{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:25:59Z","timestamp":1740173159252,"version":"3.37.3"},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004147","name":"Tsinghua University","doi-asserted-by":"publisher","award":["20161080066"],"award-info":[{"award-number":["20161080066"]}],"id":[{"id":"10.13039\/501100004147","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/jiot.2018.2875050","type":"journal-article","created":{"date-parts":[[2018,10,9]],"date-time":"2018-10-09T19:09:18Z","timestamp":1539112158000},"page":"4085-4097","source":"Crossref","is-referenced-by-count":3,"title":["Toward Efficient Transparent Computing for IoT Apps by On-Chip Kernel Offload"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4542-8671","authenticated-orcid":false,"given":"Chao","family":"Wu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6717-461X","authenticated-orcid":false,"given":"Yaoxue","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2010.69"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3131672.3131675"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1188455.1188549"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.814964"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/BF01581275"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1109\/TCSVT.2003.815165","article-title":"overview of the h.264\/avc video coding standard","volume":"13","author":"wiegand","year":"2003","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"journal-title":"Adreno Technical Details","year":"2018","key":"ref36"},{"key":"ref35","first-page":"454","article-title":"Parallel interval Newton method on CUDA","author":"beck","year":"2012","journal-title":"Proc International Workshop on Parallel Computing"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2008.5213210"},{"journal-title":"FFmpeg Scaling","year":"2017","key":"ref60"},{"journal-title":"Recursive Gaussian Filters","year":"2017","key":"ref62"},{"journal-title":"ConvolutionFFT2D&#x2014;FFT-Based 2D Convolution","year":"2017","key":"ref61"},{"journal-title":"SobelFilter&#x2014;Sobel Filter","year":"2017","key":"ref63"},{"key":"ref28","first-page":"51","article-title":"Artificial intelligence meet Internet of Things","volume":"4","author":"kumari","year":"2017","journal-title":"SENSORS"},{"journal-title":"Android Things 1 0","year":"2018","key":"ref64"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2007.6"},{"journal-title":"Raspberry Pi 3 Model B (8 April 2017)","year":"2017","key":"ref65"},{"journal-title":"UNI-T UT658 USB Tester","year":"0","key":"ref66"},{"key":"ref29","volume":"1","author":"brigham","year":"1988","journal-title":"The Fast Fourier Transform and Its Applications"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966473"},{"journal-title":"Graphics processor units (GPUs)","year":"2017","author":"wyrwas","key":"ref68"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2498900"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/11833529_1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2812803"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814441"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247692"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49583-5_9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HPCS.2010.5547126"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970748"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2584538"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"ref51","first-page":"569","article-title":"Droidscope: Seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis","author":"yan","year":"0"},{"journal-title":"H 264 Video Encoding","year":"2017","key":"ref59"},{"journal-title":"Monte Carlo Estimation of PI (Inline PRNG)","year":"2017","key":"ref58"},{"journal-title":"MatrixMulCUBLAS&#x2014;Matrix Multiplication (CUBLAS)","year":"2017","key":"ref57"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/48529.48535"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055717"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742657"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2017.2754482"},{"journal-title":"OpenGL Programming Guide The Official Guide to Learning OpenGL Version 1 2","year":"1999","author":"woo","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081358"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"203","DOI":"10.3233\/WIA-2010-0187","article-title":"Information security underlying transparent computing: Impacts, visions and challenges","volume":"8","author":"zhang","year":"2010","journal-title":"Web Intell Agent Syst An Int J"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2017.07.003"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2799935"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1700030"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2611960"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2842766"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2314132"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TST.2013.6449403"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2014.58"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2994551.2994564"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2668332.2668349"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2788802"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2005.1512820"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700167"},{"journal-title":"VectorAdd&#x2014;Vector Addition","year":"2017","key":"ref46"},{"journal-title":"Binder-for-Linux","year":"2018","key":"ref45"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45450-0_11"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/214451.214452"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1555815.1555775"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2038037.1941590"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1471-3"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081348"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8738925\/08486636.pdf?arnumber=8486636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:45:13Z","timestamp":1657745113000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8486636\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":68,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2018.2875050","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2019,6]]}}}