{"id":"https:\/\/openalex.org\/W4289446292","doi":"https:\/\/doi.org\/10.48550\/arxiv.2207.14766","title":"Deep Reinforcement Learning for End-to-End Network Slicing: Challenges and Solutions","display_name":"Deep Reinforcement Learning for End-to-End Network Slicing: Challenges and Solutions","publication_year":2022,"publication_date":"2022-07-29","ids":{"openalex":"https:\/\/openalex.org\/W4289446292","doi":"https:\/\/doi.org\/10.48550\/arxiv.2207.14766"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2207.14766","is_oa":true,"landing_page_url":"http:\/\/arxiv.org\/abs\/2207.14766","pdf_url":"https:\/\/arxiv.org\/pdf\/2207.14766","source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https:\/\/arxiv.org\/pdf\/2207.14766","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https:\/\/openalex.org\/A5100409471","display_name":"Qiang Liu","orcid":"https:\/\/orcid.org\/0000-0002-4307-2990"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Liu, Qiang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5090619132","display_name":"Nakjung Choi","orcid":"https:\/\/orcid.org\/0000-0002-6272-1933"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Choi, Nakjung","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https:\/\/openalex.org\/A5100696345","display_name":"Tao Han","orcid":"https:\/\/orcid.org\/0000-0002-5543-0716"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Han, Tao","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https:\/\/openalex.org\/A5100409471"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T10714","display_name":"Software-Defined Networks and 5G","score":0.9868000149726868,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T10714","display_name":"Software-Defined Networks and 5G","score":0.9868000149726868,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T12808","display_name":"Ferroelectric and Negative Capacitance Devices","score":0.9315999746322632,"subfield":{"id":"https:\/\/openalex.org\/subfields\/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https:\/\/openalex.org\/fields\/22","display_name":"Engineering"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/slicing","display_name":"Slicing","score":0.8667728900909424},{"id":"https:\/\/openalex.org\/keywords\/computer-science","display_name":"Computer science","score":0.8039590120315552},{"id":"https:\/\/openalex.org\/keywords\/end-to-end-principle","display_name":"End-to-end principle","score":0.7694814205169678},{"id":"https:\/\/openalex.org\/keywords\/reinforcement-learning","display_name":"Reinforcement learning","score":0.6360116004943848},{"id":"https:\/\/openalex.org\/keywords\/distributed-computing","display_name":"Distributed computing","score":0.5859734416007996},{"id":"https:\/\/openalex.org\/keywords\/network-architecture","display_name":"Network architecture","score":0.5255188941955566},{"id":"https:\/\/openalex.org\/keywords\/key","display_name":"Key (lock)","score":0.46766841411590576},{"id":"https:\/\/openalex.org\/keywords\/architecture","display_name":"Architecture","score":0.43169647455215454},{"id":"https:\/\/openalex.org\/keywords\/program-slicing","display_name":"Program slicing","score":0.4212656021118164},{"id":"https:\/\/openalex.org\/keywords\/artificial-intelligence","display_name":"Artificial intelligence","score":0.3714781403541565},{"id":"https:\/\/openalex.org\/keywords\/computer-network","display_name":"Computer network","score":0.36032021045684814},{"id":"https:\/\/openalex.org\/keywords\/world-wide-web","display_name":"World Wide Web","score":0.09373116493225098},{"id":"https:\/\/openalex.org\/keywords\/operating-system","display_name":"Operating system","score":0.09346836805343628}],"concepts":[{"id":"https:\/\/openalex.org\/C2776190703","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q488148","display_name":"Slicing","level":2,"score":0.8667728900909424},{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.8039590120315552},{"id":"https:\/\/openalex.org\/C74296488","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q2527392","display_name":"End-to-end principle","level":2,"score":0.7694814205169678},{"id":"https:\/\/openalex.org\/C97541855","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q830687","display_name":"Reinforcement learning","level":2,"score":0.6360116004943848},{"id":"https:\/\/openalex.org\/C120314980","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q180634","display_name":"Distributed computing","level":1,"score":0.5859734416007996},{"id":"https:\/\/openalex.org\/C193415008","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q639681","display_name":"Network architecture","level":2,"score":0.5255188941955566},{"id":"https:\/\/openalex.org\/C26517878","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q228039","display_name":"Key (lock)","level":2,"score":0.46766841411590576},{"id":"https:\/\/openalex.org\/C123657996","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q12271","display_name":"Architecture","level":2,"score":0.43169647455215454},{"id":"https:\/\/openalex.org\/C91071405","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1413145","display_name":"Program