{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:15:52Z","timestamp":1774538152054,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/netsoft48620.2020.9165348","type":"proceedings-article","created":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T21:29:37Z","timestamp":1597267777000},"page":"122-130","source":"Crossref","is-referenced-by-count":36,"title":["Machine Learning for Dynamic Resource Allocation in Network Function Virtualization"],"prefix":"10.1109","author":[{"given":"Stefan","family":"Schneider","sequence":"first","affiliation":[]},{"given":"Narayanan Puthenpurayil","family":"Satheeschandran","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Peuster","sequence":"additional","affiliation":[]},{"given":"Holger","family":"Karl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2017.8004105"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2815986"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2015.7335318"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2017.25"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2019.8806700"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2668470"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700560"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2017.8169837"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057118"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486320"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2943779"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111002"},{"key":"ref3","first-page":"1","article-title":"NFV-inspector: A systematic approach to profile and analyze virtual network functions","author":"khan","year":"0","journal-title":"IEEE 2nd International Conference on Cloud Networking (CloudNet)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2018.8459915"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM46954.2019.9012740"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140281"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2598420"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700127"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218511"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2016.9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2460782.2460791"},{"key":"ref22","author":"schneider","year":"2019","journal-title":"Open-source repository with all code and results"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2666781"},{"key":"ref24","first-page":"448","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","author":"ioffe","year":"0","journal-title":"International Conference on Machine Learning (ICML)"},{"key":"ref23","first-page":"240","article-title":"Understand your chains and keep your deadlines: Introducing time-constrained profiling for NFV","author":"peuster","year":"0","journal-title":"IEEE\/I-FIP International Conference on Network and Service Management (CNSM) IEEE\/IFIP"},{"key":"ref26","first-page":"108","article-title":"API design for machine learning software: experiences from the scikit-learn project","author":"buitinck","year":"0","journal-title":"ECML PKDD Workshop Languages for Data Mining and Machine Learning"},{"key":"ref25","first-page":"177","article-title":"Large-scale machine learning with stochastic gradient descent","author":"bottou","year":"0","journal-title":"International Conference on Computational Statistics (COMPSTAT)"}],"event":{"name":"2020 6th IEEE International Conference on Network Softwarization (NetSoft)","location":"Ghent, Belgium","start":{"date-parts":[[2020,6,29]]},"end":{"date-parts":[[2020,7,3]]}},"container-title":["2020 6th IEEE Conference on Network Softwarization (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9158198\/9165305\/09165348.pdf?arnumber=9165348","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:55:24Z","timestamp":1656453324000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9165348\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/netsoft48620.2020.9165348","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}