{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:50:15Z","timestamp":1730285415232,"version":"3.28.0"},"reference-count":54,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1109\/noms54207.2022.9789713","type":"proceedings-article","created":{"date-parts":[[2022,6,9]],"date-time":"2022-06-09T21:21:22Z","timestamp":1654809682000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["Use What You Know: Network and Service Coordination Beyond Certainty"],"prefix":"10.1109","author":[{"given":"Stefan","family":"Werner","sequence":"first","affiliation":[{"name":"Paderborn University,Germany"}]},{"given":"Stefan","family":"Schneider","sequence":"additional","affiliation":[{"name":"Paderborn University,Germany"}]},{"given":"Holger","family":"Karl","sequence":"additional","affiliation":[{"name":"University of Potsdam,Hasso Plattner Institute,Germany"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2959181"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3326285.3329056"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916583"},{"key":"ref32","volume":"324","author":"pr\u00e9kopa","year":"2013","journal-title":"Stochastic Programming"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2867587"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057118"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3076503"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269087"},{"key":"ref35","first-page":"163","article-title":"Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning Approach","author":"mao","year":"2020","journal-title":"2020 IFIP Networking Conference (Networking) Networking"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986662"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841846"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847918"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486320"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2019.00026"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7665"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2016.2645123"},{"article-title":"FutureCoord GitHub repository","year":"2021","author":"werner","key":"ref22"},{"key":"ref21","first-page":"1","article-title":"A single-player monte carlo tree search method combined with node importance for virtual network embedding","author":"zheng","year":"2020","journal-title":"Annals of Telecommunications"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/4067186"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2884835"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355737"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218511"},{"article-title":"Variance reduction for reinforcement learning in input-driven environments","year":"2018","author":"mao","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2015.87"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/11871842_29"},{"year":"2021","key":"ref53","article-title":"Open source mano"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1002\/net.20371"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841857"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2019.8806631"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2959183"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM46954.2019.9012716"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.3018157"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2931570"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-021-05961-4"},{"article-title":"Mastering chess and shogi by self-play with a general reinforcement learning algorithm","year":"2017","author":"silver","key":"ref16"},{"key":"ref17","first-page":"216","article-title":"Monte-Carlo Tree Search: A new framework for game ai","volume":"8","author":"chaslot","year":"2008","journal-title":"AIIDE"},{"journal-title":"ETSI GROUP SPECIFICATION GS NFV-MAN 001 V1 1 1","article-title":"Network function virtualization (NFV); management and orchestration","year":"2014","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983207"},{"article-title":"Dota 2 with large scale deep reinforcement learning","year":"2019","author":"berner","key":"ref4"},{"journal-title":"Architectural Framework for Machine Learning in Future Networks Including IMT-2020 (Y 3172)","year":"0","key":"ref3"},{"article-title":"Playing Atari with deep reinforcement learning","year":"2013","author":"mnih","key":"ref6"},{"journal-title":"Reinforcement Learning An Introduction","year":"2018","author":"sutton","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2943779"},{"key":"ref7","article-title":"Deep reinforcement learning that matters","volume":"32","author":"henderson","year":"2018","journal-title":"AAAI Conference on Artificial Intelligence"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft48620.2020.9165348"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM46954.2019.9012740"},{"journal-title":"ETSI GROUP SPECIFICATION GS NFV-MAN 001 V1 1 1","article-title":"Network function virtualization (NFV); use cases","year":"2013","key":"ref46"},{"key":"ref45","article-title":"Service Function Chaining Use Cases in Mobile Networks","author":"haeffner","year":"2019","journal-title":"Internet Engineering Task Force Internet-Draft draft-ietf-sfc-use-case-mobility-09"},{"journal-title":"Production-Grade Container Orchestration","year":"0","key":"ref48"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2018.8460029"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485853"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2947905"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140274"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2959182"}],"event":{"name":"NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2022,4,25]]},"location":"Budapest, Hungary","end":{"date-parts":[[2022,4,29]]}},"container-title":["NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9789703\/9789704\/09789713.pdf?arnumber=9789713","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:09:51Z","timestamp":1656965391000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9789713\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/noms54207.2022.9789713","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]}}}