{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:23:54Z","timestamp":1742963034090,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642212703"},{"type":"electronic","value":"9783642212710"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21271-0_1","type":"book-chapter","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T12:21:50Z","timestamp":1310559710000},"page":"1-24","source":"Crossref","is-referenced-by-count":0,"title":["Task Allocation Oriented Users Decisions in Computational Grid"],"prefix":"10.1007","author":[{"given":"Joanna","family":"Ko\u0142odziej","sequence":"first","affiliation":[]},{"given":"Fatos","family":"Xhafa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Abraham, A., Buyya, R., Nath, B.: Nature\u2019s heuristics for scheduling jobs on computational grids. In: Proc. of the 8th IEEE International Conference on Advanced Computing and Communications, pp. 45\u201352 (2000)"},{"issue":"1","key":"1_CR2","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.jnca.2005.06.001","volume":"30","author":"A. Abraham","year":"2007","unstructured":"Abraham, A., Jainb, R., Thomasc, J., Hana, S.Y.: D-SCIDS: Distributed soft computing intrusion detection system. Journal of Network and Computer Applications\u00a030(1), 81\u201398 (2007)","journal-title":"Journal of Network and Computer Applications"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Ali, S., Siegel, H.J., Maheswaran, M., Hensgen, D.: Task execution time modeling for heterogeneous computing systems. In: Proceedings of Heterogeneous Computing Workshop, pp. 185\u2013199 (2000)","DOI":"10.1109\/HCW.2000.843743"},{"key":"1_CR4","volume-title":"Dynamic Non-cooperative Game Theory","author":"T. Ba\u00e7sar","year":"1995","unstructured":"Ba\u00e7sar, T., Olsder, G.J.: Dynamic Non-cooperative Game Theory, 2nd edn. Academic Press, London (1995)","edition":"2"},{"key":"1_CR5","unstructured":"Bonet, B.: An Epsilon-Optimal Grid-Based Algorithm for Partially Observable Markov Decision Processes. In: Proc. of International Conference on Machine Learning - ICML 2002, pp. 51\u201358 (2002)"},{"key":"1_CR6","doi-asserted-by":"publisher","DOI":"10.1002\/9780470455432","volume-title":"Market Oriented Grid and Utility Computing","author":"R. Buyya","year":"2009","unstructured":"Buyya, R., Bubendorfer, K.: Market Oriented Grid and Utility Computing. Wiley Press, Chichester (2009)"},{"key":"1_CR7","unstructured":"http:\/\/knowledge.eu-egi.eu\/knowledge\/index.php"},{"key":"1_CR8","unstructured":"Garg, S.K., Buyya, R., Segel, H.J.: Scheduling Parallel Aplications on Utility Grids: Time and Cost Trade-off Management. In: Mans, B. (ed.) Proc. of the 32nd ACSC, vol.\u00a091, pp. 139\u2013147. ACS (2009)"},{"key":"1_CR9","unstructured":"Ghosh, P., Roy, N., Basu, K., Das, S.K.: A Game Theory based Pricing Strategy for Job Allocation in Mobile Grids. In: Proc. of the 18th IEEE International Parallel and Distributed Processing Symposium (IPDPS 2004), Santa Fe, New Mexico (2004)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Khan, S.U., Ahmad, I.: Non-cooperative, semi-cooperative, and cooperative games-based grid resource allocation. In: Proceedings of International Parallel and Distributed Proceedings Symposium (IPDPS 2006), pp. 101\u2013104 (2006)","DOI":"10.1109\/IPDPS.2006.1639358"},{"key":"1_CR11","first-page":"93","volume-title":"Proc. of CISIS 2010","author":"J. Ko\u0142odziej","year":"2010","unstructured":"Ko\u0142odziej, J., Xhafa, F.: A game-theoretic and hybrid genetic meta-heuristic model for security-assured scheduling of independent jobs in computational grids. In: Barolli, L., Xhafa, F., Venticinque, S. (eds.) Proc. of CISIS 2010, pp. 93\u2013100. IEEE Press, Los Alamitos (2010)"},{"key":"1_CR12","first-page":"108","volume-title":"Proc. of 23rd ECMS","author":"J. Ko\u0142odziej","year":"2009","unstructured":"Ko\u0142odziej, J., Xhafa, F., Kolanko, \u0141.: Hierarchic genetic scheduler of independent jobs in computational grid environment. In: Otamendi, J., Bargie\u0142, A. (eds.) Proc. of 23rd ECMS, Madrid, June 9-12, pp. 108\u2013115. IEEE Press, Los Alamitos (2009)"},{"issue":"5","key":"1_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TPDS.2007.1086","volume":"18","author":"Y.-K. Kwok","year":"2007","unstructured":"Kwok, Y.-K., Hwang, K., Song, S.: Selfish Grids: Game-Theoretic Modeling and NAS\/PSA Benchmark Evaluation. IEEE Transactions on Parallel and Distributing Systems\u00a018(5), 1\u201316 (2007)","journal-title":"IEEE Transactions on Parallel and Distributing Systems"},{"issue":"1","key":"1_CR14","first-page":"91","volume":"14","author":"K. Mesghouni","year":"2004","unstructured":"Mesghouni, K., Hammadi, S., Borne, P.: Evolutionary alogorithms for job-shop scheduling. Int. J. Appl. Math. Comput. Sci.