{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T19:04:26Z","timestamp":1763665466479,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["10101717"],"award-info":[{"award-number":["10101717"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1145\/3603166.3632129","type":"proceedings-article","created":{"date-parts":[[2024,4,4]],"date-time":"2024-04-04T19:23:27Z","timestamp":1712258607000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Identifying Network Congestion Using Knowledge Graphs and Link Prediction"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8985-6563","authenticated-orcid":false,"given":"Aikaterini","family":"Mitropoulou","sequence":"first","affiliation":[{"name":"National Technical University of Athens, Athens, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1823-3027","authenticated-orcid":false,"given":"Panagiotis","family":"Kokkinos","sequence":"additional","affiliation":[{"name":"University of Peloponnese, Athens, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4942-1362","authenticated-orcid":false,"given":"Emmanouel","family":"Varvarigos","sequence":"additional","affiliation":[{"name":"National Technical University of Athens, Athens, Greece"}]}],"member":"320","published-online":{"date-parts":[[2024,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.11.011"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.050"},{"key":"e_1_3_2_1_3_1","first-page":"61","volume-title":"Orchestration from the Cloud to the Edge","author":"Svorobej Sergej","year":"2020","unstructured":"Sergej Svorobej, Malika Bendechache, Frank Griesinger, and J\u00f6rg Domaschka. Orchestration from the Cloud to the Edge, pages 61--77. Springer International Publishing, Cham, 2020."},{"issue":"5","key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MCC.2018.053711663","article-title":"A note on the convergence of iot, edge, and cloud computing in smart cities","volume":"5","author":"Fazio Maria","year":"2018","unstructured":"Maria Fazio, Rajiv Ranjan, Michele Girolami, Javid Taheri, Schahram Dustdar, and Massimo Villari. A note on the convergence of iot, edge, and cloud computing in smart cities. IEEE Cloud Computing, 5(5):22--24, 2018.","journal-title":"IEEE Cloud Computing"},{"key":"e_1_3_2_1_5_1","first-page":"M3A","volume-title":"Optical Fiber Communication Conference","author":"Christodoulopoulos Kostas","year":"2018","unstructured":"Kostas Christodoulopoulos, Nicola Sambo, Nikolaos Argyris, P Giardina, Giannis Kanakis, Aristotelis Kretsis, Francesco Fresi, Andrea Sgambelluri, Giacomo Bernini, Camille Delezoide, et al. Observe-decide-act: Experimental demonstration of a self-healing network. In Optical Fiber Communication Conference, pages M3A-7. Optical Society of America, 2018."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","first-page":"2732","DOI":"10.1109\/ICC45855.2022.9839054","volume-title":"ICC 2022 - IEEE International Conference on Communications","author":"Gelenbe Erol","year":"2022","unstructured":"Erol Gelenbe and Karl Sigman. Iot traffic shaping and the massive access problem. In ICC 2022 - IEEE International Conference on Communications, pages 2732--2737, 2022."},{"issue":"24","key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","first-page":"11914","DOI":"10.3390\/app112411914","article-title":"A multi-provider end-to-end dynamic orchestration architecture approach for 5g and future communication systems","volume":"11","author":"Rodrigues Batista Jos\u00e9 Olimpio","year":"2021","unstructured":"Jos\u00e9 Olimpio Rodrigues Batista, Douglas Chagas da Silva, Moacyr Martucci, Regina Melo Silveira, and Carlos Eduardo Cugnasca. A multi-provider end-to-end dynamic orchestration architecture approach for 5g and future communication systems. Applied Sciences, 11(24):11914, Dec 2021.","journal-title":"Applied Sciences"},{"key":"e_1_3_2_1_8_1","volume-title":"Paolo Casari, and Per-Olov \u00d6stberg. Machine learning methods for reliable resource provisioning in edge-cloud computing: A survey. ACM Computing Surveys (CSUR), 52(5):1--39","author":"Duc Thang Le","year":"2019","unstructured":"Thang Le Duc, Rafael Garc\u00eda Leiva, Paolo Casari, and Per-Olov \u00d6stberg. Machine learning methods for reliable resource provisioning in edge-cloud computing: A survey. ACM Computing Surveys (CSUR), 52(5):1--39, 2019."