zum Zitat Herlocker JL et al (1999) An algorithmic framework for performing collaborative filtering. In: Proceedings of the 22nd annual international ACM SIGIR conference on research and development in information retrieval. ACM Herlocker JL et al (1999) An algorithmic framework for performing collaborative filtering. In: Proceedings of the 22nd annual international ACM SIGIR conference on research and development in information retrieval. ACM
66.
Zurück zum Zitat Wang J, De Vries AP, Reinders MJ (2006) Unifying user-based and item-based collaborative filtering approaches by similarity fusion. In: Proceedings of the 29th annual international ACM SIGIR conference on research and development in information retrieval. ACM Wang J, De Vries AP, Reinders MJ (2006) Unifying user-based and item-based collaborative filtering approaches by similarity fusion. In: Proceedings of the 29th annual international ACM SIGIR conference on research and development in information retrieval. ACM
67.
Zurück zum Zitat Zhou H et al (2016) A new sampling method in particle filter based on Pearson correlation coefficient. Neurocomputing 216:208–215 Zhou H et al (2016) A new sampling method in particle filter based on Pearson correlation coefficient. Neurocomputing 216:208–215
68.
Zurück zum Zitat Lin LI-K (1989) A concordance correlation coefficient to evaluate reproducibility. Biometrics:255–268 Lin LI-K (1989) A concordance correlation coefficient to evaluate reproducibility. Biometrics:255–268
69.
Zurück zum Zitat Adler J, Parmryd I (2010) Quantifying colocalization by correlation: the Pearson correlation coefficient is superior to the Mander’s overlap coefficient. Cytometry A 77(8):733–742 Adler J, Parmryd I (2010) Quantifying colocalization by correlation: the Pearson correlation coefficient is superior to the Mander’s overlap coefficient. Cytometry A 77(8):733–742
70.
Zurück zum Zitat Mamdani EH (1977) Application of fuzzy logic to approximate reasoning using linguistic synthesis. IEEE Trans Comput C-26(12):1182–1191MATH Mamdani EH (1977) Application of fuzzy logic to approximate reasoning using linguistic synthesis. IEEE Trans Comput C-26(12):1182–1191MATH
71.
Zurück zum Zitat Nazir S, Colombo S, Manca D (2013) Testing and analyzing different training methods for industrial operators: an experimental approach. In: Andrzej K, Ilkka T (eds) Computer aided chemical engineering. Elsevier, pp 667–672 Nazir S, Colombo S, Manca D (2013) Testing and analyzing different training methods for industrial operators: an experimental approach. In: Andrzej K, Ilkka T (eds) Computer aided chemical engineering. Elsevier, pp 667–672
72.
Zurück zum Zitat Kaur A, Kaur A (2012) Comparison of mamdani-type and sugeno-type fuzzy inference systems for air conditioning system. Int J Soft Comput Eng 2(2):323–325 Kaur A, Kaur A (2012) Comparison of mamdani-type and sugeno-type fuzzy inference systems for air conditioning system. Int J Soft Comput Eng 2(2):323–325
73.
Zurück zum Zitat Zhang Y, Zheng Z, Lyu MR (2011) WSPred: A time-aware personalized QoS prediction framework for Web services. In: 2011 IEEE 22nd international symposium on software reliability engineering (ISSRE). IEEE Zhang Y, Zheng Z, Lyu MR (2011) WSPred: A time-aware personalized QoS prediction framework for Web services. In: 2011 IEEE 22nd international symposium on software reliability engineering (ISSRE). IEEE
74.
Zurück zum Zitat Sohaib O et al (2019) Cloud computing model selection for E-commerce enterprises using a new 2-tuple fuzzy linguistic decision-making method. Com Ind Eng 132:47–58 Sohaib O et al (2019) Cloud computing model selection for E-commerce enterprises using a new 2-tuple fuzzy linguistic decision-making method. Com Ind Eng 132:47–58
75.
Zurück zum Zitat Tzeng G-H, Shen K-Y (2017) New concepts and trends of hybrid multiple criteria decision making. CRC Press, Boca RatonMATH Tzeng G-H, Shen K-Y (2017) New concepts and trends of hybrid multiple criteria decision making. CRC Press, Boca RatonMATH
Metadaten
Titel
Cloud Marginal Resource Allocation: A Decision Support Model
verfasst von
Walayat Hussain
Osama Sohaib
Mohsen Naderpour
Honghao Gao
Publikationsdatum
18.12.2019
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 4/2020
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-019-01457-7

Weitere Artikel der Ausgabe 4/2020

Mobile Networks and Applications 4/2020 Zur Ausgabe

Neuer Inhalt