{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:56Z","timestamp":1750306976346,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,2,28]],"date-time":"2013-02-28T00:00:00Z","timestamp":1362009600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["NetSE 1012194, NetTS 0964081, CSR 0834480"],"award-info":[{"award-number":["NetSE 1012194, NetTS 0964081, CSR 0834480"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NetSE 1012194, NetTS 0964081, CSR 0834480"],"award-info":[{"award-number":["NetSE 1012194, NetTS 0964081, CSR 0834480"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,2,28]]},"DOI":"10.1145\/2483977.2484005","type":"proceedings-article","created":{"date-parts":[[2013,5,14]],"date-time":"2013-05-14T12:15:27Z","timestamp":1368533727000},"page":"226-237","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Prioritized evolutionary optimization in open session management for 3D tele-immersion"],"prefix":"10.1145","author":[{"given":"Ahsan","family":"Arefin","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]},{"given":"Raoul","family":"Rivas","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]},{"given":"Klara","family":"Nahrstedt","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]}],"member":"320","published-online":{"date-parts":[[2013,2,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.58"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2072298.2072455"},{"key":"e_1_3_2_1_3_1","volume-title":"Rivas et al. Classification and analysis of 3D tele-immersive activities","author":"Arefin A.","year":"2013","unstructured":"A. Arefin , Z. Huang and R. Rivas et al. Classification and analysis of 3D tele-immersive activities . In IEEE Multimedia , 2013 . A. Arefin, Z. Huang and R. Rivas et al. Classification and analysis of 3D tele-immersive activities. In IEEE Multimedia, 2013."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/850956.854120"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1596990.1596993"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2229087.2229101"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.752646"},{"volume-title":"http:\/\/www.musion.co.uk\/ciscotelepresence","year":"2007","key":"e_1_3_2_1_8_1","unstructured":"Cisco TelePresence- On-Stage Holographic Video Conferencing. http:\/\/www.musion.co.uk\/ciscotelepresence , 2007 . Cisco TelePresence- On-Stage Holographic Video Conferencing. http:\/\/www.musion.co.uk\/ciscotelepresence, 2007."},{"key":"e_1_3_2_1_9_1","unstructured":"CoMon: A Monitoring Infrastructure for PlanetLab. http:\/\/comon.cs.princeton.edu\/.  CoMon: A Monitoring Infrastructure for PlanetLab. http:\/\/comon.cs.princeton.edu\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2011.87"},{"key":"e_1_3_2_1_11_1","volume-title":"Multi-objective optimization using evolutionary algorithms","author":"Deb K.","year":"2010","unstructured":"K. Deb . Multi-objective optimization using evolutionary algorithms . In John Wiley and Sons , 2010 . K. Deb. Multi-objective optimization using evolutionary algorithms. In John Wiley and Sons, 2010."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1106159"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(99)00113-9"},{"key":"e_1_3_2_1_14_1","volume-title":"Computers and intractability: A guide to the theory of NP-completeness","author":"Garey M.","year":"1979","unstructured":"M. Garey and D. Johnson . Computers and intractability: A guide to the theory of NP-completeness . In Freeman , 1979 . M. Garey and D. Johnson. Computers and intractability: A guide to the theory of NP-completeness. In Freeman, 1979."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062253.1062258"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/957013.957119"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195700"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(01)00402-9"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1027527.1027669"},{"key":"e_1_3_2_1_21_1","unstructured":"PlanetLab. https:\/\/www.planet-lab.org\/.  PlanetLab. https:\/\/www.planet-lab.org\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-001-0038-2"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. of INFOCOM","author":"Banerjee S.","year":"2003","unstructured":"S. Banerjee , C. Kommareddy and K. Kar et al. Construction of an efficient overlay multicast infrastructure for real-time applications . In Proc. of INFOCOM , 2003 . S. Banerjee, C. Kommareddy and K. Kar et al. Construction of an efficient overlay multicast infrastructure for real-time applications. In Proc. of INFOCOM, 2003."},{"volume-title":"http:\/\/www.itu.int\/rec\/T-REC-P.862\/en","year":"2001","key":"e_1_3_2_1_24_1","unstructured":"The Perceptual Evaluation of Speech Quality. http:\/\/www.itu.int\/rec\/T-REC-P.862\/en , 2001 . The Perceptual Evaluation of Speech Quality. http:\/\/www.itu.int\/rec\/T-REC-P.862\/en, 2001."},{"key":"e_1_3_2_1_25_1","author":"Upadhyaya S.","year":"2010","unstructured":"S. Upadhyaya and G. Dhingra . Exploring issues for QoS based routing algorithm. In Journal of Computer Science and Engineering , 2010 . S. Upadhyaya and G. Dhingra. Exploring issues for QoS based routing algorithm. In Journal of Computer Science and Engineering, 2010.","journal-title":"Exploring issues for QoS based routing algorithm. In Journal of Computer Science and Engineering"},{"volume-title":"http:\/\/www.wired.com\/gadgetlab\/2012\/07\/smartphone-sword-fighting\/","year":"2012","key":"e_1_3_2_1_26_1","unstructured":"Virtual Sword Fight. http:\/\/www.wired.com\/gadgetlab\/2012\/07\/smartphone-sword-fighting\/ , 2012 . Virtual Sword Fight. http:\/\/www.wired.com\/gadgetlab\/2012\/07\/smartphone-sword-fighting\/, 2012."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1631272.1631338"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.47"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.819168"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2072298.2072362"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342431"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1671962.1671963"}],"event":{"name":"MMSys '13: Multimedia Systems Conference 2013","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","SIGMM ACM Special Interest Group on Multimedia"],"location":"Oslo Norway","acronym":"MMSys '13"},"container-title":["Proceedings of the 4th ACM Multimedia Systems Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2483977.2484005","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2483977.2484005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:32Z","timestamp":1750235972000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2483977.2484005"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2,28]]},"references-count":32,"alternative-id":["10.1145\/2483977.2484005","10.1145\/2483977"],"URL":"https:\/\/doi.org\/10.1145\/2483977.2484005","relation":{},"subject":[],"published":{"date-parts":[[2013,2,28]]},"assertion":[{"value":"2013-02-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}