{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:25:13Z","timestamp":1771025113378,"version":"3.50.1"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,1]]},"DOI":"10.1109\/comnet55492.2022.9998475","type":"proceedings-article","created":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T19:38:21Z","timestamp":1672083501000},"page":"1-7","source":"Crossref","is-referenced-by-count":8,"title":["Optimal Resource Allocation in SDN\/NFV-Enabled Networks via Deep Reinforcement Learning"],"prefix":"10.1109","author":[{"given":"Jing","family":"Su","sequence":"first","affiliation":[{"name":"Southern Methodist University,AT&#x0026;T Center for Virtualization,Dallas,USA"}]},{"given":"Suku","family":"Nair","sequence":"additional","affiliation":[{"name":"Southern Methodist University,AT&#x0026;T Center for Virtualization,Dallas,USA"}]},{"given":"Leo","family":"Popokh","sequence":"additional","affiliation":[{"name":"CMS Hewlett Packard Enterprise,Dallas,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2015.7081093"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2015.2477041"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/nfv-sdn.2017.8169829"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/wcncw48565.2020.9124910"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2569020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524565"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2502252"},{"key":"ref8","article-title":"OR-Tools","author":"Perron","year":"2020","journal-title":"Google"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/cnsm.2015.7367338"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3010079.3010083"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3326285.3329056"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2019.2959181"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/SoftCOM52868.2021.9559076"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/netsoft.2019.8806646"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/00207179.2019.1661521"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700293"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2020.3025298"},{"key":"ref18","first-page":"1","article-title":"Physical and Virtual Resources Inventory Modeling for Efficient VNF Placement","volume-title":"2020 IEEE 10th International Conference on Consumer Electronics (ICCE-Berlin)","author":"Popokh"},{"key":"ref19","article-title":"Proximal Policy Optimization Algorithms","author":"Schulman","year":"2017","journal-title":"arXiv: Learning"},{"key":"ref20","article-title":"Machine Learning for Combinatorial Optimization: A Methodological Tour d\u2019Horizon","author":"Bengio","year":"2020","journal-title":"arXiv:1811.06128 [cs, stat]"},{"key":"ref21","volume-title":"Dynamic Programming and Markov Processes.","author":"Howard","year":"1960"},{"key":"ref22","article-title":"OpenAI Gym","author":"Brockman","year":"2016","journal-title":"arXiv:1606.01540 [cs]"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.2988486"},{"key":"ref24","first-page":"163","article-title":"Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning Approach","volume-title":"2020 IFIP Networking Conference (Networking)","author":"Mao"},{"key":"ref25","article-title":"Continuous control with deep reinforcement learning","author":"Lillicrap","year":"2019","journal-title":"arXiv:1509.02971 [cs, stat]"},{"key":"ref26","first-page":"2772","article-title":"Bridging the gap between value and policy based reinforcement learning","volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems, ser. NIPS\u201917","author":"Nachum"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1017\/jfm.2019.62"},{"key":"ref28","first-page":"523","article-title":"Deep Reinforcement Learning Attitude Control of Fixed-Wing UAVs Using Proximal Policy Optimization","volume-title":"2019 International Conference on Unmanned Aircraft Systems (ICUAS)","author":"B\u00f8hn"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1063\/5.0006492"},{"key":"ref30","article-title":"A Closer Look at Invalid Action Masking in Policy Gradient Algorithms","author":"Huang","year":"2020","journal-title":"arXiv:2006.14171 [cs, stat]"},{"key":"ref31","first-page":"8024","article-title":"PyTorch: An imperative style, high-performance deep learning library","author":"Paszke","year":"2019","journal-title":"Advances in Neural Information Processing Systems 32"},{"key":"ref32","article-title":"Exploration and exploitation in reinforcement learning","volume-title":"Research supervised by Prof. Doina Precup, CRA-W DMP Project at McGill University","author":"Coggan"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-412-8_16"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-1-4842-4470-8_7","article-title":"Google Colaboratory","author":"Bisong","year":"2019","journal-title":"Building Machine Learning and Deep Learning Models on Google Cloud Platform: A Comprehensive Guide for Beginners"},{"issue":"268","key":"ref35","first-page":"1","article-title":"Stable-Baselines3: Reliable Reinforcement Learning Implementations","volume":"22","author":"Raffin","year":"2021","journal-title":"Journal of Machine Learning Research"},{"key":"ref36","volume-title":"Open Source Cloud Computing Infrastructure"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/hase.2017.27"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-6977-1_40"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-019-0126-y"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/noms.2016.7502923"}],"event":{"name":"2022 IEEE Ninth International Conference on Communications and Networking (ComNet)","location":"Hammamet, Tunisia","start":{"date-parts":[[2022,11,1]]},"end":{"date-parts":[[2022,11,4]]}},"container-title":["2022 IEEE Ninth International Conference on Communications and Networking (ComNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9998182\/9998434\/09998475.pdf?arnumber=9998475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T12:43:30Z","timestamp":1709383410000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9998475\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/comnet55492.2022.9998475","relation":{},"subject":[],"published":{"date-parts":[[2022,11,1]]}}}