{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:09:44Z","timestamp":1765544984536,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,21]]},"DOI":"10.1145\/3627673.3680060","type":"proceedings-article","created":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T19:34:11Z","timestamp":1729452851000},"page":"4939-4947","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["COIN: Chance-Constrained Imitation Learning for Safe and Adaptive Resource Oversubscription under Uncertainty"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7305-1496","authenticated-orcid":false,"given":"Lu","family":"Wang","sequence":"first","affiliation":[{"name":"Microsoft, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4111-5843","authenticated-orcid":false,"given":"Mayukh","family":"Das","sequence":"additional","affiliation":[{"name":"Microsoft, Bangalore, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3089-0345","authenticated-orcid":false,"given":"Fangkai","family":"Yang","sequence":"additional","affiliation":[{"name":"Microsoft, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2893-5461","authenticated-orcid":false,"given":"Chao","family":"Du","sequence":"additional","affiliation":[{"name":"Microsoft, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8997-8317","authenticated-orcid":false,"given":"Bo","family":"Qiao","sequence":"additional","affiliation":[{"name":"Microsoft, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6439-8183","authenticated-orcid":false,"given":"Hang","family":"Dong","sequence":"additional","affiliation":[{"name":"Microsoft, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0102-8139","authenticated-orcid":false,"given":"Chetan","family":"Bansal","sequence":"additional","affiliation":[{"name":"Microsoft, Seattle, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8698-1860","authenticated-orcid":false,"given":"Si","family":"Qin","sequence":"additional","affiliation":[{"name":"Microsoft, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2019-213X","authenticated-orcid":false,"given":"Saravan","family":"Rajmohan","sequence":"additional","affiliation":[{"name":"Microsoft, Seattle, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2559-2383","authenticated-orcid":false,"given":"Qingwei","family":"Lin","sequence":"additional","affiliation":[{"name":"Microsoft, Beijing, CA, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9230-2799","authenticated-orcid":false,"given":"Dongmei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3808-7512","authenticated-orcid":false,"given":"Qi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.05.008"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2019.10.032"},{"key":"e_1_3_2_1_3_1","volume-title":"2nd USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE 12)","author":"Baset Salman A","year":"2012","unstructured":"Salman A Baset, Long Wang, and Chunqiang Tang. 2012. Towards an understanding of oversubscription in cloud. In 2nd USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE 12)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195716"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2014.78"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.00027"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.00027"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2018.3091"},{"key":"e_1_3_2_1_9_1","volume-title":"Uncertainty-Aware Data Aggregation for Deep Imitation Learning. In 2019 International Conference on Robotics and Automation (ICRA). 761--767","author":"Cui Yuchen","year":"2019","unstructured":"Yuchen Cui, David Isele, Scott Niekum, and Kikuo Fujimura. 2019. Uncertainty-Aware Data Aggregation for Deep Imitation Learning. In 2019 International Conference on Robotics and Automation (ICRA). 761--767."},{"key":"e_1_3_2_1_10_1","volume-title":"Safe exploration in continuous action spaces. arXiv preprint arXiv:1801.08757","author":"Dalal Gal","year":"2018","unstructured":"Gal Dalal, Krishnamurthy Dvijotham, Matej Vecerik, Todd Hester, Cosmin Paduraru, and Yuval Tassa. 2018. Safe exploration in continuous action spaces. arXiv preprint arXiv:1801.08757 (2018)."},{"key":"e_1_3_2_1_11_1","volume-title":"Advances in Neural Information Processing Systems","volume":"32","author":"Haan Pim De","year":"2019","unstructured":"Pim De Haan, Dinesh Jayaraman, and Sergey Levine. 