{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T10:58:10Z","timestamp":1768993090963,"version":"3.49.0"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:00:00Z","timestamp":1755734400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:00:00Z","timestamp":1755734400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"VMWare University Research, USA"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Photon Netw Commun"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s11107-025-01033-y","type":"journal-article","created":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T11:36:57Z","timestamp":1755776217000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Virtual network embedding on multi-cloud infrastructure using hierarchical reinforcement learning and heuristic approaches"],"prefix":"10.1007","volume":"50","author":[{"given":"Anukul","family":"Parajuli","sequence":"first","affiliation":[]},{"given":"Krishna M.","family":"Sivalingam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,21]]},"reference":[{"key":"1033_CR1","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.comnet.2018.01.021","volume":"133","author":"B Yi","year":"2018","unstructured":"Yi, B., Wang, X., Li, K., Das, S.K., Huang, M.: A comprehensive survey of Network Function Virtualization. Comput. Netw. 133, 212\u2013262 (2018)","journal-title":"Comput. Netw."},{"issue":"2","key":"1033_CR2","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MCOM.2015.7045396","volume":"53","author":"B Han","year":"2015","unstructured":"Han, B., Gopalakrishnan, V., Ji, L., Lee, S.: Network function virtualization: Challenges and opportunities for innovations. IEEE Commun. Mag. 53(2), 90\u201397 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"5","key":"1033_CR3","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MCOM.2017.1600935","volume":"55","author":"J Ordonez-Lucena","year":"2017","unstructured":"Ordonez-Lucena, J., Ameigeiras, P., Lopez, D., Ramos-Munoz, J.J., Lorca, J., Folgueira, J.: Network Slicing for 5G with SDN\/NFV: Concepts, Architectures, and Challenges. IEEE Commun. Mag. 55(5), 80\u201387 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"6","key":"1033_CR4","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1109\/JSAC.2017.2692307","volume":"35","author":"M Shafi","year":"2017","unstructured":"Shafi, M., Molisch, A.F., Smith, P.J., Haustein, T., Zhu, P., De Silva, P., Tufvesson, F., Benjebbour, A., Wunder, G.: 5G: A Tutorial Overview of Standards, Trials, Challenges, Deployment, and Practice. IEEE Journal on Selected Areas in Communications 35(6), 1201\u20131221 (2017)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"1033_CR5","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/COMST.2014.2330903","volume":"17","author":"W Xia","year":"2015","unstructured":"Xia, W., Wen, Y., Foh, C.H., Niyato, D., Xie, H.: A Survey on Software-Defined Networking. IEEE Communications Surveys & Tutorials 17(1), 27\u201351 (2015)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1033_CR6","doi-asserted-by":"crossref","unstructured":"Samar, A., Sivalingam, K.\u00a0M.:\u201cRL-based Virtual Network Embedding using VNF Sharing for Network Slicing in 5G Networks,\u201d in IEEE\/IFIP Network Operations and Management Symposium (NOMS), (May 2023)","DOI":"10.1109\/NOMS56928.2023.10154408"},{"issue":"4","key":"1033_CR7","doi-asserted-by":"publisher","first-page":"1888","DOI":"10.1109\/SURV.2013.013013.00155","volume":"15","author":"A Fischer","year":"2013","unstructured":"Fischer, A., Botero, J.F., Beck, M.T., de Meer, H., Hesselbach, X.: Virtual Network Embedding: A Survey. IEEE Communications Surveys & Tutorials 15(4), 1888\u20131906 (2013)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1033_CR8","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Ammar, M.:\u201cAlgorithms for Assigning Substrate Network Resources to Virtual Network Components,\u201d in Proc. of IEEE INFOCOM, pp. 1\u201312 (2006)","DOI":"10.1109\/INFOCOM.2006.322"},{"key":"1033_CR9","first-page":"229","volume":"32","author":"Y Tuan","year":"2020","unstructured":"Tuan, Y., Tian, Z., Wang, C., Zheng, F., Lv, Y.: A Q-learning-based approach for virtual network embedding in data center. Neural Computing ad Applications 32, 229\u2013256 (2020)","journal-title":"Neural Computing ad Applications"},{"key":"1033_CR10","doi-asserted-by":"crossref","unstructured":"Xiao, X.: \u201cDVNE-DRL: dynamic virtual network embedding algorithm based on deep reinforcement learning,\u201d Scientific Reports, vol.