{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T08:55:54Z","timestamp":1769676954938,"version":"3.49.0"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Natural Science Foundation of China and Research Grants Council (NSFC\/RGC) Joint Research Scheme","award":["62261160390\/N_HKUST656\/22"],"award-info":[{"award-number":["62261160390\/N_HKUST656\/22"]}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["62471276"],"award-info":[{"award-number":["62471276"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"RGC under the Areas of Excellence Scheme","award":["AoE\/E601\/22-R"],"award-info":[{"award-number":["AoE\/E601\/22-R"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Sel. Areas Commun."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1109\/jsac.2025.3623193","type":"journal-article","created":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T17:50:09Z","timestamp":1760982609000},"page":"3908-3924","source":"Crossref","is-referenced-by-count":0,"title":["Simple Bounds on Fidelity-Timeliness Tradeoff of Intelligent Communications for Real-Time CV"],"prefix":"10.1109","volume":"43","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9386-9359","authenticated-orcid":false,"given":"Lei","family":"Huang","sequence":"first","affiliation":[{"name":"Department of Electronic Engineering, the State Key Laboratory of Space Network and Communications, and Beijing National Research Center for Information Science and Technology (BNRist), Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6870-494X","authenticated-orcid":false,"given":"Lintao","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, the State Key Laboratory of Space Network and Communications, and Beijing National Research Center for Information Science and Technology (BNRist), Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9066-1448","authenticated-orcid":false,"given":"Wei","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, the State Key Laboratory of Space Network and Communications, and Beijing National Research Center for Information Science and Technology (BNRist), Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2519-6401","authenticated-orcid":false,"given":"Khaled B.","family":"Letaief","sequence":"additional","affiliation":[{"name":"School of Engineering, The Hong Kong University of Science and Technology, Kowloon, Hong Kong"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10278775"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3249835"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.21143"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.002.2200468"},{"key":"ref5","volume-title":"Study Scenarios Requirements for Next Generation Access Technologies","year":"2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS61880.2024.10620700"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2021.3065636"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486241"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3310101"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2024.104022","article-title":"DeCa360: Deadline-aware edge caching for two-tier 360\u00b0 video streaming","volume":"232","author":"Lin","year":"2024","journal-title":"J. Netw. Comput. Appl."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/18.995554"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2236917"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928249"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2691711"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2875119"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2958325"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.062910.081209"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2024.3487794"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3304627"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2869350"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3213588"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-009306-2.50005-4"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3098023"},{"key":"ref25","volume-title":"Information Theory and Reliable Communication","author":"Gallager","year":"1968"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP48831.2020.9287136"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3367293"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2005.846433"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3571727"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2025.3548516"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2021.05.008"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-72992-8_19"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2025.3554361"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2316519"},{"key":"ref35","volume-title":"Markov Decision Processes Discrete Stochastic Dynamic Programming","author":"Puterman","year":"2014"},{"key":"ref36","article-title":"Analysis of structured Markov processes","author":"Adan","year":"2017","journal-title":"arXiv:1709.09060"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.810294"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/18.641562"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.2307\/1426607"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/49\/11366031\/11207674.pdf?arnumber=11207674","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T21:00:10Z","timestamp":1769634010000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11207674\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":39,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/jsac.2025.3623193","relation":{},"ISSN":["1558-0008","0733-8716"],"issn-type":[{"value":"1558-0008","type":"electronic"},{"value":"0733-8716","type":"print"}],"subject":[],"published":{"date-parts":[[2025,12]]}}}