{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:57:17Z","timestamp":1764842237437,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T00:00:00Z","timestamp":1561334400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the National Key R\\&D Program of China","award":["2018YFB1004703"],"award-info":[{"award-number":["2018YFB1004703"]}]},{"name":"China NSF grant","award":["61672349, 61672353"],"award-info":[{"award-number":["61672349, 61672353"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,24]]},"DOI":"10.1145\/3326285.3329066","type":"proceedings-article","created":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T12:42:33Z","timestamp":1560516153000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Litedge"],"prefix":"10.1145","author":[{"given":"Yutong","family":"Liu","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Linghe","family":"Kong","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Muhammad","family":"Hassan","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Long","family":"Cheng","sequence":"additional","affiliation":[{"name":"Clemson University"}]},{"given":"Guangtao","family":"Xue","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Guihai","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2019,6,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Digital surveillance systems help keep k12 students, staff safe from harm, https:\/\/edtechmagazine.com\/k12\/article,accessed","author":"Tynan","year":"2018","unstructured":"D. Tynan , Digital surveillance systems help keep k12 students, staff safe from harm, https:\/\/edtechmagazine.com\/k12\/article,accessed April , 2018 . D. Tynan, Digital surveillance systems help keep k12 students, staff safe from harm, https:\/\/edtechmagazine.com\/k12\/article,accessed April, 2018."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/JIOT.2017.2786349"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/ACCESS.2017.2685434"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/TAC.2011.2164034"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/2789168.2790123"},{"unstructured":"J. L. Mitchell W. B. Pennebaker C. E. Fogg D. J. Legall Mpeg video compression standard 99 (5) (1996) 1666--1675.   J. L. Mitchell W. B. Pennebaker C. E. Fogg D. J. Legall Mpeg video compression standard 99 (5) (1996) 1666--1675.","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/DCC.2011.92"},{"key":"e_1_3_2_1_8_1","first-page":"259","volume-title":"ITSC","author":"Khoshabeh T.","year":"2007","unstructured":"R. Khoshabeh , T. Gandhi , M. M. Trivedi, Multi-camera based traffic flow characterization and classification , in: ITSC , Seattle, WA, USA , 2007 , pp. 259 -- 264 . R. Khoshabeh, T. Gandhi, M. M. Trivedi, Multi-camera based traffic flow characterization and classification, in: ITSC, Seattle, WA, USA, 2007, pp. 259--264."},{"key":"e_1_3_2_1_9_1","first-page":"480","volume-title":"IEEE AVSS","author":"Micheloni E.","year":"2005","unstructured":"C. Micheloni , E. Salvador , F. Bigaran , G. L. Foresti, An integrated surveillance system for outdoor security , in: IEEE AVSS , Como, Italy , 2005 , pp. 480 -- 485 . C. Micheloni, E. Salvador, F. Bigaran, G. L. Foresti, An integrated surveillance system for outdoor security, in: IEEE AVSS, Como, Italy, 2005, pp. 480--485."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/2710128"},{"key":"e_1_3_2_1_11_1","first-page":"82","article-title":"Mobile gpu-based deep learning framework for continuous vision applications, in: MobiSys, Niagara Falls","author":"Loc Y.","year":"2017","unstructured":"H. N. Loc , Y. Lee , R. K. Balan , Deepmon : Mobile gpu-based deep learning framework for continuous vision applications, in: MobiSys, Niagara Falls , NY, USA , 2017 , pp. 82 -- 95 . H. N. Loc, Y. Lee, R. K. Balan, Deepmon: Mobile gpu-based deep learning framework for continuous vision applications, in: MobiSys, Niagara Falls, NY, USA, 2017, pp. 82--95.","journal-title":"NY, USA"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/3081333.3081359"},{"volume-title":"Adam","author":"Howard M.","unstructured":"A. G. Howard , M. Zhu , B. Chen , D. Kalenichenko , W. Wang , T. Weyand , M. Andreetto , H. Adam , Mobilenets : Efficient convolutional neural networks for mobile vision applications, CoRRabs\/ 1704.04861. A. G. Howard, M. Zhu, B. Chen, D. Kalenichenko, W. Wang, T. Weyand, M. Andreetto, H. Adam, Mobilenets: Efficient convolutional neural networks for mobile vision applications, CoRRabs\/1704.04861.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","first-page":"63","volume-title":"IEEE INFOCOM","author":"Wang T.","year":"2018","unstructured":"S. Wang , T. Tuor , T. Salonidis , K. K. Leung , C. Makaya , T. He , K. Chan, When edge meets learning: Adaptive control for resource-constrained distributed machine learning , in: IEEE INFOCOM , Honolulu, HI, USA , 2018 , pp. 63 -- 71 . S. Wang, T. Tuor, T. Salonidis, K. K. Leung, C. Makaya, T. He, K. Chan, When edge meets learning: Adaptive control for resource-constrained distributed machine learning, in: IEEE INFOCOM, Honolulu, HI, USA, 2018, pp. 63--71."