{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:30:41Z","timestamp":1775665841888,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T00:00:00Z","timestamp":1512000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100005386","name":"Israeli Centers for Research Excellence","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005386","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,30]]},"DOI":"10.1145\/3152434.3152441","type":"proceedings-article","created":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T18:38:25Z","timestamp":1511807905000},"page":"185-191","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":169,"title":["Learning to Route"],"prefix":"10.1145","author":[{"given":"Asaf","family":"Valadarsky","sequence":"first","affiliation":[{"name":"Hebrew University of Jerusalem"}]},{"given":"Michael","family":"Schapira","sequence":"additional","affiliation":[{"name":"Hebrew University of Jerusalem"}]},{"given":"Dafna","family":"Shahaf","sequence":"additional","affiliation":[{"name":"Hebrew University of Jerusalem"}]},{"given":"Aviv","family":"Tamar","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]}],"member":"320","published-online":{"date-parts":[[2017,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"DeepMind AI Reduces Google Data Centre Cooling Bill by 40%. https:\/\/goo.gl\/QTdU2T.  DeepMind AI Reduces Google Data Centre Cooling Bill by 40%. https:\/\/goo.gl\/QTdU2T."},{"key":"e_1_3_2_2_2_1","unstructured":"IBM ILOG CPLEX Optimizer. http:\/\/www-01.ibm.com\/software\/commerce\/optimization\/cplex-optimizer\/index.html.  IBM ILOG CPLEX Optimizer. http:\/\/www-01.ibm.com\/software\/commerce\/optimization\/cplex-optimizer\/index.html."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855711.1855730"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"e_1_3_2_2_5_1","unstructured":"M. Allalouf and Y. Shavitt. Maximum flow routing with weighted max-min fairness. In Quality of Service in the Emerging Networking Panorama.  M. Allalouf and Y. Shavitt. Maximum flow routing with weighted max-min fairness. In Quality of Service in the Emerging Networking Panorama."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502048"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/780542.780599"},{"key":"e_1_3_2_2_8_1","volume-title":"Neural machine translation by jointly learning to align and translate. arXiv","author":"Bahdanau D.","year":"2014","unstructured":"D. Bahdanau , K. Cho , and Y. Bengio . Neural machine translation by jointly learning to align and translate. arXiv , 2014 . D. Bahdanau, K. Cho, and Y. Bengio. Neural machine translation by jointly learning to align and translate. arXiv, 2014."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1162264"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999585"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-gtd:19960600"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2789770.2789798"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/3045390.3045531"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/857076.857078"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039866"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:COAP.0000039487.35027.02"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.1003042"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934911"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018442"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626328"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.4467\/20838476SI.16.004.6185"},{"key":"e_1_3_2_2_22_1","volume-title":"Multi-commodity Network Solutions","author":"Jewell W. S.","year":"1966","unstructured":"W. S. Jewell . Multi-commodity Network Solutions . 1966 . W. S. Jewell. Multi-commodity Network Solutions. 1966."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67235-9_9"},{"key":"e_1_3_2_2_24_1","volume-title":"Walking the tightrope: Responsive yet stable traffic engineering","author":"Kandula S.","year":"2005","unstructured":"S. Kandula , D. Katabi , B. Davie , and A. Charny . Walking the tightrope: Responsive yet stable traffic engineering . 2005 . S. Kandula, D. Katabi, B. Davie, and A. Charny. Walking the tightrope: Responsive yet stable traffic engineering. 2005."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018442"},{"key":"e_1_3_2_2_26_1","author":"Knight S.","year":"2011","unstructured":"S. Knight , H. Nguyen , N. Falkner , R. Bowden , and M. Roughan . The internet topology zoo. IEEE Journal on Selected Areas in Communications , 2011 . S. Knight, H. Nguyen, N. Falkner, R. Bowden, and M. Roughan. The internet topology zoo. IEEE Journal on Selected Areas in Communications, 2011.","journal-title":"The internet topology zoo. IEEE Journal on Selected Areas in Communications"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/0278364913495721"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2999134.2999257"},{"key":"e_1_3_2_2_29_1","volume-title":"CoRR","author":"Kumar P.","year":"2016","unstructured":"P. Kumar , Y. Yuan , C. Yu , N. Foster , R. D. Kleinberg , and R. Soul\u00e9 . Kulfi: Robust traffic engineering using semi-oblivious routing . CoRR , 2016 . P. Kumar, Y. Yuan, C. Yu, N. Foster, R. D. Kleinberg, and R. Soul\u00e9. Kulfi: Robust traffic engineering using semi-oblivious routing. CoRR, 2016."