<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462024000301127</article-id>
<article-id pub-id-type="doi">10.13053/cys-28-3-4671</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Reinforcement Learning Based Fog and Cloud Resource Allocation for an IoRT-aware Business Process]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Fattouch]]></surname>
<given-names><![CDATA[Najla]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ben-Lahmar]]></surname>
<given-names><![CDATA[Imen]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Boukadi]]></surname>
<given-names><![CDATA[Khouloud]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,University of Sfax Faculté des Sciences Économiques et de Gestion ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Tunisia</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,University of Sfax Institut Supérieur d&#8217;Informatique et de Multimédia ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Tunisia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2024</year>
</pub-date>
<volume>28</volume>
<numero>3</numero>
<fpage>1127</fpage>
<lpage>1142</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462024000301127&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462024000301127&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462024000301127&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: IoRT-aware BP aims to promote the business process (BP) within robotics and IoT capacities. This incorporation ensures machine-to-machine (M2M) communication and the automatic execution of tasks by using robot devices. Nonetheless, the execution of this process inside the enterprise may be costly due to the consumed resources, the need for computational capacity, etc. To close these gaps, the business process outsourcing (BPO) strategy can be carried out to outsource the IoRT-aware BP to external environments (e.g., Cloud, Fog, etc.). To profit from outsourcing, an enterprise should identify suitable resources to ensure optimal process execution. The selection of resources is known in the literature as resource allocation (RA). The RA problem is described in this work using the Markov Decision Process (MDP), and it is resolved using reinforcement learning (RL). The proposed approach relies, on one hand, on Q-learning as an RL algorithm, and on the other hand, it considers the extension of the ifogSim tool to support the process execution using Fog and Cloud resources. The obtained results are promising in terms of response time regarding the scale-up of the considered resources. Furthermore, the experimental results show that our approach offers a substantial advantage in optimizing the performance of RA, which confirms its usefulness and relevance compared to other common methods.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Resource allocation]]></kwd>
<kwd lng="en"><![CDATA[reinforcement learning]]></kwd>
<kwd lng="en"><![CDATA[IoRT-aware business process]]></kwd>
<kwd lng="en"><![CDATA[fog]]></kwd>
<kwd lng="en"><![CDATA[cloud]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abdulqadir]]></surname>
<given-names><![CDATA[H. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Zeebaree]]></surname>
<given-names><![CDATA[S. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Shukur]]></surname>
<given-names><![CDATA[H. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sadeeq]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Salim]]></surname>
<given-names><![CDATA[B. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Salih]]></surname>
<given-names><![CDATA[A. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Kak]]></surname>
<given-names><![CDATA[S. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A study of moving from cloud computing to fog computing]]></article-title>
<source><![CDATA[Qubahan Academic Journal]]></source>
<year>2021</year>
<volume>1</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>60-70</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Costa]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Bachiega]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[de-Carvalho]]></surname>
<given-names><![CDATA[L. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Araujo]]></surname>
<given-names><![CDATA[A. P. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Orchestration in fog computing: A comprehensive survey]]></article-title>
<source><![CDATA[ACM Computing Surveys]]></source>
<year>2023</year>
<volume>55</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>1-34</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[ElHalawany]]></surname>
<given-names><![CDATA[B. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Zaky]]></surname>
<given-names><![CDATA[A. B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deep learning based resources allocation for internet-of-things deployment underlaying cellular networks]]></article-title>
<source><![CDATA[Mobile Networks and Applications]]></source>
<year>2020</year>
<volume>25</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1833-41</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fattouch]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Lahmar]]></surname>
<given-names><![CDATA[I. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Boukadi]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[A comprehensive architecture for an IoRT-aware business process outsourcing into fog and cloud computing]]></source>
<year>2021</year>
<volume>3067</volume>
<conf-name><![CDATA[ Tunisian Algerian Conference on Applied Computing]]></conf-name>
<conf-loc> </conf-loc>
<page-range>164-72</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fattouch]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Lahmar]]></surname>
<given-names><![CDATA[I. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Boukadi]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Towards A meta-modeling approach for an IoRT-aware business process]]></source>
<year>2022</year>
<volume>36</volume>
<numero>1</numero>
<conf-name><![CDATA[ 36th International Conference on Modelling and Simulation (ECMS)]]></conf-name>
<conf-loc> </conf-loc>
<issue>1</issue>
<page-range>29-35</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fattouch]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Lahmar]]></surname>
<given-names><![CDATA[I. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Rekik]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Boukadi]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Decision-making approach for an IoRT-aware business process outsourcing]]></article-title>
<source><![CDATA[Digital]]></source>
<year>2022</year>
<volume>2</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>520-37</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Jin]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Feng]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Kang]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Review of virtual power plant operations: Resource coordination and multidimensional interaction]]></article-title>
