<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Tender of computational works in heterogeneous distributed environment</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>A G Feoktistov</string-name>
          <email>agf@icc.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Matrosov Institute for System Dynamics and Control Theory of SB RAS</institution>
          ,
          <addr-line>Lermontov St. 134, Irkutsk, Russia, 664033</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>Nowadays, applying various market-based methods for regulating supply and demand of resources for distributed computing is becoming increasingly relevant. In particular, different forms of standard auctions are actively used. However, their basic capabilities often do not enable to fully solve the complicated problems of resource allocation in a heterogeneous distributed computing environment. In this regard, a tender of computational works based on a combinatorial Vickrey auction has been designed. It is applied within multi-agent computing management. For the tender, new models are proposed to rank the criteria of resources owners and users. The tender use advantages are shown in comparison with traditional meta-schedulers.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>1. Introduction
The current trend of turning computing resources into goods actualizes designing and applying
economic mechanisms for regulating supply and demand of such resources. This is especially
pronounced within cloud computing.</p>
      <p>Traditionally, various auctions and tenders are widely used to regulate supply and demand for goods
and services in practice.</p>
      <p>An auction is a form of public sale of any objects (lots), for example, goods and services, according
to predefined rules. Owners of lots are sellers. Bidding is based on competition between potential
purchasers of these goods and services. A person that has received the right to purchase a lot in
accordance with the auction rules becomes its winner.</p>
      <p>A tender is a competitive form for selecting proposals for the supply of goods, provision of services,
or fulfilment of work in accordance with predefined conditions. Herein, bidders are participants wished
to perform services that are in demand by customers. Unlike auctions, where the only criterion is the lot
cost, the tender enables us to determine additional conditions for the fulfilment of work. The winner of
the tender is its bidder, whose bid contains the best proposals that meet the predefined conditions.</p>
      <p>A tender may be designed in the form of an auction or a contest. In both cases, its bidders make bids
for work.</p>
      <p>In the first case, the bid distribution is carried out according to the results of bidding (comparison of
aggregated parameters of bids, the process of which is easily formalized and automated). There is a large
spectrum of solutions for holding standard auctions.</p>
      <p>In the second case, additional complex stages are required, including the condition development for
the contest, contest committee organization, and expert evaluation of bids.</p>
      <p>Obviously, an auction is the simplest form of bidding. This is due to less complexity and lower
overheads in its design compared to a contest.</p>
      <p>In the paper, a tender in which the end-user of a heterogeneous distributed computing environment
acts as a customer is proposed. A customer presents computational work (a job). Service sellers (agents)
are representatives of computational resources of the environment. Sellers claim to perform a
submitted work.</p>
      <p>
        The remainder of the paper is organized as follows. A brief overview of approaches related to the
paper topic is given in the next section. Section 3 describes the computing environment under
consideration. A problem of multi-agent computing management is formulated in Section 4. A
combinatorial Vickrey auction is described in Section 5. Section 6 provides new models for matching
owner preferences of the resource use and user criteria in solving their problems. The results of the
computational experiments are shown in Section 7. They have demonstrated the advantages of the
proposed multi-agent management. The last section concludes the paper.
2. Related work
The results of comparative analysis [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5">1-5</xref>
        ] of various auction models show that standard auctions are the
most effective, discussed, and widely applicable in practice [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Among them are English (forward or
reverse) auction [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], first-price sealed-bid auction [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], Dutch auction [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], and second-price sealed-bid
auction [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The principles of their operation are presented in detail in [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ].
      </p>
      <p>
        Each of the four above-listed standard auctions gives the auctioned lot to the participant who
appreciates it the most. At all four auctions, the bidding result is selected from a variety of
Paretooptimal solutions. However, Vickrey and English auctions, which implement the dominant strategies,
are more effective. This means that no new proposals from other bidders can change the final
situation [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>
        In the real world, an English auction is one of the most popular in practice. It is often used in
computing systems for resource allocation (see, for example, [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]) when executing both independent
jobs and pre-formed job packages. Those and others are considered as indivisible lots.
