{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:09Z","timestamp":1750220289806,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Mitcas Accelerate program","award":["IT15927"],"award-info":[{"award-number":["IT15927"]}]},{"name":"Ericsson - Global Artificial Intelligence Accelerator in Montreal"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1145\/3477314.3507096","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T00:37:36Z","timestamp":1651883856000},"page":"1967-1974","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Optimization of IoT slices in wifi enterprise networks"],"prefix":"10.1145","author":[{"given":"Foroutan","family":"Fami","sequence":"first","affiliation":[{"name":"\u00c9cole de technologie sup\u00e9rieure (\u00c9TS), Montr\u00e9al, Quebec"}]},{"given":"Nessrine","family":"Hammami","sequence":"additional","affiliation":[{"name":"\u00c9cole de technologie sup\u00e9rieure (\u00c9TS), Montr\u00e9al, Quebec"}]},{"given":"Chuan","family":"Pham","sequence":"additional","affiliation":[{"name":"\u00c9cole de technologie sup\u00e9rieure (\u00c9TS), Montr\u00e9al, Canada"}]},{"given":"Kim-Khoa","family":"Nguyen","sequence":"additional","affiliation":[{"name":"\u00c9cole de technologie sup\u00e9rieure (\u00c9TS), Canada"}]}],"member":"320","published-online":{"date-parts":[[2022,5,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2815638"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3007871"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000611"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127540.3127556"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057046"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422769"},{"key":"e_1_3_2_1_7_1","volume-title":"Q-Learning Algorithm for Joint Computation Offloading and Resource Allocation in Edge Cloud. In 2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM). 45--52","author":"Dab Boutheina","year":"2019","unstructured":"Boutheina Dab, Nadjib Aitsaadi, and Rami Langar. 2019. Q-Learning Algorithm for Joint Computation Offloading and Resource Allocation in Edge Cloud. In 2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM). 45--52."},{"key":"e_1_3_2_1_8_1","volume-title":"Towards IoT Slicing for Centralized WLANs in Enterprise Networks. In 2020 International Symposium on Networks, Computers and Communications (ISNCC). 1--6.","author":"Fami Foroutan","year":"2020","unstructured":"Foroutan Fami, Chuan Pham, and Kim-Khoa Nguyen. 2020. Towards IoT Slicing for Centralized WLANs in Enterprise Networks. In 2020 International Symposium on Networks, Computers and Communications (ISNCC). 1--6."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7105641"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC45663.2020.9120793"},{"key":"e_1_3_2_1_11_1","first-page":"11","article-title":"IEEE Standard for Information technology---Telecommunications and information exchange between systems Local and metropolitan area networks---Specific requirements - Part 11","volume":"802","author":"IEEE.","year":"2016","unstructured":"IEEE. 2016. IEEE Standard for Information technology---Telecommunications and information exchange between systems Local and metropolitan area networks---Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802.11-2016 (Revision of IEEE Std 802.11-2012) (2016), 1--3534.","journal-title":"IEEE Std"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119970460.ch12"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292663"},{"volume-title":"2021 IEEE Wireless Communications and Networking Conference (WCNC). 1--6.","author":"Lib\u00f3rio Pedro Paulo","key":"e_1_3_2_1_14_1","unstructured":"Pedro Paulo Lib\u00f3rio, Chan Tong Lam, Benjamin Ng, Daniel L. Guidoni, Marilia Curado, and Leandro A. Villas. 2021. Airtime Aware Dynamic Network Slicing for Heterogeneous IoT Services in IEEE 802.11ah. In 2021 IEEE Wireless Communications and Networking Conference (WCNC). 1--6."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","unstructured":"Volodymyr Mnih Koray Kavukcuoglu David Silver Andrei A Rusu Joel Veness Marc G Bellemare Alex Graves Martin Riedmiller Andreas K Fidjeland Georg Ostrovski et al. 2015. Human-level control through deep reinforcement learning. Nature 518 7540 (02 2015) 529--533. 10.1038\/nature14236","DOI":"10.1038\/nature14236"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2597295"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110407"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3005594"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00182-008-0117-6"},{"key":"e_1_3_2_1_20_1","volume-title":"Proximal Policy Optimization Algorithms. ArXiv abs\/1707.06347","author":"Schulman John","year":"2017","unstructured":"John Schulman, Filip Wolski, Prafulla Dhariwal, Alec Radford, and Oleg Klimov. 2017. Proximal Policy Optimization Algorithms. ArXiv abs\/1707.06347 (2017)."}],"event":{"name":"SAC '22: The 37th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Virtual Event","acronym":"SAC '22"},"container-title":["Proceedings of the 37th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477314.3507096","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3477314.3507096","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:28Z","timestamp":1750188688000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477314.3507096"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":20,"alternative-id":["10.1145\/3477314.3507096","10.1145\/3477314"],"URL":"https:\/\/doi.org\/10.1145\/3477314.3507096","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]},"assertion":[{"value":"2022-05-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}