{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:45Z","timestamp":1772164065584,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T00:00:00Z","timestamp":1445817600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,26]]},"DOI":"10.1145\/2814204.2814205","type":"proceedings-article","created":{"date-parts":[[2015,12,4]],"date-time":"2015-12-04T09:48:03Z","timestamp":1449222483000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["The next-generation in-stadium experience (keynote)"],"prefix":"10.1145","author":[{"given":"Priya","family":"Narasimhan","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Utsav","family":"Drolia","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Jiaqi","family":"Tan","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Nathan D.","family":"Mickulicz","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Rajeev","family":"Gandhi","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Computational Vision at CalTech. http:\/\/www.vision.caltech. edu\/archive.html.  Computational Vision at CalTech. http:\/\/www.vision.caltech. edu\/archive.html."},{"key":"e_1_3_2_1_2_1","unstructured":"OpenCV. http:\/\/opencv.org\/.  OpenCV. http:\/\/opencv.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Cisco. Connecting Fans in New Ways to Deliver the Ultimate Fan Experience.  Cisco. Connecting Fans in New Ways to Deliver the Ultimate Fan Experience."},{"key":"e_1_3_2_1_4_1","unstructured":"ComputerWorld. Context on ice: Penguins fans get mobile extras. URL http:\/\/www.computerworld.com\/s\/article\/9134588\/ Context_on_ice_Penguins_fans_get_mobile_extras.  ComputerWorld. Context on ice: Penguins fans get mobile extras. URL http:\/\/www.computerworld.com\/s\/article\/9134588\/ Context_on_ice_Penguins_fans_get_mobile_extras."},{"key":"e_1_3_2_1_5_1","unstructured":"M. Dano. Super Bowl traffic stats. http:\/\/goo.gl\/uzMD2B.  M. Dano. Super Bowl traffic stats. http:\/\/goo.gl\/uzMD2B."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2795381.2795388"},{"key":"e_1_3_2_1_7_1","unstructured":"Extreme Marketing Team. In-Stadium Wi-Fi Analytics Reveal Fan Engagement At Super Bowl XLIX. http:\/\/goo.gl\/piMmtQ.  Extreme Marketing Team. In-Stadium Wi-Fi Analytics Reveal Fan Engagement At Super Bowl XLIX. http:\/\/goo.gl\/piMmtQ."},{"key":"e_1_3_2_1_8_1","volume-title":"Learning Multi-scale Block Local Binary Patterns for Face Recognition. In International Conference on Biometrics (ICB)","author":"Liao S.","year":"2007"},{"key":"e_1_3_2_1_9_1","volume-title":"YinzCam: Experiences with In-Venue Mobile Video and Replays. In USENIX Large Installation System Administration Conference (LISA)","author":"Mickulicz N.","year":"2013"},{"key":"e_1_3_2_1_10_1","volume-title":"International Conference on Autonomic Computing (ICAC), Management of Big Data Systems (MBDS) Track","author":"Mickulicz N.","year":"2013"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataService.2015.24"},{"key":"e_1_3_2_1_12_1","unstructured":"Mobile Marketer. 45.7% of sports fans use smartphones to access content online. URL http:\/\/www.mobilemarketer.com\/cms\/news\/ research\/14020.html.  Mobile Marketer. 45.7% of sports fans use smartphones to access content online. URL http:\/\/www.mobilemarketer.com\/cms\/news\/ research\/14020.html."},{"key":"e_1_3_2_1_13_1","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems (TACAS)","author":"Myreen M.","year":"2007"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1775223.1775241"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/238721.238781"},{"key":"e_1_3_2_1_16_1","unstructured":"P. Narasimhan and R. Gandhi. Systems and methods for providing interactive video services. U.S. Patent US 9137495 B2.  P. Narasimhan and R. Gandhi. Systems and methods for providing interactive video services. U.S. Patent US 9137495 B2."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71067-7_6"},{"key":"e_1_3_2_1_18_1","unstructured":"P. Steinbach. Wi-Fi Service Increasingly Seen As a Must-Have Stadium Amenity. http:\/\/goo.gl\/LCGCDv July 2013.  P. Steinbach. Wi-Fi Service Increasingly Seen As a Must-Have Stadium Amenity. http:\/\/goo.gl\/LCGCDv July 2013."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2014.118"},{"key":"e_1_3_2_1_20_1","unstructured":"{ 20 } J. Tan U. D rol i a R Martins R. Gandhi and P. Narasimhan. Short P aper : C HI PS: Content - based H euristics for Improv i ng P hoto P rivacy for Smartphones. I n AC M Confere11ce 011 Security and Privacy i11 Wireless and Mobile Networks (WiSec) 20 1 4. { 21 } J. T an R Gandhi and P. Naras i mhan. STOVE : Strict Observable Verifiab l e D ata and E xecution Models for Untrusted Applications. I n IEEE CloudCom Doctoral Symposium 20 1 4. { 22 } J. T an H. T ay R .Gandhi and P. Naras i mhan. AUS P ICE : Automatic Safety P roperty Ver i fication for Unmodified Exec u tab l es. I n Working Confere11ce on Verified Software: Tools Theories and Experimems (VSTTE ) 2015.  { 20 } J. Tan U. D rol i a R Martins R. Gandhi and P. Narasimhan. Short P aper : C HI PS: Content - based H euristics for Improv i ng P hoto P rivacy for Smartphones. I n AC M Confere11ce 011 Security and Privacy i11 Wireless and Mobile Networks (WiSec) 20 1 4. { 21 } J. T an R Gandhi and P. Naras i mhan. STOVE : Strict Observable Verifiab l e D ata and E xecution Models for Untrusted Applications. I n IEEE CloudCom Doctoral Symposium 20 1 4. { 22 } J. T an H. T ay R .Gandhi and P. Naras i mhan. AUS P ICE : Automatic Safety P roperty Ver i fication for Unmodified Exec u tab l es. I n Working Confere11ce on Verified Software: Tools Theories and Experimems (VSTTE ) 2015."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.1991.3.1.71"}],"event":{"name":"GPCE'15: Generative Programming: Concepts and Experiences","location":"Pittsburgh PA USA","acronym":"GPCE'15","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 2015 ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2814204.2814205","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2814204.2814205","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:12:46Z","timestamp":1750212766000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2814204.2814205"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,26]]},"references-count":21,"alternative-id":["10.1145\/2814204.2814205","10.1145\/2814204"],"URL":"https:\/\/doi.org\/10.1145\/2814204.2814205","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2936314.2814205","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2015,10,26]]},"assertion":[{"value":"2015-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}