      </p>
      <p>However, additional overheads occur in resource allocating for problem-solving schemes
(workflows) in an English auction. These overheads are associated with the organization of individual
bidding for each subjob of the scheme and need in multi-criteria selecting optimal deadlines for carrying
out rounds of bidding.</p>
      <p>Such deadlines are determined in order to ensure equal conditions in bids waiting and responses
sending for all bidders. Participants may be at different distances from the auctioneer. Moreover, their
interconnects may have different bandwidth and load.</p>
      <p>In addition, these deadlines should lead to quick decision-making for resource allocation.</p>
      <p>Another problem is taking into account the relations between the subjobs. Sometimes, a situation
arises when the cost in executing the subjobs set may differ from the cost in executing these subjobs
separately. Often, this problem is unsolvable in fully within an English auction.</p>
      <p>Within a Vickrey auction, bidders have equal rights. They act according to uniform rules and make
sealed (unknown to other bidders) bids for the lot. All bids are reviewed by the auctioneer. The winner
is the one who made the best bid. The winner receives the lot on conditions of the bid proposed by the
participant, who turned out to be the second, according to the auction results.</p>
      <p>
        Each bidder makes a bid, reflecting the true value of the lot and maximum usefulness for this
participant. This is a feature of a Vickrey auction. The consensual steady state of auction participants is
achieved at the end of the auction. The achieved state is an analogue of the Nash equilibrium in
gametheoretic models [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. This was shown in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. The example in applying the Vickrey auction model in
a heterogeneous distributed computing environment is given in [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>
        Algorithms for multi-objective resource selection in heterogeneous cloud computing environments
are presented in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. They are based on the double auction conception [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Wherein, cloud resources
(virtual machine instances) are characterized by the performance, sizes of RAM and disk storage,
network bandwidth, and use cost. Users specify requirements to different sets of virtual machines.
Usually, in such cases, a weighted price of the computational work execution is determined.
3. Environment
Cloud computing is a very important direction in preparing and carrying out large-scale scientific
experiments. This is achieved by elastic providing computing resources on demand. Clouds provide
processors, storage, interconnect, etc.
      </p>
      <p>Large-scale scientific applications (distributed applied software packages) require applying
computing environments that provide maximum use of heterogeneous resources to increase the
computation speedup. Often, the resources of the cloud platforms themselves are not enough. Therefore,
additional resources of computing clusters, grid-systems, and public access supercomputer centers are
included in clouds.</p>
      <p>Such resources belong to different owners. They are used by end-users of various categories with
diverse purposes. In this regard, we have faced the need for a large trade-off between the efficient
resource use and makespan minimization for the applications executed on these resources.</p>
      <p>In the paper, abstract workflows (problem-solving schemes) are considered. They can be executed
on different target resources.</p>
      <p>To execute a problem-solving scheme, an end-user has to create a job for the run environment. A job
specifies requirements to the environment (number of nodes and cores, sizes of RAM and disk memory,
OS, supposed job makespan, etc.) that are necessary to solve the problem. Usually, jobs are formed
automatically at packages in formats used by environment meta-schedulers (GridWay [20], Condor
DAGMan [21], etc.).</p>
      <p>The systems supported the package design and use, for example, Orlando Tools [22], provide
mapping jobs to target resources based on methods for computation planning and resource allocation.
Wherein, the selection of resources is a key issue to ensure the efficiency of their use and decrease job
makespan. The proposed tender of computational works is designed within the Orlando Tools
development.
4. Problem formulation
A computational model of the environment is presented by the following structure:</p>
      <p>&gt;,
,   ,   ,   ,   ,   ,   &gt;,
Parameters of the subsets</p>
      <p>and  
data files.
workflow management systems.

where</p>
      <p>are the structures that describe applied and system knowledge, respectively.</p>
      <p>,   ,   ,   ,   ,   , and   are the sets of applied software packages, parameters, operations,
program modules, problem-solving schemes, jobs, and constraints to their execution.</p>
      <p>Operations from   determine computational actions on the set   of parameters.</p>
    </sec>
    <sec id="sec-2">
      <title>Parameters can be represented by scalars, vectors, and matrices of various basic data types or arbitrary data structures.</title>
      <p>Each operation   ∈   is implemented by the module   ∈   , where  ∈ ̅1̅,̅̅̅̅,  ∈ 1̅̅,̅̅̅̅̅,   is the
number of operations, and</p>
      <p>is the number of modules. One module can implement several operations.</p>
      <p>Each operation   has two subsets   ,  

⊂   of parameters. The subset  
includes input
parameters. Their values must be known in order to calculate values of parameters from  

.
module   that implements the operation   . Parameters are transferred between modules in the form of
reflect the purpose and semantics of formal parameters of the</p>
    </sec>
    <sec id="sec-3">
      <title>Schemes from</title>
      <p>represent problems-solving processes in packages. They correspond workflows in</p>
    </sec>
    <sec id="sec-4">
      <title>A description of applied knowledge is represented in detail in [23].</title>
    </sec>
    <sec id="sec-5">
      <title>The sets</title>
      <p>,   ,   ,   ,   , and   from 
corresponding sets of applied objects from</p>
      <p>have the similar purpose for system objects as the
 .   is the set of resource use criteria.
