Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...
Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...
Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
ased temporal consistency model. Accordingly, new definitions <strong>and</strong> the<br />
minimum probability time redundancy based checkpoint selection strategy <strong>and</strong><br />
probability temporal consistency based temporal verification strategy are<br />
provided. Based on our improvement, only one type <strong>of</strong> checkpoints needs to be<br />
selected instead <strong>of</strong> previous multiple ones, <strong>and</strong> only one type <strong>of</strong> temporal<br />
consistency states needs to be verified instead <strong>of</strong> previous multiple ones. The<br />
theoretical pro<strong>of</strong> has demonstrated that our adapted strategy is <strong>of</strong> the same<br />
necessity <strong>and</strong> sufficiency as the existing state-<strong>of</strong>-the-art checkpoint selection<br />
strategy but with better cost effectiveness.<br />
• Chapter 7 presented an adaptive temporal violation h<strong>and</strong>ling point selection<br />
strategy which is a novel idea proposed in this thesis. Based on the selected<br />
necessary <strong>and</strong> sufficient checkpoints, we further select a subset <strong>of</strong> them where<br />
the probability <strong>of</strong> temporal violations is above specific threshold, i.e. temporal<br />
violation h<strong>and</strong>ling is indeed necessary, as temporal violation h<strong>and</strong>ling points.<br />
The simulation experiments demonstrated that our temporal violation h<strong>and</strong>ling<br />
point selection strategy can select much fewer temporal violation h<strong>and</strong>ling points<br />
than the conventional strategies while maintaining satisfactory temporal QoS.<br />
• Chapter 8 presented an overview <strong>of</strong> temporal violation h<strong>and</strong>ling strategies for<br />
temporal violations. Given the basic requirements <strong>of</strong> automation <strong>and</strong> costeffectiveness,<br />
we proposed a general two-stage local workflow rescheduling<br />
strategy which features a two-stage searching process with metaheuristic<br />
algorithms. Furthermore, two metaheuristics algorithms, viz. genetic algorithm<br />
(GA) <strong>and</strong> ant colony optimisation (ACO), are adapted <strong>and</strong> implemented in the<br />
general strategy, <strong>and</strong> then their performances are compared comprehensively.<br />
Furthermore, the three-level temporal violation h<strong>and</strong>ling strategy which consists<br />
<strong>of</strong> three levels <strong>of</strong> temporal violations , viz. level I, level II <strong>and</strong> level III, <strong>and</strong> their<br />
corresponding h<strong>and</strong>ling strategies, viz. PTDA, ACOWR <strong>and</strong> PTDA+ACOWR, is<br />
proposed. The experimental results have shown that our strategy can ensure<br />
close to 0% global <strong>and</strong> local temporal violation rates, thus achieve high temporal<br />
QoS in scientific cloud workflow systems.<br />
In summary, wrapping up all chapters, we can conclude that with the research<br />
165