{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T12:45:32Z","timestamp":1768567532786,"version":"3.49.0"},"reference-count":46,"publisher":"Cambridge University Press (CUP)","issue":"1","license":[{"start":{"date-parts":[[2021,2,15]],"date-time":"2021-02-15T00:00:00Z","timestamp":1613347200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["cambridge.org"],"crossmark-restriction":true},"short-container-title":["Theory and Practice of Logic Programming"],"published-print":{"date-parts":[[2022,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Deploying Internet of Things (IoT)-enabled virtual network function (VNF) chains to Cloud-Edge infrastructures requires determining a placement for each VNF that satisfies all set deployment requirements as well as a software-defined routing of traffic flows between consecutive functions that meets all set communication requirements. In this article, we present a declarative solution, EdgeUsher, to the problem of how to best place VNF chains to Cloud-Edge infrastructures. EdgeUsher can determine all eligible placements for a set of VNF chains to a Cloud-Edge infrastructure so to satisfy all of their hardware, IoT, security, bandwidth, and latency requirements. It exploits probability distributions to model the dynamic variations in the available Cloud-Edge infrastructure and to assess output eligible placements against those variations.<\/jats:p>","DOI":"10.1017\/s1471068421000016","type":"journal-article","created":{"date-parts":[[2021,2,15]],"date-time":"2021-02-15T09:03:16Z","timestamp":1613379796000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1017\/policypage","source":"Crossref","is-referenced-by-count":16,"title":["Probabilistic QoS-aware Placement of VNF Chains at the Edge"],"prefix":"10.1017","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4159-8761","authenticated-orcid":false,"given":"STEFANO","family":"FORTI","sequence":"first","affiliation":[]},{"given":"FEDERICA","family":"PAGANELLI","sequence":"additional","affiliation":[]},{"given":"ANTONIO","family":"BROGI","sequence":"additional","affiliation":[]}],"member":"56","published-online":{"date-parts":[[2021,2,15]]},"reference":[{"key":"S1471068421000016_ref41","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2705720"},{"key":"S1471068421000016_ref28","doi-asserted-by":"crossref","unstructured":"Morabito, R. and Beijar, N. 2017. A Framework Based on SDN and Containers for Dynamic Service Chains on IoT Gateways. In Proceedings of the Workshop on Hot Topics in Container Networking and Networked Systems, HotConNet \u201917. ACM, New York, NY, USA, 42\u201347.","DOI":"10.1145\/3094405.3094413"},{"key":"S1471068421000016_ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.02.009"},{"key":"S1471068421000016_ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5640134"},{"key":"S1471068421000016_ref24","doi-asserted-by":"publisher","DOI":"10.1017\/S1471068410000360"},{"key":"S1471068421000016_ref15","doi-asserted-by":"crossref","unstructured":"Forti, S. and Brogi, A. 2020. Continuous reasoning for managing next-gen distributed applications. In Proceedings 36th International Conference on Logic Programming (Technical Communications), ICLP Technical Communications 2020, (Technical Communications) UNICAL, Rende (CS), Italy, 18\u201324th September 2020, Ricca, F. , Russo, A. , Greco, S. , Leone, N. , Artikis, A. , Friedrich, G. , Fodor, P. , Kimmig, A. , Lisi, F. A. , Maratea, M. , Mileo, A. , and Riguzzi, F. , Eds. EPTCS, vol. 325, 164\u2013177.","DOI":"10.4204\/EPTCS.325.0"},{"key":"S1471068421000016_ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2668470"},{"key":"S1471068421000016_ref8","doi-asserted-by":"crossref","unstructured":"Cziva, R. , Anagnostopoulos, C. and Pezaros, D. P. 2018. Dynamic, latency-optimal vNF placement at the network edge. In IEEE INFOCOM 2018 \u2013 IEEE Conference on Computer Communications. 