{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:26:38Z","timestamp":1754155598658,"version":"3.41.2"},"reference-count":49,"publisher":"Emerald","issue":"10","license":[{"start":{"date-parts":[[2016,11,7]],"date-time":"2016-11-07T00:00:00Z","timestamp":1478476800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["K"],"published-print":{"date-parts":[[2016,11,7]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Resource scheduling is the study of how to effectively measure, evaluate, analyze, and dispatch resources in order to meet the demands of corresponding tasks. Aiming at the problem of resource scheduling in the private cloud environment, the purpose of this paper is to propose a resource scheduling approach from an efficiency priority point of view.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>To measure the computational efficiencies for the resource nodes in a private cloud environment, the data envelopment analysis (DEA) approach is incorporated and a suitable DEA model is proposed. Then, based on the efficiency scores calculated by the proposed DEA model for the resource nodes, the 0-1 programming technique is introduced to build a simple resource scheduling model.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The proposed DEA model not only has the ability of ranking all the decision-making units into different positions but also can handle non-discretionary inputs and undesirable outputs when evaluating the resource nodes. Furthermore, the resource scheduling model can generate for the calculation tasks an optimal resource scheduling scheme that has the highest total computational efficiency.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title>\n<jats:p>The proposed method may also be used in studies of resource scheduling studies in the environments of public clouds and hybrid clouds.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>The proposed approach can achieve the goal of resource scheduling in private cloud computing platforms by attaining the highest total computational efficiency, which is very significant in practice.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This paper uses an efficiency priority point of view to solve the problem of resource scheduling in private cloud environments.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/k-04-2015-0108","type":"journal-article","created":{"date-parts":[[2016,12,2]],"date-time":"2016-12-02T05:48:12Z","timestamp":1480657692000},"page":"1524-1541","source":"Crossref","is-referenced-by-count":1,"title":["Resource scheduling in a private cloud environment: an efficiency priority perspective"],"prefix":"10.1108","volume":"45","author":[{"given":"Junfei","family":"Chu","sequence":"first","affiliation":[]},{"given":"Jie","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Qingyuan","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Jiasen","family":"Sun","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"10","key":"key2020051110350154600_ref001","doi-asserted-by":"crossref","first-page":"1261","DOI":"10.1287\/mnsc.39.10.1261","article-title":"A procedure for ranking efficient units in data envelopment analysis","volume":"39","year":"1993","journal-title":"Management Science"},{"issue":"4","key":"key2020051110350154600_ref002","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1287\/opre.34.4.513","article-title":"Efficiency analysis for exogenously fixed inputs and outputs","volume":"34","year":"1986","journal-title":"Operations Research"},{"issue":"3","key":"key2020051110350154600_ref003","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.comcom.2011.10.002","article-title":"Packet aggregation based network I\/O virtualization for cloud computing","volume":"35","year":"2012","journal-title":"Computer Communications"},{"issue":"2","key":"key2020051110350154600_ref151","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1080\/08823871.1998.10462318","article-title":"Measuring performance: an introduction to data envelopment analysis (DEA)","volume":"15","year":"1998","journal-title":"The Journal of Cost Analysis"},{"issue":"4","key":"key2020051110350154600_ref004","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1016\/j.is.2012.11.002","article-title":"Cost effectiveness of commercial computing clouds","volume":"38","year":"2013","journal-title":"Information Systems"},{"issue":"6","key":"key2020051110350154600_ref005","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/0377-2217(78)90138-8","article-title":"Measuring the efficiency of