{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T22:46:30Z","timestamp":1765233990281,"version":"3.44.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10586-024-04967-6","type":"journal-article","created":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T11:51:35Z","timestamp":1745841095000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Service function chain mapping method based on delay guarantee"],"prefix":"10.1007","volume":"28","author":[{"given":"Bin","family":"Zhuge","sequence":"first","affiliation":[]},{"given":"Xiaodan","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Zitian","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qianye","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Ligang","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Xian","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Yueqian","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Lingrong","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,28]]},"reference":[{"issue":"36","key":"4967_CR1","doi-asserted-by":"publisher","first-page":"170","DOI":"10.19981\/j.CN23-1581\/G3.2022.36.038","volume":"12","author":"M Li","year":"2022","unstructured":"Li, M.: Research on the development of network information security technology in cloud computing environment. Technol. Innov. Appl. 12(36), 170\u2013173 (2022). https:\/\/doi.org\/10.19981\/j.CN23-1581\/G3.2022.36.038","journal-title":"Technol. Innov. Appl."},{"issue":"2","key":"4967_CR2","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MCOM.2015.7045396","volume":"53","author":"B Han","year":"2015","unstructured":"Han, B., Gopalakrishnan, V., Ji, L., et al.: Network function virtualization: challenges and opportunities for innovations. IEEE Commun. Mag. 53(2), 90\u201397 (2015)","journal-title":"IEEE Commun. Mag."},{"key":"4967_CR3","unstructured":"Guerzoni, R.: Network functions virtualization: an introduction, benefits, enablers, challenges and call for action, introductory white paper. In: SDN and OpenFlow World Congress, vol. 1, pp. 5\u20137 (2012)"},{"key":"4967_CR4","doi-asserted-by":"crossref","unstructured":"Halpern, J., Pignataro, C.: Service function chaining (SFC) architecture[M]\/\/RFC 7665, pp. 1\u201332 (2015)","DOI":"10.17487\/RFC7665"},{"issue":"6","key":"4967_CR5","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MNET.2014.6963800","volume":"28","author":"H Hawilo","year":"2014","unstructured":"Hawilo, H., Shami, A., Mirahmadi, M., et al.: NFV: state of the art, challenges, and implementation in next generation mobile networks (vEPC). IEEE Netw. 28(6), 18\u201326 (2014)","journal-title":"IEEE Netw."},{"issue":"1","key":"4967_CR6","first-page":"4","volume":"30","author":"GS Leoni","year":"2021","unstructured":"Leoni, G.S., Freitas, D.D.B., Silva, D.\u00c9.R., et al.: Service function chain placement in distributed scenarios: a systematic review. J. Netw. Syst. Manag. 30(1), 4 (2021)","journal-title":"J. Netw. Syst. Manag."},{"issue":"1","key":"4967_CR7","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1109\/TNSM.2018.2873225","volume":"16","author":"MM Tajiki","year":"2018","unstructured":"Tajiki, M.M., Salsano, S., Chiaraviglio, L., et al.: Joint energy efficient and QoS-aware path allocation and VNF placement for service function chaining. IEEE Trans. Netw. Serv. Manag. 16(1), 374\u2013388 (2018)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"4967_CR8","doi-asserted-by":"crossref","unstructured":"Soualah, O., Mechtri, M., Ghribi, C., et al.: Energy efficient algorithm for VNF placement and chaining. In: 2017 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 579\u2013588. IEEE (2017)","DOI":"10.1109\/CCGRID.2017.84"},{"key":"4967_CR9","unstructured":"Bliek1\u00fa, C., Bonami, P., Lodi, A.: Solving mixed-integer quadratic programming problems with IBM-CPLEX: a progress report. In: Proceedings of the Twenty-Sixth RAMP Symposium, pp. 16\u201317 (2014)"},{"key":"4967_CR10","unstructured":"Grant, M., Boyd, S.: CVX: Matlab software for disciplined convex programming, version 2.1[J] (2014)"},{"key":"4967_CR11","unstructured":"Optimization, G.: Gurobi optimizer reference manual, 2020. http:\/\/www.gurobi.com, 12 (2012)"},{"issue":"4","key":"4967_CR12","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1109\/TNSM.2016.2569020","volume":"13","author":"F Bari","year":"2016","unstructured":"Bari, F., Chowdhury, S.R., Ahmed, R., et al.: Orchestrating virtualized network functions. IEEE Trans. Netw. Serv. Manag. 