 ,  , and  are the sets of resources, agents, and administrative policies determined for resources.</p>
      <p>The data structure  represents the computational history that reflects the execution statistics for
modules from   .</p>
      <p>determines relations between the above-listed objects from 
distributed computing management: Calculate  = { 1,  2, … ,   _
} knowing 
= { 1,  2, … ,   _ }
by executing  ′ = { 1,  2, … ,   _ } on resources  ′ = { 1,  2, … ,   _ } taking into account  ′ =
{ 1′,  2′, … ,  ′ _ } and  ′′ = { 1′′,  2′′, …  ′′_ }, where  ′ ⊆   ,  ′ ⊆  ,  ′ ⊆   , and  ′′ ⊆   . The
presence of various uncertainties in the problem conditions (in  ,  ,  ′,   ,   ,  ′, and  ) leads to a
variety of its additional specialized formulations.</p>
      <p>In general, the criteria  1′,  2′, … ,  ′ _ and  1′′,  2′′, …  ′′_ are the subjective preferences of resource
owners and their end-users, respectively. They can impose conflicting restrictions on a
problemsolving scheme.</p>
      <p>In the paper, the cost, makespan, and reliability of a problem-solving scheme are considered in the
role of end-user's quality criteria. The preferences of resource owners include the resource use
efficiency, average processor load, and its balancing.</p>
      <p>Let a problem-solving scheme be formed. For modules  1,  2, … ,   _ , which implement scheme
operations, evaluations of module runtimes are determined. In addition, evaluations of data (parameters)
size transferred between the modules are obtained.</p>
      <p>Agents need to allocate their resources to execute the modules.</p>
      <p>Computing process must satisfy the criteria  1,  2, … ,   ∈ { 1′,  2′, … ,  ′  ,  1′′,  2′′, …  ′′_ }. For each
ith criterion, its upper and lower bounds с</p>
      <p>≥ 0 and с
̅1̅̅,̅̅. Moreover, the following criteria optimality are defined:   →  
(</p>
      <p>).
≥ 0 are determined,  
≤   ≤  
,  =</p>
      <p>The job that is generated to execute the problem-solving scheme includes a set of subjobs. Subjobs
can relate to different classes of jobs.
5. Combinatorial Vickrey auction
Vickrey auction.</p>
      <p>A seller income within an English auction may slightly exceed a corresponding income within a
is equal to  2∗.</p>
      <p>Proposition 1. The difference in seller income within a Vickrey and forward English auction with
the fixed value  of the bid increase does not exceed this value.</p>
      <p>Proof. Let  1 and  2 ( 1 &lt;  2) are true lot worths for the agents  1 and  2,  is the fixed value of
the bid increase in bidding.</p>
      <p>Then the agent  2 becomes a winner with the bid  2∗ =  1∗ +  within an English auction, where  2∗ ≤
 2,  1∗ ≤  1 is the bid of the agent  1 at which it will complete bidding. The final lot cost (seller income)</p>
      <p>Within a Vickrey auction, agents truthfully reflect their true worths. The agent  1 will complete
bidding with the bid  1. The agent  2 becomes a winner with the bid  2. In accordance with the rule of</p>
      <sec id="sec-5-1">
        <title>According to the bidding conditions,  1∗ ≤  1. Then</title>
        <p>the second price, the final lot cost (seller income) is equal to  1.</p>
        <p>2∗ −  1 ≤  2∗− 1∗.
