{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:21:15Z","timestamp":1761402075861},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/globecom38437.2019.9013961","type":"proceedings-article","created":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T04:59:24Z","timestamp":1582865964000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Online VNF Chaining and Scheduling with Prediction: Optimality and Trade-Offs"],"prefix":"10.1109","author":[{"given":"Xi","family":"Huang","sequence":"first","affiliation":[]},{"given":"Simeng","family":"Bian","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Weijie","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Ziyu","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2629278"},{"journal-title":"Time Series Analysis Forecasting and Control","year":"2015","author":"box","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.2017.1380080"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47612-4"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1287\/opre.9.3.383"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25258-2_8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2460749"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2825236.2825253"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3326285.3329070"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013570"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8762031"},{"journal-title":"NFV report","year":"0","author":"huang","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3155055.3155064"},{"key":"ref19","article-title":"Metron: nfv service chains at the true speed of the underlying hardware","author":"katsikas","year":"0","journal-title":"Proceedings of USENIX NSDI"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2015.7116127"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842023"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402967"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3209582.3209592"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644918"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2499271"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.232"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057118"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN.2015.7114738"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195719"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486320"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2017.8117601"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/71.963420"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2200\/S00271ED1V01Y201006CNT007"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218487"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522716"},{"key":"ref26","article-title":"Jellyfish: Networking data centers, randomly","author":"singla","year":"0","journal-title":"Proceedings of USENIX NSDI"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879175"}],"event":{"name":"GLOBECOM 2019 - 2019 IEEE Global Communications Conference","start":{"date-parts":[[2019,12,9]]},"location":"Waikoloa, HI, USA","end":{"date-parts":[[2019,12,13]]}},"container-title":["2019 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8968653\/9013108\/09013961.pdf?arnumber=9013961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:50:34Z","timestamp":1658080234000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9013961\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/globecom38437.2019.9013961","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}