\u00a013, no. 19789, (2023)","DOI":"10.1038\/s41598-023-47195-5"},{"issue":"2","key":"1033_CR11","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/MNET.113.2100739","volume":"37","author":"Q Liu","year":"2023","unstructured":"Liu, Q., Choi, N., Han, T.: Deep reinforcement learning for end-to-end network slicing: Challenges and solutions. IEEE Network Magazine 37(2), 222\u2013228 (2023)","journal-title":"IEEE Network Magazine"},{"issue":"5","key":"1033_CR12","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/TSC.2018.2885299","volume":"14","author":"M Diallo","year":"2021","unstructured":"Diallo, M., Quintero, A., Pierre, S.: A QoS-Based Splitting Strategy for a Resource Embedding Across Multiple Cloud Providers. IEEE Trans. Serv. Comput. 14(5), 1278\u20131291 (2021)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"2","key":"1033_CR13","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1109\/TNSM.2015.2417652","volume":"12","author":"D Dietrich","year":"2015","unstructured":"Dietrich, D., Rizk, A., Papadimitriou, P.: Multi-Provider Virtual Network Embedding With Limited Information Disclosure. IEEE Trans. Netw. Serv. Manage. 12(2), 188\u2013201 (2015)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"1033_CR14","doi-asserted-by":"publisher","first-page":"78425","DOI":"10.1109\/ACCESS.2018.2885033","volume":"6","author":"H Cao","year":"2018","unstructured":"Cao, H., Guo, Y., Hu, Y., Wu, S., Zhu, H., Yang, L.: Location Aware and Node Ranking Value-Assisted Embedding Algorithm for One-Stage Embedding in Multiple Distributed Virtual Network Embedding. IEEE Access 6, 78425\u201378436 (2018)","journal-title":"IEEE Access"},{"key":"1033_CR15","doi-asserted-by":"crossref","unstructured":"Dolati, M., Hassanpour, S.\u00a0B., Ghaderi, M., Khonsari, A.:\u201cDeepViNE: Virtual Network Embedding with Deep Reinforcement Learning,\u201d in Proc. of IEEE INFOCOM Workshops, pp. 879\u2013885 (2019)","DOI":"10.1109\/INFCOMW.2019.8845171"},{"issue":"6","key":"1033_CR16","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1109\/JSAC.2020.2986662","volume":"38","author":"Z Yan","year":"2020","unstructured":"Yan, Z., Ge, J., Wu, Y., Li, L., Li, T.: Automatic Virtual Network Embedding: A Deep Reinforcement Learning Approach With Graph Convolutional Networks. IEEE J. Sel. Areas Commun. 38(6), 1040\u20131057 (2020)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"4","key":"1033_CR17","doi-asserted-by":"publisher","first-page":"4075","DOI":"10.1109\/TNSM.2021.3120297","volume":"18","author":"J Cheng","year":"2021","unstructured":"Cheng, J., Wu, Y., Lin, Y., E, Y., Tang, F., Ge, J.: VNE-HRL: A Proactive Virtual Network Embedding Algorithm Based on Hierarchical Reinforcement Learning. IEEE Transactions on Network and Service Management 18(4), 4075\u20134087 (2021)","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"1033_CR18","doi-asserted-by":"crossref","unstructured":"Lim, H.-K., Ullah, I., Kim, J.-B., Han, Y.-H.: \u201cVirtual network embedding based on hierarchical cooperative multi-agent reinforcement learning,\u201d IEEE Internet of Things Journal, (2023)","DOI":"10.1109\/JIOT.2023.3319542"},{"key":"1033_CR19","doi-asserted-by":"crossref","unstructured":"Dalgkitsis, A., Garrido, L.\u00a0A., Ramantas, K., Vardakas, J.\u00a0S., Kormetzas, G., Verikoukis, C.: \u201cSCHEMA III: Dynamic and Scalable VNE Framework Based on Multi-Agent RL for 5G\/6G Networks,\u201d in Proc. IEEE GLOBECOM, pp. 4351\u20134356 (2023)","DOI":"10.1109\/GLOBECOM54140.2023.10436920"},{"key":"1033_CR20","doi-asserted-by":"crossref","unstructured":"Kibalya, G., Serrat, J., Gorricho, J.