(1)</p>
        <p>Since  2∗ =  1∗ +  then, in the result of the substitution of this expression into the right part of (1),
we obtain  2∗ −  1 ≤  ∎
of the bid decrease in bidding.</p>
        <p>The same is true for a reverse English auction in providing, for example, of services.</p>
        <p>Proposition 2. The difference in the income of agents from the service provision within a Vickrey
and forward English auction with the fixed value  of the bid decrease does not exceed this value.</p>
        <p>Proof. Let  1 and  2 ( 2 &lt;  1) are true service worths for the agents  1 and  2,  is the fixed value
to  2∗.</p>
        <p>Then the agent  2 becomes a winner with the bid  2∗ =  1∗ −  , where  2∗ ≥  2,  1∗ ≥  1 is the bid of
the agent  1 at which it will complete bidding. The final service cost (income of the agent  2) is equal</p>
      </sec>
      <sec id="sec-5-2">
        <title>According to the bidding conditions,  1 ≤  1∗. Then</title>
        <p>Within Vickrey auction, agents truthfully reflect their true worths. The agent  1 will complete
bidding with the bid  1. The agent  2 becomes a winner with the bid  2. In accordance with the rule of
the second price, the final service cost (income of the agent  2) is equal to  1.</p>
        <p>1 −  2∗ ≤  1∗ −  2∗.
(2)</p>
        <p>Since  2∗ =  1∗ −  , then, in the result of the substitution of this expression into the right part of (2),
we obtain  1 −  2∗ ≤  ∎</p>
        <p>Within a combinatorial Vickrey auction, several lots can be simultaneously put up for bidding. A
combinatorial Vickrey auction provides an opportunity to make offers (bids) for combinations of such
lots [24]. An extensive bibliography confirms the effectiveness of applying various forms of such an
auction in relation to distributed computing [25-33].</p>
        <p>Moreover, in some cases, the combinatorial auction use gives an advantage over English auction. Let
two agents  1 and  2 participate in bidding for the jobs  1 and  2 execution. The jobs process the same
data set  . The job  1 ( 2) execution cost summarizes the module execution cost  1 ( 2) and data transfer
cost   . True worths  1,  2, and   of executing the jobs  1 and  2 and transferring data  by the agent
 1 and  2 are shown in Table 1.</p>
        <p>In this example, the agent  1 becomes the winner for the job  1 execution with the final service cost
equalled 2.7. The second agent  2 becomes the winner for the job  2 with the final service cost equalled
2.1. The total cost of two jobs execution is equal to 4.8. The bid offers order does not affect the final
bidding result.</p>
        <p>A combinatorial auction within which we can make a bid for the joint execution of several jobs
enables us to improve the bidding result. It provides the reduction in overhead costs for data transfer
when the jobs are executed by one agent.
However, the combinatorial nature of the multi-agent management problem leads to the selection of the
first auction. At the same time, the main drawback of this auction, like all other types of combinatorial
auctions, is the computational complexity of decision-making.</p>
        <p>The following methods are used to mitigate this complexity:
 Preliminary classification of jobs [34]. It ensures the formation of a virtual community of agents
(tender participants), each of which is sure in the presence of necessary resources and interested
in executing jobs corresponding to them.
 Decomposition of a scheme for problem-solving that represented by a tiered-parallel form into
subschemes, each including only one tier [35]. The tender for each subscheme is held separately.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>This enables agents to take into account the resource allocation for the previous tiers when processing the current tier.</title>
      <p> The use of parallel operations, providing the opportunity in proportional distributing of the
computational load related to the execution of impersonal subjob instances. Thus, it eliminates
the need in hard searching combinations of subjob instances when agents are betting.</p>
      <p>Given the above-listed methods, the maximum number of possible combinations of subjobs at each
tender round varies from one combination to several tens of combinations. This is the inherent property
for both the scientific workflows (Montage, CyberShake, Epigenomics, etc. [36]) and schemes for
solving many practical problems [35].
6. Models
To conduct and evaluate the bidding results, a virtual resource cost is used. In addition, resource owner
preferences  1′′,  2′′, …  ′′_ and user criteria  1′′,  2′′, …  ′′_ of the problem-solving efficiency are applied.
