{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:15:23Z","timestamp":1775229323353,"version":"3.50.1"},"reference-count":51,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100004318","name":"Microsoft","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004318","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,17]]},"DOI":"10.1109\/infocom53939.2023.10229045","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:40:43Z","timestamp":1693330843000},"page":"1-10","source":"Crossref","is-referenced-by-count":23,"title":["Cross-Camera Inference on the Constrained Edge"],"prefix":"10.1109","author":[{"given":"Jingzong","family":"Li","sequence":"first","affiliation":[{"name":"City University of Hong Kong"}]},{"given":"Libin","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory"}]},{"given":"Hong","family":"Xu","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Shudeng","family":"Wu","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Chun Jason","family":"Xue","sequence":"additional","affiliation":[{"name":"City University of Hong Kong"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"2022 NVIDIA AI City Challenge"},{"key":"ref2","volume-title":"Can 30,000 cameras help solve chicago\u2019s crime problem?"},{"key":"ref3","volume-title":"DNNCam\u2122 AI camera"},{"key":"ref4","volume-title":"Enabling Data Residency and Data Protection in Microsoft Azure Regions"},{"key":"ref5","volume-title":"NVIDIA Jetson Nano Developer Kit"},{"key":"ref8","volume-title":"Traffic Intelligence from Video"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3123982"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.3641638"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00286"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3524273.3528178"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2921977"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809711"},{"key":"ref15","article-title":"Binarized Neural Networks: Training Deep Neural Networks with Weights and Activations Constrained to+ 1 or-1","author":"Courbariaux","year":"2016"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405887"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3349614.3356023"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S1352-2310(97)00447-0"},{"key":"ref19","author":"Jocher","year":"2022","journal-title":"ultralytics\/yolov5: v6.1 - TensorRT, TensorFlow Edge TPU and OpenVINO Export and Inference"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3458305.3463381"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/1024022"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.155"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4140\/TCP.n.2015.249"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081360"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SEC50012.2020.00016"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230574"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483274"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00623"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2964284.2973801"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405874"},{"key":"ref31","article-title":"Rethinking the Value of Network Pruning","author":"Liu","year":"2018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3300116"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00367"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/cem.873"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2006.479"},{"key":"ref36","article-title":"Spatio-temporal Consistency and Hierarchical Matching for Multi-Target Multi-Camera Vehicle Tracking","volume-title":"Proc. IEEE CVPR Workshops","author":"Li"},{"key":"ref37","article-title":"Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks","volume":"28","author":"Ren","year":"2015","journal-title":"Advances in neural information processing systems (NIPS)"},{"key":"ref38","article-title":"Ekya: Continuous Learning of Video Analytics Models on Edge Compute Servers","volume-title":"Proc. USENIX NSDI","author":"Bhardwaj"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/hpec.2018.8547574"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01474"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01079"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3318216.3363308"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796984"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3380881"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2016.195"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430721"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230554"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2015.08.008"},{"key":"ref49","article-title":"Live Video Analytics at Scale with Approximation and Delay-Tolerance","volume-title":"Proc. USENIX NSDI","author":"Zhang"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450051"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3458305.3463377"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00849"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3448628"}],"event":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","location":"New York City, NY, USA","start":{"date-parts":[[2023,5,17]]},"end":{"date-parts":[[2023,5,20]]}},"container-title":["IEEE INFOCOM 2023 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10228851\/10228852\/10229045.pdf?arnumber=10229045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T21:56:15Z","timestamp":1709330175000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10229045\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,17]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/infocom53939.2023.10229045","relation":{},"subject":[],"published":{"date-parts":[[2023,5,17]]}}}