Читать книгу Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning - Группа авторов - Страница 3
List of Tables
Оглавление1 Chapter 3Table 3.1 Summary of the state‐of‐the‐art for virtual network embedding.Table 3.2 Summary of the state‐of‐the‐art for ML‐based placement in NFV.Table 3.3 Summary of the state‐of‐the‐art for ML‐based scaling in NFV.Table 3.4 Summary of the state‐of‐the‐art for ML‐based admission control app...Table 3.5 Summary of the state‐of‐the‐art for ML‐based resource allocation a...
2 Chapter 5Table 5.1 Categorization of covered use cases.Table 5.2 Impact of including different monitoring types on QoE estimation a...
3 Chapter 6Table 6.1 Summary of ML techniques.Table 6.2 Machine learning‐based power control.Table 6.3 blackMachine‐learning based scheduling.Table 6.4 Machine learning‐based user association.Table 6.5 Machine learning‐based spectrum allocation.
4 Chapter 7Table 7.1 Variables used for the minimization of the overall system cost.Table 7.2 A sample fraction of the observation space of the gym‐fog environm...Table 7.3 A sample fraction of the action space of the gym‐fog environment.Table 7.4 The reduced observation space of the gym‐fog environment.Table 7.5 The hardware configuration of each node.Table 7.6 The gym‐fog environment configuration.Table 7.7 The MILP model execution time.
5 Chapter 8Table 8.1 Node and graph features used for problem representation and learni...Table 8.2 provides overview of research work, general optimization problems ...Table 8.3 overviewing networking research work, general optimization problem...
6 Chapter 9Table 9.1 Summary of the key characteristics of data‐processing platform.Table 9.2 Summary of the AI techniques considered for performance management...
7 Chapter 11Table 11.1 Summary of reviewed papers.Table 11.2 Summary of the reviewed tools.
8 Chapter 12Table 12.1 The set of Android applications considered for evaluation.Table 12.2 Number of rules for combined chains.Table 12.3 Accuracy of chains generated for protecting applications.
9 Chapter 13Table 13.1 Performance of selected cryptographic functions on different IoT ...