{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:32:35Z","timestamp":1759332755517,"version":"3.37.3"},"reference-count":7,"publisher":"IEEE","funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1718901,IIS-1838207,CNS 1901218,OIA-2040680,USDA-020-67021-32855"],"award-info":[{"award-number":["CNS-1718901,IIS-1838207,CNS 1901218,OIA-2040680,USDA-020-67021-32855"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100015796","name":"Shanghai Sailing Program","doi-asserted-by":"publisher","award":["20YF1421300"],"award-info":[{"award-number":["20YF1421300"]}],"id":[{"id":"10.13039\/100015796","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,21]]},"DOI":"10.23919\/ifipnetworking52078.2021.9472202","type":"proceedings-article","created":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T20:09:00Z","timestamp":1625861340000},"page":"1-3","source":"Crossref","is-referenced-by-count":12,"title":["Resource Allocation Method for Network Slicing Using Constrained Reinforcement Learning"],"prefix":"10.23919","author":[{"given":"Yongshuai","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jiaxin","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"1v","article-title":"Network functions virtualization (nfv) infrastructure overview","volume":"1","author":"etsi","year":"2015","journal-title":"NFV-INF"},{"journal-title":"Safe exploration in continuous action spaces","year":"2018","author":"dalal","key":"ref3"},{"journal-title":"Proximal policy optimization algorithms","year":"2017","author":"schulman","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2881964"},{"key":"ref7","first-page":"1","article-title":"A constrained reinforcement learning based approach for network slicing","author":"liu","year":"0","journal-title":"2020 IEEE 28th International Conference on Network Protocols (ICNP)"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"4940","DOI":"10.1609\/aaai.v34i04.5932","article-title":"Ipo: Interior-point policy optimization under constraints","volume":"34","author":"liu","year":"0","journal-title":"The AAAI Conference on Artificial Intelligence"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600951"}],"event":{"name":"2021 IFIP Networking Conference (IFIP Networking)","start":{"date-parts":[[2021,6,21]]},"location":"Espoo and Helsinki, Finland","end":{"date-parts":[[2021,6,24]]}},"container-title":["2021 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9472750\/9472195\/09472202.pdf?arnumber=9472202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:47:36Z","timestamp":1643212056000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9472202\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":7,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking52078.2021.9472202","relation":{},"subject":[],"published":{"date-parts":[[2021,6,21]]}}}