{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:09:22Z","timestamp":1763809762241,"version":"3.37.3"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["91638204","61731012","61572174"],"award-info":[{"award-number":["91638204","61731012","61572174"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Plan Project of Hunan Province","award":["2016TP1020"],"award-info":[{"award-number":["2016TP1020"]}]},{"name":"Chongqing Education Science Project of China","award":["kj1503011"],"award-info":[{"award-number":["kj1503011"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2017.2768402","type":"journal-article","created":{"date-parts":[[2017,11,10]],"date-time":"2017-11-10T19:18:21Z","timestamp":1510341501000},"page":"504-518","source":"Crossref","is-referenced-by-count":7,"title":["An Identification Decision Tree Learning Model for Self-Management in Virtual Radio Access Network: IDTLM"],"prefix":"10.1109","volume":"6","author":[{"given":"Sai","family":"Zou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7612-7943","authenticated-orcid":false,"given":"Yuliang","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Yanglong","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Su","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2254124"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2358840"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2358856"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2358841"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2389239"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2470242"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2309014"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2256466"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2290739"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2429918"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2301143"},{"journal-title":"Network Functions Virtualization (NFV) Use cases","year":"2013","key":"ref27"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2358838"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7452271"},{"journal-title":"Cisco&#x2019;s Viewpoint Operational and Commercial","year":"2013","author":"xu","key":"ref1"},{"journal-title":"'Network Function Virtualisation An Introduction Benefits Enablers Challenges and Call for Action","year":"2014","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7054720"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2012.6379165"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2012.28"},{"key":"ref26","first-page":"115","article-title":"Cloud-RAN: Innovative radio access network architecture","author":"hadzialic","year":"2013","journal-title":"Proc 55th Int'l Symp ELMAR"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6553677"},{"journal-title":"ClassBench A packet classification benchmark","year":"2004","key":"ref50"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2449666"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2533613"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2358835"},{"key":"ref12","first-page":"9","article-title":"Netmap: A novel framework for fast packet I\/O","author":"rizzo","year":"2012","journal-title":"Proc USENIX"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2491265"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2016.2584658"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2013.00408"},{"key":"ref16","first-page":"37","article-title":"High performance and high scalable packet classification algorithm for network security systems","volume":"14","author":"pak","year":"2017","journal-title":"IEEE Trans Depend and Sec Comp"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.227"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.10.017"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5183468"},{"journal-title":"Framework and Overall Objectives of the Future Development of IMT for 2020 and Beyond","year":"2015","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600027NM"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7378425"},{"journal-title":"White paper on 5G concept","year":"2015","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736745"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7158279"},{"key":"ref49","first-page":"80","author":"zhou","year":"2016","journal-title":"Machine Learning"},{"key":"ref9","article-title":"RSCMF : A mapping framework for resource scalability collaboration in radio access networks with SDR and virtualization","author":"zou","year":"0","journal-title":"Electron Lett"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2411274"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.140112"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2407831"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7096298"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2558958"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2270441"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2613896"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2516020"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08103773.pdf?arnumber=8103773","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:26:21Z","timestamp":1642004781000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8103773\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2768402","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2018]]}}}