{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T04:25:50Z","timestamp":1768537550354,"version":"3.49.0"},"reference-count":39,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1016\/j.comnet.2023.109636","type":"journal-article","created":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T03:47:53Z","timestamp":1676432873000},"page":"109636","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":8,"special_numbering":"C","title":["Network slice reconfiguration with deep reinforcement learning under variable number of service function chains"],"prefix":"10.1016","volume":"224","author":[{"given":"Kairi","family":"Tokuda","sequence":"first","affiliation":[]},{"given":"Takehiro","family":"Sato","sequence":"additional","affiliation":[]},{"given":"Eiji","family":"Oki","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.comnet.2023.109636_b1","doi-asserted-by":"crossref","first-page":"281","DOI":"10.23919\/ICN.2020.0019","article-title":"An intelligent self-sustained RAN slicing framework for diverse service provisioning in 5G-beyond and 6G networks","volume":"1","author":"Mei","year":"2020","journal-title":"Intell. Converged Netw."},{"issue":"4","key":"10.1016\/j.comnet.2023.109636_b2","doi-asserted-by":"crossref","first-page":"B60","DOI":"10.1364\/JOCN.11.000B60","article-title":"Hierarchical edge cloud enabling network slicing for 5G optical fronthaul","volume":"11","author":"Song","year":"2019","journal-title":"J. Opt. Commun. Netw."},{"key":"10.1016\/j.comnet.2023.109636_b3","series-title":"Description of network slicing concept","year":"2016"},{"key":"10.1016\/j.comnet.2023.109636_b4","series-title":"Eur. Conf. Netw, Commun.","first-page":"1","article-title":"The creation phase in network slicing: From a service order to an operative network slice","author":"Ordonez-Lucena","year":"2018"},{"issue":"11","key":"10.1016\/j.comnet.2023.109636_b5","doi-asserted-by":"crossref","first-page":"10969","DOI":"10.1109\/JIOT.2020.2991753","article-title":"On dynamic service function chain reconfiguration in IoT networks","volume":"7","author":"Liu","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"10.1016\/j.comnet.2023.109636_b6","doi-asserted-by":"crossref","first-page":"1888","DOI":"10.1109\/SURV.2013.013013.00155","article-title":"Virtual network embedding: A survey","volume":"15","author":"Fischer","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"10","key":"10.1016\/j.comnet.2023.109636_b7","doi-asserted-by":"crossref","first-page":"2179","DOI":"10.1109\/TPDS.2018.2880992","article-title":"Efficiently embedding service function chains with dynamic virtual network function placement in geo-distributed cloud system","volume":"30","author":"Pei","year":"2018","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"4","key":"10.1016\/j.comnet.2023.109636_b8","doi-asserted-by":"crossref","first-page":"2197","DOI":"10.1109\/TNSM.2020.3019248","article-title":"Network slice reconfiguration by exploiting deep reinforcement learning with large action space","volume":"17","author":"Wei","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10.1016\/j.comnet.2023.109636_b9","series-title":"Proc. Int. Workshops Found. Appl. Self Syst","first-page":"54","article-title":"An energy-aware service function chaining and reconfiguration algorithm in NFV","author":"Kim","year":"2016"},{"key":"10.1016\/j.comnet.2023.109636_b10","doi-asserted-by":"crossref","first-page":"147224","DOI":"10.1109\/ACCESS.2019.2946648","article-title":"An approach for service function chain reconfiguration in network function virtualization architectures","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2023.109636_b11","series-title":"GLOBECOM 2020-2020 IEEE Global Communications Conference","first-page":"1","article-title":"Proactive network slice reconfiguration by exploiting prediction interval and robust optimization","author":"Wei","year":"2020"},{"issue":"4","key":"10.1016\/j.comnet.2023.109636_b12","doi-asserted-by":"crossref","DOI":"10.1007\/s11432-016-9031-x","article-title":"VNF-FG design and VNF placement for 5G mobile networks","volume":"60","author":"Cao","year":"2017","journal-title":"Sci. China Inf. Sci."},{"issue":"1","key":"10.1016\/j.comnet.2023.109636_b13","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1109\/TNET.2018.2890631","article-title":"VNF placement and resource allocation for the support of vertical services in 5G networks","volume":"27","author":"Agarwal","year":"2019","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"10.1016\/j.comnet.2023.109636_b14","article-title":"Dpsnet: Multitask learning using geometry reasoning for scene depth and semantics","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.comnet.2023.109636_b15","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.neucom.2020.03.076","article-title":"Monocular 3D vehicle detection with multi-instance depth and geometry reasoning for autonomous driving","volume":"403","author":"Zhang","year":"2020","journal-title":"Neurocomputing"},{"issue":"4","key":"10.1016\/j.comnet.2023.109636_b16","doi-asserted-by":"crossref","first-page":"1318","DOI":"10.1109\/TNSM.2019.2947905","article-title":"A deep reinforcement learning approach for VNF forwarding graph embedding","volume":"16","author":"Quang","year":"2019","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10.1016\/j.comnet.2023.109636_b17","doi-asserted-by":"crossref","first-page":"167944","DOI":"10.1109\/ACCESS.2019.2953498","article-title":"Reinforcement learning for service function chain reconfiguration in NFV-SDN metro-core optical networks","volume":"7","author":"Troia","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2023.109636_b18","doi-asserted-by":"crossref","unstructured":"A. Tavakoli, F. Pardo, P. Kormushev, Action branching architectures for deep reinforcement learning, in: Proc. AAAI Conf. Artif. Intell., Vol. 32, (1) 2018, pp. 4131\u20134138.","DOI":"10.1609\/aaai.v32i1.11798"},{"key":"10.1016\/j.comnet.2023.109636_b19","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1016\/j.comnet.2018.01.020","article-title":"MOSC: A method to assign the outsourcing of service function chain across multiple clouds","volume":"133","author":"Chen","year":"2018","journal-title":"Comput. Netw."