{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:54:49Z","timestamp":1757627689833,"version":"3.44.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032020178"},{"type":"electronic","value":"9783032020185"}],"license":[{"start":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:00:00Z","timestamp":1755820800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:00:00Z","timestamp":1755820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-02018-5_3","type":"book-chapter","created":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T10:16:36Z","timestamp":1755771396000},"page":"29-40","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Temporal Intent-Aware Multi-agent Learning for\u00a0Network Optimization"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-9146-0027","authenticated-orcid":false,"given":"Albin Larsson","family":"Forsberg","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8696-1536","authenticated-orcid":false,"given":"Alexandros","family":"Nikou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1950-7739","authenticated-orcid":false,"given":"Aneta Vulgarakis","family":"Feljan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4173-2593","authenticated-orcid":false,"given":"Jana","family":"Tumova","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,22]]},"reference":[{"key":"3_CR1","unstructured":"AI: enhancing customer experience in a complex 5G world. Ericsson Mobility Report (June 2021)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Aksaray, D., Jones, A., Kong, Z., Schwager, M., Belta, C.: Q-learning for robust satisfaction of signal temporal logic specifications. In: 2016 IEEE 55th Conference on Decision and Control (CDC), pp. 6565\u20136570. IEEE (2016)","DOI":"10.1109\/CDC.2016.7799279"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Bouton, M., Jeong, J., Outes, J., Mendo, A., Nikou, A.: Multi-agent reinforcement learning with graph Q-networks for antenna tuning. In: NOMS 2023-2023 IEEE\/IFIP Network Operations and Management Symposium, pp.\u00a01\u20137. IEEE (2023)","DOI":"10.1109\/NOMS56928.2023.10154310"},{"issue":"11","key":"3_CR4","doi-asserted-by":"publisher","first-page":"2","DOI":"10.23919\/ETR.2023.10313589","volume":"2023","author":"T Cagenius","year":"2023","unstructured":"Cagenius, T., Mildh, G., Rune, G., Vikberg, J., Wahlqvist, M., Willars, P.: 6G network architecture-a proposal for early alignment. Ericsson Technol. Rev. 2023(11), 2\u20137 (2023)","journal-title":"Ericsson Technol. Rev."},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Donz\u00e9, A., Maler, O.: Robust satisfaction of temporal logic over real-valued signals. In: International Conference on Formal Modeling and Analysis of Timed Systems, pp. 92\u2013106. Springer (2010)","DOI":"10.1007\/978-3-642-15297-9_9"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Eckhardt, H., Klein, S., Gruber, M.: Vertical antenna tilt optimization for LTE base stations. In: 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring), pp.\u00a01\u20135. IEEE (2011)","DOI":"10.1109\/VETECS.2011.5956370"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Jin, Y., Vannella, F., Bouton, M., Jeong, J., Al\u00a0Hakim, E.: A graph attention learning approach to antenna tilt optimization. In: 2022 1st International Conference on 6G Networking (6GNet), pp.\u00a01\u20135. IEEE (2022)","DOI":"10.1109\/6GNet54646.2022.9830258"},{"key":"3_CR8","first-page":"13458","volume":"34","author":"JG Kuba","year":"2021","unstructured":"Kuba, J.G., et al.: Settling the variance of multi-agent policy gradients. Adv. Neural. Inf. Process. Syst. 34, 13458\u201313470 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Larsson\u00a0Forsberg, A., Nikou, A., Vulgarakis\u00a0Feljan, A., Tumova, J.: Network parameter control in cellular networks through graph-based multi-agent constrained reinforcement learning. In: 2023 IEEE 19th International Conference on Automation Science and Engineering (CASE), pp.\u00a01\u20137. IEEE (2023)","DOI":"10.1109\/CASE56687.2023.10260368"},{"key":"3_CR10","unstructured":"Larsson\u00a0Forsberg, A., Nikou, A., Vulgarakis\u00a0Feljan, A., Tumova, J.: Multi-agent transformer-accelerated RL for satisfaction of STL specifications, pp. 1\u201310 (2024). https:\/\/arxiv.org\/abs\/2403.15916"},{"issue":"1","key":"3_CR11","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1109\/COMST.2022.3215919","volume":"25","author":"A Leivadeas","year":"2022","unstructured":"Leivadeas, A., Falkner, M.: A survey on intent-based networking. IEEE Commun. Surv. Tutor. 