{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T20:01:34Z","timestamp":1773864094623,"version":"3.50.1"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002367","name":"Strategic Priority Research Program of the Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["Y9W0011705"],"award-info":[{"award-number":["Y9W0011705"]}],"id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/tnsm.2021.3120297","type":"journal-article","created":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T06:06:36Z","timestamp":1634277996000},"page":"4075-4087","source":"Crossref","is-referenced-by-count":24,"title":["VNE-HRL: A Proactive Virtual Network Embedding Algorithm Based on Hierarchical Reinforcement Learning"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3141-3460","authenticated-orcid":false,"given":"Jin","family":"Cheng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0801-8443","authenticated-orcid":false,"given":"Yulei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yeming","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Yuepeng","family":"E","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Tang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6648-324X","authenticated-orcid":false,"given":"Jingguo","family":"Ge","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1613\/jair.639"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(99)00052-1"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3001602"},{"key":"ref32","article-title":"The pagerank citation ranking: Bringing order to the Web","author":"page","year":"1999"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2967768"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/BF01584074"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186165"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986663"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2019.2942042"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2999901"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8889923"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355737"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3326285.3329056"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2018.2871549"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1613\/jair.301"},{"key":"ref14","author":"sutton","year":"2018","journal-title":"Reinforcement Learning An Introduction"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.012"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.01.025"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014992"},{"key":"ref18","author":"mnih","year":"2013","journal-title":"Playing atari with deep reinforcement learning"},{"key":"ref19","first-page":"1726","article-title":"The option-critic architecture","author":"bacon","year":"2017","journal-title":"Proc 31st AAAI Conf Artif Intell"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2017.2748578"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2999696"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838258"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2894304"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.endm.2016.03.028"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04376-6"},{"key":"ref5","article-title":"A graph neural network-based digital twin for network slicing management","author":"wang","year":"2020","journal-title":"IEEE Trans Ind Informat"},{"key":"ref8","author":"cormen","year":"2009","journal-title":"Introduction to Algorithms"},{"key":"ref7","volume":"52","author":"wolsey","year":"1998","journal-title":"Integer Programming"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2869958"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2019.12.001"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2012.113012.120310"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/49.12889"},{"key":"ref20","article-title":"Deep reinforcement learning with double Q-learning","volume":"30","author":"van hasselt","year":"2016","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1996.493353"},{"key":"ref48","first-page":"112","article-title":"VNE-Sim: A virtual network embedding simulator","author":"haeri","year":"2016","journal-title":"Proc 9th EAI Int Conf Simulat Tools Techn"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2159308"},{"key":"ref47","first-page":"1","article-title":"Predicted capacity of Ethernet in a university environment","author":"marathe","year":"1982","journal-title":"Proc Southcon"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2815430"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646131"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1971162.1971168"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986662"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2906744"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2971543"},{"key":"ref26","first-page":"2975","article-title":"A reliable virtual network embedding algorithm based on game theory within cloud&#x2019;s backbone","author":"soualah","year":"2014","journal-title":"Proc IEEE Int Conf Commun (ICC)"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795290477"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2016.2645123"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9644641\/09570771.pdf?arnumber=9570771","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:37Z","timestamp":1652194357000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9570771\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":48,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2021.3120297","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]}}}