{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:25:14Z","timestamp":1764937514231,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031243820"},{"type":"electronic","value":"9783031243837"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-24383-7_10","type":"book-chapter","created":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T16:18:49Z","timestamp":1674577129000},"page":"173-189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Reliable Service Function Chain Orchestration Method Based on\u00a0Federated Reinforcement Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7814-5790","authenticated-orcid":false,"given":"Zhiwen","family":"Xiao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tao","family":"Tao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhuo","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Meng","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jing","family":"Shang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhihui","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhiwei","family":"Guo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,1,25]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Tai, Y.C., Yen, L.H.: Network service embedding in multiple edge systems: profit maximization by federation. In: IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2021)","DOI":"10.1109\/ICC42927.2021.9500607"},{"issue":"2","key":"10_CR2","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1109\/tnet.2018.2800400","volume":"26","author":"Y Jia","year":"2018","unstructured":"Jia, Y., Wu, C., Li, Z., et al.: Online scaling of NFV service chains across geo-distributed datacenters. IEEE\/ACM Trans. Netw. 26(2), 699\u2013710 (2018). https:\/\/doi.org\/10.1109\/tnet.2018.2800400","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Qing, H., Weifei, Z., Julong, L.: Virtual network protection strategy to ensure the reliability of SFC in NFV. In: Proceedings of the 6th International Conference on Information Engineering, pp. 1\u20135. ACM, New York (2017)","DOI":"10.1145\/3078564.3078583"},{"issue":"1","key":"10_CR4","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/TETC.2017.2675479","volume":"8","author":"S Wang","year":"2020","unstructured":"Wang, S., Zhou, A., Yang, M., et al.: Service composition in cyber-physical-social systems. IEEE Trans. Emerg. Topics Comput. 8(1), 82\u201391 (2020). https:\/\/doi.org\/10.1109\/TETC.2017.2675479","journal-title":"IEEE Trans. Emerg. Topics Comput."},{"issue":"2","key":"10_CR5","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1109\/TNSM.2019.2961153","volume":"17","author":"L Qu","year":"2020","unstructured":"Qu, L., Assi, C., Khabbaz, M.J., et al.: Reliability-aware service function chaining with function decomposition and multipath routing. IEEE Trans. Netw. Serv. Manag. 17(2), 835\u2013848 (2020)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"167944","DOI":"10.1109\/ACCESS.2019.2953498","volume":"7","author":"S Troia","year":"2019","unstructured":"Troia, S., Alvizu, R., Maier, G.: Reinforcement learning for service function chain reconfiguration in NFV-SDN metro-core optical networks. IEEE Access 7, 167944\u2013167957 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2953498","journal-title":"IEEE Access"},{"issue":"5","key":"10_CR7","doi-asserted-by":"publisher","first-page":"3066","DOI":"10.1109\/JIOT.2020.3023111","volume":"8","author":"HA Shah","year":"2020","unstructured":"Shah, H.A., Zhao, L.: Multiagent deep-reinforcement-learning-based virtual resource allocation through network function virtualization in internet of things. IEEE Internet Things J. 8(5), 3066\u20133074 (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.3023111","journal-title":"IEEE Internet Things J."},{"key":"10_CR8","doi-asserted-by":"publisher","unstructured":"Liu, X., Yu, J., Feng, Z., et al.: Multi-agent reinforcement learning for resource allocation in IoT networks with edge computing. China Commun. 17(9), 220\u2013236 (2020). https:\/\/doi.org\/10.23919\/JCC.2020.09.017","DOI":"10.23919\/JCC.2020.09.017"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Chen, H.M., Chen, S.Y., Wang, S.K., et al.: Designing a reinforcement learning approach for the NFV orchestration system with energy saving optimization. In 2022 8th International Conference on Applied System Innovation (ICASI), pp. 98\u201310. IEEE (2022)","DOI":"10.1109\/ICASI55125.2022.9774455"},{"issue":"8","key":"10_CR10","doi-asserted-by":"publisher","first-page":"2558","DOI":"10.1109\/JSAC.2021.3087227","volume":"39","author":"H Huang","year":"2021","unstructured":"Huang, H., Zeng, C., Zhao, Y., et al.: Scalable orchestration of service function chains in NFV-enabled networks: a federated reinforcement learning approach. IEEE J. Sel. Areas Commun. 