decision making units","volume":"2","year":"1978","journal-title":"European Journal of Operational Research"},{"key":"key2020051110350154600_ref006","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.omega.2014.12.001","article-title":"The enhanced Russell-based directional distance measure with undesirable outputs: numerical example considering CO 2 emissions","volume":"53","year":"2015","journal-title":"Omega"},{"issue":"2","key":"key2020051110350154600_ref008","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1016\/S0377-2217(00)00154-5","article-title":"Measuring ecological efficiency with data envelopment analysis (DEA)","volume":"132","year":"2001","journal-title":"European Journal of Operational Research"},{"issue":"1","key":"key2020051110350154600_ref009","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.aei.2005.01.004","article-title":"Comparison among five evolutionary-based optimization algorithms","volume":"19","year":"2005","journal-title":"Advanced Engineering Informatics"},{"issue":"4","key":"key2020051110350154600_ref010","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1111\/1467-8276.00510","article-title":"Nonparametric productivity analysis with undesirable outputs: comment","volume":"85","year":"2003","journal-title":"American Journal of Agricultural Economics"},{"issue":"1","key":"key2020051110350154600_ref011","doi-asserted-by":"crossref","first-page":"90","DOI":"10.2307\/1928055","article-title":"Multilateral productivity comparisons when some outputs are undesirable: a nonparametric approach","volume":"71","year":"1989","journal-title":"The Review of Economics and Statistics"},{"issue":"3","key":"key2020051110350154600_ref012","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/0305-0483(89)90029-7","article-title":"An application procedure for DEA","volume":"17","year":"1989","journal-title":"Omega"},{"issue":"4","key":"key2020051110350154600_ref013","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1007\/s11633-012-0664-y","article-title":"Task-resource scheduling problem","volume":"9","year":"2012","journal-title":"International Journal of Automation and Computing"},{"issue":"1","key":"key2020051110350154600_ref014","first-page":"42","article-title":"A new resource scheduling strategy based on genetic algorithm in cloud computing environment","volume":"7","year":"2012","journal-title":"Journal of Computers"},{"issue":"4","key":"key2020051110350154600_ref015","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1111\/1467-8276.00511","article-title":"Nonparametric productivity analysis with undesirable outputs: reply","volume":"85","year":"2003","journal-title":"American Journal of Agricultural Economics"},{"issue":"3","key":"key2020051110350154600_ref016","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1111\/0002-9092.00181","article-title":"Non-parametric productivity analysis with undesirable outputs: an application to the Canadian pulp and paper industry","volume":"83","year":"2001","journal-title":"American Journal of Agricultural Economics"},{"issue":"1-2","key":"key2020051110350154600_ref017","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/s11071-009-9629-2","article-title":"Parameter identification of chaotic systems using improved differential evolution algorithm","volume":"61","year":"2010","journal-title":"Nonlinear Dynamics"},{"key":"key2020051110350154600_ref018","doi-asserted-by":"crossref","unstructured":"Hua, Z. and Bian, Y. (2007), \u201cDEA with undesirable factors\u201d, in Zhu, J. and Cook, W.D. (Eds), Modeling Data Irregularities and Structural Complexities in Data Envelopment Analysis, Spring Science, Boston, MA, pp. 103-121.","DOI":"10.1007\/978-0-387-71607-7_6"},{"issue":"2","key":"key2020051110350154600_ref019","first-page":"480","article-title":"Survey on resource allocation policy and job scheduling algorithms of cloud computing","volume":"8","year":"2013","journal-title":"Journal of Software"},{"key":"key2020051110350154600_ref020","first-page":"48","article-title":"Supporting negotiation mechanism privacy authority method in cloud computing","volume":"41","year":"2013","journal-title":"Knowledge-Based Systems"},{"issue":"5","key":"key2020051110350154600_ref021","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1016\/j.asoc.2013.01.025","article-title":"Honey bee behavior inspired load balancing of tasks in cloud computing environments","volume":"13","year":"2013","journal-title":"Applied Soft