Fig. 9From: Task scheduling in cloud environment: optimization, security prioritization and processor selection schemesVariations in schedule length obtained from the AVCT approach and MXCT approachBack to article page