13(4), 725\u2013739 (2016)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"4967_CR13","doi-asserted-by":"crossref","unstructured":"Luizelli, M.C., Bays, L.R., Buriol, L.S., et al.: Piecing together the NFV provisioning puzzle: efficient placement and chaining of virtual network functions. In: 2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM), pp. 98\u2013106. IEEE (2015)","DOI":"10.1109\/INM.2015.7140281"},{"key":"4967_CR14","doi-asserted-by":"crossref","unstructured":"Cziva, R., Pezaros, D.P.: On the latency benefits of edge nfv. In: 2017 ACM\/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 105\u2013106. IEEE (2017)","DOI":"10.1109\/ANCS.2017.23"},{"issue":"3","key":"4967_CR15","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/TNSM.2016.2598068","volume":"13","author":"M Mechtri","year":"2016","unstructured":"Mechtri, M., Ghribi, C., Zeghlache, D.: A scalable algorithm for the placement of service function chains. IEEE Trans. Netw. Serv. Manag. 13(3), 533\u2013546 (2016)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"4","key":"4967_CR16","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s10922-023-09771-y","volume":"31","author":"R Panteleimon","year":"2023","unstructured":"Panteleimon, R., Panagiotis, P.: Intelligent and resource-conserving service function chain (SFC) embedding. J. Netw. Syst. Manag. 31(4), 81 (2023)","journal-title":"J. Netw. Syst. Manag."},{"issue":"prepublish","key":"4967_CR17","first-page":"1","volume":"2024","author":"Y Yue","year":"2024","unstructured":"Yue, Y., Sun, S., Zhang, X., et al.: VNF placement in NFV-enabled networks: considering time-varying workloads and multi-tenancy with a throughput optimization heuristic. Computing 2024(prepublish), 1\u201334 (2024)","journal-title":"Computing"},{"key":"4967_CR18","unstructured":"Chen, X., Yang, Y.: Reinforcement learning: survey of recent work. Appl. Res. Comput. 27(08), 2834\u20132838+2844 (2010)"},{"key":"4967_CR19","doi-asserted-by":"crossref","unstructured":"Xiao, Y., Zhang, Q., Liu, F., et al.: NFVdeep: adaptive online service function chain deployment with deep reinforcement learning. In: Proceedings of the International Symposium on Quality of Service, pp. 1\u201310 (2019)","DOI":"10.1145\/3326285.3329056"},{"issue":"2","key":"4967_CR20","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1109\/JSAC.2019.2959181","volume":"38","author":"J Pei","year":"2019","unstructured":"Pei, J., Hong, P., Pan, M., et al.: Optimal VNF placement via deep reinforcement learning in SDN\/NFV-enabled networks. IEEE J. Sel. Areas Commun. 38(2), 263\u2013278 (2019)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"04","key":"4967_CR21","first-page":"69","volume":"31","author":"M Wang","year":"2023","unstructured":"Wang, M., Chi, Y., Yang, X.: A dynamic mapping scheme for service function chains oriented to multi-tenant shared VNF instances. J. Beijing Inst. Electron. Sci. Technol. 31(04), 69\u201378 (2023)","journal-title":"J. Beijing Inst. Electron. Sci. Technol."},{"issue":"06","key":"4967_CR22","first-page":"40","volume":"41","author":"Y Long","year":"2024","unstructured":"Long, Y.: Low-power deployment method for heterogeneous service function chain of software-defined wireless network. J. Xinxiang Univ. 41(06), 40\u201344 (2024)","journal-title":"J. Xinxiang Univ."},{"key":"4967_CR23","doi-asserted-by":"crossref","unstructured":"Abdel-Basset, M., Abdel-Fatah, L., Sangaiah, A.: Metaheuristic algorithms: a comprehensive review. Computational intelligence for multimedia big data on the cloud with engineering applications, pp. 185\u2013231 (2018)","DOI":"10.1016\/B978-0-12-813314-9.00010-4"},{"key":"4967_CR24","doi-asserted-by":"crossref","unstructured":"Li, J., Shi, W., Zhang, N., et al.: Reinforcement learning based VNF scheduling with end-to-end delay guarantee. In: 2019 IEEE\/CIC International Conference on Communications in China (ICCC), pp. 572\u2013577. IEEE (2019)","DOI":"10.1109\/ICCChina.2019.8855889"},{"issue":"2","key":"4967_CR25","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/s10922-024-09803-1","volume":"32","author":"IS Eddine","year":"2024","unstructured":"Eddine, I.S., Lamri, S., Djamil, A.: Placement optimization of virtual network functions in a cloud computing environment. J. Netw. Syst. Manag. 