{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T21:04:59Z","timestamp":1769634299264,"version":"3.49.0"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,10]]},"DOI":"10.1109\/infocom42981.2021.9488704","type":"proceedings-article","created":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T20:07:32Z","timestamp":1627330052000},"page":"1-10","source":"Crossref","is-referenced-by-count":72,"title":["AutoML for Video Analytics with Edge Computing"],"prefix":"10.1109","author":[{"given":"Apostolos","family":"Galanopoulos","sequence":"first","affiliation":[]},{"given":"Jose A.","family":"Ayala-Romero","sequence":"additional","affiliation":[]},{"given":"Douglas J.","family":"Leith","sequence":"additional","affiliation":[]},{"given":"George","family":"Iosifidis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Efficient and Robust Automated Machine Learning","author":"feurer","year":"2015","journal-title":"Proc of NIPS"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2921977"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3132211.3134459"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155476"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486241"},{"key":"ref37","article-title":"Dedas: Online Task Dispatching and Scheduling with Band-width Constraint in Edge Computing","author":"meng","year":"2019","journal-title":"Proc of IEEE INFOCOM"},{"key":"ref36","article-title":"Adaptive User-managed Service Placement for Mobile Edge Computing: An Online Learning Approach","author":"meng","year":"2019","journal-title":"Proc of IEEE INFOCOM"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155524"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2018.00011"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/PADSW.2018.8645013"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3300116"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.54"},{"key":"ref2","article-title":"Seeing AI","year":"0"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2698164"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2494218"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2017.49"},{"key":"ref21","article-title":"Edge-Dataset Description","author":"galanopoulos","year":"0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3240508.3240561"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.226"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742666"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809711"},{"key":"ref50","article-title":"On Kernelized Multi-Armed Bandits","author":"chowdhury","year":"2017","journal-title":"Proc of ICML"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230574"},{"key":"ref11","article-title":"VideoEdge:Processing Camera Streams Using Hierarchical Clusters","author":"hung","year":"2018","journal-title":"Proc of IEEE\/ACM SEC"},{"key":"ref40","article-title":"CherryPick: Adaptively Unearthing the Best Cloud Configurations for Big Data Analytics","author":"alipourfard","year":"2017","journal-title":"Proc of USENIX NSDI"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2949347"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485905"},{"key":"ref14","article-title":"Live Video Analytics at Scale with Approximation and Delay-Tolerance","author":"zhang","year":"2017","journal-title":"Proc of USENIX NSDI"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149069"},{"key":"ref16","volume":"2","author":"williams","year":"2006","journal-title":"Gaussian Processes for Machine Learning"},{"key":"ref17","article-title":"Gaussian process optimization in the bandit setting: No regret and experimental design","author":"srinivas","year":"2010","journal-title":"Proc of ICML"},{"key":"ref18","article-title":"Algorithms for Hyper-Parameter Optimization","author":"bergstra","year":"2011","journal-title":"Proc of NIPS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487629"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3097895.3097900"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524411"},{"key":"ref5","first-page":"1","article-title":"Mobile Edge Computing - a Key Technology Towards 5G","volume":"11","author":"hu","year":"2015","journal-title":"ETSI White Paper"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2487344"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057116"},{"key":"ref49","article-title":"Regret Bounds for Safe Gaussian Process Bandit Optimization","author":"amani","year":"2020"},{"key":"ref9","article-title":"Yolov3: An incremental improvement","author":"redmon","year":"2018"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2182033"},{"key":"ref45","article-title":"Algorithms for Non-Stationary Generalized Linear Bandits","author":"russac","year":"2020"},{"key":"ref48","article-title":"Stagewise Safe Bayesian Optimization with Gaussian Processes","author":"sui","year":"2018","journal-title":"Proc of ICML"},{"key":"ref47","article-title":"Safe Exploration for Optimization with Gaussian Processes","author":"sui","year":"2015","journal-title":"Proc of ICML"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00108"},{"key":"ref44","article-title":"Parametric Bandits: The Generalized Linear Case","author":"filippi","year":"2010","journal-title":"Proc of NIPS"},{"key":"ref43","article-title":"Optimality of Thompson Sampling for Gaussian Bandits Depends on Priors","author":"junya","year":"2013"}],"event":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications","location":"Vancouver, BC, Canada","start":{"date-parts":[[2021,5,10]]},"end":{"date-parts":[[2021,5,13]]}},"container-title":["IEEE INFOCOM 2021 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9488422\/9488423\/09488704.pdf?arnumber=9488704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:43:40Z","timestamp":1652183020000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9488704\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,10]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/infocom42981.2021.9488704","relation":{},"subject":[],"published":{"date-parts":[[2021,5,10]]}}}