{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:35:50Z","timestamp":1761395750367,"version":"3.37.3"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1716945"],"award-info":[{"award-number":["1716945"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1109\/tnsm.2020.2995900","type":"journal-article","created":{"date-parts":[[2020,5,20]],"date-time":"2020-05-20T20:27:26Z","timestamp":1590006446000},"page":"1322-1336","source":"Crossref","is-referenced-by-count":23,"title":["Auto-Scaling Network Service Chains Using Machine Learning and Negotiation Game"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9957-8336","authenticated-orcid":false,"given":"Sabidur","family":"Rahman","sequence":"first","affiliation":[]},{"given":"Tanjila","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Minh","family":"Huynh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0740-1061","authenticated-orcid":false,"given":"Massimo","family":"Tornatore","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1483-1257","authenticated-orcid":false,"given":"Biswanath","family":"Mukherjee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Internet Traffic Data","year":"2018","key":"ref39"},{"key":"ref38","first-page":"441","article-title":"Game theory and the analysis of collusion in conspiracy and merger cases","volume":"5","author":"kattan","year":"1997","journal-title":"George Mason Law Review"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"year":"2018","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2017.2780133"},{"journal-title":"The WEKA Workbench Online Appendix for Data Mining Practical Machine Learning Tools and Techniques","year":"2016","author":"frank","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_28"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47745-4_7"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1504\/IJBDI.2016.073903"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.12.038"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44917-2_21"},{"journal-title":"InfoGainAttributeEval","year":"2018","key":"ref40"},{"key":"ref11","first-page":"181","article-title":"Auto-scaling model for computing system","volume":"5","author":"hung","year":"2012","journal-title":"Int J Hybrid Inf Technol"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-014-9314-7"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1890799.1890803"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1555271.1555275"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/781027.781067"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2010.69"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2012.47"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2867587"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2016.0030"},{"journal-title":"ECOMP (Enhanced Control Orchestration Management & Policy) Architecture White Paper","year":"2018","key":"ref28"},{"key":"ref4","article-title":"Resource aware routing for service function chains in SDN and NFV-enabled network","author":"hong","year":"2018","journal-title":"IEEE Trans Services Comput"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535778"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2598068"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.028"},{"key":"ref29","first-page":"3","article-title":"Supervised machine learning: A review of classification techniques","author":"kotsiantis","year":"2007","journal-title":"Emerg Artif Intell Appl Comput Eng"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2880992"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422788"},{"journal-title":"Amazon Web Sevices - Auto-scaling","year":"2018","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7588276"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2013.167"},{"journal-title":"Network Functions Virtualisation Introductory White Paper","year":"2012","key":"ref1"},{"journal-title":"Cisco Integrated Services Virtual Router Data Sheet","year":"2019","key":"ref46"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2815298"},{"journal-title":"Google Fiber Pricing","year":"2019","key":"ref45"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2580668"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2015.7387426"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.04.013"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2800400"},{"journal-title":"The Problem With Backpropagation","year":"2019","key":"ref41"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2760188"},{"journal-title":"Google Cloud Pricing","year":"2019","key":"ref44"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.02.052"},{"journal-title":"The fall of RNN\/LSTM","year":"2020","key":"ref43"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8648096"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/4275028\/9188035\/9097295-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9188035\/09097295.pdf?arnumber=9097295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:05:35Z","timestamp":1651079135000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9097295\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":46,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2020.2995900","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2020,9]]}}}