{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:14:13Z","timestamp":1772727253124,"version":"3.50.1"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Natural Science Foundation of Shandong Province, China","award":["ZR2022QF070"],"award-info":[{"award-number":["ZR2022QF070"]}]},{"name":"General Research Fund from Hong Kong Research","award":["11209520"],"award-info":[{"award-number":["11209520"]}]},{"name":"CUHK, Hong Kong","award":["5501329"],"award-info":[{"award-number":["5501329"]}]},{"name":"CUHK, Hong Kong","award":["5501517"],"award-info":[{"award-number":["5501517"]}]},{"name":"CUHK, Hong Kong","award":["4937007"],"award-info":[{"award-number":["4937007"]}]},{"name":"CUHK, Hong Kong","award":["4937008"],"award-info":[{"award-number":["4937008"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1109\/tmc.2023.3296608","type":"journal-article","created":{"date-parts":[[2023,7,18]],"date-time":"2023-07-18T17:48:40Z","timestamp":1689702520000},"page":"4777-4792","source":"Crossref","is-referenced-by-count":4,"title":["Efficient Time-Series Data Delivery in IoT With Xender"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2718-8483","authenticated-orcid":false,"given":"Libin","family":"Liu","sequence":"first","affiliation":[{"name":"Zhongguancun Laboratory, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2519-2550","authenticated-orcid":false,"given":"Jingzong","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6947-9740","authenticated-orcid":false,"given":"Zhixiong","family":"Niu","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8947-9067","authenticated-orcid":false,"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shandong Provincial Key Laboratory of Computer Networks, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6431-9868","authenticated-orcid":false,"given":"Jason Chun","family":"Xue","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9359-9571","authenticated-orcid":false,"given":"Hong","family":"Xu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Chinese University of Hong Kong, Hong Kong, China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/932"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.005"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3122863"},{"key":"ref13","first-page":"85","article-title":"Store-edge RippleStream: Versatile infrastructure for IoT data transfer","volume-title":"Proc. USENIX Workshop Hot Topics Edge Comput.","author":"Bharde"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3264903"},{"key":"ref15","article-title":"The malicious use of artificial intelligence: Forecasting, prevention, and mitigation","author":"Brundage","year":"2018"},{"key":"ref16","first-page":"99","article-title":"Principal-components analysis and exploratory and confirmatory factor analysis","author":"Bryant","year":"1995","journal-title":"Reading Understanding Multivariate Statist."},{"key":"ref17","article-title":"DTWNet: A dynamic time warping network","volume-title":"Proc. 33rd Int. Conf. Neural Inf. Process. Syst.","author":"Cai"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737587"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5748"},{"key":"ref20","first-page":"73","article-title":"An industrial robot system based on edge computing: An early experience","volume-title":"Proc. USENIX Workshop Hot Topics Edge Comput.","author":"Chen"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2911935"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3398209"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475495"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2016.11"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2962795"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/261381"},{"key":"ref27","first-page":"91","article-title":"SMC: Smart media compression for edge storage offloading","volume-title":"Proc. USENIX Workshop Hot Topics Edge Comput.","author":"Elgazar"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685899"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969125"},{"key":"ref30","first-page":"229","article-title":"To zip or not to zip: Effective resource usage for real-time compression","volume-title":"Proc. 11th USENIX Conf. File Storage Technol.","author":"Harnik"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2991111"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1126\/science.aay5881"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007573"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3081578"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405856"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737631"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403208"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3062653"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/316"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3050927"},{"key":"ref41","first-page":"507","article-title":"Siphon: Expediting inter-datacenter coflows in wide-area data analytics","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Liu"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2869889"},{"key":"ref43","first-page":"127","article-title":"Adaptively compressing IoT data on the resource-constrained edge","volume-title":"Proc. USENIX Workshop Hot Topics Edge Comput.","author":"Lu"},{"key":"ref44","first-page":"24","article-title":"C-RNN-GAN: A continuous recurrent neural network with adversarial training","volume-title":"Proc. Constructive Mach. Learn. Workshop","author":"Mogren"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2950349"},{"key":"ref46","article-title":"Fun with LD_PRELOAD","volume-title":"Proc. Linux. Conf. au","volume":"153","author":"Pulo"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2411594"},{"key":"ref48","first-page":"1","article-title":"On the accuracy of appliance identification based on distributed load metering data","volume-title":"Proc. Sustain. Internet ICT Sustainability","author":"Reinhardt"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3390\/s16091463"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS.2018.8517812"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098852"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1978.1163055"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.21"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6032"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2385603.2385606"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2017.8249368"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2504106"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6056"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2018.06.007"},{"issue":"11","key":"ref60","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.petrol.2019.106223"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.20"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1996.8.7.1341"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3419185"},{"key":"ref65","first-page":"645","article-title":"Neural adaptive content-aware internet video delivery","volume-title":"Proc. 13th USENIX Conf. Operating Syst. Des. Implementation","author":"Yeo"},{"key":"ref66","article-title":"Time-series generative adversarial networks","volume-title":"Proc. 33rd Int. Conf. Neural Inf. Process. Syst.","author":"Yoon"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011409"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3011690"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5477"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345430"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17325"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055714"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055934"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/10491282\/10185624.pdf?arnumber=10185624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T19:50:52Z","timestamp":1712692252000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10185624\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5]]},"references-count":64,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2023.3296608","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5]]}}}