slicing","level":3,"score":0.4212656021118164},{"id":"https:\/\/openalex.org\/C154945302","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3714781403541565},{"id":"https:\/\/openalex.org\/C31258907","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1301371","display_name":"Computer network","level":1,"score":0.36032021045684814},{"id":"https:\/\/openalex.org\/C136764020","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q466","display_name":"World Wide Web","level":1,"score":0.09373116493225098},{"id":"https:\/\/openalex.org\/C111919701","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q9135","display_name":"Operating system","level":1,"score":0.09346836805343628},{"id":"https:\/\/openalex.org\/C142362112","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q735","display_name":"Art","level":0,"score":0},{"id":"https:\/\/openalex.org\/C153349607","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q36649","display_name":"Visual arts","level":1,"score":0}],"mesh":[],"locations_count":3,"locations":[{"id":"pmh:oai:arXiv.org:2207.14766","is_oa":true,"landing_page_url":"http:\/\/arxiv.org\/abs\/2207.14766","pdf_url":"https:\/\/arxiv.org\/pdf\/2207.14766","source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"pmh:oai:digitalcommons.unl.edu:csearticles-1313","is_oa":false,"landing_page_url":"https:\/\/digitalcommons.unl.edu\/csearticles\/282","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S4306513441","display_name":"Insecta mundi","issn_l":"0749-6737","issn":["0749-6737","1942-1354","1942-1362"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/P4310316217","host_organization_name":"Center for Systematic Entomology","host_organization_lineage":["https:\/\/openalex.org\/P4310316217"],"host_organization_lineage_names":["Center for Systematic Entomology"],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"CSE Journal Articles","raw_type":"text"},{"id":"doi:10.48550\/arxiv.2207.14766","is_oa":true,"landing_page_url":"https:\/\/doi.org\/10.48550\/arxiv.2207.14766","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2207.14766","is_oa":true,"landing_page_url":"http:\/\/arxiv.org\/abs\/2207.14766","pdf_url":"https:\/\/arxiv.org\/pdf\/2207.14766","source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https:\/\/metadata.un.org\/sdg\/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https:\/\/content.openalex.org\/works\/W4289446292.pdf","grobid_xml":"https:\/\/content.openalex.org\/works\/W4289446292.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https:\/\/openalex.org\/W2134982133","https:\/\/openalex.org\/W1964336761","https:\/\/openalex.org\/W2991905743","https:\/\/openalex.org\/W4239953224","https:\/\/openalex.org\/W2112395437","https:\/\/openalex.org\/W2347708239","https:\/\/openalex.org\/W4302024603","https:\/\/openalex.org\/W2170816480","https:\/\/openalex.org\/W1595405651","https:\/\/openalex.org\/W2011854888"],"abstract_inverted_index":{"5G":[0,118],"and":[1,85,107,119,133,148,151],"beyond":[2,120],"is":[3],"expected":[4],"to":[5,37,66,71,83,94],"enable":[6],"various":[7],"emerging":[8],"use":[9,21,67],"cases":[10,22],"with":[11],"diverse":[12],"performance":[13,57],"requirements":[14],"from":[15],"vertical":[16],"industries.":[17],"To":[18],"serve":[19],"these":[20],"cost-effectively,":[23],"network":[24,42,60,75,97,104,137,157],"slicing":[25,98,105,138],"plays":[26],"a":[27,91,109],"key":[28],"role":[29],"in":[30,117,131,136],"dynamically":[31],"creating":[32],"virtual":[33],"end-to-end":[34,156],"networks":[35],"according":[36],"specific":[38],"resource":[39],"demands.":[40],"A":[41],"slice":[43],"may":[44],"have":[45],"hundreds":[46],"of":[47,58,128],"configurable":[48],"parameters":[49],"over":[50],"multiple":[51,143],"technical":[52],"domains":[53],"that":[54,113],"define":[55],"the":[56,59,96,103,129],"slice,":[61],"which":[62],"makes":[63],"it":[64],"impossible":[65],"traditional":[68],"model-based":[69],"solutions":[70,116],"orchestrate":[72],"resources":[73],"for":[74,154],"slices.":[76],"In":[77],"this":[78],"article,":[79],"we":[80,101,123,141],"discuss":[81],"how":[82],"design":[84],"deploy":[86],"deep":[87],"reinforcement":[88],"learning":[89],"(DRL),":[90],"model-free":[92],"approach,":[93],"address":[95],"problem.":[99],"First,":[100],"analyze":[102],"problem":[106],"present":[108],"standard-compliant":[110],"system":[111],"architecture":[112],"enables":[114],"DRL-based":[115],"networks.":[121],"Second,":[122],"provide":[124],"an":[125],"in-depth":[126],"analysis":[127],"challenges":[130],"designing":[132],"deploying":[134],"DRL":[135],"systems.":[139],"Third,":[140],"explore":[142],"promising":[144],"techniques,":[145],"i.e.,":[146],"safety":[147],"distributed":[149],"DRL,":[150],"imitation":[152],"learning,":[153],"automating":[155],"slicing.":[158]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}