Resource cost characteristics are selected in such a way that the cost in computational work performing
on a more performance resource cannot be higher than the cost in performing the same work on a less
performance resource.</p>
      <p>The tender is based on three models for matching owner preferences and user criteria:
1) Model oriented to user criteria, when the following ranking by an importance decrease is
applying in bids reviewing:  1′′,  2′′, …  ′′_ ,  1′,  2′, … ,  ′ _ ,
2) Model oriented to owner preferences, when the following ranking by an importance decrease is
applying in bids reviewing:  1′,  2′, … ,  ′  ,  1′′,  2′′, …  ′′_ ,
3) Model, in which user criteria and owner preferences are not ranked.</p>
      <p>Each agent makes bids for executing individual subjobs, the class of which corresponds to the
resources of this agent. Elements of one bid reflect  1′,  2′, … ,  ′  ,  1′′,  2′′, …  ′′_ for one subjob.</p>
      <p>In addition, any agent can make bids on executing sets of jobs. Elements of such a bid reflect
 1′,  2′, … ,  ′  ,  1′′,  2′′, …  ′′_ for each job in the set.</p>
      <p>To determine the best bids in Models 1 and Model 2, the lexicographic rule of multi-criteria selection
is applied. Model 3 uses the Pareto-optimal selection of the best bids. The aspects of the aforementioned
selection methods may be found in [37].</p>
      <p>In the case of non-uniqueness of the decision, an additional bid evaluation is carried out. The selected
bids are compared with the ideal bid using the Cartesian metric.
7. Experiments
The evaluation in operating a multi-agent system (MAS) in processing job flows through semi-natural
modeling [38] for the three proposed models was carried out in an experimental environment that
includes two resource pools:
 Pool 1: 8 virtual machines with the following characteristics: 1 Intel Xeon processor E5506
(1 core, 2.13 GHz, 4 MB L3 cache, 2 GB RAM DDR3-800, 4 FLOP/cycle),
 Pool 2: 10 virtual machines with the following characteristics: 1 AMD Opteron 6276 processor
(8 core, 2.3 GHz, 16 MB L3 cache, 32 GB RAM DDR3-1600, 4 FLOP/cycle).</p>
      <p>The environment is based on resources of public access Irkutsk Supercomputer Center of the Siberian
Branch of the Russian Academy of Sciences [39].</p>
      <p>Jobs specify scientific workflows. Among them are Montage, CyberShake, Epigenomics, LIGO, and
SIPHT. Each flow included 30 workflows of the same type.</p>
      <p>Analysis of the MAS operation was fulfilled in comparison with the meta-schedulers Condor
DAGMan and GridWay. The following criteria were selected for a comparative analysis of the quality
in job flow processing: cost and makespan of job execution, computation speedup, resource use
efficiency, average processor load, and standard deviation from it. The first three criteria represent user
criteria. The other three criteria reflect the resource owner preferences. A standard deviation
characterizes the resource load balancing.</p>
      <p>Figure 1 shows that the MAS with Model 1 provides advantages in all user criteria for each job flow
in comparison with both Condor DAGMan and GridWay. The management results with the Condor
DAGMan and GridWay use are very close. At the same time, MAS reduces the cost and makespan of
executing jobs and increases computation speedup. In particular, Figure 1(c) and Figure 1(d) show the
speedup of computations under the MAS management in comparison with Condor DAGMan and
GridWay, respectively. In contrast to Condor DAGMan and GridWay, the transfer of data directly
between agents significantly influenced the achieved cost, makespan, and speedup. The aforementioned
meta-schedulers transfer data through centralized storages. This leads to more overheads.</p>
      <p>8
Number of cores</p>
      <p>c)
1
88
1</p>
      <p>8
Number of cores
d)
88</p>
      <p>Figure 2 shows that MAS with Model 2 provides the advantages in all criteria that reflect the resource
owner preferences. The benefits are demonstrated for each job flow in comparison with both Condor
DAGMan and GridWay. MAS increases the resource use efficiency and average processor load. In
addition, it decreases the standard deviation  from average processor load.</p>
      <p>Using Model 3 with unranked criteria, MAS shows an improvement in more criteria than Condor
DAGMan and GridWay.</p>
      <p>0.9 90</p>
      <p>Thus, the advantages of the proposed multi-agent management over the traditional meta-schedulers
are obvious. Each of the three models makes it possible to achieve the required level of service,
depending on the way of ranking the criteria.
