Search Results - "Toledo, Cláudio F Motta"

  • Showing 1 - 6 results of 6
Refine Results
  1. 1
  2. 2

    Multi-Objective Optimization for Workflow Scheduling Under Task Selection Policies in Clouds by Shishido, Henrique Yoshikazu, Estrella, Julio Cezar, Toledo, Claudio F. Motta

    “…Cloud computing provides infrastructure for executing workflows that require high processing and storage capacity. Although there are several algorithms for…”
    Get full text
    Conference Proceeding
  3. 3

    Multi-population genetic algorithm to solve the synchronized and integrated two-level lot sizing and scheduling problem by Toledo, C.F.M., França, P.M., Morabito, R., Kimms, A.

    “…This paper introduces an evolutionary algorithm as a procedure to solve the Synchronized and Integrated Two-Level Lot Sizing and Scheduling Problem (SITLSP)…”
    Get full text
    Journal Article
  4. 4

    Optimal Allocation and Sizing of Distributed Generation for Loss Minimization using a Multi-Population Genetic Algorithm by Almeida, Alessandro Wilk Silva, Toledo, Claudio F. Motta, Arantes, Marcio S.

    “…The paper introduces a evolutionary algorithm, based on Multi Population Genetic Algorithm (MPGA), to support decisions about allocation and power sizing of…”
    Get full text
    Conference Proceeding
  5. 5

    A CloudSim Extension for Evaluating Security Overhead in Workflow Execution in Clouds by Shishido, Henrique Yoshikazu, Estrella, Julio Cezar, Motta Toledo, Claudio F., Reiff-Marganiec, Stephan

    “…Workflow scheduling algorithms for cloud environments are extensively studied using workflow management system simulators. The common criteria covered by…”
    Get full text
    Conference Proceeding
  6. 6

    (WIP) Tasks Selection Policies for Securing Sensitive Data on Workflow Scheduling in Clouds by Shishido, Henrique Yoshikazu, Estrella, Julio Cezar, Toledo, Claudio Fabiano Motta, Reiff-Marganiec, Stephan

    “…Scheduling is an important topic to support data security for workflow execution in clouds. Some workflow scheduling algorithms use security services such as…”
    Get full text
    Conference Proceeding