-L., Pasquini, R., Yao, H., Zhang, P.:\u201cA Reinforcement Learning Based Approach for 5G Network Slicing Across Multiple Domains,\u201d in Proc. International Conference on Network and Service Management (CNSM), pp. 1\u20135 (2019)","DOI":"10.23919\/CNSM46954.2019.9012674"},{"issue":"5","key":"1033_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3453160","volume":"54","author":"S Pateria","year":"2021","unstructured":"Pateria, S., Subagdja, B., Tan, A.-H., Quek, C.: Hierarchical reinforcement learning: A comprehensive survey. ACM Computing Surveys 54(5), 1\u201335 (2021)","journal-title":"ACM Computing Surveys"},{"key":"1033_CR22","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.comcom.2023.10.024","volume":"213","author":"R Kumar","year":"2024","unstructured":"Kumar, R., Sinwar, D., Singh, V.: QoS aware resource allocation for coexistence mechanisms between eMBB and URLLC: Issues, challenges, and future directions in 5G. Comput. Commun. 213, 208\u2013235 (2024)","journal-title":"Comput. Commun."},{"key":"1033_CR23","doi-asserted-by":"crossref","unstructured":"Chatras, B., Tsang\u00a0Kwong, U.\u00a0S., Bihannic, N.: \u201cNFV enabling network slicing for 5G,\u201d in Proc. of Conference on Innovations in Clouds, Internet and Networks (ICIN), pp. 219\u2013225 (2017)","DOI":"10.1109\/ICIN.2017.7899415"},{"issue":"6","key":"1033_CR24","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1109\/TMC.2019.2908903","volume":"19","author":"M Srinivasan","year":"2020","unstructured":"Srinivasan, M., Murthy, C.S.R.: Efficient Spectrum Slicing in 5G Networks: An Overlapping Coalition Formation Approach. IEEE Trans. Mob. Comput. 19(6), 1299\u20131316 (2020)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"4","key":"1033_CR25","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MCOM.2016.7452271","volume":"54","author":"S Abdelwahab","year":"2016","unstructured":"Abdelwahab, S., Hamdaoui, B., Guizani, M., Znati, T.: Network function virtualization in 5G. IEEE Commun. Mag. 54(4), 84\u201391 (2016)","journal-title":"IEEE Commun. Mag."},{"key":"1033_CR26","unstructured":"Sutton, R.\u00a0S., Barto, A.\u00a0G.: Reinforcement learning: An introduction. MIT press, (2018)"},{"key":"1033_CR27","unstructured":"Graesser, L., Keng, W.\u00a0L.: Foundations of deep reinforcement learning: theory and practice in Python. Addison-Wesley Professional, (2019)"},{"key":"1033_CR28","unstructured":"Sutton, R.\u00a0S., McAllester, D., Singh, S., Mansour, Y.:\u201cPolicy gradient methods for reinforcement learning with function approximation,\u201d Advances in neural information processing systems, vol.\u00a012, (1999)"},{"key":"1033_CR29","unstructured":"Schulman, J., Wolski, F., Dhariwal, P., Radford, A., Klimov, O.: \u201cProximal Policy Optimization Algorithms,\u201d CoRR, vol. abs\/1707.06347, (2017)"},{"issue":"1\u20132","key":"1033_CR30","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/S0004-3702(99)00052-1","volume":"112","author":"RS Sutton","year":"1999","unstructured":"Sutton, R.S., Precup, D., Singh, S.: Between MDPs and semi-MDPs: A framework for temporal abstraction in reinforcement learning. Artif. Intell. 112(1\u20132), 181\u2013211 (1999)","journal-title":"Artif. Intell."},{"key":"1033_CR31","doi-asserted-by":"crossref","unstructured":"Daigavane, A.\u00a0S., Ravindran, B., Aggarwal, G.:\u201cUnderstanding Convolutions on Graphs,\u201d Distill, (2021)","DOI":"10.23915\/distill.00032"},{"issue":"04","key":"1033_CR32","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/1971162.1971168","volume":"41","author":"X Cheng","year":"2011","unstructured":"Cheng, X., Su, S., Zhang, Z., Wang, H., Yang, F., Luo, Y., Wang, J.: Virtual Network Embedding Through Topology-Aware Node Ranking. Computer Communication Review 41(04), 38\u201347 (2011)","journal-title":"Computer Communication Review"},{"key":"1033_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2018.01.025","volume":"284","author":"H