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/5.959341"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1016\/j.comnet.2014.03.027"},{"key":"e_1_3_2_1_17_1","first-page":"21","volume-title":"ECCV","author":"Liu D.","year":"2016","unstructured":"W. Liu , D. Anguelov , D. Erhan , C. Szegedy , S. E. Reed , C. Fu , A. C. Berg , SSD: single shot multibox detector , in: ECCV , Amsterdam , The Netherlands , 2016 , pp. 21 -- 37 . W. Liu, D. Anguelov, D. Erhan, C. Szegedy, S. E. Reed, C. Fu, A. C. Berg, SSD: single shot multibox detector, in: ECCV, Amsterdam, The Netherlands, 2016, pp. 21--37."},{"key":"e_1_3_2_1_18_1","first-page":"1398","volume-title":"IEEE ICCV","author":"He X.","year":"2017","unstructured":"Y. He , X. Zhang , J. Sun, Channel pruning for accelerating very deep neural networks , in: IEEE ICCV , Venice , 2017 , pp. 1398 -- 1406 . Y. He, X. Zhang, J. Sun, Channel pruning for accelerating very deep neural networks, in: IEEE ICCV, Venice, 2017, pp. 1398--1406."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/2906388.2906396"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1137\/080732730"},{"key":"e_1_3_2_1_21_1","first-page":"132","volume-title":"Gwangju","author":"Song S.","year":"2014","unstructured":"Y. Song , S. Noh , J. Yu , C. Park , B. Lee, Background subtraction based on gaussian mixture models using color and depth information, in: ICCAIS , Gwangju , South Korea , 2014 , pp. 132 -- 135 . Y. Song, S. Noh, J. Yu, C. Park, B. Lee, Background subtraction based on gaussian mixture models using color and depth information, in: ICCAIS, Gwangju, South Korea, 2014, pp. 132--135."},{"unstructured":"S. Han H. Mao W. J. Dally Deep compression: Compressing deep neural network with pruning trained quantization and huffman coding CoRR abs\/1510.00149.  S. Han H. Mao W. J. Dally Deep compression: Compressing deep neural network with pruning trained quantization and huffman coding CoRR abs\/1510.00149.","key":"e_1_3_2_1_22_1"},{"unstructured":"X. Liu J. Pool S. Han W. J. Dally Efficient sparse-winograd convolutional neural networks CoRR abs\/1802.06367.  X. Liu J. Pool S. Han W. J. Dally Efficient sparse-winograd convolutional neural networks CoRR abs\/1802.06367.","key":"e_1_3_2_1_23_1"},{"unstructured":"X. Z. Yihui He J. Sun Channel pruning github code https:\/\/github.com\/yihui-he\/channel-pruning.  X. Z. Yihui He J. Sun Channel pruning github code https:\/\/github.com\/yihui-he\/channel-pruning.","key":"e_1_3_2_1_24_1"},{"unstructured":"M. Mathieu M. Henaff Y. LeCun Fast training of convolutional networks through ffts CoRR abs\/1312.5851.  M. Mathieu M. Henaff Y. LeCun Fast training of convolutional networks through ffts CoRR abs\/1312.5851.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","first-page":"160.1","volume-title":"BMVC","author":"Highlander A.","year":"2015","unstructured":"T. Highlander , A. Rodriguez, Very efficient training of convolutional neural networks using fast fourier transform and overlap-and-add , in: BMVC , Swansea, UK , 2015 , pp. 160.1 -- 160.9 . T. Highlander, A. Rodriguez, Very efficient training of convolutional neural networks using fast fourier transform and overlap-and-add, in: BMVC, Swansea, UK, 2015, pp. 160.1--160.9."},{"key":"e_1_3_2_1_27_1","first-page":"740","volume-title":"ECCV","author":"Lin M.","year":"2014","unstructured":"T. Lin , M. Maire , S. J. Belongie , J. Hays , P. Perona , D. Ramanan , P. Doll\u00e1r , C. L. Zitnick , Microsoft COCO : common objects in context , in: ECCV , Zurich, Switzerland , 2014 , pp. 740 -- 755 . T. Lin, M. Maire, S. J. Belongie, J. Hays, P. Perona, D. Ramanan, P. Doll\u00e1r, C. L. Zitnick, Microsoft COCO: common objects in context, in: ECCV, Zurich, Switzerland, 2014, pp. 740--755."},{"unstructured":"wikipedia Pin-hole projection formula https:\/\/en.wikipedia.org\/wiki\/Pinhole_camera_model.  wikipedia Pin-hole projection formula https:\/\/en.wikipedia.org\/wiki\/Pinhole_camera_model.","key":"e_1_3_2_1_28_1"},{"unstructured":"ccrisan Motioneyeos https:\/\/github.com\/ccrisan\/motioneyeos.  ccrisan Motioneyeos https:\/\/github.com\/ccrisan\/motioneyeos.","key":"e_1_3_2_1_29_1"}],"event":{"acronym":"IWQoS '19","name":"IWQoS '19: IEEE\/ACM International Symposium on Quality of Service","location":"Phoenix Arizona"},"container-title":["Proceedings of the International Symposium on Quality of Service"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3326285.3329066","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3326285.3329066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:00Z","timestamp":1750206360000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3326285.3329066"}},"subtitle":["towards light-weight edge computing for efficient wireless surveillance system"],"short-title":[],"issued":{"date-parts":[[2019,6,24]]},"references-count":29,"alternative-id":["10.1145\/3326285.3329066","10.1145\/3326285"],"URL":"https:\/\/doi.org\/10.1145\/3326285.3329066","relation":{},"subject":[],"published":{"date-parts":[[2019,6,24]]},"assertion":[{"value":"2019-06-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}