dc.contributor.author | Xu, Xiaolong | |
dc.contributor.author | Geng, Qingfan | |
dc.contributor.author | Cao, Hao | |
dc.contributor.author | Mo, Ruichao | |
dc.contributor.author | Wan, Shaohua | |
dc.contributor.author | Qi, Lianyong | |
dc.contributor.author | Wang, Hao | |
dc.date.accessioned | 2020-01-16T07:48:13Z | |
dc.date.available | 2020-01-16T07:48:13Z | |
dc.date.created | 2020-01-15T12:23:23Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | Communications in Computer and Information Science. 2019, 1123 217-230. | nb_NO |
dc.identifier.issn | 1865-0929 | |
dc.identifier.uri | http://hdl.handle.net/11250/2636537 | |
dc.description.abstract | In edge computing, the workflow is used to simulate and manage computing tasks as well as information exchange for compute-intensive and data-intensive application, which is convenient for the various complex process to work orderly. However, the resource conflict among cooperative works of multiple mobile edge computing (MEC) nodes by workflow, together with the service failure and the performance degradation, bring about additional uncertainties of scheduling strategies. Consequently, such uncertainties delay the completion of tasks and spoil the user experience. To deal with that issue, we propose a blockchain-powered resource provisioning (BPRP) method to design policies for workflows in the edge computing environment. Technically, we use the directed acyclic graph to indicate workflows of each edge node and regard its scheduling strategy as an individual gene to adapt to the following algorithm. Then, we use the non-dominated sorting genetic algorithm-III (NSGA-III) to optimize the workflow scheduling strategies on the basis of tasks’ timely completion with good quality. A large number of experiments were carried out to verify the effectiveness of our method. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Springer | nb_NO |
dc.title | Blockchain-Powered Service Migration for Uncertainty-Aware Workflows in Edge Computing | nb_NO |
dc.type | Journal article | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.description.version | acceptedVersion | nb_NO |
dc.source.pagenumber | 217-230 | nb_NO |
dc.source.volume | 1123 | nb_NO |
dc.source.journal | Communications in Computer and Information Science | nb_NO |
dc.identifier.doi | 10.1007/978-981-15-1304-6_18 | |
dc.identifier.cristin | 1773603 | |
dc.description.localcode | This is a post-peer-review, pre-copyedit version of an article. The final authenticated version is available online at: 10.1007/978-981-15-1304-6_18 | nb_NO |
cristin.unitcode | 194,63,10,0 | |
cristin.unitname | Institutt for datateknologi og informatikk | |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |