Paper
20 October 2022 Negative feedback scheduling algorithm based on similarity and historical performance
Weiwei Miao, Zeng Zeng, Rui Zhang, Zesheng Xi
Author Affiliations +
Proceedings Volume 12350, 6th International Workshop on Advanced Algorithms and Control Engineering (IWAACE 2022); 123502J (2022) https://doi.org/10.1117/12.2653167
Event: 6th International Workshop on Advanced Algorithms and Control Engineering (IWAACE 2022), 2022, Qingdao, China
Abstract
The existing scheduling strategies do not have enough granularity in the division of execution units, and can not flexibly use the attack feedback information. Lack of security to some extent. Therefore, this paper proposes a scheduling algorithm considering the similarity between components and the historical performance of executors. Firstly, a specific component similarity quantification method is designed to improve the heterogeneous differentiation of executors. Then, the historical work performance is incorporated into the executor scheduling strategy to improve the utilization efficiency and system security of the executor. Finally, two attributes are integrated to calculate the comprehensive score. Experiments show that compared with existing algorithms, this method can better distinguish similar executors. At the same time, it dynamically adjusts the selection of executors through the attack feedback information, taking into account the system dynamics and security, and has good practicality.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Weiwei Miao, Zeng Zeng, Rui Zhang, and Zesheng Xi "Negative feedback scheduling algorithm based on similarity and historical performance", Proc. SPIE 12350, 6th International Workshop on Advanced Algorithms and Control Engineering (IWAACE 2022), 123502J (20 October 2022); https://doi.org/10.1117/12.2653167
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Defense and security

Network security

Computer programming

Computer programming languages

Negative feedback

Actuators

RELATED CONTENT

Cyber defense through hardware security
Proceedings of SPIE (May 09 2018)
Campus network security model study
Proceedings of SPIE (January 13 2012)
NSL: a network-security-oriented language
Proceedings of SPIE (February 08 2005)

Back to Top