{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:39:17Z","timestamp":1774021157853,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T00:00:00Z","timestamp":1561334400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Program for Support of Top-notch Young Professionals in National Program for Special Support of Eminent Professionals"},{"name":"Fundamental Research Funds for the Central Universities","award":["2017KFKJXX009, 3004210116"],"award-info":[{"award-number":["2017KFKJXX009, 3004210116"]}]},{"name":"NSFC","award":["61761136014, 61722206, 61520106005"],"award-info":[{"award-number":["61761136014, 61722206, 61520106005"]}]},{"name":"National Key Research & Development (R&D) Plan","award":["2017YFB1001703"],"award-info":[{"award-number":["2017YFB1001703"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,24]]},"DOI":"10.1145\/3326285.3329056","type":"proceedings-article","created":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T12:42:33Z","timestamp":1560516153000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":189,"title":["NFVdeep"],"prefix":"10.1145","author":[{"given":"Yikai","family":"Xiao","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]},{"given":"Qixia","family":"Zhang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]},{"given":"Fangming","family":"Liu","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]},{"given":"Jia","family":"Wang","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong"}]},{"given":"Miao","family":"Zhao","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong"}]},{"given":"Zhongxing","family":"Zhang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]},{"given":"Jiaxing","family":"Zhang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2019,6,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bernardetta Addis DallalBelabed Mathieu Bouet and Stefano Secci. 2015. Virtual network functions placement and routing optimization. In 2015 IEEE 4th CloudNet. IEEE 171--177.  Bernardetta Addis DallalBelabed Mathieu Bouet and Stefano Secci. 2015. Virtual network functions placement and routing optimization. In 2015 IEEE 4th CloudNet. IEEE 171--177."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485943"},{"key":"e_1_3_2_1_3_1","unstructured":"Alibaba. 2019. ClusterData201708 in Alibaba. https:\/\/github.com\/alibaba\/clusterdata {Online Accessed 5-May-2019}.  Alibaba. 2019. ClusterData201708 in Alibaba. https:\/\/github.com\/alibaba\/clusterdata {Online Accessed 5-May-2019}."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(99)00265-9"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.021"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-9031-x"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218511"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639344"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2815986"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2668470"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Xincai Fei Fangming Liu Hong Xu and Hai Jin. 2017. Towards load-balanced VNF assignment in geo-distributed NFV infrastructure. In 2017 IEEE\/ACM 25th IWQoS. IEEE 1--10.  Xincai Fei Fangming Liu Hong Xu and Hai Jin. 2017. Towards load-balanced VNF assignment in geo-distributed NFV infrastructure. In 2017 IEEE\/ACM 25th IWQoS. IEEE 1--10.","DOI":"10.1109\/IWQoS.2017.7969166"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486320"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Ed. Halpern J. et al. 2015. Service Function Chaining (SFC) Architecture. http:\/\/www.rfc-editor.org\/info\/rfc7665{Online Accessed 5-May-2019}.  Ed. Halpern J. et al. 2015. Service Function Chaining (SFC) Architecture. http:\/\/www.rfc-editor.org\/info\/rfc7665{Online Accessed 5-May-2019}.","DOI":"10.17487\/RFC7665"},{"key":"e_1_3_2_1_14_1","volume-title":"Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. CoRR abs\/1502.03167","author":"Ioffe Sergey","year":"2015"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2017.7899395"},{"key":"e_1_3_2_1_16_1","volume-title":"IEEE GLOBECOM","author":"Abdelquoddouss","year":"2017"},{"key":"e_1_3_2_1_17_1","volume-title":"DHL: Enabling Flexible Software Network Functions with FPGA Acceleration. In 2018 IEEE 38th","author":"Li Xiaoyao","year":"2018"},{"key":"e_1_3_2_1_18_1","unstructured":"Yuxi Li. 2017. Deep reinforcement learning: An overview. arXiv preprint arXiv:1701.07274 (2017).  Yuxi Li. 2017. Deep reinforcement learning: An overview. arXiv preprint arXiv:1701.07274 (2017)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524563"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2016.2535401"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Marouen Mechtri Chaima Ghribi and Djamal Zeghlache. 2016. Vnf placement and chaining in distributed cloud. In 2016 IEEE 9th CLOUD. IEEE 376--383.  Marouen Mechtri Chaima Ghribi and Djamal Zeghlache. 2016. Vnf placement and chaining in distributed cloud. In 2016 IEEE 9th CLOUD. IEEE 376--383.","DOI":"10.1109\/CLOUD.2016.0057"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Sevil Mehraghdam Matthias Keller and Holger Karl. 2014. Specifying and placing chains of virtual network functions. In 2014 IEEE 3rd CloudNet. IEEE 7--13.  Sevil Mehraghdam Matthias Keller and Holger Karl. 2014. Specifying and placing chains of virtual network functions. In 2014 IEEE 3rd CloudNet. IEEE 7--13.","DOI":"10.1109\/CloudNet.2014.6968961"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Volodymyr Mnih Koray Kavukcuoglu etal 2015. Human-level control through deep reinforcement learning. Nature 518 7540 (2015) 529--533.  Volodymyr Mnih Koray Kavukcuoglu et al. 2015. Human-level control through deep reinforcement learning. Nature 518 7540 (2015) 529--533.","DOI":"10.1038\/nature14236"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2014.7014205"},{"key":"e_1_3_2_1_26_1","volume-title":"27th ICML","author":"Nair Vinod","year":"2010"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym10050163"},{"key":"e_1_3_2_1_28_1","volume-title":"12th Usenix OSDI","author":"Panda Aurojit","year":"2016"},{"key":"e_1_3_2_1_29_1","first-page":"1057","article-title":"Policy Gradient Methods for Reinforcement Learning with Function Approximation","volume":"7","author":"Yishay Mansour Satinder Singh","year":"2012","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057036"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2015.19"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"David Silver Aja Huang etal 2016. Mastering the game of Go with deep neural networks and tree search. Nature 529 7587 (2016) 484--489.  David Silver Aja Huang et al. 2016. Mastering the game of Go with deep neural networks and tree search. Nature 529 7587 (2016) 484--489.","DOI":"10.1038\/nature16961"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2959058"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841846"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.9.1.91-98"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600947"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.233"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2015.2388585"},{"key":"e_1_3_2_1_39_1","unstructured":"Zhifeng Xu Fangming Liu Tao Wang and Hong Xu. 2016. Demystifying the energy efficiency of network function virtualization. In 2016 IEEE\/ACM 24th IWQoS.  Zhifeng Xu Fangming Liu Tao Wang and Hong Xu. 2016. Demystifying the energy efficiency of network function virtualization. In 2016 IEEE\/ACM 24th IWQoS."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842023"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486246"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737660"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.232"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502829"}],"event":{"name":"IWQoS '19: IEEE\/ACM International Symposium on Quality of Service","location":"Phoenix Arizona","acronym":"IWQoS '19"},"container-title":["Proceedings of the International Symposium on Quality of Service"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3326285.3329056","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3326285.3329056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:00Z","timestamp":1750206360000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3326285.3329056"}},"subtitle":["adaptive online service function chain deployment with deep reinforcement learning"],"short-title":[],"issued":{"date-parts":[[2019,6,24]]},"references-count":44,"alternative-id":["10.1145\/3326285.3329056","10.1145\/3326285"],"URL":"https:\/\/doi.org\/10.1145\/3326285.3329056","relation":{},"subject":[],"published":{"date-parts":[[2019,6,24]]},"assertion":[{"value":"2019-06-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}