{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:15:29Z","timestamp":1775229329871,"version":"3.50.1"},"reference-count":79,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072269"],"award-info":[{"award-number":["62072269"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2020YFE0200500"],"award-info":[{"award-number":["2020YFE0200500"]}]},{"name":"General Research Fund from the Research Grants Council of Hong Kong","award":["16209418"],"award-info":[{"award-number":["16209418"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1109\/tmc.2023.3246539","type":"journal-article","created":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T23:51:26Z","timestamp":1676937086000},"page":"2078-2092","source":"Crossref","is-referenced-by-count":8,"title":["Live Migration of Video Analytics Applications in Edge Computing"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8685-6077","authenticated-orcid":false,"given":"Chenghao","family":"Rong","sequence":"first","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7825-4137","authenticated-orcid":false,"given":"Jessie Hui","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4493-5145","authenticated-orcid":false,"given":"Jilong","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1533-0865","authenticated-orcid":false,"given":"Yipeng","family":"Zhou","sequence":"additional","affiliation":[{"name":"FSE, School of Computing, Macquarie University, Macquarie Park, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5222-1898","authenticated-orcid":false,"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Electronic and Computer Engineering, Hong Kong University of Science and Technology, Hong Kong"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Aws local zones","year":"2022"},{"key":"ref2","article-title":"Azure private mec","year":"2022"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.3641638"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2018.00016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2949347"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230574"},{"key":"ref7","first-page":"377","article-title":"Live video analytics at scale with approximation and Delay-Tolerance","volume-title":"Proc. 14th USENIX Symp. Netw. Syst. Des. Implementation","author":"Zhang"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3125359"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485905"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2705720"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s19071488"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218677"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/377069.377091"},{"key":"ref14","first-page":"915","article-title":"Checkpoint and restoration of micro-service in docker containers","volume-title":"Proc. 3rd Int. Conf. Mechatron. Ind. Informat.","author":"Yang"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.91"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3516807.3516817"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3524452"},{"key":"ref18","first-page":"273","article-title":"Live migration of virtual machines","volume-title":"Proc. 2nd Conf. Symp. Netw. Syst. Des. Implementation","author":"Clark"},{"key":"ref19","first-page":"391","article-title":"Fast transparent migration for virtual machines","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Nelson"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LCN52139.2021.9525029"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155403"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218415"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1618525.1618528"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2010.42"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MCHPC49590.2019.00010"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.05.003"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2016.120"},{"key":"ref28","first-page":"299","article-title":"Elastic scaling of stateful network functions","volume-title":"Proc. 15th USENIX Symp. Netw. Syst. Des. Implementation","author":"Woo"},{"key":"ref29","first-page":"239","article-title":"Paving the way for NFV: Simplifying middlebox modifications using StateAlyzr","volume-title":"Proc. 13th USENIX Symp. Netw. Syst. Des. Implementation","author":"Khalid"},{"key":"ref30","article-title":"The prime challenges for amazons new delivery robot","year":"2022"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.350"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2985265"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3422604.3425943"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405874"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3274783.3274834"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809711"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2794881"},{"key":"ref38","first-page":"1","article-title":"Toward lighter containers for the edge","volume-title":"Proc. 3rd USENIX Workshop Hot Topics Edge Comput.","author":"Park"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2871842"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430721"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8296962"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01079"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.09.014"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155476"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.4324\/9780203978948-13"},{"key":"ref47","first-page":"595","article-title":"Gandiva: Introspective cluster scheduling for deep learning","volume-title":"Proc. 13th USENIX Symp. Operating Syst. Des. Implementation","author":"Xiao"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230554"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.9"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"ref51","article-title":"4 reasons why your docker containers cant talk to each other","author":"Orlov","year":"2022"},{"key":"ref52","article-title":"Kubernetes, production-grade container orchestration","year":"2022"},{"key":"ref54","article-title":"How to use background subtraction methods","year":"2022"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1177\/0278364913491297"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302675"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/358438.349309"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2007.4629212"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576200"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-012-0294-6"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3132211.3134453"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2007477.1952699"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3132211.3134460"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494848"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3318216.3363456"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2827070"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3046737"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3380955"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91431-8_24"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2957804"},{"key":"ref74","article-title":"Network functions virtualisation (NFV)","year":"2022"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626313"},{"key":"ref76","first-page":"227","article-title":"Split\/Merge: System support for elastic execution in virtual middleboxes","volume-title":"Proc. 10th USENIX Symp. Netw. Syst. Des. Implementation","author":"Rajagopalan"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/2967360.2967363"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3105583"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7784446"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2785989.2785993"},{"key":"ref81","first-page":"97","article-title":"Stateless network functions: Breaking the tight coupling of state and processing","volume-title":"Proc. 14th USENIX Symp. Netw. Syst. Des. Implementation","author":"Kablan"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/10422841\/10049158.pdf?arnumber=10049158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T22:42:38Z","timestamp":1707259358000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10049158\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":79,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2023.3246539","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3]]}}}