Energy conscious scheduling for distributed computing systems under different operating conditions

Young Choon Lee*, Albert Y. Zomaya

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

290 Citations (Scopus)


Traditionally, the primary performance goal of computer systems has focused on reducing the execution time of applications while increasing throughput. This performance goal has been mostly achieved by the development of high-density computer systems. As witnessed recently, these systems provide very powerful processing capability and capacity. They often consist of tens or hundreds of thousands of processors and other resource-hungry devices. The energy consumption of these systems has become a major concern. In this paper, we address the problem of scheduling precedence-constrained parallel applications on multiprocessor computer systems and present two energy-conscious scheduling algorithms using dynamic voltage scaling (DVS). A number of recent commodity processors are capable of DVS, which enables processors to operate at different voltage supply levels at the expense of sacrificing clock frequencies. In the context of scheduling, this multiple voltage facility implies that there is a trade-off between the quality of schedules and energy consumption. To effectively balance these two performance goals, we have devised a novel objective function and a variant from that. The main difference between the two algorithms is in their measurement of energy consumption. The extensive comparative evaluations conducted as part of this work show that the performance of our algorithms is very compelling in terms of both application completion time and energy consumption.

Original languageEnglish
Article number5677511
Pages (from-to)1374-1381
Number of pages8
JournalIEEE Transactions on Parallel and Distributed Systems
Issue number8
Publication statusPublished - 2011
Externally publishedYes


Dive into the research topics of 'Energy conscious scheduling for distributed computing systems under different operating conditions'. Together they form a unique fingerprint.

Cite this