2019. Causal confusion in imitation learning. Advances in Neural Information Processing Systems, Vol. 32 (2019)."},{"key":"e_1_3_2_1_12_1","volume-title":"Differentiable Constrained Imitation Learning for Robot Motion Planning and Control. arXiv preprint arXiv:2210.11796","author":"Diehl Christopher","year":"2022","unstructured":"Christopher Diehl, Janis Adamek, Martin Kr\u00fcger, Frank Hoffmann, and Torsten Bertram. 2022. Differentiable Constrained Imitation Learning for Robot Motion Planning and Control. arXiv preprint arXiv:2210.11796 (2022)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2013.6630832"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2789272.2886795"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1666"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.131"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015583703449"},{"volume-title":"Big data analytics","author":"Govindaraju Venu","key":"e_1_3_2_1_18_1","unstructured":"Venu Govindaraju, Vijay Raghavan, and Calyampudi Radhakrishna Rao. 2015. Big data analytics. Elsevier."},{"key":"e_1_3_2_1_19_1","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Hadary Ori","year":"2020","unstructured":"Ori Hadary, Luke Marshall, Ishai Menache, Abhisek Pan, Esaias E Greeff, David Dion, Star Dorminey, Shailesh Joshi, Yang Chen, Mark Russinovich, and Thomas Moscibroda. 2020. Protean: VM Allocation Service at Scale. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20). USENIX Association, 845--861. https:\/\/www.usenix.org\/conference\/osdi20\/presentation\/hadary"},{"key":"e_1_3_2_1_20_1","volume-title":"On cloud-based oversubscription. arXiv preprint arXiv:1402.4758","author":"Householder Rachel","year":"2014","unstructured":"Rachel Householder, Scott Arnold, and Robert Green. 2014. On cloud-based oversubscription. arXiv preprint arXiv:1402.4758 (2014)."},{"key":"e_1_3_2_1_21_1","volume-title":"ICIS 2009 proceedings","author":"Huang Ke-Wei","year":"2009","unstructured":"Ke-Wei Huang and Mengqi Wang. 2009. Firm-level productivity analysis for software as a service companies. ICIS 2009 proceedings (2009), 21."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-021-05946-3"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2024.3369333"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2021.3087423"},{"key":"e_1_3_2_1_25_1","volume-title":"2021 USENIX Annual Technical Conference (USENIX ATC 21)","author":"Kumbhare Alok Gautam","year":"2021","unstructured":"Alok Gautam Kumbhare, Reza Azimi, Ioannis Manousakis, Anand Bonde, Felipe Frujeri, Nithish Mahalingam, Pulkit A Misra, Seyyed Ahmad Javadi, Bianca Schroeder, Marcus Fontoura, et al. 2021. $$Prediction-Based$$ Power Oversubscription in Cloud Platforms. In 2021 USENIX Annual Technical Conference (USENIX ATC 21). 473--487."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2019.04.008"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2408-4"},{"key":"e_1_3_2_1_28_1","volume-title":"Continuous control with deep reinforcement learning. arXiv preprint arXiv:1509.02971","author":"Lillicrap Timothy P","year":"2015","unstructured":"Timothy P Lillicrap, Jonathan J Hunt, Alexander Pritzel, Nicolas Heess, Tom Erez, Yuval Tassa, David Silver, and Daan Wierstra. 2015. Continuous control with deep reinforcement learning. arXiv preprint arXiv:1509.02971 (2015)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1609\/aiide.v18i1.21959"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/357783.331677"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2021.105400"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/IROS40897.2019.8968287"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094670520933683"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094670520933683"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC40024.2019.9029423"},{"key":"e_1_3_2_1_36_1","volume-title":"Advances in Neural Information Processing Systems","volume":"32","author":"Paternain Santiago","year":"2019","unstructured":"Santiago Paternain, Luiz Chamon, Miguel Calvo-Fullana, and Alejandro Ribeiro. 2019. Constrained reinforcement learning has zero duality gap. Advances in Neural Information Processing Systems, Vol. 32 (2019)."