Competitive analysis of fundamental scheduling algorithms on a fault-prone machine and the impact of resource augmentation

Antonio Fernández Anta, Chryssis Georgiou, Dariusz R. Kowalski, Elli Zavou

Research output: Contribution to journalArticlepeer-review

5 Scopus citations

Abstract

Reliable task execution in machines that are prone to unpredictable crashes and restarts is both challenging and of high importance, but not much work exists on the analysis of such systems. We consider the online version of the problem, with tasks arriving over time at a single machine under worst-case assumptions. We analyze the fault-tolerant properties of four popular scheduling algorithms: Longest In System (LIS), Shortest In System (SIS), Largest Processing Time (LPT) and Shortest Processing Time (SPT). We use three metrics for the evaluation and comparison of their competitive performance, namely, completed load, pending load and latency. We also investigate the effect of resource augmentation in their performance, by increasing the speed of the machine. Hence, we compare the behavior of the algorithms for different speed intervals and show that there is no clear winner with respect to all the three considered metrics. While SPT is the only algorithm that achieves competitiveness on completed load for small speed, LIS is the only one that achieves competitiveness on latency (for large enough speed).

Original languageEnglish (US)
Pages (from-to)245-256
Number of pages12
JournalFuture Generation Computer Systems
Volume78
DOIs
StatePublished - Jan 2018
Externally publishedYes

Keywords

  • Competitive analysis
  • Different task processing times
  • Failures
  • Online algorithms
  • Resource augmentation
  • Scheduling

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Competitive analysis of fundamental scheduling algorithms on a fault-prone machine and the impact of resource augmentation'. Together they form a unique fingerprint.

Cite this