Yao","year":"2018","unstructured":"Yao, H., Chen, X., Li, M., Zhang, P., Wang, L.: A novel reinforcement learning algorithm for virtual network embedding. Neurocomputing 284, 1\u20139 (2018)","journal-title":"Neurocomputing"},{"issue":"2","key":"1033_CR34","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1109\/TETC.2018.2871549","volume":"9","author":"H Yao","year":"2021","unstructured":"Yao, H., Zhang, B., Zhang, P., Wu, S., Jiang, C., Guo, S.: RDAM: A Reinforcement Learning Based Dynamic Attribute Matrix Representation for Virtual Network Embedding. IEEE Trans. Emerg. Top. Comput. 9(2), 901\u2013914 (2021)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"2","key":"1033_CR35","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1109\/TNSM.2015.2417652","volume":"12","author":"D Dietrich","year":"2015","unstructured":"Dietrich, D., Rizk, A., Papadimitriou, P.: Multi-Provider Virtual Network Embedding With Limited Information Disclosure. IEEE Trans. Netw. Serv. Manage. 12(2), 188\u2013201 (2015)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"5","key":"1033_CR36","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/TSC.2018.2885299","volume":"14","author":"M Diallo","year":"2021","unstructured":"Diallo, M., Quintero, A., Pierre, S.: A QoS-Based Splitting Strategy for a Resource Embedding Across Multiple Cloud Providers. IEEE Trans. Serv. Comput. 14(5), 1278\u20131291 (2021)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"1033_CR37","doi-asserted-by":"publisher","first-page":"78425","DOI":"10.1109\/ACCESS.2018.2885033","volume":"6","author":"H Cao","year":"2018","unstructured":"Cao, H., Guo, Y., Hu, Y., Wu, S., Zhu, H., Yang, L.: Location Aware and Node Ranking Value-Assisted Embedding Algorithm for One-Stage Embedding in Multiple Distributed Virtual Network Embedding. IEEE Access 6, 78425\u201378436 (2018)","journal-title":"IEEE Access"},{"issue":"3","key":"1033_CR38","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.1109\/TSC.2023.3326539","volume":"17","author":"T Wang","year":"2024","unstructured":"Wang, T., Shen, L., Fan, Q., Xu, T., Liu, T., Xiong, H.: Joint Admission Control and Resource Allocation of Virtual Network Embedding via Hierarchical Deep Reinforcement Learning. IEEE Trans. Serv. Comput. 17(3), 1001\u20131015 (2024)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"4","key":"1033_CR39","doi-asserted-by":"publisher","first-page":"6814","DOI":"10.1109\/TII.2024.3353848","volume":"20","author":"S Wu","year":"2024","unstructured":"Wu, S., Chen, N., Wen, G., Xu, L., Zhang, P., Zhu, H.: Virtual Network Embedding for Task Offloading in IIoT: A DRL-Assisted Federated Learning Scheme. IEEE Trans. Industr. Inf. 20(4), 6814\u20136824 (2024)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"1033_CR40","doi-asserted-by":"publisher","first-page":"3363","DOI":"10.1109\/TIFS.2023.3279587","volume":"18","author":"P Zhang","year":"2023","unstructured":"Zhang, P., Chen, N., Li, S., Choo, K.-K.R., Jiang, C., Wu, S.: Multi-Domain Virtual Network Embedding Algorithm Based on Horizontal Federated Learning. IEEE Transactions on Information Forensics and Security 18, 3363\u20133375 (2023)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1033_CR41","doi-asserted-by":"crossref","unstructured":"Houidi, O., Soualah, O., Houidi, I., Zeghlache, D.: \u201cEnergy Efficient VNF-FG Embedding via Attention-Based Deep Reinforcement Learning,\u201d in Proc. of International Conference on Network and Service Management (CNSM), pp. 1\u20137 (2023)","DOI":"10.23919\/CNSM59352.2023.10327825"},{"issue":"1","key":"1033_CR42","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/S0004-3702(99)00052-1","volume":"112","author":"RS Sutton","year":"1999","unstructured":"Sutton, R.S., Precup, D., Singh, S.: Between MDPs and semi-MDPs: A framework for temporal abstraction in reinforcement learning. Artif. Intell. 112(1), 181\u2013211 (1999)","journal-title":"Artif. Intell."