{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T10:08:30Z","timestamp":1760609310988,"version":"3.37.3"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"33","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["777067"],"award-info":[{"award-number":["777067"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["18CX02139A"],"award-info":[{"award-number":["18CX02139A"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s00521-020-05372-x","type":"journal-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T04:05:41Z","timestamp":1601870741000},"page":"23795-23817","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A deep reinforcement learning-based algorithm for reliability-aware multi-domain service deployment in smart ecosystems"],"prefix":"10.1007","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7053-3756","authenticated-orcid":false,"given":"Godfrey","family":"Kibalya","sequence":"first","affiliation":[]},{"given":"Joan","family":"Serrat","sequence":"additional","affiliation":[]},{"given":"Juan-Luis","family":"Gorricho","sequence":"additional","affiliation":[]},{"given":"Dorothy","family":"Okello","sequence":"additional","affiliation":[]},{"given":"Peiying","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"issue":"3","key":"5372_CR1","doi-asserted-by":"publisher","first-page":"1175","DOI":"10.1109\/TNSM.2018.2861717","volume":"15","author":"G Sun","year":"2018","unstructured":"Sun G, Li Y, Liao D, Chang V (2018) Service function chain orchestration across multiple domains: a full mesh aggregation approach. IEEE Trans Netw Serv Manag 15(3):1175\u20131191. https:\/\/doi.org\/10.1109\/TNSM.2018.2861717","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"5","key":"5372_CR2","doi-asserted-by":"publisher","first-page":"3298","DOI":"10.1109\/JIOT.2017.2726120","volume":"5","author":"P Zhang","year":"2018","unstructured":"Zhang P, Yao H, Liu Y (2018) Virtual network embedding based on computing, network, and storage resource constraints. IEEE Internet Things J 5(5):3298\u20133304. https:\/\/doi.org\/10.1109\/JIOT.2017.2726120","journal-title":"IEEE Internet Things J"},{"key":"5372_CR3","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.comnet.2017.01.008","volume":"114","author":"S Khebbache","year":"2017","unstructured":"Khebbache S, Hadji M, Zeghlache D (2017) Virtualized network functions chaining and routing algorithms. Comput Netw 114:95\u2013110. https:\/\/doi.org\/10.1016\/j.comnet.2017.01.008","journal-title":"Comput Netw"},{"issue":"1","key":"5372_CR4","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/TNSM.2018.2876623","volume":"16","author":"PTA Quang","year":"2019","unstructured":"Quang PTA, Bradai A, Singh KD, Picard G, Riggio R (2019) Single and multi-domain adaptive allocation algorithms for VNF forwarding graph embedding. IEEE Trans Netw Serv Manag 16(1):98\u2013112. https:\/\/doi.org\/10.1109\/TNSM.2018.2876623","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"5","key":"5372_CR5","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1016\/j.future.2012.08.002","volume":"29","author":"G Sun","year":"2013","unstructured":"Sun G, Yu H, Anand V, Li L (2013) A cost efficient framework and algorithm for embedding dynamic virtual network requests. Future Gener Comput Syst 29(5):1265\u20131277. https:\/\/doi.org\/10.1016\/j.future.2012.08.002","journal-title":"Future Gener Comput Syst"},{"issue":"2","key":"5372_CR6","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/lnet.2019.2902720","volume":"1","author":"P Kaliyammal Thiruvasagam","year":"2019","unstructured":"Kaliyammal Thiruvasagam P, Kotagi VJ, Murthy CSR (2019) The more the merrier: enhancing reliability of 5G communication services with guaranteed delay. IEEE Netw Lett 1(2):52\u201355. https:\/\/doi.org\/10.1109\/lnet.2019.2902720","journal-title":"IEEE Netw Lett"},{"key":"5372_CR7","doi-asserted-by":"publisher","unstructured":"Zhang P, Wang C, Qin Z, Cao H (2020) A multidomain virtual network embedding algorithm based on multiobjective optimization for Internet of Drones architecture in Industry 4.0. Software\u2014Practice and Experience (October 2019), pp 1\u201319. https:\/\/doi.org\/10.1002\/spe.2815","DOI":"10.1002\/spe.2815"},{"issue":"May","key":"5372_CR8","doi-asserted-by":"publisher","first-page":"107349","DOI":"10.1016\/j.comnet.2020.107349","volume":"179","author":"G Kibalya","year":"2020","unstructured":"Kibalya G, Serrat J, Gorricho JL, Yao H, Zhang P (2020) A novel dynamic programming inspired algorithm for embedding of virtual networks in future networks. Comput Netw 179(May):107349. https:\/\/doi.org\/10.1016\/j.comnet.2020.107349","journal-title":"Comput Netw"},{"key":"5372_CR9","doi-asserted-by":"publisher","unstructured":"Kibalya G, Serrat J, Gorricho JL, Pasquini R, Yao H, Zhang P (2019) A reinforcement learning based approach for 5G network slicing across multiple domains. In: 15th international conference on network and service management, CNSM 2019. https:\/\/doi.org\/10.23919\/CNSM46954.2019.9012674","DOI":"10.23919\/CNSM46954.2019.9012674"},{"key":"5372_CR10","doi-asserted-by":"publisher","unstructured":"Leconte M, Paschos GS, Mertikopoulos P, Kozat UC (2018) A resource allocation framework for network slicing. In: Proceedings\u2014IEEE INFOCOM 2018-April, pp 2177\u20132185. https:\/\/doi.org\/10.1109\/INFOCOM.2018.8486303","DOI":"10.1109\/INFOCOM.2018.8486303"},{"key":"5372_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106984","author":"AA Barakabitze","year":"2020","unstructured":"Barakabitze AA, Ahmad A, Mijumbi R, Hines A (2020) 5G network slicing using SDN and NFV: a survey of taxonomy, architectures and future challenges. Comput Netw. https:\/\/doi.org\/10.1016\/j.comnet.2019.106984","journal-title":"Comput Netw"},{"issue":"2","key":"5372_CR12","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MCOM.2018.1700622","volume":"56","author":"K Kaur","year":"2018","unstructured":"Kaur K, Garg S, Aujla GS, Kumar N, Rodrigues JJ, Guizani M (2018) Edge computing in the industrial internet of things environment: software-defined-networks-based edge-cloud interplay. IEEE Commun Mag 56(2):44\u201351. https:\/\/doi.org\/10.1109\/MCOM.2018.1700622","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"5372_CR13","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1109\/TII.2017.2738841","volume":"14","author":"GS Aujla","year":"2018","unstructured":"Aujla GS, Kumar N, Zomaya AY, Ranjan R (2018) Optimal decision making for big data processing at edge-cloud environment: an SDN perspective. IEEE Trans Ind Inf 14(2):778\u2013789. https:\/\/doi.org\/10.1109\/TII.2017.2738841","journal-title":"IEEE Trans Ind Inf"},{"issue":"1","key":"5372_CR14","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/TNSM.2017.2654681","volume":"14","author":"D Dietrich","year":"2017","unstructured":"Dietrich D, Abujoda A, Rizk A, Papadimitriou P (2017) Multi-provider service chain embedding with nestor. IEEE Trans Netw Serv Manag 14(1):91\u2013105. https:\/\/doi.org\/10.1109\/TNSM.2017.2654681","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"2","key":"5372_CR15","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1109\/TNSM.2015.2417652","volume":"12","author":"D Dietrich","year":"2015","unstructured":"Dietrich D, Rizk A, Papadimitriou P (2015) Multi-provider virtual network embedding with limited information disclosure. IEEE Trans Netw Serv Manag 12(2):188\u2013201. https:\/\/doi.org\/10.1109\/TNSM.2015.2417652","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"1","key":"5372_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1869-0238-4-6","volume":"4","author":"F Samuel","year":"2013","unstructured":"Samuel F, Chowdhury M, Boutaba R (2013) PolyViNE: Policy-based virtual network embedding across multiple domains. J Internet Serv Appl 4(1):1\u201323. https:\/\/doi.org\/10.1186\/1869-0238-4-6","journal-title":"J Internet Serv Appl"},{"key":"5372_CR17","doi-asserted-by":"publisher","unstructured":"Afolabi I, Bagaa M, Taleb T, Flinck H (2017) End-To-end network slicing enabled through network function virtualization. In: 2017 IEEE conference on standards for communications and networking, CSCN 2017, pp 