{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:43Z","timestamp":1763468203107,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,2]],"date-time":"2014-06-02T00:00:00Z","timestamp":1401667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["#1054693, #1065506, and #1218041."],"award-info":[{"award-number":["#1054693, #1065506, and #1218041."]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,2]]},"DOI":"10.1145\/2594368.2594370","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"259-272","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Rio"],"prefix":"10.1145","author":[{"given":"Ardalan","family":"Amiri Sani","sequence":"first","affiliation":[{"name":"Rice University, Houston, TX, USA"}]},{"given":"Kevin","family":"Boos","sequence":"additional","affiliation":[{"name":"Rice University, Houston, TX, USA"}]},{"given":"Min Hong","family":"Yun","sequence":"additional","affiliation":[{"name":"Rice University, Houston, TX, USA"}]},{"given":"Lin","family":"Zhong","sequence":"additional","affiliation":[{"name":"Rice University, Houston, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,6,2]]},"reference":[{"unstructured":"http:\/\/www.theverge.com\/2011\/06\/09\/google-voice-skype-imessage-and-the-death-of-the-phone-number\/.  http:\/\/www.theverge.com\/2011\/06\/09\/google-voice-skype-imessage-and-the-death-of-the-phone-number\/.","key":"e_1_3_2_1_1_1"},{"unstructured":"Android ION Memory Allocator. http:\/\/lwn.net\/Articles\/480055\/.  Android ION Memory Allocator. http:\/\/lwn.net\/Articles\/480055\/.","key":"e_1_3_2_1_2_1"},{"unstructured":"Android IP Webcam application. https:\/\/play.google.com\/store\/apps\/details?id=com.pas.webcam&hl=en.  Android IP Webcam application. https:\/\/play.google.com\/store\/apps\/details?id=com.pas.webcam&hl=en.","key":"e_1_3_2_1_3_1"},{"unstructured":"Android Wi-Fi Speaker application. https:\/\/play.google.com\/store\/apps\/details?id=pixelface.android.audio&hl=en.  Android Wi-Fi Speaker application. https:\/\/play.google.com\/store\/apps\/details?id=pixelface.android.audio&hl=en.","key":"e_1_3_2_1_4_1"},{"unstructured":"Applications for taking self-portraits. http:\/\/giveawaytuesdays.wonderhowto.com\/inspiration\/10-iphone-and-android-apps-for-taking-self-portraits-0129658\/.  Applications for taking self-portraits. http:\/\/giveawaytuesdays.wonderhowto.com\/inspiration\/10-iphone-and-android-apps-for-taking-self-portraits-0129658\/.","key":"e_1_3_2_1_5_1"},{"unstructured":"Citrix Metaframe. http:\/\/www.citrix.com.  Citrix Metaframe. http:\/\/www.citrix.com.","key":"e_1_3_2_1_6_1"},{"unstructured":"Digi International: AnywhereUSB. http:\/\/www.digi.com\/products\/usb\/anywhereusb.jsp.  Digi International: AnywhereUSB. http:\/\/www.digi.com\/products\/usb\/anywhereusb.jsp.","key":"e_1_3_2_1_7_1"},{"unstructured":"Dropcam. https:\/\/www.dropcam.com\/.  Dropcam. https:\/\/www.dropcam.com\/.","key":"e_1_3_2_1_8_1"},{"unstructured":"Intel WiDi. http:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/intel-wireless-display.html.  Intel WiDi. http:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/intel-wireless-display.html.","key":"e_1_3_2_1_9_1"},{"unstructured":"Linux ksocket. http:\/\/ksocket.sourceforge.net\/.  Linux ksocket. http:\/\/ksocket.sourceforge.net\/.","key":"e_1_3_2_1_10_1"},{"unstructured":"MightyText application. http:\/\/mightytext.net.  MightyText application. http:\/\/mightytext.net.","key":"e_1_3_2_1_11_1"},{"unstructured":"Miracast. http:\/\/www.wi-fi.org\/wi-fi-certified-miracast%E2%84%A2.  Miracast. http:\/\/www.wi-fi.org\/wi-fi-certified-miracast%E2%84%A2.","key":"e_1_3_2_1_12_1"},{"unstructured":"Monsoon Power Monitor. http:\/\/www.msoon.com\/LabEquipment\/PowerMonitor\/.  Monsoon Power Monitor. http:\/\/www.msoon.com\/LabEquipment\/PowerMonitor\/.","key":"e_1_3_2_1_13_1"},{"unstructured":"Network File System. http:\/\/etherpad.tools.ietf.org\/html\/rfc3530.  Network File System. http:\/\/etherpad.tools.ietf.org\/html\/rfc3530.","key":"e_1_3_2_1_14_1"},{"unstructured":"Privilege escalation using NVIDIA GPU driver bug. http:\/\/www.securelist.com\/en\/advisories\/50085.  Privilege escalation using NVIDIA GPU driver bug. http:\/\/www.securelist.com\/en\/advisories\/50085.","key":"e_1_3_2_1_15_1"},{"unstructured":"Rio Project Homepage (including a video demo). http:\/\/www.ruf.rice.edu\/~mobile\/rio.html.  