25(1), 625\u2013655 (2022)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/LCSYS.2021.3049917","volume":"6","author":"W Liu","year":"2021","unstructured":"Liu, W., Mehdipour, N., Belta, C.: Recurrent neural network controllers for signal temporal logic specifications subject to safety constraints. IEEE Control Syst. Lett. 6, 91\u201396 (2021)","journal-title":"IEEE Control Syst. Lett."},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Nikou, A., Mujumdar, A., Sundararajan, V., Orlic, M., Feljan, A.V.: Safe ran control: a symbolic reinforcement learning approach. In: 2022 IEEE 17th International Conference on Control & Automation (ICCA), pp. 332\u2013337. IEEE (2022)","DOI":"10.1109\/ICCA54724.2022.9831850"},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"197005","DOI":"10.1109\/ACCESS.2020.3033325","volume":"8","author":"PAS Ord\u00f3\u00f1ez","year":"2020","unstructured":"Ord\u00f3\u00f1ez, P.A.S., Luna-Ram\u00edrez, S., Toril, M.: A computationally efficient method for QoE-driven self-planning of antenna tilts in a LTE network. IEEE Access 8, 197005\u2013197016 (2020)","journal-title":"IEEE Access"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Perepu, S.K., Martins, J.P., Souza, R., Dey, K.: Intent-based multi-agent reinforcement learning for service assurance in cellular networks. In: GLOBECOM 2022-2022 IEEE Global Communications Conference, pp. 2879\u20132884. IEEE (2022)","DOI":"10.1109\/GLOBECOM48099.2022.10001426"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Razavi, R., Klein, S., Claussen, H.: Self-optimization of capacity and coverage in LTE networks using a fuzzy reinforcement learning approach. In: 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1865\u20131870. IEEE (2010)","DOI":"10.1109\/PIMRC.2010.5671622"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Singh, N.K., Saha, I.: STL-based synthesis of feedback controllers using reinforcement learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a037, pp. 15118\u201315126 (2023)","DOI":"10.1609\/aaai.v37i12.26764"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Vannella, F., Iakovidis, G., Al\u00a0Hakim, E., Aumayr, E., Feghhi, S.: Remote electrical tilt optimization via safe reinforcement learning. In: 2021 IEEE Wireless Communications and Networking Conference (WCNC), pp.\u00a01\u20137. IEEE (2021)","DOI":"10.1109\/WCNC49053.2021.9417363"},{"key":"3_CR19","unstructured":"Vannella, F., Proutiere, A., Jeong, J.: Best arm identification in multi-agent multi-armed bandits. In: International Conference on Machine Learning, pp. 34875\u201334907. PMLR (2023)"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Varnai, P., Dimarogonas, D.V.: On robustness metrics for learning STL tasks. In: 2020 American Control Conference (ACC), pp. 5394\u20135399. IEEE (2020)","DOI":"10.23919\/ACC45564.2020.9147692"},{"key":"3_CR21","unstructured":"Vaswani, A., et al.: Attention is all you need. Adv. Neural. Inf. Process. Syst. 30 (2017)"},{"key":"3_CR22","first-page":"16509","volume":"35","author":"M Wen","year":"2022","unstructured":"Wen, M., et al.: Multi-agent reinforcement learning is a sequence modeling problem. Adv. Neural. Inf. Process. Syst. 35, 16509\u201316521 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security. SAFECOMP 2025 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-02018-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T04:31:26Z","timestamp":1757478686000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-02018-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,22]]},"ISBN":["9783032020178","9783032020185"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-02018-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,8,22]]},"assertion":[{"value":"22 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Stockholm","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"44","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/safecomp2025.se\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}