30\u201335. https:\/\/doi.org\/10.1109\/CSCN.2017.8088594","DOI":"10.1109\/CSCN.2017.8088594"},{"issue":"2","key":"5372_CR18","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1109\/TNSM.2017.2693404","volume":"14","author":"N Shahriar","year":"2017","unstructured":"Shahriar N, Ahmed R, Chowdhury SR, Khan A, Boutaba R, Mitra J (2017) Generalized recovery from node failure in virtual network embedding. IEEE Trans Netw Serv Manag 14(2):261\u2013274. https:\/\/doi.org\/10.1109\/TNSM.2017.2693404","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"5372_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICC.2017.7996840","volume":"1","author":"W Ding","year":"2017","unstructured":"Ding W, Yu H, Luo S (2017) Enhancing the reliability of services in NFV with the cost-efficient redundancy scheme. IEEE Int Conf Commun 1:1\u20136. https:\/\/doi.org\/10.1109\/ICC.2017.7996840","journal-title":"IEEE Int Conf Commun"},{"key":"5372_CR20","doi-asserted-by":"publisher","unstructured":"Beck MT, Botero JF, Samelin K (2017) Resilient allocation of service function chains. In: 2016 IEEE conference on network function virtualization and software defined networks, NFV-SDN 2016, pp 128\u2013133. https:\/\/doi.org\/10.1109\/NFV-SDN.2016.7919487","DOI":"10.1109\/NFV-SDN.2016.7919487"},{"key":"5372_CR21","doi-asserted-by":"publisher","unstructured":"Cotroneo D, De Simone L, Iannillo AK, Lanzaro A, Natella R, Fan J, Ping W (2014) Network function virtualization: challenges and directions for reliability assurance. In: Proceedings\u2014IEEE 25th international symposium on software reliability engineering workshops, ISSREW 2014, pp 37\u201342. https:\/\/doi.org\/10.1109\/ISSREW.2014.48","DOI":"10.1109\/ISSREW.2014.48"},{"issue":"c","key":"5372_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/jiot.2019.2937110","volume":"PP","author":"G Sun","year":"2019","unstructured":"Sun G, Xu Z, Yu H, Chen X, Chang V, Vasilakos AV (2019) Low-latency and resource-efficient service function chaining orchestration in network function virtualization. IEEE Internet Things J PP(c):1\u20131. https:\/\/doi.org\/10.1109\/jiot.2019.2937110","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"5372_CR23","doi-asserted-by":"publisher","first-page":"3877","DOI":"10.1109\/JSYST.2018.2879883","volume":"13","author":"G Sun","year":"2019","unstructured":"Sun G, Zhu G, Liao D, Yu H, Du X, Guizani M (2019) Cost-efficient service function chain orchestration for low-latency applications in NFV networks. IEEE Syst J 13(4):3877\u20133888. https:\/\/doi.org\/10.1109\/JSYST.2018.2879883","journal-title":"IEEE Syst J"},{"key":"5372_CR24","doi-asserted-by":"publisher","first-page":"37314","DOI":"10.1109\/ACCESS.2018.2847910","volume":"6","author":"P Zhang","year":"2018","unstructured":"Zhang P, Yao H, Qiu C, Liu Y (2018) Virtual network embedding using node multiple metrics based on simplified electre method. IEEE Access 6:37314\u201337327. https:\/\/doi.org\/10.1109\/ACCESS.2018.2847910","journal-title":"IEEE Access"},{"key":"5372_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2885748","author":"M Di Mauro","year":"2018","unstructured":"Di Mauro M, Longo M, Postiglione F (2018) Availability evaluation of multi-tenant service function chaining infrastructures by multidimensional universal generating function. IEEE Trans Serv Comput. https:\/\/doi.org\/10.1109\/TSC.2018.2885748","journal-title":"IEEE Trans Serv Comput"},{"key":"5372_CR26","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1016\/j.future.2017.09.065","volume":"87","author":"G Sun","year":"2018","unstructured":"Sun G, Liao D, Zhao D, Sun Z, Chang V (2018) Towards provisioning hybrid virtual networks in federated cloud data centers. Future Gener Comput Syst 87:457\u2013469. https:\/\/doi.org\/10.1016\/j.future.2017.09.065","journal-title":"Future Gener Comput Syst"},{"issue":"4","key":"5372_CR27","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1016\/j.comnet.2010.12.011","volume":"55","author":"I Houidi","year":"2011","unstructured":"Houidi I, Louati W, Ben Ameur W, Zeghlache D (2011) Virtual network provisioning across multiple substrate networks. Comput Netw 