{"id":"https://openalex.org/W3036527957","doi":"https://doi.org/10.1109/icccs49078.2020.9118446","title":"Reinforcement Learning for Resource Mapping in 5G Network Slicing","display_name":"Reinforcement Learning for Resource Mapping in 5G Network Slicing","publication_year":2020,"publication_date":"2020-05-01","ids":{"openalex":"https://openalex.org/W3036527957","doi":"https://doi.org/10.1109/icccs49078.2020.9118446","mag":"3036527957"},"language":"en","primary_location":{"id":"doi:10.1109/icccs49078.2020.9118446","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs49078.2020.9118446","pdf_url":null,"source":{"id":"https://openalex.org/S4306498617","display_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046603659","display_name":"Liyuan Zhao","orcid":"https://orcid.org/0000-0003-3324-4514"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liyuan Zhao","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing Laboratory of Advanced Information Networks, Beijing University of Posts and Telecommunications, Institute of Sensing Technology and Business, BUPT (Wuxi), China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing Laboratory of Advanced Information Networks, Beijing University of Posts and Telecommunications, Institute of Sensing Technology and Business, BUPT (Wuxi), China, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100361300","display_name":"Li Li","orcid":"https://orcid.org/0000-0003-0309-2695"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Li","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing Laboratory of Advanced Information Networks, Beijing University of Posts and Telecommunications, Institute of Sensing Technology and Business, BUPT (Wuxi), China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing Laboratory of Advanced Information Networks, Beijing University of Posts and Telecommunications, Institute of Sensing Technology and Business, BUPT (Wuxi), China, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5046603659"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":1.9439,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.86108468,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"pp","issue":null,"first_page":"869","last_page":"873"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13731","display_name":"Advanced Computing and Algorithms","score":0.9478999972343445,"subfield":{"id":"https://openalex.org/subfields/3322","display_name":"Urban Studies"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.946399986743927,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8085814118385315},{"id":"https://openalex.org/keywords/network-virtualization","display_name":"Network virtualization","score":0.6548837423324585},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6438387632369995},{"id":"https://openalex.org/keywords/virtual-network","display_name":"Virtual network","score":0.6385049223899841},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.6362531185150146},{"id":"https://openalex.org/keywords/dijkstras-algorithm","display_name":"Dijkstra's algorithm","score":0.6334893107414246},{"id":"https://openalex.org/keywords/slicing","display_name":"Slicing","score":0.6083948016166687},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5368459820747375},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.426474392414093},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3781861364841461},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.30283910036087036},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22566351294517517},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.1600934863090515},{"id":"https://openalex.org/keywords/shortest-path-problem","display_name":"Shortest path problem","score":0.13647061586380005},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09051048755645752},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.07966750860214233},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07766610383987427}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8085814118385315},{"id":"https://openalex.org/C2779898492","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Network virtualization","level":4,"score":0.6548837423324585},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6438387632369995},{"id":"https://openalex.org/C2776874963","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Virtual network","level":2,"score":0.6385049223899841},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.6362531185150146},{"id":"https://openalex.org/C173870130","wikidata":"https://www.wikidata.org/wiki/Q8548","display_name":"Dijkstra's algorithm","level":4,"score":0.6334893107414246},{"id":"https://openalex.org/C2776190703","wikidata":"https://www.wikidata.org/wiki/Q488148","display_name":"Slicing","level":2,"score":0.6083948016166687},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5368459820747375},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.426474392414093},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3781861364841461},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.30283910036087036},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22566351294517517},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.1600934863090515},{"id":"https://openalex.org/C22590252","wikidata":"https://www.wikidata.org/wiki/Q1058754","display_name":"Shortest path problem","level":3,"score":0.13647061586380005},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09051048755645752},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.07966750860214233},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07766610383987427},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccs49078.2020.9118446","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs49078.2020.9118446","pdf_url":null,"source":{"id":"https://openalex.org/S4306498617","display_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2130267070","https://openalex.org/W2148869760","https://openalex.org/W2591344039","https://openalex.org/W2806562791","https://openalex.org/W2900804979","https://openalex.org/W2916079228","https://openalex.org/W2918062483","https://openalex.org/W6734342071","https://openalex.org/W6751636519"],"related_works":["https://openalex.org/W2128291817","https://openalex.org/W3112443690","https://openalex.org/W2170281383","https://openalex.org/W2085452000","https://openalex.org/W4200095813","https://openalex.org/W2044709933","https://openalex.org/W2014891887","https://openalex.org/W1491476327","https://openalex.org/W2985326423","https://openalex.org/W3047378479"],"abstract_inverted_index":{"In":[0,73,96],"the":[1,35,41,47,74,80,85,88,97,103,107,114,117,126,130,143,156,163,169,173,181,193,201],"era":[2],"of":[3,43,87,109,129,136,158,192,196],"5G,":[4],"network":[5,16,24,38,54,82,159,197],"slicing":[6,160],"is":[7,184],"considered":[8],"to":[9,27,45,53,83,92,186],"be":[10],"an":[11],"effective":[12],"solution":[13],"for":[14],"flexible":[15],"deployment":[17],"and":[18,39,70,111,121,138,200],"diversified":[19],"services.":[20],"It":[21],"based":[22,63,149],"on":[23,34,64,122,150],"virtualization":[25],"technology":[26],"divide":[28],"into":[29,142],"multiple":[30],"end-to-end":[31],"virtual":[32,94],"networks":[33],"substrate":[36],"physical":[37,89],"in":[40,190],"form":[42],"services":[44],"meet":[46],"user":[48],"that":[49,180],"has":[50],"customized":[51],"appeal":[52],"resource.":[55],"This":[56],"paper":[57],"proposes":[58],"a":[59,93],"reinforcement":[60],"learning":[61],"algorithm":[62,115,148,171,183],"collaborative":[65],"relationship":[66],"between":[67],"node":[68,75,90,110,137],"mapping":[69,76,91,99,118,161],"link":[71,98,112,139],"mapping(RLCO).":[72],"stage,":[77,100],"we":[78,101,167],"apply":[79,102],"policy":[81],"calculate":[84],"probability":[86],"node.":[95],"Dijkstra":[104],"algorithm.":[105,132],"After":[106],"success":[108],"mapping,":[113],"evaluates":[116],"results":[119,178],"respectively,":[120],"this":[123,151],"basis,":[124],"defines":[125],"reward":[127,144,152],"function":[128,153],"RLCO":[131,147,170,182],"The":[133,146,177],"difference":[134],"characteristics":[135],"are":[140],"introduced":[141],"function.":[145],"can":[154],"make":[155],"result":[157],"reach":[162],"global":[164],"optimal.":[165],"Furthermore,":[166],"compare":[168],"with":[172],"other":[174,187],"three":[175,188],"algorithms.":[176],"show":[179],"superior":[185],"algorithms":[189],"terms":[191],"acceptance":[194],"rate":[195],"slice":[198],"requests":[199],"long-term":[202],"earning/cost":[203],"ratio.":[204]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