<source><![CDATA[Applied Energy]]></source>
<year>2024</year>
<volume>357</volume>
<page-range>122284</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Govindan]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Agarwal]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Darbari]]></surname>
<given-names><![CDATA[J. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Jha]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An integrated decision making model for the selection of sustainable forward and reverse logistic providers]]></article-title>
<source><![CDATA[Annals of Operations Research]]></source>
<year>2019</year>
<volume>273</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>607-50</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Dastjerdi]]></surname>
<given-names><![CDATA[A. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Ghosh]]></surname>
<given-names><![CDATA[S. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Buyya]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[iFogSim: A toolkit for modeling and simulation of resource management techniques in the internet of things, edge and fog computing environments]]></article-title>
<source><![CDATA[Software: Practice and Experience]]></source>
<year>2017</year>
<volume>47</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>1275-96</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hailu]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Chebo]]></surname>
<given-names><![CDATA[A. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mapping business process outsourcing and innovation towards a future research]]></article-title>
<source><![CDATA[Business Process Management Journal]]></source>
<year>2024</year>
<volume>30</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>158-82</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Halima]]></surname>
<given-names><![CDATA[R. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Kallel]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmed-Nacer]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gaaloul]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Optimal business process deployment cost in cloud resources]]></article-title>
<source><![CDATA[Journal of Supercomputing]]></source>
<year>2021</year>
<volume>77</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>1579-611</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Havur]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Cabanillas]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Polleres]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Benchmarking answer set programming systems for resource allocation in business processes]]></article-title>
<source><![CDATA[Expert Systems with Applications]]></source>
<year>2022</year>
<volume>205</volume>
<page-range>117599</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[van-der-Aalst]]></surname>
<given-names><![CDATA[W. M. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Duan]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reinforcement learning based resource allocation in business process management]]></article-title>
<source><![CDATA[Data &amp; Knowledge Engineering]]></source>
<year>2011</year>
<volume>70</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>127-45</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hummaida]]></surname>
<given-names><![CDATA[A. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Paton]]></surname>
<given-names><![CDATA[N. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Sakellariou]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Scalable virtual machine migration using reinforcement learning]]></article-title>
<source><![CDATA[Journal of Grid Computing]]></source>
<year>2022</year>
<volume>20</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>15</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ihde]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Pufahl]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Völker]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Goel]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Weske]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A framework for modeling and executing task-specific resource allocations in business processes]]></article-title>
<source><![CDATA[Computing]]></source>
<year>2022</year>
<volume>104</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>2405-29</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kallel]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Rekik]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Khemakhem]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[IoT-Fog-Cloud based architecture for smart systems: Prototypes of autism and COVID-19 monitoring systems]]></article-title>
<source><![CDATA[Software: Practice and Experience]]></source>
<year>2020</year>
<volume>51</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>91-116</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[S. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Jeong]]></surname>
<given-names><![CDATA[J. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Aridi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Jun]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Factors that affect the technological transition of firms toward the industry 4.0 technologies]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2023</year>
<volume>11</volume>
<page-range>1694-707</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Koken]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cloud robotics platforms]]></article-title>
<source><![CDATA[Interdisciplinary Description of Complex Systems: INDECS]]></source>
<year>2015</year>
<volume>13</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>26-33</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lakhan]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mohammed]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Obaid]]></surname>
<given-names><![CDATA[O. I.]]></given-names>
</name>
<name>
<surname><![CDATA[Chakraborty]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Abdulkareem]]></surname>
<given-names><![CDATA[K. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Kadry]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Efficient deep-reinforcement learning aware resource allocation in SDN-enabled fog paradigm]]></article-title>
<source><![CDATA[Automated Software Engineering]]></source>
<year>2022</year>
<volume>29</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-25</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[López-Pintado]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Dumas]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Berx]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Discovery, simulation, and optimization of business processes with differentiated resources]]></article-title>
<source><![CDATA[Information Systems]]></source>
<year>2024</year>
<volume>120</volume>
