{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:00:48Z","timestamp":1766066448897,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,5,18]],"date-time":"2015-05-18T00:00:00Z","timestamp":1431907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006445","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS #1054693, CNS #1218041, CNS #1422312"],"award-info":[{"award-number":["CNS #1054693, CNS #1218041, CNS #1422312"]}],"id":[{"id":"10.13039\/100006445","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,5,18]]},"DOI":"10.1145\/2742647.2742663","type":"proceedings-article","created":{"date-parts":[[2015,5,11]],"date-time":"2015-05-11T16:31:04Z","timestamp":1431361864000},"page":"213-226","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":48,"title":["Starfish"],"prefix":"10.1145","author":[{"given":"Robert","family":"LiKamWa","sequence":"first","affiliation":[{"name":"Rice University, Houston, TX, USA"}]},{"given":"Lin","family":"Zhong","sequence":"additional","affiliation":[{"name":"Rice University, Houston, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,5,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24670-1_36"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383412"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307849.2307862"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77650"},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. USENIX Security Symp.","author":"Brumley David","year":"2004","unstructured":"David Brumley and Dawn Song . Privtrans : Automatically partitioning programs for privilege separation . In Proc. USENIX Security Symp. , 2004 . David Brumley and Dawn Song. Privtrans: Automatically partitioning programs for privilege separation. In Proc. USENIX Security Symp., 2004."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966473"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/362759.362813"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814441"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352606"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. USENIX Symp. on Operating Systems Design and Implementation (OSDI)","author":"Gordon Mark S.","year":"2012","unstructured":"Mark S. Gordon , Davoud Anoushe Jamshidi , Scott A. Mahlke , Zhuoqing Morley Mao , and Xu Chen . Comet : Code offload by migrating execution transparently . In Proc. USENIX Symp. on Operating Systems Design and Implementation (OSDI) , 2012 . Mark S. Gordon, Davoud Anoushe Jamshidi, Scott A. Mahlke, Zhuoqing Morley Mao, and Xu Chen. Comet: Code offload by migrating execution transparently. In Proc. USENIX Symp. on Operating Systems Design and Implementation (OSDI), 2012."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001455"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594383"},{"issue":"2","key":"e_1_3_2_1_13_1","first-page":"255","article-title":"Improving software performance with automatic memoization","volume":"18","author":"Hall Marty","year":"1997","unstructured":"Marty Hall and J. Paul McNamee . Improving software performance with automatic memoization . Johns Hopkins APL Technical Digest , 18 ( 2 ): 255 , 1997 . Marty Hall and J. Paul McNamee. Improving software performance with automatic memoization. Johns Hopkins APL Technical Digest, 18(2):255, 1997.","journal-title":"Johns Hopkins APL Technical Digest"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/851036.856457"},{"key":"e_1_3_2_1_15_1","unstructured":"Itseez. OpenCV Computer Vision Library. http:\/\/opencv.org.  Itseez. OpenCV Computer Vision Library. http:\/\/opencv.org."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/365628.365655"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464448"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637166.2637230"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/286385.286386"},{"key":"e_1_3_2_1_20_1","volume-title":"Always-on vision processing unit (VPU) for mobile applications","author":"Moloney David","year":"2014","unstructured":"David Moloney , Brendan Barry , Fergal Connor , Martin O'Riordan , Cormac Brick , David Donohoe , David Nicholls , Richard Richmond , and Vasile Toma . Always-on vision processing unit (VPU) for mobile applications . IEEE Micro , 2014 . David Moloney, Brendan Barry, Fergal Connor, Martin O'Riordan, Cormac Brick, David Donohoe, David Nicholls, Richard Richmond, and Vasile Toma. Always-on vision processing unit (VPU) for mobile applications. IEEE Micro, 2014."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/850926.851700"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355284.1355292"},{"key":"e_1_3_2_1_23_1","unstructured":"Andrey Ponomarenko. API changes\/compatibility report for the OpenCV library. http:\/\/upstream.rosalinux.ru\/versions\/opencv.html.  Andrey Ponomarenko. API changes\/compatibility report for the OpenCV library. http:\/\/upstream.rosalinux.ru\/versions\/opencv.html."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000000"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639126"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240636"},{"key":"e_1_3_2_1_27_1","volume-title":"CreateSpace","author":"Richard","year":"2009","unstructured":"Richard M. Stallman and GCC DeveloperCommunity. Using The GNU Compiler Collection: A GNU Manual For GCC Version 4.3.3 . CreateSpace , Paramount, CA , 2009 . Richard M. Stallman and GCC DeveloperCommunity. Using The GNU Compiler Collection: A GNU Manual For GCC Version 4.3.3. CreateSpace, Paramount, CA, 2009."},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. IEEE Computer Vision and Pattern Recognition Work. (CVPRW)","author":"Stone Zak","year":"2008","unstructured":"Zak Stone , Todd Zickler , and Trevor Darrell . Autotagging Facebook : Social network context improves photo annotation . In Proc. IEEE Computer Vision and Pattern Recognition Work. (CVPRW) , 2008 . Zak Stone, Todd Zickler, and Trevor Darrell. Autotagging Facebook: Social network context improves photo annotation. In Proc. IEEE Computer Vision and Pattern Recognition Work. (CVPRW), 2008."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1499799.1499878"},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. European Symp. on Research in Computer Security (ESORICS)","author":"Wu Yongzheng","year":"2012","unstructured":"Yongzheng Wu , Sai Sathyanarayan , Roland H. C. Yap , and Zhenkai Liang. CodeJail: Application-transparent isolation of libraries with tight program interactions . In Proc. European Symp. on Research in Computer Security (ESORICS) , 2012 . Yongzheng Wu, Sai Sathyanarayan, Roland H. C. Yap, and Zhenkai Liang. CodeJail: Application-transparent isolation of libraries with tight program interactions. In Proc. European Symp. on Research in Computer Security (ESORICS), 2012."}],"event":{"name":"MobiSys'15: The 13th Annual International Conference on Mobile Systems, Applications, and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Florence Italy","acronym":"MobiSys'15"},"container-title":["Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2742647.2742663","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2742647.2742663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:33Z","timestamp":1750227393000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2742647.2742663"}},"subtitle":["Efficient Concurrency Support for Computer Vision Applications"],"short-title":[],"issued":{"date-parts":[[2015,5,18]]},"references-count":30,"alternative-id":["10.1145\/2742647.2742663","10.1145\/2742647"],"URL":"https:\/\/doi.org\/10.1145\/2742647.2742663","relation":{},"subject":[],"published":{"date-parts":[[2015,5,18]]},"assertion":[{"value":"2015-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}