{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:16:21Z","timestamp":1730279781123,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,25]],"date-time":"2021-06-25T00:00:00Z","timestamp":1624579200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,25]],"date-time":"2021-06-25T00:00:00Z","timestamp":1624579200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,25]]},"DOI":"10.1109\/iwqos52092.2021.9521362","type":"proceedings-article","created":{"date-parts":[[2021,8,26]],"date-time":"2021-08-26T20:59:51Z","timestamp":1630011591000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["Towards Chain-Aware Scaling Detection in NFV with Reinforcement Learning"],"prefix":"10.1109","author":[{"given":"Lin","family":"He","sequence":"first","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology (BNRist),Institute for Network Sciences and Cyberspace, Tsinghua University"}]},{"given":"Lishan","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology (BNRist),Institute for Network Sciences and Cyberspace, Tsinghua University"}]},{"given":"Ying","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing National Research Center for Information Science and Technology (BNRist),Institute for Network Sciences and Cyberspace, Tsinghua University"}]}],"member":"263","reference":[{"key":"ref39","first-page":"67","article-title":"Using Reinforcement Learning for Autonomic Resource Allocation in Clouds: Towards a Fully Automated Workflow","author":"dutreilh","year":"2011","journal-title":"Proc ICASSP"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.2864"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624151"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7784446"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2959181"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3326285.3329056"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-014-9314-7"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2929260"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2867587"},{"key":"ref34","first-page":"33","article-title":"Co-Scaler: Cooperative Scaling of Software-Defined NFV Service Function Chain","author":"zhang","year":"2016","journal-title":"Proc of IEEE NFV-SDN"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057118"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2017.15"},{"key":"ref11","article-title":"ENVI: Elastic Resource Flexing for Network Function Virtualization","author":"cao","year":"2017","journal-title":"Proc of USENIX HotCloud"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3230718.3230725"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098843"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342080"},{"key":"ref15","first-page":"1928","article-title":"Asynchronous Methods for Deep Reinforcement Learning","author":"mnih","year":"2016","journal-title":"Proc of the 33nd International Conference on Machine Learning"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2940147.2940155"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005750"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230551"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934875"},{"key":"ref28","first-page":"229","article-title":"Snort: Lightweight Intrusion Detection for Networks","volume":"99","author":"roesch","year":"1999","journal-title":"LISA"},{"key":"ref4","first-page":"299","article-title":"Elastic Scaling of Stateful Network Functions","author":"woo","year":"2018","journal-title":"Proc of USENIX NSDI"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815692"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626313"},{"article-title":"Make data useful","year":"0","author":"linden","key":"ref6"},{"year":"0","key":"ref29","article-title":"Squid"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879175"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2015.7335318"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2016.0028"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6963800"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486320"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"key":"ref20","first-page":"227","article-title":"Split\/Merge: System Support for Elastic Execution in Virtual Middleboxes","author":"rajagopalan","year":"2013","journal-title":"Proc of USENIX NSDI"},{"year":"2019","key":"ref22","article-title":"Amazon EC2 Pricing on Demand"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2226216"},{"journal-title":"Reinforcement Learning An Introduction Ser Adaptive Computation and Machine Learning","year":"1998","author":"sutton","key":"ref24"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2019.00061"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"ref26","first-page":"265","article-title":"Tensorflow: A System for Large-Scale Machine Learning","author":"abadi","year":"2016","journal-title":"Proc of USENIX OSDI"},{"year":"2014","key":"ref25","article-title":"Data Plane Development Kit"}],"event":{"name":"2021 IEEE\/ACM 29th International Symposium on Quality of Service (IWQOS)","start":{"date-parts":[[2021,6,25]]},"location":"Tokyo, Japan","end":{"date-parts":[[2021,6,28]]}},"container-title":["2021 IEEE\/ACM 29th International Symposium on Quality of Service (IWQOS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9521186\/9521256\/09521362.pdf?arnumber=9521362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:44:34Z","timestamp":1659483874000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9521362\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,25]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/iwqos52092.2021.9521362","relation":{},"subject":[],"published":{"date-parts":[[2021,6,25]]}}}