55(4):1011\u20131023. https:\/\/doi.org\/10.1016\/j.comnet.2010.12.011","journal-title":"Comput Netw"},{"key":"5372_CR28","doi-asserted-by":"publisher","unstructured":"Zhang Q, Wang X, Kim I, Palacharla P, Ikeuchi T (2016) Vertex-centric computation of service function chains in multi-domain networks. In: IEEE NETSOFT 2016\u20132016 IEEE NetSoft conference and workshops: software-defined infrastructure for networks, clouds, IoT and services, pp 211\u2013218. https:\/\/doi.org\/10.1109\/NETSOFT.2016.7502415","DOI":"10.1109\/NETSOFT.2016.7502415"},{"key":"5372_CR29","doi-asserted-by":"publisher","unstructured":"Abujoda A, Papadimitriou P (2016) DistNSE: Distributed network service embedding across multiple providers. In: 2016 8th International conference on communication systems and networks, COMSNETS 2016 (i), pp 1\u20138. https:\/\/doi.org\/10.1109\/COMSNETS.2016.7439948","DOI":"10.1109\/COMSNETS.2016.7439948"},{"key":"5372_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2018.01.025","volume":"284","author":"H Yao","year":"2018","unstructured":"Yao H, Chen X, Li M, Zhang P, Wang L (2018) A novel reinforcement learning algorithm for virtual network embedding. Neurocomputing 284:1\u20139. https:\/\/doi.org\/10.1016\/j.neucom.2018.01.025","journal-title":"Neurocomputing"},{"issue":"1","key":"5372_CR31","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/TNSM.2016.2522080","volume":"13","author":"SS Mwanje","year":"2016","unstructured":"Mwanje SS, Schmelz LC, Mitschele-Thiel A (2016) Cognitive cellular networks: a Q-learning framework for self-organizing networks. IEEE Trans Netw Serv Manag 13(1):85\u201398. https:\/\/doi.org\/10.1109\/TNSM.2016.2522080","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"January","key":"5372_CR32","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.comcom.2018.07.015","volume":"129","author":"J Moysen","year":"2018","unstructured":"Moysen J, Giupponi L (2018) From 4G to 5G: self-organized network management meets machine learning. Comput Commun 129(January):248\u2013268. https:\/\/doi.org\/10.1016\/j.comcom.2018.07.015","journal-title":"Comput Commun"},{"issue":"c","key":"5372_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TNSE.2020.2995863","volume":"4697","author":"P Zhang","year":"2020","unstructured":"Zhang P, Wang C, Jiang C, Benslimane A (2020) Security-aware virtual network embedding algorithm based on reinforcement learning. IEEE Trans Netw Sci Eng 4697(c):1\u201311. https:\/\/doi.org\/10.1109\/TNSE.2020.2995863","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"5372_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/tii.2020.2968946","volume":"3203","author":"M Singh","year":"2020","unstructured":"Singh M, Aujla GSS, Singh A, Kumar N, Garg S (2020) Deep learning based blockchain framework for secure software defined industrial networks. IEEE Trans Ind Inform 3203:1\u20131. https:\/\/doi.org\/10.1109\/tii.2020.2968946","journal-title":"IEEE Trans Ind Inform"},{"key":"5372_CR35","doi-asserted-by":"publisher","unstructured":"Houidi I, Louati W, Zeghlache D (2008) A distributed virtual network mapping algorithm. In: IEEE international conference on communications, pp 5634\u20135640. https:\/\/doi.org\/10.1109\/ICC.2008.1056","DOI":"10.1109\/ICC.2008.1056"},{"issue":"4","key":"5372_CR36","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MCOMSTD.2017.8258603","volume":"1","author":"T Mahmoodi","year":"2017","unstructured":"Mahmoodi T, Van Helvoort H, Mansfield S (2017) Management and orchestration. IEEE Commun Stand Mag 1(4):60. https:\/\/doi.org\/10.1109\/MCOMSTD.2017.8258603","journal-title":"IEEE Commun Stand Mag"},{"key":"5372_CR37","doi-asserted-by":"publisher","unstructured":"Shen M, Xu K, Yang K, Chen HH (2014) Towards efficient virtual network embedding across multiple network domains. In: IEEE international workshop on quality of service, IWQoS, pp 61\u201370. https:\/\/doi.org\/10.1109\/IWQoS.2014.6914301","DOI":"10.1109\/IWQoS.2014.6914301"},{"key":"5372_CR38","doi-asserted-by":"crossref","unstructured":"Dietrich D, Rizk A, Papadimitriou P (2013) Multi-domain virtual network embedding with limited