{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T03:59:08Z","timestamp":1771473548331,"version":"3.50.1"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"European Union\u2019s Horizon 2020 ICT Cloud Computing program under the ACCORDION project","award":["871793"],"award-info":[{"award-number":["871793"]}]},{"name":"European Union\u2019s Horizon 2020 research and innovation program under the CHARITY project","award":["101016509"],"award-info":[{"award-number":["101016509"]}]},{"DOI":"10.13039\/501100002341","name":"Academy of Finland Project 6Genesis","doi-asserted-by":"publisher","award":["318927"],"award-info":[{"award-number":["318927"]}],"id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1109\/tnsm.2021.3074618","type":"journal-article","created":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T20:26:49Z","timestamp":1619036809000},"page":"472-484","source":"Crossref","is-referenced-by-count":36,"title":["AI-Based Network-Aware Service Function Chain Migration in 5G and Beyond Networks"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8917-9670","authenticated-orcid":false,"given":"Rami Akrem","family":"Addad","sequence":"first","affiliation":[{"name":"Department of Communications and Networking, Aalto University, Espoo, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4262-7242","authenticated-orcid":false,"given":"Diego Leonel Cadette","family":"Dutra","sequence":"additional","affiliation":[{"name":"PESC, Federal University of Rio de Janeiro, Rio de Janeiro, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1119-1239","authenticated-orcid":false,"given":"Tarik","family":"Taleb","sequence":"additional","affiliation":[{"name":"COMNET, Aalto University, Espoo, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9619-6682","authenticated-orcid":false,"given":"Hannu","family":"Flinck","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, Espoo, Finland"}]}],"member":"263","reference":[{"key":"ref39","author":"schaul","year":"2015","journal-title":"Prioritized experience replay"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992698"},{"key":"ref33","author":"sutton","year":"1998","journal-title":"Introduction to Reinforcement Learning"},{"key":"ref32","author":"tirumala","year":"2005","journal-title":"The TCP\/UDP Bandwidth Measurement Tool"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916583"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800289"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"ref36","author":"mnih","year":"2013","journal-title":"Playing atari with deep reinforcement learning"},{"key":"ref35","first-page":"2094","article-title":"Deep reinforcement learning with double Q-learning","author":"hasselt","year":"2016","journal-title":"Proc 13th AAAI Conf Artif Intell (AAAI)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2743240"},{"key":"ref28","year":"2019","journal-title":"How to Set RSYNC Speed Limit From Eating All Bandwidth With Bwlimit Option"},{"key":"ref27","year":"2019","journal-title":"Developing Software for Multi-Access Edge Computing"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2018.8581836"},{"key":"ref2","year":"2015","journal-title":"5G White Paper"},{"key":"ref1","year":"2018"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2008.3027"},{"key":"ref22","first-page":"557","article-title":"Implementing scalable, network-aware virtual machine migration for cloud data centers","author":"tso","year":"2013","journal-title":"Proc IEEE 6th Int Conf Cloud Comput"},{"key":"ref21","author":"chollet","year":"2015","journal-title":"Keras"},{"key":"ref24","author":"chen","year":"2012","journal-title":"Coordinating virtual machine migrations in enterprise data centers and clouds"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.5071527"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3078501"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAC.2016.9"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(89)90020-8"},{"key":"ref51","first-page":"32","article-title":"PyTorch: An imperative style, high-performance deep learning library","author":"paszke","year":"2019","journal-title":"Proc Adv Neural Inf Process Syst (NIPS)"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s11203-008-9021-8"},{"key":"ref54","author":"kingma","year":"2014","journal-title":"Adam A method for stochastic optimization"},{"key":"ref53","first-page":"281","article-title":"Random search for hyper-parameter optimization","volume":"13","author":"bergstra","year":"2012","journal-title":"J Mach Learn Res"},{"key":"ref52","author":"lillicrap","year":"2015","journal-title":"Continuous control with deep reinforcement learning"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1700200"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2941458"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992696"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2943405"},{"key":"ref13","author":"latva-aho","year":"2019","journal-title":"Key drivers and research challenges for 6G ubiquitous wireless intelligence"},{"key":"ref14","article-title":"White paper 5G evolution and 6G","year":"2020"},{"key":"ref15","year":"2019","journal-title":"Experiential Networked Intelligence (ENI) ENI Definition of Categories for AI Application to Networks"},{"key":"ref16","year":"2019","journal-title":"Experiential Networked Intelligence (ENI) ENI Use Cases"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1613\/jair.301"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2019.8685918"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.23919\/ITU-WT.2018.8597889"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800498"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600947"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013983"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800268"},{"key":"ref8","year":"2018","journal-title":"MEC in 5g networks"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8648002"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/BF00115009"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIRCA.2018.8597302"},{"key":"ref46","article-title":"Comparing deep reinforcement learning methods for engineering applications","author":"chen","year":"2018"},{"key":"ref45","first-page":"1","article-title":"Policy gradient methods for reinforcement learning with function approximation","author":"sutton","year":"1999","journal-title":"Proc Adv Neural Inf Process Syst (NIPS)"},{"key":"ref48","article-title":"Mobile edge computing (MEC); bandwidth management API","year":"2017"},{"key":"ref47","article-title":"Multi-access edge computing (MEC); application mobility service API","year":"2020"},{"key":"ref42","author":"wang","year":"2016","journal-title":"Sample efficient actor&#x2013;critic with experience replay"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1137\/S0363012901385691"},{"key":"ref44","first-page":"183","article-title":"Reinforcement learning with perceptual aliasing: The perceptual distinctions approach","author":"chrisman","year":"1992","journal-title":"Proc 10th Nat Conf Artif Intell (AAAI)"},{"key":"ref43","first-page":"1928","article-title":"Asynchronous methods for deep reinforcement learning","author":"mnih","year":"2016","journal-title":"Proc 33rd Int Conf Mach Learn (ICML)"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9732399\/09409935.pdf?arnumber=9409935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T20:24:38Z","timestamp":1658175878000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9409935\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":55,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2021.3074618","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3]]}}}