\u00a014(1), 91\u2013103 (2004)","journal-title":"Int. J. Appl. Math. Comput. Sci."},{"key":"1_CR15","volume-title":"Meta-heuristics for Scheduling in Distributed Computing Environments","author":"D. Montana","year":"2008","unstructured":"Montana, D., Zinky, J.: Optimizing Routing and Backlogs for Job Flows in a Distributed Computing Environment. In: Xhafa, F., Abraham, A. (eds.) Meta-heuristics for Scheduling in Distributed Computing Environments, Springer, Heidelberg (2008)"},{"key":"1_CR16","unstructured":"Norman, M.: Types of grid users and the Customer-Service Provider relationship: a future picture of grid use. In: Cox, J. (ed.) Proc. of the UK e-Science All Hands Meeting, Nottingham, September 18-21, pp. 37\u201344 (2006)"},{"key":"1_CR17","unstructured":"Ritchie, G., Levine, J.: A fast effective local search for scheduling independent jobs in heterogeneous computing environments, Technical Report, Centre for Intelligent System and their Applications, School of Informatics, University of Edinburgh (2003)"},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1137\/S0097539701397059","volume":"2","author":"T. Roughgarden","year":"2004","unstructured":"Roughgarden, T.: Stackelberg scheduling strategies. SIAM Journal on Computing\u00a02, 332\u2013350 (2004)","journal-title":"SIAM Journal on Computing"},{"key":"1_CR19","first-page":"70","volume":"15","author":"A. Shelestov","year":"2008","unstructured":"Shelestov, A., Skakun, S., Kussul, O.: Intelligent Model of user Behavior in Distributed Systems. Int. Journal on \u201cInformation Theories and Applications\u201d\u00a015, 70\u201375 (2008)","journal-title":"Int. Journal on \u201cInformation Theories and Applications\u201d"},{"key":"1_CR20","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.jpdc.2009.09.003","volume":"70","author":"R. Subrata","year":"2010","unstructured":"Subrata, R., Zomaya, A.Y., Landfeldt, B.: Cooperative power-aware scheduling in grid computing environments. J. Parallel Distrib. Comput.\u00a070, 84\u201391 (2010)","journal-title":"J. Parallel Distrib. Comput."},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-540-30207-0_43","volume-title":"Grid and Cooperative Computing - GCC 2004 Workshops","author":"L. Wang","year":"2004","unstructured":"Wang, L., Wei, L., Liao, X.-K., Wang, H.: AT-RBAC: An Authentication Trustworthiness-Based RBAC Model. In: Jin, H., Pan, Y., Xiao, N., Sun, J. (eds.) GCC 2004. LNCS, vol.\u00a03252, pp. 343\u2013350. Springer, Heidelberg (2004)"},{"key":"1_CR22","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1016\/j.future.2009.11.005","volume":"26","author":"F. Xhafa","year":"2010","unstructured":"Xhafa, F., Abraham, A.: Computational models and heuristic methods for grid scheduling problems. Future Generation Computer Systems\u00a026, 608\u2013621 (2010)","journal-title":"Future Generation Computer Systems"},{"issue":"5","key":"1_CR23","first-page":"1","volume":"3","author":"F. Xhafa","year":"2007","unstructured":"Xhafa, F., Carretero, J., Abraham, A.: Genetic Algorithm Based Schedulers for Grid Computing Systems. International Journal of Innovative Computing, Information and Control\u00a03(5), 1\u201319 (2007)","journal-title":"International Journal of Innovative Computing, Information and Control"},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-642-02319-4_34","volume-title":"Hybrid Artificial Intelligence Systems","author":"F. Xhafa","year":"2009","unstructured":"Xhafa, F., Gonzalez, J.A., Dahal, K.P., Abraham, A.: A GA(TS) hybrid algorithm for scheduling in computational grids. In: Corchado, E., Wu, X., Oja, E., Herrero, \u00c1., Baruque, B. (eds.) HAIS 2009. LNCS, vol.\u00a05572, pp. 285\u2013292. Springer, Heidelberg (2009)"},{"key":"1_CR25","unstructured":"Zhang, G., Sun, J.: Grid intrusion detection based on soft computing by modeling real-user\u2019s normal behaviors. In: Proc. of IEEE International Conference on Granular Computing 2006, pp. 558\u2013561 (2006)"}],"container-title":["Studies in Computational Intelligence","Intelligent Decision Systems in Large-Scale Distributed Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21271-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:30:22Z","timestamp":1741314622000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-21271-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642212703","9783642212710"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21271-0_1","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2011]]}}}