693\u2013701.","DOI":"10.1109\/INFOCOM.2018.8486021"},{"key":"S1471068421000016_ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.020"},{"key":"S1471068421000016_ref39","first-page":"1","article-title":"Efficient provisioning of security service function chaining using network security defense patterns","author":"Shameli Sendi","year":"2018","journal-title":"IEEE Transactions on Services Computing"},{"key":"S1471068421000016_ref46","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3504"},{"key":"S1471068421000016_ref44","doi-asserted-by":"crossref","unstructured":"Yala, L. , Frangoudis, P. A. and Ksentini, A. 2018. Latency and availability driven VNF placement in a MEC-NFV environment. In 2018 IEEE Global Communications Conference (GLOBECOM), 1\u20137.","DOI":"10.1109\/GLOCOM.2018.8647858"},{"key":"S1471068421000016_ref26","doi-asserted-by":"publisher","DOI":"10.1017\/S1471068413000513"},{"key":"S1471068421000016_ref40","doi-asserted-by":"crossref","unstructured":"Sun, Q. , Lu, P. , Lu, W. and Zhu, Z. 2016. Forecast-assisted NFV service chain deployment based on affiliation-aware VNF placement. In 2016 IEEE Global Communications Conference (GLOBECOM). IEEE, 1\u20136.","DOI":"10.1109\/GLOCOM.2016.7841846"},{"key":"S1471068421000016_ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2862350"},{"key":"S1471068421000016_ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.11.002"},{"key":"S1471068421000016_ref31","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2762345"},{"key":"S1471068421000016_ref21","doi-asserted-by":"publisher","DOI":"10.1017\/S1471068410000566"},{"key":"S1471068421000016_ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-015-5494-z"},{"key":"S1471068421000016_ref14","doi-asserted-by":"crossref","unstructured":"Fischer, A. , K\u00fchn, R. , Mandarawi, W. and de Meer, H. 2017. Modeling security requirements for VNE algorithms. In Proceedings of the 10th EAI International Conference on Performance Evaluation Methodologies and Tools. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, Belgium, 149\u2013154.","DOI":"10.4108\/eai.25-10-2016.2266673"},{"key":"S1471068421000016_ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600907"},{"key":"S1471068421000016_ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700895"},{"key":"S1471068421000016_ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2750180"},{"key":"S1471068421000016_ref37","first-page":"1","article-title":"Designing a softwarized network deployed on a fleet of drones for rural zone monitoring","author":"Rametta","year":"2017","journal-title":"Future Internet 9"},{"key":"S1471068421000016_ref35","first-page":"1","article-title":"Traffic-aware and energy-efficient VNF placement for service chaining: Joint sampling and matching approach","author":"Pham","year":"2018","journal-title":"IEEE Transactions on Services Computing"},{"key":"S1471068421000016_ref33","doi-asserted-by":"crossref","unstructured":"Oechsner, S. and Ripke, A. 2015. Flexible support of VNF placement functions in openstack. In Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft). IEEE, 1\u20136.","DOI":"10.1109\/NETSOFT.2015.7116178"},{"key":"S1471068421000016_ref34","doi-asserted-by":"crossref","unstructured":"Ojo, M. , Adami, D. and Giordano, S. 2016. A SDN-IoT architecture with NFV implementation. In 2016 IEEE Globecom Workshops (GC Wkshps). IEEE, 1\u20136.","DOI":"10.1109\/GLOCOMW.2016.7848825"},{"key":"S1471068421000016_ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2869958"},{"key":"S1471068421000016_ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2800003"},{"key":"S1471068421000016_ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2800400"},{"key":"S1471068421000016_ref29","doi-asserted-by":"crossref","unstructured":"Mouradian, C. , Kianpisheh, S. and Glitho, R. H. 2018. Application component placement in NFV-based hybrid cloud\/fog systems. In 2018 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN). IEEE, 25\u201330.","DOI":"10.1109\/LANMAN.2018.8475055"},{"key":"S1471068421000016_ref2","doi-asserted-by":"crossref","unstructured":"Addis, B. , Belabed, D. , Bouet, M. and Secci, S. 2015. Virtual network functions placement and routing optimization. In 2015 IEEE 4th International Conference on Cloud Networking (CloudNet). IEEE, 171\u2013177.","DOI":"10.1109\/CloudNet.2015.7335301"},{"key":"S1471068421000016_ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2598420"},{"key":"S1471068421000016_ref36","article-title":"Fog computing for the internet of things: A survey","volume":"2","author":"Puliafito","year":"2019","journal-title":"ACM Transactions on Internet Technology 19"},{"key":"S1471068421000016_ref12","unstructured":"ETSI. 2019. Multi-access Edge Computing (MEC); Framework and Reference Architecture. Tech. Rep. ETSI GS MEC 003 V2.1.1, ETSI. January."