为了解决复杂任务群调度过程中资源利用不均、任务完成时间较长等问题,以最小化资源负载均方差和最小化任务群完成时间为目标构建复杂任务群资源调度模型,提出一种融合局部搜索和Pareto支配的多目标优化算法BRLSN(multi-objective optimization based on boundary range local search and NSGA-Ⅱ,BRLSN)。该算法采用有效的编码方式与交叉变异算子进行迭代寻优,并利用基于边界区域局部搜索的精英保留策略扩大算法搜索范围,保存种群优良个体。实验结果表明,BRLSN相较于其他多目标算法在收敛性和多样性上有显著的提升,同时算法收敛速度更快,种群质量更高,明显优化了最终目标函数的结果值。
To enhance user perceived performance,Akamai' s content distribution network(CDN) utilizes the domain name system(DNS) effectively to redirect users to close-by content replicas over short time scale.The use of DNS redirection has brought a significant advantage to Akamai' s CDN.However,the reliance on DNS also poses a fundamental threat to Akamai' s content distribution model.In particular,systematic evaluation and quantification illustrates the impact of recent emerging public DNS resolving services on Akamai' s CDN,including the degradation of corresponding user perceived performance and the benefit damnification of collaborating internet services providers(ISPs) that host Akamai's edge servers.The measurement demonstrates that a considerable penetration of public DNS resolving services(e.g.,OpenDNS and GoogleDNS) effectively corrupts the Akamai' s serving model,namely the large-scale server distribution and quick DNS redirection.
A scheme is proposed for quantum information splitting of a two-qubit Bell state by using a four-qubit entangled state as a quantum channel. In the scenario, it is supposed that there are three legitimate parties, say Alice, Bob and Charlie. Alice is the sender of quantum information. Bob and Charlie are two agents. Alice first performs GHZ state measurement and tells Bob and Charlie the measurement results via a classical channel. It is impossible for Bob to reconstruct the original state with local operations unless help is obtained from Charlie. If Charlie allows Bob to reconstruct the original state information, he needs to perform a single-qubit measurement and tell Bob the measurement result. Using the measurement results from Alice and Charlie, Bob can reconstruct the original state. We also consider the problem of security attacks. This protocol is considered to be secure.