[1] |
FOSTER I, ZHAO Y, RAICU I, et al. Cloud computing and grid computing 360-degree compared[C]. 2008 grid computing environments workshop. IEEE, 2008: 1-10.
|
[2] |
BOTTA A, DE DONATO W, PERSICO V, et al. Integration of cloud computing and internet of things:a survey[J]. Future generation computer systems, 2016, 56: 684-700.
|
[3] |
LIU Y, LIU X, ZHOU W, et al. A Survey on Resource Management in Cloud Computing:Taxonomy, Challenges, and Future Directions[J]. IEEE Transactions on Parallel and Distributed Systems, 2020, 31(4): 839-857.
|
[4] |
黄秋兰, 李海波, 石京燕, 等. 基于Openstack的高能物理虚拟计算集群系统及应用[J]. 计算机科学, 2017, 44(10): 59-63.
doi: 10.11896/j.issn.1002-137X.2017.10.011
|
[5] |
SEFRAOUI O, AISSAOUI M, ELEULDJ M, et al. Openstack: toward an open-source solution for cloud computing[J]. International Journal of Computer Applications, 2012, 55(3): 38-42.
|
[6] |
KIVITY A, KAMAY Y, LAOR D, et al. kvm: the linux virtual machine monitor[C]. Proceedings of the Linux symposium:volume 1. Dttawa, Dntorio, Canada, 2007: 225-230.
|
[7] |
LI H, CHENG Y, HUANG Q, et al. Integration of openstack cloud resources in bes iii computing cluster[C]. Journal of Physics: Conference Series: volume 898.IOP Publishing, 2017: 062033.
|
[8] |
LOOPE J. MANAGING infrastructure with puppet: configuration management at scale[M]. O’Reilly Media, Inc, 2011.
|
[9] |
ERICKSON R, FIENEN M, MCCALLA S, et al. Wrangling distributed computing for highthroughput environmental science: An introduction to htcondor[J]. PLoS computational biology, 2018, 14(10): e1006468.
|
[10] |
BIRD I, CARMINATI F, MOUNT R, et al. Update of the computing models of the wlcg and the lhc experiments[R]. 2014.
|
[11] |
BELL T, BOMPASTOR B, BUKOWIEC S, et al. Scaling the cern openstack cloud[C]. Journal of Physics: Conference Series: volume 664. IOP Publishing, 2015: 022003.
|
[12] |
SHAH S, KHAN M. A comprehensive survey on token-based authentication mechanisms for cloud computing[J]. Journal of Network and Computer Applications, 2019, 142: 1-17.
|
[13] |
GUPTA A, VETTER J. IOMMU: An Effective Remedy for Security Vulnerabilities and Performance Overheads in Modern I/O Devices[J]. IEEE Transactions on Parallel and Distributed Systems, 2018, 29(9): 2058-2072.
|
[14] |
DONG F, WU J, WANG X, et al. SR-IOV based Virtualized NICs: Architecture, Design and Implementation[J]. Journal of Network and Computer Applications, 2015, 55: 105-115.
|