Skip to main content
. 2021 Mar 1;7:e410. doi: 10.7717/peerj-cs.410

Table 1. The related dominant literature studies on ESCM.

Research MCS composition Using game theory Cooperative game based on core coalition
Fontanini & Ferreira (2014) Yes Yes No
Wahab et al. (2016) Yes Yes No
Esposito et al. (2016) Yes Yes No
Lei & Junxing (2017) Yes Yes No (Learning Algorithm)
Li et al. (2012) Yes Yes No
Zhang & Hu (2015) Yes Yes No (Virtual Enterprise Alliance)
Li, Yao & Zhou (2016) Yes No (Promoted GA) No
Qiu (2014) Yes No No
Sasikaladevi (2016) Yes No (Knapsack) No
Wang, Yang & Mi (2015) Yes No (Novel algorithm via graph theory) No
Wang et al. (2016a) Yes No (GA and annealing) No
Huang, Liu & Duan (2014) Yes No (MCOP) No
Dastjerdi & Buyya (2014) Yes No (Fuzzy) No
Wang et al. (2016b) Yes No (Promoted MIP) No
Huang et al. (2015) Yes No (Proposed algorithm SCA) No
Li et al. (2016) Yes No (Proposed algorithm BEA) No
Liu & Zhang (2017) Yes No (SESG-SC based on GA) No
Liu et al. (2017) Yes No (Proposed algorithm based on MMAS) No
Xu et al. (2016) Yes No (Bee algorithm based on pareto optimal) No
Zheng, Feng & Tan (2016) Yes No (PSO and Fuzzy) No
Liu et al. (2016) Yes No (Normalization via SAW) No
Zhou & Yao (2017c) Yes No (Proposed HABC algorithm) No
Zhou & Yao (2017a) Yes No (Proposed algorithm based on artificial bee colony) No
Zhou & Yao (2017e) Yes No (Proposed HABC algorithm based on bee colony) No
Zhou & Yao (2017d) Yes No (Proposed HABC algorithm based on bee colony) No
Zhou & Yao (2017f) Yes No (Proposed MPsaDABC Algorithm) No
Zhou & Yao (2017b) Yes No (Proposed HABC algorithm based on bee colony) No
Chen et al. (2016) Yes Yes No
This research Yes Yes Yes
HHS Vulnerability Disclosure