|
[1] M. Rouse. (2008). DEFINITION master/slave. [2] Apache™ Hadoop®! Available: http://hadoop.apache.org/ [3] J. Dean and S. Ghemawat, "MapReduce: simplified data processing on large clusters," Communications of the ACM, vol. 51, no. 1, pp. 107-113, 2008. [4] C. George, J. Dollimore, T. Kindberg, and G. Blair, Distributed System: Concepts and Design (5th Edition). Boston: Addison-Wesley, 2011. [5] R. Schollmeier, "A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications," in Peer-to-Peer Computing, 2001. Proceedings. First International Conference on, 2001, pp. 101-102: IEEE. [6] L. Bianchi, M. Dorigo, L. M. Gambardella, and W. J. Gutjahr, "A survey on metaheuristics for stochastic combinatorial optimization," Natural Computing, vol. 8, no. 2, pp. 239-287, 2009. [7] Wikipedia, "Weapon Target Assignment Problem." [8] W. A. Metler, F. L. Preston, and J. Hofmann, "A suite of weapon assignment algorithms for a SDI mid-course battle manager," DTIC Document1990. [9] S. P. Lloyd and H. S. Witsenhausen, "Weapons allocation is NP-complete," in 1986 Summer Computer Simulation Conference, 1986, pp. 1054-1058. [10] M. Mitchell, An introduction to genetic algorithms. MIT press, 1998. [11] J. Kennedy and R. Eberhart, "Particle Swarm Optimization," 1995. [12] D. KARABOGA, "AN IDEA BASED ON HONEY BEE SWARM FOR NUMERICAL OPTIMIZATION," vol. 10, 2005. [13] Z. Song, F. Zhu, and D. Zhang, "A heuristic genetic algorithm for solving constrained Weapon-Target Assignment problem," in 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems, 2009, vol. 1, pp. 336-341. [14] Z. J. Lee, S. F. Su, and C. Y. Lee, "A genetic algorithm with domain knowledge for weapon‐target assignment problems," Journal of the Chinese Institute of Engineers, vol. 25, no. 3, pp. 287-295, 2002/04/01 2002. [15] Z. J. Lee, S. F. Su, and C. Y. Lee, "Efficiently solving general weapon-target assignment problem by genetic algorithms with greedy eugenics," IEEE Trans Syst Man Cybern B Cybern, vol. 33, no. 1, pp. 113-21, 2003. [16] X. Zeng, Y. Zhu, L. Nan, K. Hu, B. Niu, and X. He, "Solving weapon-target assignment problem using discrete particle swarm optimization," in Intelligent Control and Automation, 2006. WCICA 2006. The Sixth World Congress on, 2006, vol. 1, pp. 3562-3565: IEEE. [17] F. Bellifemine, A. Poggi, and G. Rimassa, "JADE–A FIPA-compliant agent framework," in Proceedings of PAAM, 1999, vol. 99, no. 97-108, p. 33: London. [18] J. Pitt and F. Bellifemine, "A Protocol-Based Semantics for FIPA97 ACL and its Implementation in JADE," in AI* IA, 1999, vol. 99. [19] D. Karaboga, "An idea based on honey bee swarm for numerical optimization," Technical report-tr06, Erciyes university, engineering faculty, computer engineering department2005.
|