Research Article
Scheduling Parallel Intrusion Detecting Applications on Hybrid Clouds
Table 1
Notations for problem description.
| Notations | Indications | Notations | Indications |
| | Private cloud | | -th public cloud |
| | Total number of public clouds | | -th VM type |
| | Total number of VM types | | Amount of CPU of |
| | Amount of Memory of | | Price of provided by |
| | -th application | | Total number of applications |
| | Task number of | | completion time of |
| | -th task of | | Runtime of |
| | Start time of | | completion time of |
| / | Capacity of CPU/Memory in | | Time slot |
| | Budget | | A variable : requires : otherwise |
| | A decision variable : is dispatched to : otherwise | | A decision variable : is executed at slot on : otherwise |
|
|