{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:59:44Z","timestamp":1743026384873,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031248658"},{"type":"electronic","value":"9783031248665"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-24866-5_32","type":"book-chapter","created":{"date-parts":[[2023,2,4]],"date-time":"2023-02-04T19:02:42Z","timestamp":1675537362000},"page":"445-459","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Multi-UAVs\u2019 Provider Model for\u00a0the\u00a0Provision of\u00a05G Service Chains: A Game Theoretic Approach"],"prefix":"10.1007","author":[{"given":"Giorgia Maria","family":"Cappello","sequence":"first","affiliation":[]},{"given":"Gabriella","family":"Colajanni","sequence":"additional","affiliation":[]},{"given":"Patrizia","family":"Daniele","sequence":"additional","affiliation":[]},{"given":"Laura","family":"Galluccio","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Grasso","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Schembra","sequence":"additional","affiliation":[]},{"given":"Laura Rosa Maria","family":"Scrimali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,5]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Erdelj, M., Natalizio, E., Chowdhury, K.R., AkyildizI. F.: Help from the Sky: leveraging UAVs for disaster management. In: IEEE Pervasive Computing, vol. 16, no. 1, pp. 24\u201332 (2017)","DOI":"10.1109\/MPRV.2017.11"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"George, J., Sujit, P.B., Sousa, J.B.: Search strategies for multiple UAV search and destroy missions. J. Intell. Robot. Syst. 61, 355\u2013367 (2011)","DOI":"10.1007\/978-94-007-1110-5_23"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Gupta, A., Jha, R.K.: A survey of 5G network: architecture and emerging technologies. IEEE Access 3, 1206\u20131232 (2015)","DOI":"10.1109\/ACCESS.2015.2461602"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Yi, B., Wang, X., Li, K., Sajal, k. D., Huang, M.: A comprehensive survey of network function virtualization. Comput. Netw. 133, 212\u2013262 (2018)","DOI":"10.1016\/j.comnet.2018.01.021"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Filali, A., Abouaomar, A., Cherkaoui, S., Kobbane, A., Guizani, M.: Multi-access edge computing: a survey. IEEE Access 8, 197017\u2013197046 (2020)","DOI":"10.1109\/ACCESS.2020.3034136"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Faraci, G., Grasso, C., Schembra, G.: Design of a 5G network slice extension with MEC UAVs managed with reinforcement learning. IEEE J. Sel. Areas Commun. 38, pp. 2356\u20132371 (2020)","DOI":"10.1109\/JSAC.2020.3000416"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Faraci, G., Grasso, C., Schembra, G.: Reinforcement-learning for management of a 5G network slice extension with UAVs. In: IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 732\u2013737 (2019)","DOI":"10.1109\/INFCOMW.2019.8845316"},{"key":"32_CR8","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s10479-009-0653-x","volume":"175","author":"F Facchinei","year":"2010","unstructured":"Facchinei, F., Kanzow, C.: Generalized Nash equilibrium problems. Ann. Oper. Res. 175, 177\u2013211 (2010)","journal-title":"Ann. Oper. Res."},{"issue":"1","key":"32_CR9","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.automatica.2011.09.042","volume":"48","author":"AA Kulkarni","year":"2012","unstructured":"Kulkarni, A.A., Shanbhag, U.V.: On the variational equilibrium as a refinement of the generalized Nash equilibrium. Automatica 48(1), 45\u201355 (2012)","journal-title":"Automatica"},{"issue":"1","key":"32_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s43069-022-00127-x","volume":"3","author":"G Colajanni","year":"2022","unstructured":"Colajanni, G., Daniele, P., Sciacca, D.: On the provision of services with UAVs in disaster scenarios: a two-stage stochastic approach. Oper. Res. Forum 3(1), 1\u201330 (2022). https:\/\/doi.org\/10.1007\/s43069-022-00127-x","journal-title":"Oper. Res. Forum"},{"key":"32_CR11","doi-asserted-by":"publisher","unstructured":"Colajanni G., Sciacca D.: An optimization model for service requests management in a 5G network architecture. In: Masone, A., et al. (eds.): Optimization and Data Science: Trends and Applications. AIRO Springer Series, vol. 6, pp. 81\u201398. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-86286-2_7","DOI":"10.1007\/978-3-030-86286-2_7"},{"key":"32_CR12","volume-title":"Variational Inequalities and Their Applications","author":"D Kinderlehrer","year":"1980","unstructured":"Kinderlehrer, D., Stampacchia, G.: Variational Inequalities and Their Applications. Academic Press, New York (1980)"},{"key":"32_CR13","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/BF02073589","volume":"44","author":"P Dupuis","year":"1993","unstructured":"Dupuis, P., Nagurney, A.: Dynamical systems and variational inequalities. Ann. Oper. Res. 44, 9\u201342 (1993)","journal-title":"Ann. Oper. Res."