Rio Project Homepage (including a video demo). http:\/\/www.ruf.rice.edu\/~mobile\/rio.html.","key":"e_1_3_2_1_16_1"},{"unstructured":"USB Over IP. http:\/\/usbip.sourceforge.net\/.  USB Over IP. http:\/\/usbip.sourceforge.net\/.","key":"e_1_3_2_1_17_1"},{"unstructured":"Web Services on Devices: Devices That Are Controlled on the Network. http:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/aa826001(v=vs.85).aspx.  Web Services on Devices: Devices That Are Controlled on the Network. http:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/aa826001(v=vs.85).aspx.","key":"e_1_3_2_1_18_1"},{"unstructured":"Wireless LAN at 60 GHz - IEEE 802.11ad Explained. In Agilent White Paper.  Wireless LAN at 60 GHz - IEEE 802.11ad Explained. In Agilent White Paper.","key":"e_1_3_2_1_19_1"},{"unstructured":"Wireless USB. http:\/\/www.usb.org\/wusb\/home\/.  Wireless USB. http:\/\/www.usb.org\/wusb\/home\/.","key":"e_1_3_2_1_20_1"},{"volume-title":"Cisco White Paper","year":"2012","unstructured":"802 .11ac : The Fifth Generation of Wi-Fi . In Cisco White Paper , 2012 . 802.11ac: The Fifth Generation of Wi-Fi. In Cisco White Paper, 2012.","key":"e_1_3_2_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/2541940.2541943"},{"key":"e_1_3_2_1_23_1","first-page":"0406A","author":"Architecture Reference Manual ARM.","year":"2007","unstructured":"ARM. Architecture Reference Manual , ARMv7- A and ARMv7-R edition. ARM DDI , 0406A , 2007 . ARM. Architecture Reference Manual, ARMv7-A and ARMv7-R edition. ARM DDI, 0406A, 2007.","journal-title":"ARM DDI"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/1247660.1247692"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/1095810.1095837"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/1066116.1066123"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/121132.121159"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/1814433.1814441"},{"key":"e_1_3_2_1_29_1","volume-title":"Terminal Server Edition: Technical Reference","author":"Cumberland B. C.","year":"1999","unstructured":"B. C. Cumberland , G. Carius , and A. Muir . Microsoft Windows NT Server 4.0 , Terminal Server Edition: Technical Reference . Microsoft Press , 1999 . B. C. Cumberland, G. Carius, and A. Muir. Microsoft Windows NT Server 4.0, Terminal Server Edition: Technical Reference. Microsoft Press, 1999."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/1814433.1814442"},{"key":"e_1_3_2_1_32_1","volume-title":"Synthesis Lectures on Mobile and Pervasive Computing","author":"Flinn J.","year":"2012","unstructured":"J. Flinn . Cyber Foraging : Bridging Mobile and Cloud Computing . Synthesis Lectures on Mobile and Pervasive Computing , 2012 . J. Flinn. Cyber Foraging: Bridging Mobile and Cloud Computing. Synthesis Lectures on Mobile and Pervasive Computing, 2012."},{"key":"e_1_3_2_1_33_1","volume-title":"Proc. USENIX OSDI","author":"Gordon M. S.","year":"2012","unstructured":"M. S. Gordon , D. A. Jamshidi , S. Mahlke , Z. M. Mao , and X. Chen . COMET: Code Offload by Migrating Execution Transparently . In Proc. USENIX OSDI , 2012 . M. S. Gordon, D. A. Jamshidi, S. Mahlke, Z. M. Mao, and X. Chen. COMET: Code Offload by Migrating Execution Transparently. In Proc. USENIX OSDI, 2012."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/2043106.2043111"},{"key":"e_1_3_2_1_35_1","volume-title":"A Common Internet File System (CIFS\/1.0) Protocol","author":"Leach P. J.","year":"1997","unstructured":"P. J. Leach and D. Naik . A Common Internet File System (CIFS\/1.0) Protocol . IETF Network Working Group RFC Draft , 1997 . P. J. Leach and D. Naik. A Common Internet File System (CIFS\/1.0) Protocol. IETF Network Working Group RFC Draft, 1997."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/2307636.2307641"},{"key":"e_1_3_2_1_37_1","volume-title":"Ivy: A Shared Virtual Memory System for Parallel Computing. In Proc. Int. Conf. Parallel Processing","author":"Li K.","year":"1988","unstructured":"K. Li . Ivy: A Shared Virtual Memory System for Parallel Computing. In Proc. Int. Conf. Parallel Processing , 1988 . K. Li. Ivy: A Shared Virtual Memory System for Parallel Computing. In Proc. Int. Conf. Parallel Processing, 1988."