Computing"},{"issue":"4","key":"key2020051110350154600_ref022","doi-asserted-by":"crossref","first-page":"1077","DOI":"10.1111\/j.1467-8276.2005.00788.x","article-title":"Weak disposability in nonparametric production analysis with undesirable outputs","volume":"87","year":"2005","journal-title":"American Journal of Agricultural Economics"},{"issue":"2","key":"key2020051110350154600_ref023","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1111\/j.1467-8276.2008.01238.x","article-title":"Weak disposability in nonparametric production analysis: reply to F\u00e4re and Grosskopf","volume":"91","year":"2009","journal-title":"American Journal of Agricultural Economics"},{"issue":"4","key":"key2020051110350154600_ref024","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1016\/j.compind.2013.02.008","article-title":"A ranking chaos algorithm for dual scheduling of cloud service and computing resource in private cloud","volume":"64","year":"2013","journal-title":"Computers in Industry"},{"key":"key2020051110350154600_ref025","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.omega.2015.03.009","article-title":"Two-stage DEA models with undesirable input-intermediate-outputs","volume":"56","year":"2015","journal-title":"Omega"},{"issue":"11","key":"key2020051110350154600_ref026","doi-asserted-by":"crossref","first-page":"2478","DOI":"10.1016\/j.cor.2011.12.015","article-title":"Data envelopment analysis based on maximin relative efficiency criterion","volume":"39","year":"2012","journal-title":"Computers & Operations Research"},{"issue":"12","key":"key2020051110350154600_ref027","doi-asserted-by":"crossref","first-page":"1620","DOI":"10.1287\/mnsc.37.12.1620","article-title":"Resource-use efficiency in public schools: a study of Connecticut data","volume":"37","year":"1991","journal-title":"Management Science"},{"issue":"2","key":"key2020051110350154600_ref028","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1016\/j.jbi.2009.08.014","article-title":"Cloud computing: a new business paradigm for biomedical information sharing","volume":"43","year":"2010","journal-title":"Journal of Biomedical Informatics"},{"issue":"3","key":"key2020051110350154600_ref029","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1016\/0377-2217(94)00346-7","article-title":"On the measurement of technical efficiency in the public sector","volume":"90","year":"1996","journal-title":"European Journal of Operational Research"},{"issue":"3","key":"key2020051110350154600_ref030","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1016\/S0377-2217(97)00306-8","article-title":"Non-discretionary inputs in data envelopment analysis","volume":"111","year":"1998","journal-title":"European Journal of Operational Research"},{"issue":"1","key":"key2020051110350154600_ref031","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1016\/S0377-2217(03)00403-X","article-title":"Performance evaluation when non-discretionary factors correlate with technical efficiency","volume":"159","year":"2004","journal-title":"European Journal of Operational Research"},{"issue":"1","key":"key2020051110350154600_ref032","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/S0377-2217(01)00293-4","article-title":"Modeling undesirable factors in efficiency evaluation","volume":"142","year":"2002","journal-title":"European Journal of Operational Research"},{"volume-title":"Robust Engineering","year":"2000","key":"key2020051110350154600_ref033"},{"issue":"3","key":"key2020051110350154600_ref034","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1016\/j.clsr.2010.03.002","article-title":"Digital evidence in cloud computing systems","volume":"26","year":"2010","journal-title":"Computer Law & Security Review"},{"issue":"12","key":"key2020051110350154600_ref035","doi-asserted-by":"crossref","first-page":"3045","DOI":"10.1016\/j.cor.2013.06.012","article-title":"Optimized task scheduling and resource allocation on cloud computing environment using improved differential evolution algorithm","volume":"40","year":"2013","journal-title":"Computers & Operations Research"},{"issue":"6","key":"key2020051110350154600_ref036","doi-asserted-by":"crossref","first-page":"1400","DOI":"10.1016\/j.jss.2012.01.019","article-title":"Comparison of scheduling schemes for on-demand IaaS requests","volume":"85","year":"2012","journal-title":"Journal of Systems and Software"},{"issue":"4","key":"key2020051110350154600_ref037","doi-asserted-by":"crossref","first-page":"909","DOI":"10.1016\/j.omega.2008.07.001","article-title":"DEA game cross-efficiency approach to Olympic