},{"key":"S1471068421000016_ref5","doi-asserted-by":"crossref","unstructured":"Bouten, N. , Claeys, M. , Mijumbi, R. , Famaey, J. , Latr\u00e9, S. and Serrat, J. 2016. Semantic validation of affinity constrained service function chain requests. In IEEE NetSoft Conference and Workshops, NetSoft 2016, Seoul, South Korea, June 6\u201310, 2016. IEEE, 202\u2013210.","DOI":"10.1109\/NETSOFT.2016.7502414"},{"key":"S1471068421000016_ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2717482"},{"key":"S1471068421000016_ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-019-00403-y"},{"key":"S1471068421000016_ref6","first-page":"719","article-title":"How to place your apps in the fog: State of the art and open challenges","volume":"5","author":"Brogi","year":"2020","journal-title":"Software: Practice and Experience 50"},{"key":"S1471068421000016_ref23","doi-asserted-by":"publisher","DOI":"10.3390\/fi11030069"},{"key":"S1471068421000016_ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.08.011"},{"key":"S1471068421000016_ref38","volume-title":"Foundations of Probabilistic Logic Programming","author":"Riguzzi","year":"2018"},{"key":"S1471068421000016_ref3","doi-asserted-by":"crossref","unstructured":"Alhussein, O. , Do, P. T. , Li, J. , Ye, Q. , Shi, W. , Zhuang, W. , Shen, X. , Li, X. and Rao, J. 2018. Joint VNF placement and multicast traffic routing in 5G core networks. In 2018 IEEE Global Communications Conference (GLOBECOM). IEEE, 1\u20136.","DOI":"10.1109\/GLOCOM.2018.8648029"},{"key":"S1471068421000016_ref22","first-page":"1409","article-title":"A survey on the placement of virtual resources and virtual network functions","volume":"2","author":"Laghrissi","year":"2018","journal-title":"IEEE Communications Surveys and Tutorials 21"},{"key":"S1471068421000016_ref27","first-page":"236","article-title":"Network function virtualization: State-of-the-art and research challenges","volume":"1","author":"Mijumbi","year":"2015","journal-title":"IEEE Communications surveys and tutorials 18"},{"key":"S1471068421000016_ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2690823"}],"container-title":["Theory and Practice of Logic Programming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.cambridge.org\/core\/services\/aop-cambridge-core\/content\/view\/S1471068421000016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,19]],"date-time":"2022-01-19T08:10:26Z","timestamp":1642579826000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.cambridge.org\/core\/product\/identifier\/S1471068421000016\/type\/journal_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,15]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["S1471068421000016"],"URL":"https:\/\/doi.org\/10.1017\/s1471068421000016","relation":{},"ISSN":["1471-0684","1475-3081"],"issn-type":[{"value":"1471-0684","type":"print"},{"value":"1475-3081","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,15]]},"assertion":[{"value":"\u00a9 The Author(s), 2021. Published by Cambridge University Press on behalf of Theory and Practice of Logic Programming","name":"copyright","label":"Copyright","group":{"name":"copyright_and_licensing","label":"Copyright and Licensing"}},{"value":"This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (http:\/\/creativecommons.org\/licenses\/by\/4.0\/), which permits unrestricted re-use, distribution, and reproduction in any medium, provided the original work is properly cited.","name":"license","label":"License","group":{"name":"copyright_and_licensing","label":"Copyright and Licensing"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}