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1145\/2541940.2541975"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1145\/1378600.1378617"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1145\/2517349.2522719"},{"key":"e_1_3_2_1_41_1","author":"Park S. C.","year":"2003","unstructured":"S. C. Park , M. K. Park , and M. G. Kang . Super-Resolution Image Reconstruction: a Technical Overview. IEEE Signal Processing Magazine , 2003 . S. C. Park, M. K. Park, and M. G. Kang. Super-Resolution Image Reconstruction: a Technical Overview. IEEE Signal Processing Magazine, 2003.","journal-title":"Super-Resolution Image Reconstruction: a Technical Overview. IEEE Signal Processing Magazine"},{"key":"e_1_3_2_1_42_1","volume-title":"Computational Photography. In Proc. STAR Eurographics","author":"Raskar R.","year":"2006","unstructured":"R. Raskar , J. Tumblin , A. Mohan , A. Agrawal , and Y. Li . Computational Photography. In Proc. STAR Eurographics , 2006 . R. Raskar, J. Tumblin, A. Mohan, A. Agrawal, and Y. Li. Computational Photography. In Proc. STAR Eurographics, 2006."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1109\/4236.656066"},{"key":"e_1_3_2_1_44_1","volume-title":"Proc. USENIX Conference","author":"Rifkin A. P.","year":"1986","unstructured":"A. P. Rifkin , M. P. Forbes , R. L. Hamilton , M. Sabrio , S. Shah , and K. Yueh . RFS Architectural Overview . In Proc. USENIX Conference , 1986 . A. P. Rifkin, M. P. Forbes, R. L. Hamilton, M. Sabrio, S. Shah, and K. Yueh. RFS Architectural Overview. In Proc. USENIX Conference, 1986."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1145\/22949.24053"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.1145\/319151.319154"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.1145\/195473.195575"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_48_1","DOI":"10.1145\/945445.945466"},{"key":"e_1_3_2_1_49_1","volume-title":"OMAP4430 Multimedia Device Silicon Revision 2.x. SWPU231N","author":"Instruments Texas","year":"2010","unstructured":"Texas Instruments . Architecture Reference Manual , OMAP4430 Multimedia Device Silicon Revision 2.x. SWPU231N , 2010 . Texas Instruments. Architecture Reference Manual, OMAP4430 Multimedia Device Silicon Revision 2.x. SWPU231N, 2010."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_50_1","DOI":"10.1145\/1073204.1073259"},{"key":"e_1_3_2_1_51_1","volume-title":"Low Latency and Interference Immune Wireless Standard. In Proc. IEEE Wireless Communications and Networking Conference (WCNC)","author":"Woodings R.","year":"2006","unstructured":"R. Woodings and M. Pandey . WirelessUSB: a Low Power , Low Latency and Interference Immune Wireless Standard. In Proc. IEEE Wireless Communications and Networking Conference (WCNC) , 2006 . R. Woodings and M. Pandey. WirelessUSB: a Low Power, Low Latency and Interference Immune Wireless Standard. In Proc. IEEE Wireless Communications and Networking Conference (WCNC), 2006."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.1145\/1276377.1276379"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_53_1","DOI":"10.1109\/71.159038"}],"event":{"sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"acronym":"MobiSys'14","name":"MobiSys'14: The 12th Annual International Conference on Mobile Systems, Applications, and Services","location":"Bretton Woods New Hampshire USA"},"container-title":["Proceedings of the 12th annual international conference on Mobile systems, applications, and services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2594368.2594370","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2594368.2594370","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:02Z","timestamp":1750229762000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2594368.2594370"}},"subtitle":["a system solution for sharing i\/o between mobile systems"],"short-title":[],"issued":{"date-parts":[[2014,6,2]]},"references-count":52,"alternative-id":["10.1145\/2594368.2594370","10.1145\/2594368"],"URL":"https:\/\/doi.org\/10.1145\/2594368.2594370","relation":{},"subject":[],"published":{"date-parts":[[2014,6,2]]},"assertion":[{"value":"2014-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}