rankings","volume":"37","year":"2009","journal-title":"Omega"},{"key":"key2020051110350154600_ref038","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.cie.2015.12.019","article-title":"Extended secondary goal models for weights selection in DEA cross-efficiency evaluation","volume":"93","year":"2016","journal-title":"Computers & Industrial Engineering"},{"issue":"20","key":"key2020051110350154600_ref039","first-page":"5590","article-title":"DEA cross-efficiency evaluation based on satisfaction degree: an application to technology selection","volume":"54","year":"2016","journal-title":"International Journal of Production Research"},{"issue":"12","key":"key2020051110350154600_ref040","doi-asserted-by":"crossref","first-page":"2146","DOI":"10.1057\/jors.2011.1","article-title":"A new approach in modelling undesirable output in DEA model & star","volume":"62","year":"2011","journal-title":"Journal of the Operational Research Society"},{"issue":"3","key":"key2020051110350154600_ref041","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1016\/S0377-2217(97)00076-3","article-title":"The effects of exogenous variables in efficiency measurement \u2013 a Monte Carlo study","volume":"105","year":"1998","journal-title":"European Journal of Operational Research"},{"issue":"11","key":"key2020051110350154600_ref042","doi-asserted-by":"crossref","first-page":"1638","DOI":"10.3923\/itj.2012.1638.1643","article-title":"Resource scheduling of cloud computing for node of wireless sensor network based on antcolony algorithm","volume":"11","year":"2012","journal-title":"Information Technology Journal"},{"issue":"2","key":"key2020051110350154600_ref043","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1016\/j.ejor.2015.03.036","article-title":"Undesirable outputs and weighting schemes in composite indicators based on data envelopment analysis","volume":"245","year":"2015","journal-title":"European Journal of Operational Research"},{"issue":"16","key":"key2020051110350154600_ref044","doi-asserted-by":"crossref","first-page":"214","DOI":"10.4156\/jcit.vol7.issue16.26","article-title":"Study on the resource allocation algorithm based on ant colony optimization","volume":"7","year":"2012","journal-title":"Journal of Convergence Information Technology"},{"key":"key2020051110350154600_ref045","doi-asserted-by":"crossref","unstructured":"Dorigo, M. and St\u00fctzle, T. (2003), \u201cThe ant colony optimization metaheuristic: algorithms, applications, and advances\u201d, in Glover, F. and Kochenberger, G.A. (Eds), Handbook of Metaheuristics, Springer, New York, NY, pp. 250-285.","DOI":"10.1007\/0-306-48056-5_9"},{"issue":"1","key":"key2020051110350154600_ref046","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1016\/S0377-2217(03)00191-7","article-title":"Modeling undesirable factors in efficiency evaluation: comment","volume":"157","year":"2004","journal-title":"European Journal of Operational Research"},{"issue":"2","key":"key2020051110350154600_ref047","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1016\/S0377-2217(99)00429-4","article-title":"Efficiency measurement in the stochastic frontier model","volume":"129","year":"2001","journal-title":"European Journal of Operational Research"},{"issue":"4","key":"key2020051110350154600_ref048","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1016\/j.future.2011.10.001","article-title":"Using clouds to scale grid resources: an economic model","volume":"28","year":"2012","journal-title":"Future Generation Computer Systems"},{"issue":"6","key":"key2020051110350154600_ref049","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSP.2010.186","article-title":"Security and privacy challenges in cloud computing environments","volume":"8","year":"2010","journal-title":"IEEE Security and Privacy"}],"container-title":["Kybernetes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/K-04-2015-0108","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-04-2015-0108\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/K-04-2015-0108\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:47:41Z","timestamp":1753393661000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/k\/article\/45\/10\/1524-1541\/273043"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,7]]},"references-count":49,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2016,11,7]]}},"alternative-id":["10.1108\/K-04-2015-0108"],"URL":"https:\/\/doi.org\/10.1108\/k-04-2015-0108","relation":{},"ISSN":["0368-492X"],"issn-type":[{"type":"print","value":"0368-492X"}],"subject":[],"published":{"date-parts":[[2016,11,7]]}}}