39(8), 2558\u20132571 (2021). https:\/\/doi.org\/10.1109\/JSAC.2021.3087227","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"12","key":"10_CR11","doi-asserted-by":"publisher","first-page":"8475","DOI":"10.1109\/TII.2021.3064351","volume":"17","author":"P Zhang","year":"2021","unstructured":"Zhang, P., Wang, C., Jiang, C., et al.: Deep reinforcement learning assisted federated learning algorithm for data management of IIoT. IEEE Trans. Industr. Inform. 17(12), 8475\u20138484 (2021). https:\/\/doi.org\/10.1109\/TII.2021.3064351","journal-title":"IEEE Trans. Industr. Inform."},{"issue":"3","key":"10_CR12","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1109\/JIOT.2022.3170449","volume":"23","author":"DC Nguyen","year":"2021","unstructured":"Nguyen, D.C., Ding, M., Pathirana, P.N., et al.: Federated learning for internet of things: a comprehensive survey. IEEE Commun. Surv. Tutor. 23(3), 1622\u20131658 (2021). https:\/\/doi.org\/10.1109\/JIOT.2022.3170449","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"10_CR13","doi-asserted-by":"publisher","first-page":"774","DOI":"10.1109\/TNSM.2018.2815986","volume":"15","author":"M Dieye","year":"2018","unstructured":"Dieye, M., Ahvar, S., Sahoo, J., et al.: CPVNF: cost-efficient proactive VNF placement and chaining for value-added services in content delivery networks. IEEE Trans. Netw. Service Manag. 15(2), 774\u2013786 (2018). https:\/\/doi.org\/10.1109\/TNSM.2018.2815986","journal-title":"IEEE Trans. Netw. Service Manag."},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Sang, I.K., Kim, H.S.: A VNF placement method based on VNF characteristics. In: International Conference on Information Networking, Jeju Island, pp. 864\u2013869. IEEE (2021)","DOI":"10.1109\/ICOIN50884.2021.9334022"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Yang, Z., Chen, B., Dai, M., et al.: VNF placement for service chaining in IP over WDM networks. In: Asia Communications and Photonics Conference, Hangzhou, pp. 1\u20133. IEEE (2018)","DOI":"10.1109\/ACP.2018.8595730"},{"issue":"1","key":"10_CR16","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/TNSM.2017.2782370","volume":"15","author":"B Kar","year":"2018","unstructured":"Kar, B., Wu, E.H.K., Lin, Y.D., et al.: Energy cost optimization in dynamic placement of virtualized network function chains. IEEE Trans. Netw. Service Manag. 15(1), 372\u2013386 (2018). https:\/\/doi.org\/10.1109\/TNSM.2017.2782370","journal-title":"IEEE Trans. Netw. Service Manag."},{"issue":"2","key":"10_CR17","doi-asserted-by":"publisher","first-page":"1524","DOI":"10.1109\/TNSM.2021.3055693","volume":"18","author":"A Varasteh","year":"2021","unstructured":"Varasteh, A., Madiwalar, B., Bemten, A.V., et al.: Holu: power-aware and delay-constrained VNF placement and chaining. IEEE Trans. Netw. Service Manag. 18(2), 1524\u20131539 (2021). https:\/\/doi.org\/10.1109\/TNSM.2021.3055693","journal-title":"IEEE Trans. Netw. Service Manag."},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Quang, P., Hadjadj-Aoul, Y., Outtagarts, A.: On using deep reinforcement learning for VNF forwarding graphs placement. In: 11th International Conference on Network of the Future, Bordeaux, pp. 126\u2013128. IEEE (2020)","DOI":"10.1109\/NoF50125.2020.9249090"},{"issue":"2","key":"10_CR19","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1109\/JSAC.2019.2959181","volume":"38","author":"J Pei","year":"2020","unstructured":"Pei, J., Hong, P., Pan, M., et al.: Optimal VNF placement via deep reinforcement learning in SDN\/NFV-enabled networks. IEEE J. Sel. Areas Commun. 38(2), 263\u2013278 (2020). https:\/\/doi.org\/10.1109\/JSAC.2019.2959181","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10_CR20","doi-asserted-by":"publisher","unstructured":"Rui, L., Chen, X., Gao, Z., et al.: Petri net-based reliability assessment and migration optimization strategy of SFC. IEEE Trans. Netw. Service Manag. 18(1), 167\u2013181 (2020). https:\/\/doi.org\/10.1109\/tnsm.2020.3045705","DOI":"10.1109\/tnsm.2020.3045705"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-24383-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T23:38:24Z","timestamp":1728776304000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-24383-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031243820","9783031243837"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-24383-7_10","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"25 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CollaborateCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Collaborative Computing: Networking, Applications and Worksharing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"colcom2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/collaboratecom.eai-conferences.org\/2022","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confyplus.eai.eu","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"171","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}