A Survey on Scheduling Algorithms in Cloud Computing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: Cloud Computing is every Where .Cloud Computing gets its name as metaphor for the Internet and it has changed the model of storing and managing data for scalable, real time ,internet based applications and Resources satisfying end users needs. Cloud computing services are usually backed by large-scale data centers are built to serve many users and many disparate Applications, for this we are considering Virtualization a s a perfect match. Resource Scheduling is a complicated task in cloud computing environment because there are many alternative computers with varying capacities. in this paper a review was performed on the Existing Scheduling Algorithms. limitations with existing Systems was list out. As a future enhancement a new Algorithm will develop.
Authors and Affiliations
Mrs. M. Padmavathi , Shaik. Mahabbob Basha, Professor , Mr. Srinivas Pothapragada, CEO of Ostilio
Real Time Zetta Bytes -Universal Memory ASIC SOC IP Core Design Implementation using VHDL and Verilog HDL for High Capacity Data Computing Processors like Cloud/Cluster/Super VLIW Parallel Distributing Pipelined Array Computing Processors
Abstract: The main intention is RTL Design Architecture and HDL Design Implementation of Zetta Bytes Memory ASIC SOC IP Core for Advanced Parallel Array Distributed Pipelined Array Computing /Cloud Computing / Super VLIW...
Performance measurement of MANET routing protocols underBlackhole security attack
Abstract: Unlike wired networks or other wireless networks, where the nodes communicate with each other viaan access point or a base station, wireless Mobile ad hoc network is an infrastructure less network where t...
Simulation of Denial of Service (DoS) Attack using Matlab and Xilinx
Abstract: As the Internet is growing – so is the vulnerability of the network. Companies now days are spending huge amount of money to protect their sensitive data from different attacks that they face. DoS or Deni...
Foreground detection by using multi features
Abstract: Foreground detection is an essential task in many applications and a commonly used approach to obtain foreground objects from the background. Many techniques exist, but due to shadows and changes in illum...
Analysis of Titles from the Questions of the Stack OverflowCommunity Using Natural Language Processing (NLP)Techniques
Abstract: Major online “Question and Answer” forums have proven to be of enormous help to programmersand developers from all parts of the world. One such important forum is the Stack Overflow community. In thispaper, we...