{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T05:56:51Z","timestamp":1776232611677,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T00:00:00Z","timestamp":1309219200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,28]]},"DOI":"10.1145\/1999995.2000000","type":"proceedings-article","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T17:34:50Z","timestamp":1309282490000},"page":"43-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":277,"title":["Odessa"],"prefix":"10.1145","author":[{"given":"Moo-Ryong","family":"Ra","sequence":"first","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"given":"Anmol","family":"Sheth","sequence":"additional","affiliation":[{"name":"Intel Labs, Seattle, WA, USA"}]},{"given":"Lily","family":"Mummert","sequence":"additional","affiliation":[{"name":"Intel Labs, Pittsburgh, PA, USA"}]},{"given":"Padmanabhan","family":"Pillai","sequence":"additional","affiliation":[{"name":"Intel Labs, Pittsburgh, PA, USA"}]},{"given":"David","family":"Wetherall","sequence":"additional","affiliation":[{"name":"University of Washington &amp; Intel Labs, Seattle, WA, USA"}]},{"given":"Ramesh","family":"Govindan","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"R. K. Balan. \"Simplifying Cyber Foraging\". PhD thesis 2006. (In Carnegie Mellon University-CS-06-120).   R. K. Balan. \"Simplifying Cyber Foraging\". PhD thesis 2006. (In Carnegie Mellon University-CS-06-120)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133373.1133390"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1066125"},{"key":"e_1_3_2_1_4_1","volume-title":"Learning OpenCV: Computer Vision with the OpenCV Library","author":"Bradski G.","year":"2008","unstructured":"G. Bradski and A. Kaehler . \" Learning OpenCV: Computer Vision with the OpenCV Library \". O'Reilly Media , 2008 . G. Bradski and A. Kaehler. \"Learning OpenCV: Computer Vision with the OpenCV Library\". O'Reilly Media, 2008."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1764873.1764876"},{"key":"e_1_3_2_1_6_1","volume-title":"MoSIFT: Recognizing Human Actions in Surveillance Videos","author":"Chen M.","year":"2009","unstructured":"M. Chen and A. Hauptmann . \" MoSIFT: Recognizing Human Actions in Surveillance Videos \". In Carnegie Mellon University-CS-09-161, Carnegie Mellon University , 2009 . M. Chen and A. Hauptmann. \"MoSIFT: Recognizing Human Actions in Surveillance Videos\". In Carnegie Mellon University-CS-09-161, Carnegie Mellon University, 2009."},{"key":"e_1_3_2_1_7_1","volume-title":"Exploiting Rich Mobile Environment","author":"Cheng J.","year":"2005","unstructured":"J. Cheng , R. K. Balan , and M. Satyanarayanan . \" Exploiting Rich Mobile Environment \". Technical Report Carnegie Mellon University-CS-05-199, Carnegie Mellon University , 2005 . J. Cheng, R. K. Balan, and M. Satyanarayanan. \"Exploiting Rich Mobile Environment\". Technical Report Carnegie Mellon University-CS-05-199, Carnegie Mellon University, 2005."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966473"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814441"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/850928.851899"},{"key":"e_1_3_2_1_12_1","volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"Garey M. R.","year":"1979","unstructured":"M. R. Garey and D. S. Johnson . \" Computers and Intractability: A Guide to the Theory of NP-Completeness \". W. H. Freeman and Company , New York , 1979 . M. R. Garey and D. S. Johnson. \"Computers and Intractability: A Guide to the Theory of NP-Completeness\". W. H. Freeman and Company, New York, 1979."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.1321031"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/296806.296826"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273005"},{"key":"e_1_3_2_1_16_1","first-page":"0","article-title":"Vision based hand gesture interfaces for wearable computing and virtual environments","author":"Kolsch M.","year":"2004","unstructured":"M. Kolsch . \" Vision based hand gesture interfaces for wearable computing and virtual environments \". PhD thesis , 2004 . (In 0 - 496 -01704-7). M. Kolsch. \"Vision based hand gesture interfaces for wearable computing and virtual environments\". PhD thesis, 2004. (In 0-496-01704-7).","journal-title":"PhD thesis"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2010.5543877"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/344588.344618"},{"key":"e_1_3_2_1_19_1","volume-title":"IEEE International Parallel and Distributed Processing Symposium (IPDPS)","author":"Li Z.","year":"2002","unstructured":"Z. Li , C. Wang , and R. Xu . \" Task Allocation for Distributed Multimedia Processing on Wirelessly Networked Handheld Devices \". In IEEE International Parallel and Distributed Processing Symposium (IPDPS) , 2002 . Z. Li, C. Wang, and R. Xu. \"Task Allocation for Distributed Multimedia Processing on Wirelessly Networked Handheld Devices\". In IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2002."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851322.1851328"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189041"},{"key":"e_1_3_2_1_23_1","volume-title":"Symposium on Networked Systems Design and Implementation (NSDI)","author":"Newton R.","year":"2009","unstructured":"R. Newton , S. Toledo , L. Girod , H. Balakrishnan , and S. Madden . \" Wishbone: Profile-based Partitioning for Sensornet Applications \". In Symposium on Networked Systems Design and Implementation (NSDI) , 2009 . R. Newton, S. Toledo, L. Girod, H. Balakrishnan, and S. Madden. \"Wishbone: Profile-based Partitioning for Sensornet Applications\". In Symposium on Networked Systems Design and Implementation (NSDI), 2009."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2007.04.004"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542245.1542256"},{"key":"e_1_3_2_1_26_1","volume-title":"IEEE International Conference on Robotics and Automation","author":"Romea A. C.","year":"2009","unstructured":"A. C. Romea , D. Berenson , S. Srinivasa , and D. Ferguson . \" Object Recognition and Full Pose Registration from a Single Image for Robotic Manipulation \". In IEEE International Conference on Robotics and Automation , 2009 . A. C. Romea, D. Berenson, S. Srinivasa, and D. Ferguson. \"Object Recognition and Full Pose Registration from a Single Image for Robotic Manipulation\". In IEEE International Conference on Robotics and Automation, 2009."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/98.943998"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2009.5161036"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067170.1067180"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1996130.1996149"},{"key":"e_1_3_2_1_32_1","volume-title":"Conference on Uncertainty in Artificial Intelligence (UAI)","author":"Zhu Q.","year":"2010","unstructured":"Q. Zhu , B. Kveton , L. Mummert , and P. Pillai . \" Automatic Tuning of Interactive Perception Applications \". In Conference on Uncertainty in Artificial Intelligence (UAI) , 2010 . Q. Zhu, B. Kveton, L. Mummert, and P. Pillai. \"Automatic Tuning of Interactive Perception Applications\". In Conference on Uncertainty in Artificial Intelligence (UAI), 2010."}],"event":{"name":"MobiSys'11: The 9th International Conference on Mobile Systems, Applications, and Services","location":"Bethesda Maryland USA","acronym":"MobiSys'11","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 9th international conference on Mobile systems, applications, and services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1999995.2000000","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1999995.2000000","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:05:51Z","timestamp":1750244751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1999995.2000000"}},"subtitle":["enabling interactive perception applications on mobile devices"],"short-title":[],"issued":{"date-parts":[[2011,6,28]]},"references-count":32,"alternative-id":["10.1145\/1999995.2000000","10.1145\/1999995"],"URL":"https:\/\/doi.org\/10.1145\/1999995.2000000","relation":{},"subject":[],"published":{"date-parts":[[2011,6,28]]},"assertion":[{"value":"2011-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}