Research Article
Dynamic Security Exchange Scheduling Model for Business Workflow Based on Queuing Theory in Cloud Computing
Table 1
Total waiting time by
M/
G/
k/
l-
model with different arrival and service rates for all tasks.
| λ | 0.1 | 0.2 | 0.3 | 0.4 | 0.5 | 0.6 | 0.7 | 0.8 | 0.9 |
| 0.1 | 83.3 | — | — | — | — | — | — | — | — | 0.2 | 33.3 | 41.7 | — | — | — | — | — | — | — | 0.3 | 21.4 | 23.4 | 27.8 | — | — | — | — | — | — | 0.4 | 15.9 | 16.7 | 18.2 | 20.8 | — | — | — | — | — | 0.5 | 12.6 | 13.0 | 13.8 | 14.9 | 16.9 | — | — | — | — | 0.6 | 10.5 | 10.7 | 11.1 | 11.8 | 12.6 | 13.9 | — | — | — | 0.7 | 9.0 | 9.1 | 9.4 | 9.8 | 10.3 | 10.9 | 11.9 | — | — | 0.8 | 7.8 | 7.9 | 7.9 | 8.3 | 8.7 | 9.1 | 9.7 | 10.4 | — | 0.9 | 7.1 | 7.1 | 7.1 | 7.3 | 7.5 | 7.8 | 8.2 | 8.6 | 9.3 |
|
|