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919957"},{"issue":"5","key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","first-page":"3394","DOI":"10.1109\/JIOT.2020.3022534","article-title":"Efficient federated learning algorithm for resource allocation in wireless iot networks","volume":"8","author":"Nguyen Van-Dinh","year":"2020","unstructured":"Van-Dinh Nguyen, Shree Krishna Sharma, Thang X Vu, Symeon Chatzinotas, and Bj\u00f6rn Ottersten. Efficient federated learning algorithm for resource allocation in wireless iot networks. IEEE Internet of Things Journal, 8(5):3394--3409, 2020.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"2018 Eleventh International Conference on Contemporary Computing (IC3)","author":"Madan Rishabh","year":"2018","unstructured":"Rishabh Madan and Partha Sarathi Mangipudi. Predicting computer network traffic: a time series forecasting approach using dwt, arima and rnn. In 2018 Eleventh International Conference on Contemporary Computing (IC3), pages 1--5. IEEE, 2018."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1109\/ICESC48915.2020.9156045","volume-title":"2020 International Conference on Electronics and Sustainable Communication Systems (ICESC)","author":"Nihale Shyam","year":"2020","unstructured":"Shyam Nihale, Shantanu Sharma, Lokesh Parashar, and Upendra Singh. Network traffic prediction using long short-term memory. In 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), pages 338--343. IEEE, 2020."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2938236"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.01.021"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.12.015"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789878"},{"key":"e_1_3_2_1_17_1","volume-title":"Graph neural network-based efficient subgraph embedding method for link prediction in mobile edge computing. Sensors, 23(10)","author":"Deng Xiaolong","year":"2023","unstructured":"Xiaolong Deng, Jufeng Sun, and Junwen Lu. Graph neural network-based efficient subgraph embedding method for link prediction in mobile edge computing. Sensors, 23(10), 2023."},{"issue":"2","key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MNET.001.1900156","article-title":"Fog intelligence for network anomaly detection","volume":"34","author":"Yang Kai","year":"2020","unstructured":"Kai Yang, Hui Ma, and Shaoyu Dou. Fog intelligence for network anomaly detection. IEEE Network, 34(2):78--82, 2020.","journal-title":"IEEE Network"},{"key":"e_1_3_2_1_19_1","volume-title":"Performance anomaly detection and bottleneck identification. ACM Comput. Surv., 48(1), jul","author":"Ibidunmoye Olumuyiwa","year":"2015","unstructured":"Olumuyiwa Ibidunmoye, Francisco Hern\u00e1ndez-Rodriguez, and Erik Elmroth. Performance anomaly detection and bottleneck identification. ACM Comput. Surv., 48(1), jul 2015."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.01.039"},{"key":"e_1_3_2_1_21_1","volume-title":"Roberto Navigli, Sebastian Neumaier, et al. Knowledge graphs. Synthesis Lectures on Data, Semantics, and Knowledge, 12(2):1--257","author":"Hogan Aidan","year":"2021","unstructured":"Aidan Hogan, Eva Blomqvist, Michael Cochez, Claudia d'Amato, Gerard de Melo, Claudio Gutierrez, Sabrina Kirrane, Jos\u00e9 Emilio Labra Gayo, Roberto Navigli, Sebastian Neumaier, et al. Knowledge graphs. Synthesis Lectures on Data, Semantics, and Knowledge, 12(2):1--257, 2021."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2666781"},{"key":"e_1_3_2_1_23_1","volume-title":"Optimal wireless resource allocation with random edge graph neural networks. ieee transactions on signal processing, 68:2977--2991","author":"Eisen Mark","year":"2020","unstructured":"Mark Eisen and Alejandro Ribeiro. Optimal wireless resource allocation with random edge graph neural networks. ieee transactions on signal processing, 68:2977--2991, 2020."