{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T06:31:29Z","timestamp":1725085889813},"reference-count":72,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Federal Ministry of Education and Research in Germany (BMBF) as part of the project AI-NET-PROTECT","doi-asserted-by":"publisher","award":["ID 16KIS1294"],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"German Research Foundation (DFG) as part of the project ADVISE","doi-asserted-by":"publisher","award":["ID - 438892507"],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1109\/tnsm.2022.3177694","type":"journal-article","created":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T19:36:32Z","timestamp":1653507392000},"page":"2839-2853","source":"Crossref","is-referenced-by-count":4,"title":["D2<\/sub>A: Operating a Service Function Chain Platform With Data-Driven Scheduling Policies"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-3501-6996","authenticated-orcid":false,"given":"Patrick","family":"Kramer","sequence":"first","affiliation":[{"name":"Chair of Communication Networks, Technical University of Munich, München, Germany"}]},{"given":"Philip","family":"Diederich","sequence":"additional","affiliation":[{"name":"Chair of Communication Networks, Technical University of Munich, München, Germany"}]},{"given":"Corinna","family":"Kramer","sequence":"additional","affiliation":[{"name":"Deutscher Sparkassenverlag GmbH, Stuttgart, Germany"}]},{"given":"Rastin","family":"Pries","sequence":"additional","affiliation":[{"name":"Nokia Strategy & Technology, Nokia Bell-Labs, Munich, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4358-8038","authenticated-orcid":false,"given":"Wolfgang","family":"Kellerer","sequence":"additional","affiliation":[{"name":"Chair of Communication Networks, Technical University of Munich, München, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2001-4050","authenticated-orcid":false,"given":"Andreas","family":"Blenk","sequence":"additional","affiliation":[{"name":"Chair of Communication Networks, Technical University of Munich, München, Germany"}]}],"member":"263","reference":[{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3343180.3343184"},{"key":"ref71","first-page":"361","article-title":"Shenango: Achieving high CPU efficiency for latency-sensitive datacenter workloads","author":"ousterhout","year":"2019","journal-title":"Proc NSDI"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365412"},{"key":"ref39","first-page":"1","article-title":"A hierarchical model for device placement","author":"mirhoseini","year":"2018","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref38","article-title":"Device placement optimization with reinforcement learning","author":"mirhoseini","year":"2017","journal-title":"arXiv 1706 04972"},{"key":"ref33","first-page":"345","article-title":"Shinjuku: Preemptive scheduling for $\\mu$\nsecond-scale tail latency","author":"kaffes","year":"2019","journal-title":"Proc NSDI"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2020.07.063"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879175"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAI.2017.8248440"},{"key":"ref37","first-page":"185","author":"greenwald","year":"2017","journal-title":"Solving for Best Responses and Equilibria in Extensive-Form Games with Reinforcement Learning Methods"},{"key":"ref36","author":"gibbons","year":"1992","journal-title":"A Primer in Game Theory"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481"},{"key":"ref34","year":"2020","journal-title":"Trace Statistics for Caida Passive oc48 and oc192 Traces"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736036"},{"key":"ref62","first-page":"306","article-title":"Optimizing virtual machine scheduling in NUMA multicore systems","author":"rao","year":"2013","journal-title":"Proc HPCA"},{"key":"ref61","first-page":"277","article-title":"Thread and memory placement on NUMA systems: Asymmetry matters","author":"lepers","year":"2015","journal-title":"Proc USENIX ATC"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2014.6853224"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3394625"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005750"},{"key":"ref27","article-title":"Neural combinatorial optimization with reinforcement learning","author":"bello","year":"2016","journal-title":"arXiv 1611 09940"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342080"},{"key":"ref66","first-page":"171","article-title":"Metron: NFV service chains at the true speed of the underlying hardware","author":"katsikas","year":"2018","journal-title":"Proc NSDI"},{"key":"ref29","article-title":"Machine learning for combinatorial optimization: A methodological tour d’horizon","author":"bengio","year":"2018","journal-title":"arXiv 1811 06128"},{"key":"ref67","first-page":"313","article-title":"Iron: Isolating network-based CPU in container environments","author":"khalid","year":"2018","journal-title":"Proc 15th USENIX Symp Netw Syst Des Implement (NSDI)"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2867827"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.02.018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2019.8901715"},{"key":"ref1","article-title":"Mobile-edge computing—Introductory technical white