{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T10:03:05Z","timestamp":1766138585170,"version":"build-2065373602"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,8]]},"DOI":"10.1109\/ccwc60891.2024.10427694","type":"proceedings-article","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T23:35:29Z","timestamp":1707867329000},"page":"0687-0694","source":"Crossref","is-referenced-by-count":6,"title":["Enhancing Cloud-Based Application Component Placement with AI-Driven Operations"],"prefix":"10.1109","author":[{"given":"Efterpi","family":"Paraskevoulakou","sequence":"first","affiliation":[{"name":"University of Piraeus,Department of Digital Systems,Greece"}]},{"given":"Jean-Didier Totow","family":"Tom-Ata","sequence":"additional","affiliation":[{"name":"University of Piraeus,Department of Digital Systems,Greece"}]},{"given":"Chrysostomos","family":"Symvoulidis","sequence":"additional","affiliation":[{"name":"University of Piraeus,Department of Digital Systems,Greece"}]},{"given":"Dimosthenis","family":"Kyriazis","sequence":"additional","affiliation":[{"name":"University of Piraeus,Department of Digital Systems,Greece"}]}],"member":"263","reference":[{"key":"ref1","first-page":"67","article-title":"Using reinforcement learning for autonomic resource allocation in clouds: towards a fully automated workflow","volume-title":"ICAS 2011, The Seventh International Conference on Autonomic and Autonomous Systems","author":"Dutreilh"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-27815-0_13"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-010-9379-0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242618"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3311921"},{"journal-title":"Playing atari with deep reinforcement learning","year":"2013","author":"Mnih","key":"ref6"},{"journal-title":"Proximal policy optimization algorithms","year":"2017","author":"Schulman","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2017.000081"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E48712.2020.00016"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/network2010008"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103058"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05462-x"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27645-3_1"},{"key":"ref14","article-title":"Above the clouds: A berkeley view of cloud computing","volume-title":"Technical Report UCB\/EECS-2009-28","volume":"17","author":"Armbrust","year":"2009"},{"journal-title":"The cloud application modelling and execution language (CAMEL)","year":"2017","author":"Rossini","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-019-0138-7"},{"issue":"2012","key":"ref17","volume-title":"OASIS: Topology and Orchestration Specification for Cloud Applications Version 1.0 Committee Specification Draft","volume":"03","year":"2012"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68279-0_8"},{"journal-title":"Python for education: the exact cover problem","year":"2010","author":"Kapanowski","key":"ref19"},{"journal-title":"Dancing links","year":"2000","author":"Knuth","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/0201010"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1613\/jair.301"},{"journal-title":"Actor-critic algorithms-Advances in neural information processing systems","year":"2000","author":"Konda","key":"ref23"},{"key":"ref24","first-page":"1889","article-title":"Trust region policy optimization","volume-title":"International conference on machine learning","author":"Schulman"},{"key":"ref25","article-title":"Reinforcement learning: An introduction second edition","volume-title":"Adaptive computation and machine learning","author":"Sutton","year":"2018"},{"journal-title":"Measuring the reliability of reinforcement learning algorithms","year":"2019","author":"Chan","key":"ref26"}],"event":{"name":"2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)","start":{"date-parts":[[2024,1,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2024,1,10]]}},"container-title":["2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10426790\/10427556\/10427694.pdf?arnumber=10427694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T14:34:19Z","timestamp":1709476459000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10427694\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,8]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ccwc60891.2024.10427694","relation":{},"subject":[],"published":{"date-parts":[[2024,1,8]]}}}