Fig. 10From: Task scheduling in cloud environment: optimization, security prioritization and processor selection schemesVariations in schedule length obtained from the AVCT approach and MNCT approachBack to article page