paper","author":"patel","year":"2014"},{"key":"ref20","year":"2015","journal-title":"Data Plane Development Kit (DPDK)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815423"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132780"},{"key":"ref24","author":"love","year":"2010","journal-title":"Linux Kernel Development"},{"key":"ref23","first-page":"459","article-title":"ClickOS and the art of network function virtualization","author":"martins","year":"2014","journal-title":"Proc NSDI"},{"key":"ref26","year":"2022","journal-title":"3 Environment Abstraction Layer—Data Plane Development Kit 22 03 0-RC2 Documentation"},{"key":"ref25","year":"2020","journal-title":"CFS Scheduler"},{"key":"ref50","article-title":"Population based training of neural networks","author":"jaderberg","year":"2017","journal-title":"arXiv 1711 09846"},{"key":"ref51","article-title":"Tune: A research platform for distributed model selection and training","author":"liaw","year":"2018","journal-title":"arXiv 1807 05118"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486246"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2018.8369019"},{"key":"ref57","author":"witten","year":"2011","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815692"},{"key":"ref55","article-title":"Layer normalization","author":"ba","year":"2016","journal-title":"arXiv 1607 06450"},{"key":"ref54","author":"adaloglou","year":"2020","journal-title":"Intuitive Explanation of Skip Connections in Deep Learning"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref52","first-page":"91","article-title":"NFV performance profiling on multi-core servers","author":"peng","year":"2020","journal-title":"Proc IFIP Netw Conf (Networking)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098828"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737544"},{"key":"ref40","article-title":"Chip placement with deep reinforcement learning","author":"mirhoseini","year":"2020","journal-title":"arXiv 2004 10746"},{"key":"ref12","first-page":"538","article-title":"First fit bin packing: A tight analysis","volume":"20","author":"d\u00f3sa","year":"2013","journal-title":"Proc STACS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1201\/9781420072747-c3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2019.8846943"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3155921.3158429"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405868"},{"key":"ref17","first-page":"1","article-title":"Graph attention networks","author":"veli?kovi?","year":"2018","journal-title":"Proc ICLR"},{"key":"ref18","first-page":"196","article-title":"SFC2CPU: Operating a service function chain platform with neural combinatorial optimization","author":"kr\u00e4mer","year":"2021","journal-title":"Proc IFIP\/IEEE Int Symp Integr Netw Manage"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2940147.2940155"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.09.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/NetSys.2019.8854495"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-017-0905-y"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2895553"},{"key":"ref8","author":"martin","year":"2018","journal-title":"Clean architecture a craftsman's guide to software structure and design"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.09.035"},{"key":"ref49","article-title":"A system for massively parallel hyperparameter tuning","author":"li","year":"2018","journal-title":"arXiv 1810 05934"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999602"},{"key":"ref46","first-page":"1","article-title":"Prioritized experience replay","author":"schaul","year":"2016","journal-title":"Proc 4th Int Conf Learn Represent (ICLR)"},{"key":"ref45","article-title":"Deep reinforcement learning with double Q-learning","author":"hasselt","year":"2015","journal-title":"arXiv 1509 06461 [cs]"},{"key":"ref48","article-title":"RLlib: Abstractions for distributed reinforcement learning","author":"liang","year":"2017","journal-title":"arXiv 1712 09381"},{"key":"ref47","article-title":"Dueling network architectures for deep reinforcement learning","author":"wang","year":"2015","journal-title":"arXiv 1511 06581"},{"key":"ref42","first-page":"6000","article-title":"Attention is All you Need","author":"vaswani","year":"2017","journal-title":"Proc NIPS"},{"key":"ref41","first-page":"315","article-title":"Deep sparse rectifier neural networks","volume":"15","author":"glorot","year":"2011","journal-title":"Proc PMLR"},{"key":"ref44","first-page":"1","article-title":"An image is worth 16x16 words: Transformers for image recognition at scale","author":"dosovitskiy","year":"2021","journal-title":"Proc 9th Int Conf Learn Represent (ICLR)"},{"key":"ref43","article-title":"Emergent tool use from multi-agent autocurricula","author":"baker","year":"2019","journal-title":"arXiv 1909 07528"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9917435\/09781605.pdf?arnumber=9781605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T17:59:10Z","timestamp":1665770350000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9781605\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":72,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2022.3177694","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9]]}}}