8. Conclusions
The paper addresses a relevant issue related to resource allocation in a heterogeneous distributed
computing environment with multi-agent management. The environment can integrate resources of
public access supercomputer centers, grid-systems, and cloud platforms. Agents represent environment
resources and implement their allocation in solving problems of scientific applications (distributed
applied software packages).</p>
      <p>A new bidding mechanism is proposed to solve the resource allocation issue. The mechanism is
implemented in the form of a tender of computational works. The tender is based on applying a
combinatorial Vickrey auction. Similar mechanisms enable resource providers to effectively utilize their
available resources and obtain higher income. In the paper, such mechanisms are expanded. Within the
tender, resource owner preference and user criteria of problem-solving complement the only criterion
(cost of computational works) of a Vickrey auction.</p>
      <p>Using the tender, agents truthfully make their bids and quickly provide decision-making. The
provided bidding mechanism is highly scalable, efficient and validated by comprehensive semi-natural
modeling. The experiments were carried out through processing job flows for the well-known scientific
workflows. The advantages of the proposed multi-agent management are demonstrated in comparison
with the well-known traditional meta-schedulers for distributed computing environments.</p>
      <p>The full theoretical rationale for the achievement of an agreed state by agents within the tender is the
subject of further study.</p>
      <p>Acknowledgments
The study is supported by the Basic Research Program of SB RAS, project no. IV.38.1.1.
[20] GridWay Metascheduler. Available at: http://www.gridway.org (accessed: 10.05.2020)
[21] Condor DAGMan. Available at: https://research.cs.wisc.edu/htcondor/dagman/dagman.html
(accessed: 10.05.2020)
[22] Tchernykh A, Feoktistov A, Gorsky S, Sidorov I, Kostromin R, Bychkov I, Basharina O,
Alexandrov A and Rivera-Rodriguez R 2019 Orlando Tools: Development, Training, and Use
of Scalable Applications in Heterogeneous Distributed Computing Environments Comm.</p>
      <p>Com. Inf. Sc. 979 265–279
[23] Bychkov I, Oparin G, Tchernykh A, Feoktistov A, Bogdanova V and Gorsky S 2017 Conceptual
Model of Problem-Oriented Heterogeneous Distributed Computing Environment with
MultiAgent Management Procedia Comput. Sci. 103 162–167
[24] Pekec A and Rothkopf M H 2003 Combinatorial auction design Manage. Sci. 49(11) 1485–1503
[25] Hershberger J and Suri S 2001 Vickrey prices and shortest paths: What is an edge worth? Proc.
of the 42nd IEEE Symposium on Foundations of Computer Science (IEEE Computer Society)
pp 252–259
[26] Jain R and Walrand J 2010 An efficient Nash–implementation mechanism for network resource
allocation Automatica (Oxf) 46(8) 1276–1283
[27] Lin W Y, Lin G Y and Wei H Y 2010 Dynamic auction mechanism for cloud resource allocation
Proc. of the10th IEEE / ACM Intern. Conf. on Cluster, Cloud and Grid Computing (CCGrid)
(IEEE Computer Society) pp 591–592
[28] Zhang Y, Niyato D, Wang P and Hossain E 2012 Auction–based resource allocation in cognitive
radio systems IEEE Commun. Mag. 50(11) 108–120
[29] Di S, Wang C L and Chen L 2013 Ex–post efficient resource allocation for self–organizing cloud</p>
      <p>Computers and Electrical Engineering 39(7) 2342–2356
[30] Prasad A S and Rao S 2014 A mechanism design Approach to resource procurement in cloud
computing IEEE Trans. Comput. 63(1) 17–30
[31] Nejad M, Mashayekhy L and Grosu D 2015 Truthful greedy mechanisms for dynamic virtual
machine provisioning and allocation in clouds IEEE T. Parall Distr. 26(2) 594–603
[32] Tanaka M and Murakami Y 2016 Strategy-proof pricing for cloud service composition IEEE</p>
      <p>Trans. on Cloud Comput. 4(3) 363–375
[33] Landa R, Charalambides M, Clegg R G, Griffin D and Rio M 2016 Self–Tuning Service
Provisioning for Decentralized Cloud Applications IEEE Trans. Netw. Service Manag.
13(2) 197–211
[34] Feoktistov A G, Tchernych A, Kostromin R O and Gorsky S A 2017 Knowledge Elicitation in
Multi-Agent System for Distributed Computing Management Proc. of the 40th Inter.