},{"key":"e_1_3_2_1_37_1","volume-title":"Genjin Xie, Congsheng Zhang, Yang Guan, Yao Mu, and Enxin Sun.","author":"Peng Baiyu","year":"2022","unstructured":"Baiyu Peng, Jingliang Duan, Jianyu Chen, Shengbo Eben Li, Genjin Xie, Congsheng Zhang, Yang Guan, Yao Mu, and Enxin Sun. 2022. Model-Based Chance-Constrained Reinforcement Learning via Separated Proportional-Integral Lagrangian. IEEE Transactions on Neural Networks and Learning Systems (2022)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC45484.2021.9683748"},{"key":"e_1_3_2_1_39_1","volume-title":"Efficient training of artificial neural networks for autonomous navigation. Neural computation","author":"Pomerleau Dean A","year":"1991","unstructured":"Dean A Pomerleau. 1991. Efficient training of artificial neural networks for autonomous navigation. Neural computation (1991)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7553036"},{"key":"e_1_3_2_1_41_1","volume-title":"International Conference on Machine Learning. PMLR, 8502--8511","author":"Satija Harsh","year":"2020","unstructured":"Harsh Satija, Philip Amortila, and Joelle Pineau. 2020. Constrained markov decision processes via backward value functions. In International Conference on Machine Learning. PMLR, 8502--8511."},{"key":"e_1_3_2_1_42_1","volume-title":"2020 USENIX Annual Technical Conference (USENIX ATC 20)","author":"Shahrad Mohammad","year":"2020","unstructured":"Mohammad Shahrad, Rodrigo Fonseca, Inigo Goiri, Gohar Chaudhry, Paul Batum, Jason Cooke, Eduardo Laureano, Colby Tresness, Mark Russinovich, and Ricardo Bianchini. 2020. Serverless in the Wild: Characterizing and Optimizing the Serverless Workload at a Large Cloud Provider. In 2020 USENIX Annual Technical Conference (USENIX ATC 20). USENIX Association, 205--218. https:\/\/www.usenix.org\/conference\/atc20\/presentation\/shahrad"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Junjie Sheng Lu Wang Fangkai Yang Bo Qiao Hang Dong Xiangfeng Wang Bo Jin Jun Wang Si Qin Saravan Rajmohan et al. 2022. Learning Cooperative Oversubscription for Cloud by Chance-Constrained Multi-Agent Reinforcement Learning. arXiv preprint arXiv:2211.11759 (2022).","DOI":"10.1145\/3543507.3583298"},{"key":"e_1_3_2_1_44_1","volume-title":"Autonomous airline revenue management: A deep reinforcement learning approach to seat inventory control and overbooking. arXiv preprint arXiv:1902.06824","author":"Mohd Shihab Syed Arbab","year":"2019","unstructured":"Syed Arbab Mohd Shihab, Caleb Logemann, Deepak-George Thomas, and Peng Wei. 2019. Autonomous airline revenue management: A deep reinforcement learning approach to seat inventory control and overbooking. arXiv preprint arXiv:1902.06824 (2019)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1287\/trsc.9.2.101"},{"volume-title":"2019 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS).","author":"Silv\u00e9rio Jo\u00e3o","key":"e_1_3_2_1_46_1","unstructured":"Jo\u00e3o Silv\u00e9rio, Yanlong Huang, Fares J. Abu-Dakka, Leonel Rozo, and Darwin G. Caldwell. 2019. Uncertainty-Aware Imitation Learning using Kernelized Movement Primitives. In 2019 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.07.041"},{"volume-title":"Reinforcement learning: An introduction","author":"Sutton Richard S","key":"e_1_3_2_1_48_1","unstructured":"Richard S Sutton and Andrew G Barto. 2018. Reinforcement learning: An introduction. MIT press."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tre.2004.09.001"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2813541"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tre.2018.12.019"}],"event":{"name":"CIKM '24: The 33rd ACM International Conference on Information and Knowledge Management","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Boise ID USA","acronym":"CIKM '24"},"container-title":["Proceedings of the 33rd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3680060","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627673.3680060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:17Z","timestamp":1750294697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3680060"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"references-count":51,"alternative-id":["10.1145\/3627673.3680060","10.1145\/3627673"],"URL":"https:\/\/doi.org\/10.1145\/3627673.3680060","relation":{},"subject":[],"published":{"date-parts":[[2024,10,21]]},"assertion":[{"value":"2024-10-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}