›› 2012, Vol. 42 ›› Issue (05): 1302-1308.

Previous Articles     Next Articles

Grid resource management model based on combinatorial double auction with virtual seller

LIU Yuan, MA Xiao-lei, LIU Yuan-an, LI Bao-gang   

  1. School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Received:2011-10-28 Online:2012-09-01 Published:2012-09-01

Abstract: A grid resource Management model based on Combinatorial Double Auction with Virtual Seller (MCDA+VS) is proposed. In MCDA+VS mechanism, a dynamic bidding strategy is established to afford participants opportunities of re-bidding in different round of an auction. As a result, the transaction ratio can be effectively increased. In addition, a virtual seller is introduced and involved in each round of auctions to transform surplus resources into trade revenue. The idea of utilizing surplus resources can lead to not only higher resource utilization but also larger trade revenue. In grid environment, the improved auction performances help to establish good economic incentive, which could attract more grid users and resource providers into grid transactions.

Key words: computer application, grid, resource management model, combinatorial double auction, virtual seller, multi-round auction

CLC Number: 

  • TP393
[1] Buyya R, Abramson D, Venugopal S. The grid economy[J].Proceedings of the IEEE,2005,93(3):698-714.
[2] Bubendorfer K. Fine grained resource reservation in open grid economies//Second IEEE International Conference on e-Science and Grid Computing, Amsterdam, Netherlands, 2006.
[3] Das A, Grosu D. Combinatorial auction-based protocols for resource allocation in grids//The 19th IEEE International Parallel and Distributed Processing Symposium, Colorado, USA, 2005.
[4] Liu Yang, He H C. Multi-unit combinatorial auction based grid resource co-allocation approach//Third International Conference on Semantics, Knowledge and Grid,Washington, DC, USA, 2007.
[5] Kant U, Grosu D. Double auction protocols for resource allocation in grids//ITCC, Washington, DC, USA, 2005.
[6] Tan Z, Gurd R J. Market-based grid resource allocation using a stable continuous double auction//Proceedings of JSSPP, Texas, USA, 2007.
[7] Ding Ding, Luo S W, Gao Z. A greedy double auction mechanism for grid resource allocation//Proceedings of JSSPP,GA, USA, 2010.
[8] Xia M, Stallaert J, Whinston A B. Solving the combinatorial double auction problem[J]. European Journal of Operational Research, 2005, 164(1): 239-251.
[9] 李立,马晓雷,刘元安. 基于组合双向拍卖的网格资源分配[J].电子学报, 2009, 37(1): 165-169. Li Li, Ma Xiao-lei, Liu Yuan-an. Grid resource allocation based on the combinatorial double auction[J]. Chinese Journal of Electronics, 2009, 37(1): 165-169.
[10] Wang K, Li L, Hausheer D, et al. A trust-incentive-based combinatorial double auction algorithm//2010 IEEE NOMS, Osaka, Japan, 2010: 209-215.
[11] 范小勇,梁樑,古春生. 多回合组合双向拍卖交易机制研究[J]. 系统工程理论与实践, 2005, 25(1): 32-36,48. Fan Xiao-yong, Liang Liang, Gu Chun-sheng. A study on multi-round combinatorial double auction bargaining mechanism[J]. System Engineering Theory and Practice, 2005, 25(1): 32-36,48.
[1] NI Ying-sheng,SUN Qi-xin,MA Ye,XU Dong,LIU Chao. Shear distribution of multi-cell corrugated steel web composite beams based on space grid analysis [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1735-1746.
[2] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[3] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[4] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[5] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[6] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[7] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[8] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[9] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[10] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[11] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[12] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[13] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[14] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[15] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!