Convention on information and communication technology, electronics and microelectronics
(MIPRO-2017) (Riejka: IEEE) pp 1350–1355
[35] Feoktistov A G, Kostromin R O, Sidorov I A and Gorsky S A 2018 Development of Distributed
Subject-Oriented Applications for Cloud Computing through the Integration of Conceptual
and Modular Programming Proceedings of the 41st Intern. Convention on information and
communication technology, electronics and microelectronics (MIPRO-2018) (Riejka: IEEE)
pp 256–261
[36] Juve G, Chervenak A, Deelman E, Bharathi S, Mehta G and Vahi K 2013. Characterizing and
profiling scientific workflows Future Gener. Comput. Syst. 29(3) 682–692
[37] Ho W, Xu X and Dey P K 2010 Multi-criteria decision making approaches for supplier evaluation
and selection: A literature review Eur. J. Oper. Res. 202(1) 16–24
[38] Feoktistov A G, Sidorov I A, Kostromin R O, Oparin G A and Basharina O Yu Methods and
tools for evaluating the reliability of information and computation processes in grid and cloud
computing systems Proc. of the 1st Intern. Workshop on Information, Computation, and
Control Systems for Distributed Environments (ICCS-DE) (CEUR-WS Proceedings) 2430
pp 60–69
[39] Irkutsk Supercomputer Center. Available at: http://hpc.icc.ru (accessed: 10.05.2020)</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Wellman</surname>
            <given-names>M P</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Walsh</surname>
            <given-names>W E</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wurman P R and MacKie-Mason J K 2001</surname>
          </string-name>
          <article-title>Auction protocols for decentralized scheduling Games Econ</article-title>
          .
          <source>Behav</source>
          .
          <volume>35</volume>
          (
          <issue>1</issue>
          )
          <fpage>271</fpage>
          -
          <lpage>303</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Ausubel L M and Milgrom</surname>
            <given-names>P 2006</given-names>
          </string-name>
          <article-title>The lovely but lonely Vickrey auction Combinatorial auctions Cramton P</article-title>
          ,
          <string-name>
            <surname>Shoham</surname>
            <given-names>Y</given-names>
          </string-name>
          and
          <string-name>
            <surname>Steinberg R</surname>
          </string-name>
          (Cambridge: MIT Press) pp
          <fpage>22</fpage>
          -
          <lpage>26</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Buyya</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abramson</surname>
            <given-names>D</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giddy</surname>
            <given-names>J</given-names>
          </string-name>
          and
          <string-name>
            <surname>Stockinger H 2002 Economic</surname>
          </string-name>
          <article-title>Models for Resource Management and Scheduling in Grid Computing Concurr</article-title>
          .
          <source>Comput</source>
          .
          <volume>14</volume>
          (
          <issue>13-15</issue>
          )
          <fpage>1507</fpage>
          -
          <lpage>1542</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Cramton</surname>
            <given-names>P</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shoham</surname>
            <given-names>Y</given-names>
          </string-name>
          and
          <string-name>
            <surname>Steinberg</surname>
            <given-names>R 2007</given-names>
          </string-name>
          <article-title>An overview of combinatorial auctions ACM SIGecom Exchanges 7</article-title>
          (
          <issue>1</issue>
          )
          <fpage>3</fpage>
          -
          <lpage>14</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Grosu</surname>
            <given-names>D</given-names>
          </string-name>
          and
          <article-title>Das A 2004 Auction-based resource allocation protocols in grids Proc. of the 16th IASTED Intern</article-title>
          .
          <source>Conf. on Parallel and Distributed Computing and Systems</source>
          (Calgary: ACTA Press) pp
          <fpage>20</fpage>
          -
          <lpage>27</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Coppinger</surname>
            <given-names>V M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith</surname>
            <given-names>V L</given-names>
          </string-name>
          and
          <article-title>Titus J 1980 Incentives and behavior in English, Dutch and sealed-bid auctions Econ</article-title>
          .
          <source>Inq</source>
          .
          <volume>18</volume>
          (
          <issue>1</issue>
          )
          <fpage>1</fpage>
          -
          <lpage>22</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Neeman Z 2003</surname>
          </string-name>
          <article-title>The effectiveness of English auctions Games Econ</article-title>
          .
          <source>Behav</source>
          .
          <volume>43</volume>
          (
          <issue>2</issue>
          )
          <fpage>214</fpage>
          -
          <lpage>238</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Harrison</surname>
            <given-names>G W</given-names>
          </string-name>
          <year>1989</year>
          <article-title>Theory and misbehavior of first-price auctions Am</article-title>
          .
          <source>Econ. Rev</source>
          .
          <volume>79</volume>
          (
          <issue>4</issue>
          )
          <fpage>749</fpage>
          -
          <lpage>762</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Bagwell</surname>
            <given-names>L S</given-names>
          </string-name>
          <year>1992</year>
          <article-title>Dutch auction repurchases: An analysis of shareholder heterogeneity J</article-title>
          .