},{"issue":"10","key":"10.1016\/j.comnet.2023.109636_b20","doi-asserted-by":"crossref","first-page":"2246","DOI":"10.1109\/JSAC.2018.2869960","article-title":"A framework for provisioning availability of NFV in data center networks","volume":"36","author":"Fan","year":"2018","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"3","key":"10.1016\/j.comnet.2023.109636_b21","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1109\/TNSM.2017.2711610","article-title":"On dynamic service function chain deployment and readjustment","volume":"14","author":"Liu","year":"2017","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10.1016\/j.comnet.2023.109636_b22","series-title":"Continuous control with deep reinforcement learning","author":"Lillicrap","year":"2015"},{"issue":"9","key":"10.1016\/j.comnet.2023.109636_b23","doi-asserted-by":"crossref","first-page":"7450","DOI":"10.1109\/JIOT.2020.3038793","article-title":"Dynamic service function chain orchestration for NFV\/MEC-enabled IoT networks: A deep reinforcement learning approach","volume":"8","author":"Liu","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"10.1016\/j.comnet.2023.109636_b24","doi-asserted-by":"crossref","first-page":"1926","DOI":"10.1109\/LCOMM.2021.3061991","article-title":"SFC embedding meets machine learning: Deep reinforcement learning approaches","volume":"25","author":"Liu","year":"2021","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.comnet.2023.109636_b25","series-title":"Dynamic input for deep reinforcement learning in autonomous driving","author":"Huegle","year":"2019"},{"issue":"16","key":"10.1016\/j.comnet.2023.109636_b26","doi-asserted-by":"crossref","first-page":"4155","DOI":"10.1109\/JLT.2019.2923615","article-title":"DeepRMSA: a deep reinforcement learning framework for routing, modulation and spectrum assignment in elastic optical networks","volume":"37","author":"Chen","year":"2019","journal-title":"J. Lightw. Technol."},{"issue":"11","key":"10.1016\/j.comnet.2023.109636_b27","doi-asserted-by":"crossref","first-page":"2512","DOI":"10.1109\/JSAC.2017.2760147","article-title":"Network slicing for service-oriented networks under resource constraints","volume":"35","author":"Zhang","year":"2017","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"3","key":"10.1016\/j.comnet.2023.109636_b28","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1109\/TNSM.2016.2598420","article-title":"Resource allocation in NFV: A comprehensive survey","volume":"13","author":"Herrera","year":"2016","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10.1016\/j.comnet.2023.109636_b29","doi-asserted-by":"crossref","first-page":"214696","DOI":"10.1109\/ACCESS.2020.3040949","article-title":"Resource allocation for network slicing in mobile networks","volume":"8","author":"Banchs","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2023.109636_b30","series-title":"2021 IEEE International Conference on Web Services","first-page":"426","article-title":"An efficient algorithm for service function chains reconfiguration in mobile edge cloud networks","author":"Li","year":"2021"},{"key":"10.1016\/j.comnet.2023.109636_b31","series-title":"Reinforcement Learning: An Introduction","author":"Sutton","year":"2018"},{"key":"10.1016\/j.comnet.2023.109636_b32","series-title":"Int. Conf. Mach. Learn.","first-page":"1995","article-title":"Dueling network architectures for deep reinforcement learning","author":"Wang","year":"2016"},{"key":"10.1016\/j.comnet.2023.109636_b33","series-title":"Prioritized experience replay","author":"Schaul","year":"2015"},{"key":"10.1016\/j.comnet.2023.109636_b34","series-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014"},{"key":"10.1016\/j.comnet.2023.109636_b35","series-title":"2013 Proceedings IEEE INFOCOM","first-page":"2211","article-title":"Traffic engineering in software defined networks","author":"Agarwal","year":"2013"},{"issue":"2","key":"10.1016\/j.comnet.2023.109636_b36","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1109\/TNSM.2019.2899609","article-title":"Reconfiguration in network slicing\u2014Optimizing the profit and performance","volume":"16","author":"Wang","year":"2019","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10.1016\/j.comnet.2023.109636_b37","doi-asserted-by":"crossref","unstructured":"S. Salman, C. Streiffer, H. Chen, T. Benson, A. Kadav, DeepConf: Automating data center network topologies management with machine learning, in: Proceedings of the 2018 Workshop on Network Meets AI & ML, 2018, pp. 8\u201314.","DOI":"10.1145\/3229543.3229554"},{"issue":"2","key":"10.1016\/j.comnet.2023.109636_b38","doi-asserted-by":"crossref","first-page":"2275","DOI":"10.1109\/TNSM.2020.3045145","article-title":"Preventive start-time optimization to determine link weights against probabilistic link failures","volume":"18","author":"Hirano","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"4","key":"10.1016\/j.comnet.2023.109636_b39","doi-asserted-by":"crossref","first-page":"4294","DOI":"10.1109\/TNSM.2021.3096254","article-title":"Virtual network function allocation in service function chains using backups with availability schedule","volume":"18","author":"Kang","year":"2021","journal-title":"IEEE Trans. Netw. Serv. Manag."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128623000816?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128623000816?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T13:25:38Z","timestamp":1761398738000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128623000816"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4]]},"references-count":39,"alternative-id":["S1389128623000816"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2023.109636","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2023,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Network slice reconfiguration with deep reinforcement learning under variable number of service function chains","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2023.109636","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"109636"}}