Fig. 8From: Task scheduling and resource allocation in cloud computing using a heuristic approachResponse time for cybershake tasksBack to article page