<page-range>102289</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Masuda]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Zimmermann]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Shirasaka]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Nakamura]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<source><![CDATA[Internet of robotic things with digital platforms: Digitization of robotics enterprise]]></source>
<year>2020</year>
<volume>189</volume>
<page-range>381-91</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Metzger]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Kley]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Palm]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Triggering proactive business process adaptations via online reinforcement learning]]></source>
<year>2020</year>
<volume>12168</volume>
<conf-name><![CDATA[ 18th Business Process Management Conference (BPM)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>273-90</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Neubauer]]></surname>
<given-names><![CDATA[T. R.]]></given-names>
</name>
<name>
<surname><![CDATA[da-Silva]]></surname>
<given-names><![CDATA[V. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Fantinato]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Peres]]></surname>
<given-names><![CDATA[S. M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Resource allocation optimization in business processes supported by reinforcement learning and process mining]]></source>
<year>2022</year>
<volume>13653</volume>
<page-range>580-95</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[OMG]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Parida]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Mahapatra]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Business process model and notation (BPMN), version 2.0]]></article-title>
<source><![CDATA[Object Management Group]]></source>
<year>2011</year>
<volume>1</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>18</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Palm]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Metzger]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Pohl]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Online reinforcement learning for self-adaptive information systems]]></source>
<year>2020</year>
<conf-name><![CDATA[ 32nd International Conference on Advanced Information Systems Engineering (CAiSE)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>169-84</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="">
<collab>Precimed</collab>
<source><![CDATA[precimed. precimed-prima]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rebmann]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Rehse]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Pinter]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Schnaubelt]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Daun]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Fettke]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[IoT-based activity recognition for process assistance in human-robot disaster response]]></source>
<year>2020</year>
<volume>392</volume>
<conf-name><![CDATA[ Business Process Management Forum BPM]]></conf-name>
<conf-loc> </conf-loc>
<page-range>71-87</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rekik]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Boukadi]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Ben-Abdallah]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[A framework for cloud selection based on business process profile]]></source>
<year>2017</year>
<volume>299</volume>
<page-range>97-110</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Simoens]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Dragone]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Saffiotti]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The internet of robotic things: A review of concept, added value and applications]]></article-title>
<source><![CDATA[International Journal of Advanced Robotic Systems]]></source>
<year>2018</year>
<volume>15</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1729881418759424</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sutton]]></surname>
<given-names><![CDATA[R. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Barto]]></surname>
<given-names><![CDATA[A. G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reinforcement learning: An introduction]]></article-title>
<source><![CDATA[Robotica]]></source>
<year>1999</year>
<volume>17</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>229-35</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Talaat]]></surname>
<given-names><![CDATA[F. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Effective prediction and resource allocation method (EPRAM) in fog computing environment for smart healthcare system]]></article-title>
<source><![CDATA[Multimedia Tools and Applications]]></source>
<year>2022</year>
<volume>81</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>8235-58</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Volkova]]></surname>
<given-names><![CDATA[V. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Chemenkaya]]></surname>
<given-names><![CDATA[L. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Desyatirikova]]></surname>
<given-names><![CDATA[E. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Hajali]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Khodar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Osama]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Load balancing in cloud computing]]></source>
<year>2018</year>
<conf-name><![CDATA[ Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>387-90</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Liang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Dai]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Miao]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deep reinforcement learning: a survey]]></article-title>
<source><![CDATA[IEEE Transactions on Neural Networks and Learning Systems]]></source>
<year>2024</year>
<volume>35</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>5064-78</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yi]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Cao]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Coding schemes and resource allocations for the multi-task coded distributed computation]]></source>
<year>2021</year>
<conf-name><![CDATA[ IEEE International Conference on Communications Workshops (ICC)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zbikowski]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Ostapowicz]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gawrysiak]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deep reinforcement learning for resource allocation in business processes]]></article-title>
<source><![CDATA[Process Mining Workshops]]></source>
<year>2021</year>
<page-range>177-89</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