information disclosure. In: 2013 IFIP networking conference, IFIP networking 2013, 12(2), pp 188\u2013201 (2013)","DOI":"10.1109\/TNSM.2015.2417652"},{"key":"5372_CR39","doi-asserted-by":"publisher","first-page":"22054","DOI":"10.1109\/ACCESS.2017.2761840","volume":"5","author":"H Cao","year":"2017","unstructured":"Cao H, Zhu Y, Yang L, Zheng G (2017) A efficient mapping algorithm with novel node-ranking approach for embedding virtual networks. IEEE Access 5:22054\u201322066. https:\/\/doi.org\/10.1109\/ACCESS.2017.2761840","journal-title":"IEEE Access"},{"issue":"3","key":"5372_CR40","doi-asserted-by":"publisher","first-page":"545","DOI":"10.25046\/aj020370","volume":"2","author":"S Li","year":"2017","unstructured":"Li S, Saidi MY, Chen K (2017) Multi-domainvirtualnetwork embedding with coordinated link mapping. Adv Sci Technol Eng Syst 2(3):545\u2013552. https:\/\/doi.org\/10.25046\/aj020370","journal-title":"Adv Sci Technol Eng Syst"},{"key":"5372_CR41","doi-asserted-by":"publisher","unstructured":"Martin-Perez J, Bernardos CJ (2018) Multi-Domain VNF Mapping Algorithms. In: IEEE International symposium on broadband multimedia systems and broadcasting, BMSB 2018-June. https:\/\/doi.org\/10.1109\/BMSB.2018.8436765","DOI":"10.1109\/BMSB.2018.8436765"},{"key":"5372_CR42","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.3966\/160792642018111906010","volume":"19","author":"Q Xu","year":"2018","unstructured":"Xu Q, Gao D, Zhou H, Quan W, Shi W (2018) An energy-aware method for multi-domain service function chaining. J Internet Technol 19:1727\u20131739. https:\/\/doi.org\/10.3966\/160792642018111906010","journal-title":"J Internet Technol"},{"key":"5372_CR43","doi-asserted-by":"publisher","unstructured":"Boutigny F, Betg\u00e9-Brezetz S, Debar H, Blanc G, Lavignotte A, Popescu I (2018) Multi-provider secure virtual network embedding. In: 2018 9th IFIP international conference on new technologies, mobility and security, NTMS 2018\u2014proceedings 2018-Janua, pp 1\u20135. https:\/\/doi.org\/10.1109\/NTMS.2018.8328706","DOI":"10.1109\/NTMS.2018.8328706"},{"key":"5372_CR44","doi-asserted-by":"publisher","unstructured":"Sun G, Li Y, Zhu G, Liao D, Chang V (2018) Energy-efficient service function chain provisioning in multi-domain networks. In: IoTBDS 2018\u2014Proceedings of the 3rd international conference on internet of things, big data and security 2018-March(January), pp 144\u2013163. https:\/\/doi.org\/10.5220\/0006770301440152","DOI":"10.5220\/0006770301440152"},{"key":"5372_CR45","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/j.future.2018.09.037","volume":"91","author":"G Sun","year":"2019","unstructured":"Sun G, Li Y, Yu H, Vasilakos AV, Du X, Guizani M (2019) Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks. Future Gener Comput Syst 91:347\u2013360. https:\/\/doi.org\/10.1016\/j.future.2018.09.037","journal-title":"Future Gener Comput Syst"},{"issue":"2","key":"5372_CR46","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1109\/TCYB.2016.2645123","volume":"48","author":"S Haeri","year":"2018","unstructured":"Haeri S, Trajkovi\u0107 L (2018) Virtual network embedding via Monte Carlo Tree search. IIEEE Trans Cyberneti 48(2):510\u2013521. https:\/\/doi.org\/10.1109\/TCYB.2016.2645123","journal-title":"IIEEE Trans Cyberneti"},{"key":"5372_CR47","doi-asserted-by":"publisher","unstructured":"Dolati M, Hassanpour SB, Ghaderi M, Khonsari A (2019) DeepViNE: Virtual network embedding with deep reinforcement learning. In: INFOCOM 2019\u2014IEEE conference on computer communications workshops, INFOCOM WKSHPS 2019, pp 879\u2013885. https:\/\/doi.org\/10.1109\/INFCOMW.2019.8845171","DOI":"10.1109\/INFCOMW.2019.8845171"},{"key":"5372_CR48","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.jnca.2015.03.007","volume":"53","author":"Z Zhang","year":"2015","unstructured":"Zhang Z, Su S, Lin Y, Cheng X, Shuang K, Xu P (2015) Adaptive multi-objective artificial immune system based virtual network embedding. J Netw Comput Appl 53:140\u2013155. https:\/\/doi.org\/10.1016\/j.jnca.2015.03.007","journal-title":"J Netw Comput