Fig. 8From: Task scheduling in cloud environment: optimization, security prioritization and processor selection schemesThe complete HEFT algorithmBack to article page