          <source>Finance</source>
          <volume>47</volume>
          (
          <issue>1</issue>
          )
          <fpage>71</fpage>
          -
          <lpage>105</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Vickrey</surname>
            <given-names>W</given-names>
          </string-name>
          1961 Counterspeculation, Auctions, and
          <source>Competitive Sealed Tenders J. Finance</source>
          <volume>16</volume>
          (
          <issue>1</issue>
          )
          <fpage>8</fpage>
          -
          <lpage>37</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Cassady</surname>
            <given-names>R JR</given-names>
          </string-name>
          <year>1967</year>
          <article-title>Auctions and Auctioneering (Berkley</article-title>
          and Los Angeles, California: University of California Press) p
          <fpage>327</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>McAfee R P and McMillan J 1987</surname>
          </string-name>
          <article-title>Auctions</article-title>
          and
          <string-name>
            <given-names>bidding J.</given-names>
            <surname>Econ</surname>
          </string-name>
          . Lit.
          <volume>25</volume>
          (
          <issue>2</issue>
          )
          <fpage>699</fpage>
          -
          <lpage>738</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Sandholm</surname>
            <given-names>T 2000</given-names>
          </string-name>
          <article-title>Issues in computational Vickrey auctions Int</article-title>
          .
          <source>J. Electron. Comm</source>
          .
          <volume>4</volume>
          (
          <issue>3</issue>
          )
          <fpage>107</fpage>
          -
          <lpage>129</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Badica</surname>
            <given-names>C</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ilie</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Muscar</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Badica</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sandu</surname>
            <given-names>L</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sbora</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ganzha</surname>
            <given-names>M</given-names>
          </string-name>
          and
          <string-name>
            <surname>Paprzycki M 2015</surname>
          </string-name>
          <article-title>Distributed agent-based online auction system Computing and Informatics</article-title>
          .
          <volume>33</volume>
          (
          <issue>3</issue>
          )
          <fpage>518</fpage>
          -
          <lpage>552</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Blume</surname>
            <given-names>A</given-names>
          </string-name>
          and
          <string-name>
            <surname>Heidhues</surname>
            <given-names>P 2004</given-names>
          </string-name>
          <article-title>All equilibria of the Vickrey auction J. econ</article-title>
          .
          <source>Theory</source>
          <volume>114</volume>
          (
          <issue>1</issue>
          )
          <fpage>170</fpage>
          -
          <lpage>177</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Nash</surname>
            <given-names>J 1950</given-names>
          </string-name>
          <article-title>Equilibrium points in n-person games P. Natl</article-title>
          .
          <source>Acad. Sci. USA</source>
          <volume>36</volume>
          (
          <issue>1</issue>
          )
          <fpage>48</fpage>
          -
          <lpage>49</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Feoktistov</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kostromin</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sidorov</surname>
            <given-names>I</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gorsky</surname>
            <given-names>S</given-names>
          </string-name>
          and
          <string-name>
            <surname>Oparin G</surname>
          </string-name>
          <article-title>2019 Multi-Agent Algorithm for Re-Allocating Grid-Resources and Improving Fault-Tolerance of Problem-Solving Processes Procedia Comput</article-title>
          . Sci.
          <volume>150</volume>
          <fpage>171</fpage>
          -
          <lpage>178</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Toporkov</surname>
            <given-names>V</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tchernykh</surname>
            <given-names>A</given-names>
          </string-name>
          and
          <string-name>
            <surname>Yemelyanov</surname>
            <given-names>D 2019</given-names>
          </string-name>
          <article-title>Budget and Cost-Aware Resources Selection Strategy in Cloud Computing Environments Commun</article-title>
          .
          <source>Comput. Inf. Sci</source>
          .
          <volume>1129</volume>
          <fpage>667</fpage>
          -
          <lpage>677</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Li</surname>
            <given-names>Q</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huang</surname>
            <given-names>C</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bao</surname>
            <given-names>H</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fu</surname>
            <given-names>B</given-names>
          </string-name>
          and
          <string-name>
            <surname>Jia X 2019</surname>
          </string-name>
          <article-title>A Game-Based Combinatorial Double Auction Model for Cloud Resource Allocation Proc. of the 28th Intern. Conf. on Computer Communication and Networks (ICCCN) (IEEE</article-title>
          ) pp
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>