Appl"},{"issue":"4","key":"5372_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TNSM.2019.2947905","volume":"16","author":"TAQ Pham","year":"2019","unstructured":"Pham TAQ, Hadjadj-aoul Y, Outtagarts A (2019) VNF-FG embedding: a deep reinforcement learning approach. IEEE Trans Netw Serv Manag 16(4):1318\u20131331. https:\/\/doi.org\/10.1109\/TNSM.2019.2947905","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"5372_CR50","doi-asserted-by":"publisher","unstructured":"Baggio G, Francescon A, Fedrizzi R (2017) Multi-domain service orchestration with X-MANO. In: 2017 IEEE conference on network softwarization: softwarization sustaining a hyper-connected world: en route to 5G, NetSoft 2017, pp 5\u20136. https:\/\/doi.org\/10.1109\/NETSOFT.2017.8004259","DOI":"10.1109\/NETSOFT.2017.8004259"},{"key":"5372_CR51","doi-asserted-by":"publisher","unstructured":"Francescon A, Baggio G, Fedrizzi R, Ferrusy R,  Ben Yahiaz I, Riggio R (2017) X\u2013MANO: Cross\u2013domain management and orchestration of network services, 2017. IEEE Conference on Network Softwarization (NetSoft), Bologna, 2017, pp 1\u20135. https:\/\/doi.org\/10.1109\/NETSOFT.2017.8004223","DOI":"10.1109\/NETSOFT.2017.8004223"},{"key":"5372_CR52","doi-asserted-by":"publisher","unstructured":"Tusa F, Clayman S, Valocchi D, Galis A (2018) Multi-domain orchestration for the deployment and management of services on a slice enabled NFVI. In: 2018 IEEE conference on network function virtualization and software defined networks, NFV-SDN 2018, pp. 1\u20135. https:\/\/doi.org\/10.1109\/NFV-SDN.2018.8725769","DOI":"10.1109\/NFV-SDN.2018.8725769"},{"key":"5372_CR53","doi-asserted-by":"publisher","unstructured":"Cao H, Chen J, Guo Y, Zhu H, Yang L (2019) A novel and one-stage embedding algorithm for mapping virtual networks. In: 2018 24th Asia-Pacific conference on communications, APCC 2018, pp 156\u2013161. https:\/\/doi.org\/10.1109\/APCC.2018.8633537","DOI":"10.1109\/APCC.2018.8633537"},{"issue":"4","key":"5372_CR54","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/3092819.3092827","volume":"44","author":"F Bianchi","year":"2017","unstructured":"Bianchi F, Presti FL (2017) A markov reward based resource-latency aware heuristic for the virtual network embedding problem. Perform Eval Rev 44(4):57\u201368. https:\/\/doi.org\/10.1145\/3092819.3092827","journal-title":"Perform Eval Rev"},{"key":"5372_CR55","doi-asserted-by":"publisher","unstructured":"Gong L, Wen Y, Zhu Z, Lee T (2014) Toward profit-seeking virtual network embedding algorithm via global resource capacity. In: Proceedings\u2014IEEE INFOCOM, pp 1\u20139. https:\/\/doi.org\/10.1109\/INFOCOM.2014.6847918","DOI":"10.1109\/INFOCOM.2014.6847918"},{"key":"5372_CR56","doi-asserted-by":"publisher","unstructured":"Amiri R, Mehrpouyan H, Fridman L, Mallik RK, Nallanathan A, Matolak D (2018) A machine learning approach for power allocation in HetNets considering QoS. In: IEEE international conference on communications 2018-May. https:\/\/doi.org\/10.1109\/ICC.2018.8422864","DOI":"10.1109\/ICC.2018.8422864"},{"issue":"February","key":"5372_CR57","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.jnca.2018.10.005","volume":"124","author":"K Hejja","year":"2018","unstructured":"Hejja K, Hesselbach X (2018) Online power aware coordinated virtual network embedding with 5G delay constraint. J Netw Comput Appl 124(February):121\u2013136. https:\/\/doi.org\/10.1016\/j.jnca.2018.10.005","journal-title":"J Netw Comput Appl"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-020-05372-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-020-05372-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-020-05372-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T15:07:25Z","timestamp":1697728045000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-020-05372-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":57,"journal-issue":{"issue":"33","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["5372"],"URL":"https:\/\/doi.org\/10.1007\/s00521-020-05372-x","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"1 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}