{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T00:58:01Z","timestamp":1776387481591,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T00:00:00Z","timestamp":1533600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,7]]},"DOI":"10.1145\/3230543.3230574","type":"proceedings-article","created":{"date-parts":[[2018,8,8]],"date-time":"2018-08-08T19:13:06Z","timestamp":1533755586000},"page":"253-266","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":385,"title":["Chameleon"],"prefix":"10.1145","author":[{"given":"Junchen","family":"Jiang","sequence":"first","affiliation":[{"name":"University of Chicago and Microsoft Research"}]},{"given":"Ganesh","family":"Ananthanarayanan","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Peter","family":"Bodik","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Siddhartha","family":"Sen","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Ion","family":"Stoica","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]}],"member":"320","published-online":{"date-parts":[[2018,8,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon aws deeplens. https:\/\/aws.amazon.com\/deeplens\/.  Amazon aws deeplens. https:\/\/aws.amazon.com\/deeplens\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Artificial Intelligence Surveillance Cameras Security. https:\/\/www.theverge.com\/2018\/1\/23\/16907238\/artificial-intelligence-surveillance-cameras-security.  Artificial Intelligence Surveillance Cameras Security. https:\/\/www.theverge.com\/2018\/1\/23\/16907238\/artificial-intelligence-surveillance-cameras-security."},{"key":"e_1_3_2_1_3_1","unstructured":"AWS Lambda. https:\/\/aws.amazon.com\/lambda\/.  AWS Lambda. https:\/\/aws.amazon.com\/lambda\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Azure Functions. https:\/\/azure.microsoft.com\/en-us\/services\/functions\/.  Azure Functions. https:\/\/azure.microsoft.com\/en-us\/services\/functions\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Google clips. https:\/\/store.google.com\/us\/product\/google_clips?hl=en-US.  Google clips. https:\/\/store.google.com\/us\/product\/google_clips?hl=en-US."},{"key":"e_1_3_2_1_6_1","unstructured":"New Search Engine Revolutionizes Video Surveillance. https:\/\/i-hls.com\/archives\/80734.  New Search Engine Revolutionizes Video Surveillance. https:\/\/i-hls.com\/archives\/80734."},{"key":"e_1_3_2_1_7_1","unstructured":"Tensorflow detection model zoo. https:\/\/github.com\/tensorflow\/models\/blob\/master\/research\/object_detection\/g3doc\/detection_model_zoo.md.  Tensorflow detection model zoo. https:\/\/github.com\/tensorflow\/models\/blob\/master\/research\/object_detection\/g3doc\/detection_model_zoo.md."},{"key":"e_1_3_2_1_8_1","unstructured":"Tensorflow-slim image classification model library. https:\/\/github.com\/tensorflow\/models\/tree\/master\/research\/slim.  Tensorflow-slim image classification model library. https:\/\/github.com\/tensorflow\/models\/tree\/master\/research\/slim."},{"key":"e_1_3_2_1_9_1","unstructured":"Yolo. https:\/\/pjreddie.com\/darknet\/yolo\/.  Yolo. https:\/\/pjreddie.com\/darknet\/yolo\/."},{"key":"e_1_3_2_1_10_1","volume-title":"http:\/\/ffmpeg.org\/","year":"2000","unstructured":"FFmpeg. http:\/\/ffmpeg.org\/ , 2000 --2018. FFmpeg. http:\/\/ffmpeg.org\/, 2000--2018."},{"key":"e_1_3_2_1_11_1","first-page":"39.1","volume-title":"25th Conference on Learning Theory (COLT '12)","author":"Agrawal S.","year":"2012","unstructured":"S. Agrawal and N. Goyal . Analysis of thompson sampling for the multi-armed bandit problem . In 25th Conference on Learning Theory (COLT '12) , pages 39.1 -- 39.26 , 2012 . S. Agrawal and N. Goyal. Analysis of thompson sampling for the multi-armed bandit problem. In 25th Conference on Learning Theory (COLT '12), pages 39.1--39.26, 2012."},{"key":"e_1_3_2_1_12_1","first-page":"469","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17)","author":"Alipourfard O.","year":"2017","unstructured":"O. Alipourfard , H. H. Liu , J. Chen , S. Venkataraman , M. Yu , and M. Zhang . Cherrypick: Adaptively unearthing the best cloud configurations for big data analytics . In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17) , pages 469 -- 482 , 2017 . O. Alipourfard, H. H. Liu, J. Chen, S. Venkataraman, M. Yu, and M. Zhang. Cherrypick: Adaptively unearthing the best cloud configurations for big data analytics. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17), pages 469--482, 2017."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.3641638"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-009-0275-4"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906396"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098184"},{"key":"e_1_3_2_1_20_1","volume-title":"Citeseer","author":"Hoover W. E.","year":"1984","unstructured":"W. E. Hoover and M. Rockville . Algorithms for confidence circles and ellipses . Citeseer , 1984 . W. E. Hoover and M. Rockville. Algorithms for confidence circles and ellipses. Citeseer, 1984."},{"key":"e_1_3_2_1_21_1","volume-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861","author":"Howard A. G.","year":"2017","unstructured":"A. G. Howard , M. Zhu , B. Chen , D. Kalenichenko , W. Wang , T. Weyand , M. Andreetto , and H. Adam . Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861 , 2017 . A. G. Howard, M. Zhu, B. Chen, D. Kalenichenko, W. Wang, T. Weyand, M. Andreetto, and H. Adam. Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv preprint arXiv:1704.04861, 2017."},{"key":"e_1_3_2_1_22_1","volume-title":"Focus: Querying large video datasets with low latency and low cost. arXiv preprint arXiv:1801.03493","author":"Hsieh K.","year":"2018","unstructured":"K. Hsieh , G. Ananthanarayanan , P. Bodik , P. Bahl , M. Philipose , P. B. Gibbons , and O. Mutlu . Focus: Querying large video datasets with low latency and low cost. arXiv preprint arXiv:1801.03493 , 2018 . K. Hsieh, G. Ananthanarayanan, P. Bodik, P. Bahl, M. Philipose, P. B. Gibbons, and O. Mutlu. Focus: Querying large video datasets with low latency and low cost. arXiv preprint arXiv:1801.03493, 2018."},{"key":"e_1_3_2_1_23_1","volume-title":"Speed\/accuracy trade-offs for modern convolutional object detectors. CoRR, abs\/1611.10012","author":"Huang J.","year":"2016","unstructured":"J. Huang , V. Rathod , C. Sun , M. Zhu , A. Korattikara , A. Fathi , I. Fischer , Z. Wojna , Y. Song , S. Guadarrama , and K. Murphy . Speed\/accuracy trade-offs for modern convolutional object detectors. CoRR, abs\/1611.10012 , 2016 . J. Huang, V. Rathod, C. Sun, M. Zhu, A. Korattikara, A. Fathi, I. Fischer, Z. Wojna, Y. Song, S. Guadarrama, and K. Murphy. Speed\/accuracy trade-offs for modern convolutional object detectors. CoRR, abs\/1611.10012, 2016."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.14778\/3137628.3137664"},{"key":"e_1_3_2_1_25_1","volume-title":"ITE Journal","author":"Loewenherz F.","year":"2017","unstructured":"F. Loewenherz , V. Bahl , and Y. Wang . Video analytics towards vision zero . In ITE Journal , 2017 . F. Loewenherz, V. Bahl, and Y. Wang. Video analytics towards vision zero. In ITE Journal, 2017."},{"key":"e_1_3_2_1_26_1","volume-title":"Efficient contextual bandits in non-stationary worlds. CoRR, abs\/1708.01799","author":"Luo H.","year":"2017","unstructured":"H. Luo , A. Agarwal , and J. Langford . Efficient contextual bandits in non-stationary worlds. CoRR, abs\/1708.01799 , 2017 . H. Luo, A. Agarwal, and J. Langford. Efficient contextual bandits in non-stationary worlds. CoRR, abs\/1708.01799, 2017."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-009-0909-0","volume-title":"Bayesian approach to global optimization","author":"Mockus J.","year":"1989","unstructured":"J. Mockus . Bayesian approach to global optimization . Kluwer , Dordrecht , 1989 . J. Mockus. Bayesian approach to global optimization. Kluwer, Dordrecht, 1989."},{"key":"e_1_3_2_1_28_1","unstructured":"F. Pukelsheim. Optimal Design of Experiments. John Wiley & Sons Inc. New York 1993.  F. Pukelsheim. Optimal Design of Experiments. John Wiley & Sons Inc. New York 1993."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.236"},{"key":"e_1_3_2_1_30_1","first-page":"12","volume-title":"AAAI","volume":"4","author":"Szegedy C.","year":"2017","unstructured":"C. Szegedy , S. Ioffe , V. Vanhoucke , and A. A. Alemi . Inception-v4, inception-resnet and the impact of residual connections on learning . In AAAI , volume 4 , page 12 , 2017 . C. Szegedy, S. Ioffe, V. Vanhoucke, and A. A. Alemi. Inception-v4, inception-resnet and the impact of residual connections on learning. In AAAI, volume 4, page 12, 2017."},{"key":"e_1_3_2_1_31_1","first-page":"363","volume-title":"13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16)","author":"Venkataraman S.","year":"2016","unstructured":"S. Venkataraman , Z. Yang , M. Franklin , B. Recht , and I. Stoica . Ernest: Efficient performance prediction for large-scale advanced analytics . In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) , pages 363 -- 378 , 2016 . S. Venkataraman, Z. Yang, M. Franklin, B. Recht, and I. Stoica. Ernest: Efficient performance prediction for large-scale advanced analytics. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16), pages 363--378, 2016."},{"key":"e_1_3_2_1_32_1","first-page":"1","volume-title":"NSDI","volume":"9","author":"Zhang H.","year":"2017","unstructured":"H. Zhang , G. Ananthanarayanan , P. Bodik , M. Philipose , P. Bahl , and M. J. Freedman . Live video analytics at scale with approximation and delay-tolerance . In NSDI , volume 9 , page 1 , 2017 . H. Zhang, G. Ananthanarayanan, P. Bodik, M. Philipose, P. Bahl, and M. J. Freedman. Live video analytics at scale with approximation and delay-tolerance. In NSDI, volume 9, page 1, 2017."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790123"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127479.3128605"}],"event":{"name":"SIGCOMM '18: ACM SIGCOMM 2018 Conference","location":"Budapest Hungary","acronym":"SIGCOMM '18","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230543.3230574","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230543.3230574","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:47Z","timestamp":1750210787000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230543.3230574"}},"subtitle":["scalable adaptation of video analytics"],"short-title":[],"issued":{"date-parts":[[2018,8,7]]},"references-count":34,"alternative-id":["10.1145\/3230543.3230574","10.1145\/3230543"],"URL":"https:\/\/doi.org\/10.1145\/3230543.3230574","relation":{},"subject":[],"published":{"date-parts":[[2018,8,7]]},"assertion":[{"value":"2018-08-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}