Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014, Article ID 404681, 8 pages
http://dx.doi.org/10.1155/2014/404681
Research Article

A Strategy Optimization Approach for Mission Deployment in Distributed Systems

1College of Computer Science and Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
2College of Software Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China

Received 16 October 2014; Accepted 5 November 2014; Published 23 November 2014

Academic Editor: Hui Zhang

Copyright © 2014 Liu Xiaojian et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. R. Grimaila, R. F. Mills, M. Haas, and D. Kelly, “Mission assurance: issues and challenges,” Report Documentation, Air Force Institute of Technology, Wright-Patterson, AFB Ohio Center for Cyberspace Research, 2010. View at Google Scholar
  2. M. Albanese, S. Jajodia, R. Jhawar, and V. Piuri, “Reliable mission deployment in vulnerable distributed systems,” in Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W '13), pp. 1–8, IEEE, Budapest, Hungary, June 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. O. H. Ibarra and C. E. Kim, “Heuristic algorithms for scheduling independent tasks on nonidentical processors,” Journal of the Association for Computing Machinery, vol. 24, no. 2, pp. 280–289, 1977. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  4. R. Armstrong, D. Hensgen, and T. Kidd, “The relative performance of various mapping algorithms is independent of sizable variances in run-time predictions,” in Proceedings of the 7th Heterogeneous Computing Workshop (HCW '98), pp. 79–87, Orlando, Fla, USA, March 1998.
  5. V. M. Lo, “Heuristic algorithms for task assignment in distributed systems,” IEEE Transactions on Computers, vol. 37, no. 11, pp. 1384–1397, 1988. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  6. S. Srinivasan and N. K. Jha, “Safety and reliability driven task allocation in distributed systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 10, no. 3, pp. 238–251, 1999. View at Publisher · View at Google Scholar · View at Scopus
  7. T. Xie, X. Qin, and A. Sung, “SAREC: a security-aware scheduling strategy for real-time applications on clusters,” in Proceedings of the International Conference on Parallel Processing, pp. 5–12, Oslo, Norway, June 2005. View at Publisher · View at Google Scholar · View at Scopus
  8. S.-W. Xiong, Y.-X. Zhao, and N. Xu, “SAREC-GA: a security-aware real-time scheduling algorithm with genetic algorithm,” in Proceedings of the International Conference on Machine Learning and Cybernetics (ICMLC '07), vol. 6, pp. 3122–3127, Hong Kong, August 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. Z. Shuai, H. Zhang, J. Wang, J. Li, and M. Ouyang, “Lateral motion control for four-wheel-independent-drive electric vehicles using optimal torque allocation and dynamic message priority scheduling,” Control Engineering Practice, vol. 24, no. 1, pp. 55–66, 2014. View at Publisher · View at Google Scholar · View at Scopus
  10. H. Zhang, Y. Shi, and A. Saadat Mehr, “Robust static output feedback control and remote PID design for networked motor systems,” IEEE Transactions on Industrial Electronics, vol. 58, no. 12, pp. 5396–5405, 2011. View at Publisher · View at Google Scholar · View at Scopus
  11. H. Zhang, Y. Shi, and M. Liu, “H step tracking control for networked discrete-time nonlinear systems with integral and predictive actions,” IEEE Transactions on Industrial Informatics, vol. 9, no. 1, pp. 337–345, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. Z. Shuai, H. Zhang, J. Wang, J. Li, and M. Ouyang, “Combined AFS and DYC control of four-wheel-independent-drive electric vehicles over CAN Network with time-varying delays,” IEEE Transactions on Vehicular Technology, vol. 63, no. 2, pp. 591–602, 2014. View at Publisher · View at Google Scholar · View at Scopus
  13. H. Zhang, Y. Shi, and J. Wang, “On energy-to-peak filtering for nonuniformly sampled nonlinear systems: a markovian jump system approach,” IEEE Transactions on Fuzzy Systems, vol. 22, no. 1, pp. 212–222, 2014. View at Publisher · View at Google Scholar · View at Scopus
  14. H. Zhang and J. Wang, “State estimation of discrete-time Takagi-Sugeno fuzzy systems in a network environment,” IEEE Transactions on Cybernetics, 2014. View at Publisher · View at Google Scholar
  15. R. B. Myerson, Game Theory: Analysis of Conflict, Harvard University Press, 1991. View at MathSciNet
  16. P. F. Syverson, “A different look at secure distributed computation,” in Proceedings of the 10th IEEE Computr Security Foundations Workshop (CSFW '97), pp. 109–115, June 1997. View at Scopus
  17. P. Liu, W. Zang, and M. Yu, “Incentive-based modeling and inference of attacker intent, objectives, and strategies,” ACM Transactions on Information and System Security, vol. 8, no. 1, pp. 78–118, 2005. View at Publisher · View at Google Scholar · View at Scopus
  18. J. Mirkovic and P. Reiher, “A taxonomy of ddos attack and ddos defense mechanisms,” Computer Communication Review, vol. 34, no. 2, 2004. View at Google Scholar
  19. J. Xu and W. Lee, “Sustaining availability of web services under distributed denial of service attacks,” IEEE Transactions on Computers, vol. 52, no. 2, pp. 195–208, 2003. View at Publisher · View at Google Scholar · View at Scopus
  20. K.-W. Lye and J. M. Wing, “Game strategies in network security,” International Journal of Information Security, vol. 4, no. 1-2, pp. 71–86, 2005. View at Publisher · View at Google Scholar · View at Scopus
  21. S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu, “A survey of game theory as applied to network security,” in Proceedings of the 43rd Annual Hawaii International Conference on System Sciences (HICSS '43), pp. 1–10, January 2010. View at Publisher · View at Google Scholar · View at Scopus
  22. JP1-02, “Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms,” October 2009.
  23. M. B. Donley, “Problems of defense organization and management,” Joint Forces Quarterly, vol. 8, pp. 86–94, 1995. View at Google Scholar
  24. W. Lee, W. Fan, M. Miller, S. J. Stolfo, and E. Zadok, “Toward cost-sensitive modeling for intrusion detection and response,” Journal of Computer Security, vol. 10, no. 1-2, pp. 5–22, 2002. View at Google Scholar · View at Scopus
  25. J. Kennedy and R. Eberhart, “Particle swarm optimization,” in Proceedings of the IEEE International Conference on Neural Networks, pp. 1942–1948, December 1995. View at Scopus
  26. Y. Shi and R. Eberhart, “A modified particle swarm optimizer,” in Proceedings of the IEEE World Congress on Computational Intelligence, Evolutionary Computation Proceedings, pp. 69–73, 1998.
  27. K. A. De Jong, Analysis of the behavior of a class of genetic adaptive systems [Doctoral dissertation], 1975.
  28. E. Dekel and S. Scotchmer, “On the evolution of optimizing behavior,” Journal of Economic Theory, vol. 57, no. 2, pp. 392–406, 1992. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  29. H. Xu, Y. Ding, and Z. Hu, “Evolutionary design of combinational circuit based on game genetic algorithm,” Journal of Computer Applications, vol. 3, p. 079, 2009. View at Google Scholar