},{"issue":"5","key":"1033_CR43","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/0893-6080(89)90020-8","volume":"2","author":"K Hornik","year":"1989","unstructured":"Hornik, K., Stinchcombe, M., White, H.: Multilayer feedforward networks are universal approximators. Neural Netw 2(5), 359\u2013366 (1989)","journal-title":"Neural Netw"},{"key":"1033_CR44","doi-asserted-by":"crossref","unstructured":"Bai, Y., Ding, H., Bian, S., Chen, T., Sun, Y., Wang, W.:\u201cSimGNN: A Neural Network Approach to Fast Graph Similarity Computation,\u201d 2020. [Online]. Available: arXiv:1808.05689","DOI":"10.1145\/3289600.3290967"},{"key":"1033_CR45","doi-asserted-by":"publisher","first-page":"07","DOI":"10.1007\/s10922-020-09522-3","volume":"28","author":"A Chiha","year":"2020","unstructured":"Chiha, A., Van der Wee, M., Colle, D., Verbrugge, S.: Network Slicing Cost Allocation Model. J. Netw. Syst. Manage. 28, 07 (2020)","journal-title":"J. Netw. Syst. Manage."},{"key":"1033_CR46","doi-asserted-by":"publisher","DOI":"10.25080\/TCWV9851","volume-title":"Exploring network structure, dynamics, and function using NetworkX","author":"A Hagberg","year":"2008","unstructured":"Hagberg, A., Swart, P., Chult, D.S.: Exploring network structure, dynamics, and function using NetworkX. Tech. Rep, Los Alamos National Lab (LANL), USA (2008)"},{"key":"1033_CR47","unstructured":"Paszke, A., et\u00a0al.: \u201cPyTorch: An Imperative Style, High-Performance Deep Learning Library,\u201d in Advances in Neural Information Processing Systems (NIPS), pp. 8024\u20138035 (2019)"},{"issue":"268","key":"1033_CR48","first-page":"1","volume":"22","author":"A Raffin","year":"2021","unstructured":"Raffin, A., Hill, A., Gleave, A., Kanervisto, A., Ernestus, M., Dormann, N.: Stable-Baselines3: Reliable Reinforcement Learning Implementations. J. Mach. Learn. Res. 22(268), 1\u20138 (2021)","journal-title":"J. Mach. Learn. Res."},{"key":"1033_CR49","doi-asserted-by":"crossref","unstructured":"Ge, J., Li, T., Wu, Y.:\u201cVirtual Network Embedding via Hierarchical Reinforcement Learning 1,\u201d in AI and Machine Learning for Network and Security Management. Wiley-IEEE Press, pp. 69\u201389 (2023)","DOI":"10.1002\/9781119835905.ch4"},{"issue":"2","key":"1033_CR50","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/TSSC.1968.300136","volume":"4","author":"PE Hart","year":"1968","unstructured":"Hart, P.E., Nilsson, N.J., Raphael, B.: A formal basis for the heuristic determination of minimum cost paths. IEEE Transactions on Systems Science and Cybernetics 4(2), 100\u2013107 (1968)","journal-title":"IEEE Transactions on Systems Science and Cybernetics"},{"key":"1033_CR51","doi-asserted-by":"crossref","unstructured":"Bynum, M.\u00a0L., Hackebeil, G.\u00a0A., Hart, W.\u00a0E., Laird, C.\u00a0D., Nicholson, B.\u00a0L., Siirola, J.\u00a0D., Watson, J.-P., Woodruff, D.\u00a0L.: Pyomo\u2013optimization modeling in python, 3rd\u00a0ed. Springer Science & Business Media, vol.\u00a067 (2021)","DOI":"10.1007\/978-3-030-68928-5_5"},{"key":"1033_CR52","unstructured":"GLPK Development Team, \u201cGLPK (GNU Linear Programming Kit),\u201d https:\/\/www.gnu.org\/software\/glpk\/, Last Accessed: June 3, (2025)"}],"container-title":["Photonic Network Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11107-025-01033-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11107-025-01033-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11107-025-01033-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T04:13:27Z","timestamp":1759119207000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11107-025-01033-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,21]]},"references-count":52,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["1033"],"URL":"https:\/\/doi.org\/10.1007\/s11107-025-01033-y","relation":{},"ISSN":["1387-974X","1572-8188"],"issn-type":[{"value":"1387-974X","type":"print"},{"value":"1572-8188","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,21]]},"assertion":[{"value":"17 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"3"}}