32(2), 29 (2024)","journal-title":"J. Netw. Syst. Manag."},{"key":"4967_CR26","doi-asserted-by":"crossref","unstructured":"Yala, L., Frangoudis, P.A., Ksentini, A.: Latency and availability driven VNF placement in a MEC-NFV environment. In: 2018 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/GLOCOM.2018.8647858"},{"issue":"1","key":"4967_CR27","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1080\/21642583.2019.1708830","volume":"8","author":"J Xue","year":"2020","unstructured":"Xue, J., Shen, B.: A novel swarm intelligence optimization approach: sparrow search algorithm. Syst. Sci. Control Eng. Open Access J. 8(1), 22\u201334 (2020)","journal-title":"Syst. Sci. Control Eng. Open Access J."},{"issue":"5","key":"4967_CR28","first-page":"101","volume":"44","author":"X Kui","year":"2022","unstructured":"Kui, X., He, R., Chen, J.: Research on underwater acoustic spread spectrum communication technology based on chaotic encryption. Ship Sci. Technol. 44(5), 101\u2013104 (2022)","journal-title":"Ship Sci. Technol."},{"key":"4967_CR29","first-page":"3","volume":"11","author":"R Zheng","year":"2020","unstructured":"Zheng, R., Sui, T., Zhang, T., Jiang, Q.: Optimization analysis of chaotic sequence for DCSK. Changjiang Inf. Commun. 11, 3 (2020)","journal-title":"Changjiang Inf. Commun."},{"key":"4967_CR30","unstructured":"Zhang, J., Liu, A.: A UAV trajectory planning method based on improved Levy flight ant lion optimization algorithm. CN111815055A [P] (2020)"},{"key":"4967_CR31","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1016\/j.future.2019.02.028","volume":"97","author":"AA Heidari","year":"2019","unstructured":"Heidari, A.A., Mirjalili, S., Faris, H., et al.: Harris hawks optimization: algorithm and applications. Futur. Gener. Comput. Syst. 97, 849\u2013872 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"12","key":"4967_CR32","doi-asserted-by":"publisher","first-page":"21","DOI":"10.19304\/J.ISSN1000-7180.2022.0223","volume":"39","author":"G Wu","year":"2022","unstructured":"Wu, G., Wei, W., Li, S., Guo, Y., Wu, C.: Multi-strategy optimization sparrow search algorithm based on chaos and its application. Microelectron. Comput. 39(12), 21\u201330 (2022). https:\/\/doi.org\/10.19304\/J.ISSN1000-7180.2022.0223","journal-title":"Microelectron. Comput."},{"issue":"2","key":"4967_CR33","doi-asserted-by":"publisher","first-page":"350","DOI":"10.4304\/jsw.9.2.350-357","volume":"9","author":"X Xia","year":"2014","unstructured":"Xia, X., Liu, J., Li, Y.: Particle Swarm optimization algorithm with reverse-learning and local-learning behavior. J. Softw. 9(2), 350\u2013357 (2014)","journal-title":"J. Softw."},{"key":"4967_CR34","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili, S., Mirjalili, S.M., Lewis, A.: Grey wolf optimizer. Adv. Eng. Softw. 69, 46\u201361 (2014)","journal-title":"Adv. Eng. Softw."},{"issue":"2","key":"4967_CR35","first-page":"150194","volume":"4","author":"M Jamil","year":"2013","unstructured":"Jamil, M., Yang, X.S.: A literature survey of benchmark functions for global optimization problems. Int. J. Math. Modell. Numer. Optim. 4(2), 150194 (2013)","journal-title":"Int. J. Math. Modell. Numer. Optim."},{"key":"4967_CR36","unstructured":"Liu, Y.: Virtual network function resource allocation and service function chain routing. University of Science and Technology of China (2020)"},{"key":"4967_CR37","doi-asserted-by":"crossref","unstructured":"Mills, D.L., Braun, H.W.: The NSFNET backbone network. In: Proceedings of the ACM Workshop on Frontiers in Computer Communications Technology, pp. 191\u2013196 (1987)","DOI":"10.1145\/55482.55502"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04967-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04967-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04967-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T12:40:08Z","timestamp":1757162408000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04967-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,28]]},"references-count":37,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["4967"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04967-6","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,4,28]]},"assertion":[{"value":"5 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"322"}}