Showing 4 open source projects for "scheduling algorithm in cloudsim"

View related business solutions
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • Start building your dream online with an easy-to-use and affordable website builder | one.com Icon
    Start building your dream online with an easy-to-use and affordable website builder | one.com

    For companies and brands seeking a provider of website tools, hosting, and personalized email solutions

    Website tools, hosting, and personalized email all in one plan. We’ll help you every step of the way. Find or transfer your domain name, build your site, and make it a success. Kick-start your success today by registering the perfect domain name. If you already own a domain name, we’ll help you transfer it. Build your website with the simple Website Builder or more advanced WordPress. Create a beautiful, responsive site in just a few steps. Grow your customer base. You’ve put in the effort of creating something you are proud of, and now you want the world to see it. To get you started, all our plans include one free domain for a whole year. Start building your dream online with our easy-to-use website builder. Grow your website traffic with Google Ads. Get 1 month free when you sign up. Our friendly support team is available 24/7, every day of the year. All our plans include a free SSL certificate. Your website is secure from day 1.
    Learn More
  • 1
    glider

    glider

    glider is a forward proxy with multiple protocols support

    ...We can set up local listeners as proxy servers, and forward requests to internet via forwarders. Act as both proxy client and proxy server(protocol converter). Flexible proxy & protocol chains. Load balancing with the following scheduling algorithm, rr: round robin, ha: high availability, lha: latency based high availability, dh: destination hashing. Rule & priority based forwarder choosing: Config Examples. DNS forwarding server. Force upstream querying by TCP. Association rules between dns and forwarder choosing. Association rules between dns and ipset. dns cache support. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    An easy-to-use simulator for decentralized distributed scheduling in Clusters, Grids, and Cloud ecosystem MaGate 2.0 is now available from github! https://github.com/huangye177/magate
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    VIM cloud

    Web Based IaaS Cloud Controller (VimCloud)

    This is a pure IaaS cloud controller with all the basic functionality of IaaS Cloud Controller. This uses proposed “Trust Based Scheduling Algorithm and Load Balancing Algorithm”. It uses Cloud Architecture with Trust Management layer. It uses Qemu machine emulator and virtualizer as virtualization software at Host. It uses Libvirt driver [30] to interact with Qemu and to interact with its virtualization capabilities of a range of operating systems. Libvirt provides a common, generic and stable layer to securely manage domains on a node. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Rt-Simulator is a library to simulate task behaviors on uni/multi-processors with different scheduling algorithms. It provides a run-time reference by fast-prototyping and it can also used for scheduling algorithm research simulation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Powerful, all-in-one identity verification, fraud prevention and compliance platform. Icon
    Powerful, all-in-one identity verification, fraud prevention and compliance platform.

    For businesses needing an automated identity verification to defeat fraud while processing customers' data quickly and securely

    iDenfy protects startups, financial institutions, gambling, streaming, ridesharing, and other digital services from identity fraud using a three-layer identity verification process. The process protects businesses from the most threatening forms of identity fraud.
    Learn More
  • Previous
  • You're on page 1
  • Next