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2005.323"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005750"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098843"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633041"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2349905"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/3045390.3045594"},{"key":"e_1_3_2_2_37_1","volume-title":"CoRR","author":"Mnih V.","year":"2013","unstructured":"V. Mnih , K. Kavukcuoglu , D. Silver , A. Graves , I. Antonoglou , D. Wierstra , and M. A. Riedmiller . Playing atari with deep reinforcement learning . CoRR , 2013 . V. Mnih, K. Kavukcuoglu, D. Silver, A. Graves, I. Antonoglou, D. Wierstra, and M. A. Riedmiller. Playing atari with deep reinforcement learning. CoRR, 2013."},{"key":"e_1_3_2_2_38_1","volume-title":"Nature","author":"Mnih V.","year":"2015","unstructured":"V. Mnih , K. Kavukcuoglu , D. Silver , A. A. Rusu , J. Veness , M. G. Bellemare , A. Graves , M. Riedmiller , A. K. Fidjeland , G. Ostrovski , Human-level control through deep reinforcement learning . Nature , 2015 . V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G. Bellemare, A. Graves, M. Riedmiller, A. K. Fidjeland, G. Ostrovski, et al. Human-level control through deep reinforcement learning. Nature, 2015."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/2371238"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637213"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/3045118.3045319"},{"key":"e_1_3_2_2_42_1","volume-title":"Proximal Policy Optimization Algorithms. ArXiv e-prints","author":"Schulman J.","year":"2017","unstructured":"J. Schulman , F. Wolski , P. Dhariwal , A. Radford , and O. Klimov . Proximal Policy Optimization Algorithms. ArXiv e-prints , 2017 . J. Schulman, F. Wolski, P. Dhariwal, A. Radford, and O. Klimov. Proximal Policy Optimization Algorithms. ArXiv e-prints, 2017."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/77600.77620"},{"key":"e_1_3_2_2_44_1","volume-title":"Mastering the game of Go with deep neural networks and tree search. Nature","author":"Silver D.","year":"2016","unstructured":"D. Silver , A. Huang , C. J. Maddison , A. Guez , L. Sifre , G. van den Driessche , J. Schrittwieser , I. Antonoglou , V. Panneershelvam , M. Lanctot , S. Dieleman , D. Grewe , J. Nham , N. Kalchbrenner , I. Sutskever , T. Lillicrap , M. Leach , K. Kavukcuoglu , T. Graepel , and D. Hassabis . Mastering the game of Go with deep neural networks and tree search. Nature , 2016 . D. Silver, A. Huang, C. J. Maddison, A. Guez, L. Sifre, G. van den Driessche, J. Schrittwieser, I. Antonoglou, V. Panneershelvam, M. Lanctot, S. Dieleman, D. Grewe, J. Nham, N. Kalchbrenner, I. Sutskever, T. Lillicrap, M. Leach, K. Kavukcuoglu, T. Graepel, and D. Hassabis. Mastering the game of Go with deep neural networks and tree search. Nature, 2016."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/551283"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/3154580.3154581"},{"key":"e_1_3_2_2_47_1","volume-title":"Machine Learning","author":"Watkins C. J.","year":"1992","unstructured":"C. J. Watkins and P. Dayan . Q-learning . Machine Learning , 1992 . C. J. Watkins and P. Dayan. Q-learning. Machine Learning, 1992."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486020"},{"key":"e_1_3_2_2_49_1","volume-title":"Scalable trust-region method for deep reinforcement learning using kronecker-factored approximation. ArXiv e-prints","author":"Wu Y.","year":"2017","unstructured":"Y. Wu , E. Mansimov , S. Liao , R. B. Grosse , and J. Ba . Scalable trust-region method for deep reinforcement learning using kronecker-factored approximation. ArXiv e-prints , 2017 . Y. Wu, E. Mansimov, S. Liao, R. B. Grosse, and J. Ba. Scalable trust-region method for deep reinforcement learning using kronecker-factored approximation. ArXiv e-prints, 2017."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.94"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342440"}],"event":{"name":"HotNets-XVI: The 16th ACM Workshop on Hot Topics in Networks","location":"Palo Alto CA USA","acronym":"HotNets-XVI","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","CISCO"]},"container-title":["Proceedings of the 16th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152434.3152441","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3152434.3152441","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:30Z","timestamp":1750212810000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152434.3152441"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,30]]},"references-count":51,"alternative-id":["10.1145\/3152434.3152441","10.1145\/3152434"],"URL":"https:\/\/doi.org\/10.1145\/3152434.3152441","relation":{},"subject":[],"published":{"date-parts":[[2017,11,30]]},"assertion":[{"value":"2017-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}