},{"issue":"2","key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","first-page":"78","DOI":"10.3390\/info13020078","article-title":"Security service function chain based on graph neural network","volume":"13","author":"Li Wei","year":"2022","unstructured":"Wei Li, Haomin Wang, Xiaoliang Zhang, Dingding Li, Lijing Yan, Qi Fan, Yuan Jiang, and Ruoyu Yao. Security service function chain based on graph neural network. Information, 13(2):78, 2022.","journal-title":"Information"},{"key":"e_1_3_2_1_25_1","volume-title":"Graph databases: new opportunities for connected data. \"O'Reilly Media","author":"Robinson Ian","year":"2015","unstructured":"Ian Robinson, Jim Webber, and Emil Eifrem. Graph databases: new opportunities for connected data. \"O'Reilly Media, Inc.\", 2015."},{"key":"e_1_3_2_1_26_1","volume-title":"Inductive representation learning on large graphs. Advances in neural information processing systems, 30","author":"Hamilton Will","year":"2017","unstructured":"Will Hamilton, Zhitao Ying, and Jure Leskovec. Inductive representation learning on large graphs. Advances in neural information processing systems, 30, 2017."},{"key":"e_1_3_2_1_27_1","volume-title":"Fast graph representation learning with pytorch geometric. ArXiv, abs\/1903.02428","author":"Fey Matthias","year":"2019","unstructured":"Matthias Fey and Jan Eric Lenssen. Fast graph representation learning with pytorch geometric. ArXiv, abs\/1903.02428, 2019."},{"key":"e_1_3_2_1_28_1","volume-title":"Link prediction based on graph neural networks. Advances in neural information processing systems, 31","author":"Zhang Muhan","year":"2018","unstructured":"Muhan Zhang and Yixin Chen. Link prediction based on graph neural networks. Advances in neural information processing systems, 31, 2018."},{"issue":"3","key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1140\/epjb\/s10051-023-00495-1","article-title":"Graph attention network via node similarity for link prediction","volume":"96","author":"Yang Kai","year":"2023","unstructured":"Kai Yang, Yuan Liu, Zijuan Zhao, Xingxing Zhou, and Peijin Ding. Graph attention network via node similarity for link prediction. The European Physical Journal B, 96(3):27, Mar 2023.","journal-title":"The European Physical Journal B"},{"key":"e_1_3_2_1_30_1","volume-title":"Networkx documentation","author":"X.","year":"2023","unstructured":"NetworkX. Networkx documentation, 2023."},{"volume-title":"Neo4j python driver documentation","year":"2023","key":"e_1_3_2_1_31_1","unstructured":"Neo4j. Neo4j python driver documentation, 2023."},{"key":"e_1_3_2_1_32_1","volume-title":"The generalized sigmoid activation function: Competitive supervised learning. Inf. Sci., 99(1--2):69--82, jun","author":"Narayan Sridhar","year":"1997","unstructured":"Sridhar Narayan. The generalized sigmoid activation function: Competitive supervised learning. Inf. Sci., 99(1--2):69--82, jun 1997."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357879"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"}],"event":{"name":"UCC '23: IEEE\/ACM 16th International Conference on Utility and Cloud Computing","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE TCSC"],"location":"Taormina (Messina) Italy","acronym":"UCC '23"},"container-title":["Proceedings of the IEEE\/ACM 16th International Conference on Utility and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603166.3632129","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603166.3632129","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:09Z","timestamp":1750286949000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603166.3632129"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":34,"alternative-id":["10.1145\/3603166.3632129","10.1145\/3603166"],"URL":"https:\/\/doi.org\/10.1145\/3603166.3632129","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]},"assertion":[{"value":"2024-04-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}