},{"issue":"3","key":"32_CR14","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/JSAC.2017.2672278","volume":"35","author":"S D\u2019Oro","year":"2017","unstructured":"D\u2019Oro, S., Galluccio, L., Palazzo, S., Schembra, G.: A game theoretic approach for distributed resource allocation and orchestration of softwarized networks. IEEE J. Sel. Areas Commun. 35(3), 721\u2013735 (2017)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"4","key":"32_CR15","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/s10287-013-0183-5","volume":"11","author":"A Nagurney","year":"2014","unstructured":"Nagurney, A., Wolf, T.: A Cournot-Nash-Bertrand game theory model of a service-oriented Internet with price and quality competition among network transport providers. CMS 11(4), 475\u2013502 (2014)","journal-title":"CMS"},{"key":"32_CR16","unstructured":"Lasaulce, S., Tembine, H.: Game Theory and Learning for Wireless Networks: Fundamentals and Applications. Academic Press, Cambridge (2011)"},{"issue":"3","key":"32_CR17","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MSP.2010.936021","volume":"27","author":"G Scutari","year":"2010","unstructured":"Scutari, G., Palomar, D.P., Facchinei, F., Pang, J.S.: Convex optimization, game theory, and variational inequality theory. IEEE Sig. Process. Mag. 27(3), 35\u201349 (2010)","journal-title":"IEEE Sig. Process. Mag."},{"key":"32_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-2178-1","volume-title":"Network Economics: A Variational Inequality Approach","author":"A Nagurney","year":"1998","unstructured":"Nagurney, A.: Network Economics: A Variational Inequality Approach, vol. 10. Springer, Dordrecht (1998). https:\/\/doi.org\/10.1007\/978-94-011-2178-1"},{"key":"32_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/b97543","volume-title":"Finite-Dimensional Variational Inequalities and Complementarity Problems","year":"2003","unstructured":"Facchinei, F., Pang, J.S. (eds.): Finite-Dimensional Variational Inequalities and Complementarity Problems. Springer, New York (2003). https:\/\/doi.org\/10.1007\/b97543"},{"issue":"5","key":"32_CR20","doi-asserted-by":"publisher","first-page":"4964","DOI":"10.1109\/TVT.2019.2902318","volume":"68","author":"MA Messous","year":"2019","unstructured":"Messous, M.A., Senouci, S.M., Sedjelmaci, H., Cherkaoui, S.: A game theory based efficient computation offloading in an UAV network. IEEE Trans. Veh. Technol. 68(5), 4964\u20134974 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"14","key":"32_CR21","doi-asserted-by":"publisher","first-page":"9483","DOI":"10.1007\/s00500-021-05863-6","volume":"25","author":"A Giagkos","year":"2021","unstructured":"Giagkos, A., Tuci, E., Wilson, M.S., Charlesworth, P.B.: UAV flight coordination for communication networks: genetic algorithms versus game theory. Soft. Comput. 25(14), 9483\u20139503 (2021). https:\/\/doi.org\/10.1007\/s00500-021-05863-6","journal-title":"Soft. Comput."},{"issue":"4","key":"32_CR22","doi-asserted-by":"publisher","first-page":"3386","DOI":"10.1109\/COMST.2019.2919613","volume":"21","author":"ME Mkiramweni","year":"2019","unstructured":"Mkiramweni, M.E., Yang, C., Li, J., Zhang, W.: A survey of game theory in unmanned aerial vehicles communications. IEEE Commun. Surv. Tutor. 21(4), 3386\u20133416 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"32_CR23","doi-asserted-by":"publisher","first-page":"47787","DOI":"10.1109\/ACCESS.2020.2978853","volume":"8","author":"J Ni","year":"2020","unstructured":"Ni, J., Tang, G., Mo, Z., Cao, W., Yang, S.X.: An improved potential game theory based method for multi-UAV cooperative search. IEEE Access 8, 47787\u201347796 (2020)","journal-title":"IEEE Access"},{"key":"32_CR24","doi-asserted-by":"crossref","unstructured":"Nemer, I.A., Sheltami, T.R., Mahmoud, A.S.: A game theoretic approach of deployment a multiple UAVs for optimal coverage. Transp. Res. Part A Policy Pract. 140, 215\u2013230 (2020)","DOI":"10.1016\/j.tra.2020.08.004"},{"key":"32_CR25","doi-asserted-by":"crossref","unstructured":"Cappello, G.M., et al.: Optimizing FANET lifetime for 5G softwarized network provisioning, submitted (2022)","DOI":"10.1109\/TNSM.2022.3193883"}],"container-title":["Lecture Notes in Computer Science","Learning and Intelligent Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-24866-5_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,4]],"date-time":"2023-02-04T19:07:07Z","timestamp":1675537627000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-24866-5_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031248658","9783031248665"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-24866-5_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"5 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LION","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Learning and Intelligent Optimization","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milos Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"lion2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/lion16.sba-research.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}