{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:40:32Z","timestamp":1773157232435,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":101,"publisher":"ACM","funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2106862"],"award-info":[{"award-number":["CNS-2106862"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"U.S. Army Research Office and the U.S. Army Futures Command","award":["W519TC-23-C- 0003"],"award-info":[{"award-number":["W519TC-23-C- 0003"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1145\/3769102.3770616","type":"proceedings-article","created":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T16:00:41Z","timestamp":1764777641000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Does Accurate Real-Time AI Need Edge Offload?"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6300-8796","authenticated-orcid":false,"given":"Qifei","family":"Dong","sequence":"first","affiliation":[{"name":"School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8347-2657","authenticated-orcid":false,"given":"Jingao","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0171-020X","authenticated-orcid":false,"given":"Padmanabhan","family":"Pillai","sequence":"additional","affiliation":[{"name":"School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2187-2049","authenticated-orcid":false,"given":"Mahadev","family":"Satyanarayanan","sequence":"additional","affiliation":[{"name":"School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Last accessed on","year":"2025","unstructured":"A 360 review of AI agent benchmarks. (https:\/\/research.ibm.com\/blog\/AI-agent-benchmarks). Last accessed on June 11, 2025."},{"key":"e_1_3_2_1_2_1","volume-title":"Last accessed on","author":"Coco","year":"2025","unstructured":"Coco-test-dev. (https:\/\/cocodataset.org\/). Last accessed on June 18, 2025."},{"key":"e_1_3_2_1_3_1","volume-title":"Performance & Price Analysis. (https:\/\/artificialanalysis.ai\/models). Last accessed on","author":"Comparison","year":"2025","unstructured":"Comparison of Models: Intelligence, Performance & Price Analysis. (https:\/\/artificialanalysis.ai\/models). Last accessed on June 11, 2025."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/www.kaggle.com\/models\/tensorflow\/efficientdet\/tfLite\/lite2-detection-metadata. Kaggle: TensorFlow EfficientDet TFLite model catalog, accessed","author":"EfficientDet-Lite","year":"2025","unstructured":"EfficientDet-Lite2 tflite detection metadata. https:\/\/www.kaggle.com\/models\/tensorflow\/efficientdet\/tfLite\/lite2-detection-metadata. Kaggle: TensorFlow EfficientDet TFLite model catalog, accessed June 18, 2025."},{"key":"e_1_3_2_1_5_1","volume-title":"Last accessed on","author":"Elijah","year":"2025","unstructured":"Elijah-2025 Benchmarks. (https:\/\/github.com\/cmusatyalab\/elijah2025-benchmarks). Last accessed on October 14, 2025."},{"key":"e_1_3_2_1_6_1","volume-title":"Last accessed on","author":"Imagenet","year":"2025","unstructured":"Imagenet-1k. (https:\/\/huggingface.co\/datasets\/mlx-vision\/imagenet-1k\/tree\/main). Last accessed on June 18, 2025."},{"key":"e_1_3_2_1_7_1","volume-title":"Last accessed on","author":"Introducing Geekbench AI.","year":"2025","unstructured":"Introducing Geekbench AI. (https:\/\/www.geekbench.com\/ai\/). Last accessed on June 11, 2025."},{"key":"e_1_3_2_1_8_1","unstructured":"Lasot: Large-scale single object tracking. http:\/\/vision.cs.stonybrook.edu\/~lasot\/. LaSOT Dataset accessed June 19 2025."},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/github.com\/tensorflow\/models\/tree\/master\/official\/projects\/movinet#tf-lite-streaming-models. TensorFlow Model Garden, accessed","author":"Movinet","year":"2025","unstructured":"Movinet tflite streaming models. https:\/\/github.com\/tensorflow\/models\/tree\/master\/official\/projects\/movinet#tf-lite-streaming-models. TensorFlow Model Garden, accessed June 18, 2025."},{"key":"e_1_3_2_1_10_1","volume-title":"Last accessed on","author":"Benchmarks","year":"2025","unstructured":"S&P AI Benchmarks by Kensho. (https:\/\/benchmarks.kensho.com\/). Last accessed on June 11, 2025."},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/docs.ultralytics.com\/tasks\/segment\/. Ultralytics YOLO Docs, accessed","author":"Ultralytics","year":"2025","unstructured":"Ultralytics yolo11 instance segmentation tasks. https:\/\/docs.ultralytics.com\/tasks\/segment\/. Ultralytics YOLO Docs, accessed June 19, 2025."},{"key":"e_1_3_2_1_12_1","volume-title":"https:\/\/docs.ultralytics.com\/models\/yolo11\/#key-features. Ultralytics YOLO documentation, accessed","author":"Yolo","year":"2025","unstructured":"Yolo11. https:\/\/docs.ultralytics.com\/models\/yolo11\/#key-features. Ultralytics YOLO documentation, accessed June 18, 2025."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2010.5537589"},{"key":"e_1_3_2_1_14_1","first-page":"6846","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV)","author":"Arnab A.","year":"2021","unstructured":"Arnab, A., Dehghani, M., Heigold, G., Sun, C., Lucic, M., and Schmid, C. Vivit: A video vision transformer. In Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV) (2021), IEEE, pp. 6836\u20136846."},{"key":"e_1_3_2_1_15_1","volume-title":"Rejuvenating Computer Architecture Research (and the whole semiconductor industry) with Open-Source Hardware. https:\/\/microarch.org\/micro52\/media\/asanovic_keynote.pdf","author":"Asanovic K.","year":"2019","unstructured":"Asanovic, K. Rejuvenating Computer Architecture Research (and the whole semiconductor industry) with Open-Source Hardware. https:\/\/microarch.org\/micro52\/media\/asanovic_keynote.pdf, 2019. Slides from MICRO-52 Keynote Talk."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228584"},{"key":"e_1_3_2_1_17_1","volume-title":"2023 IEEE\/ACM Symposium on Edge Computing (SEC)","author":"Bala M.","year":"2023","unstructured":"Bala, M., Eiszler, T., Chen, X., Harkes, J., Blakley, J., Pillai, P., and Satyanarayanan, M. Democratizing Drone Autonomy via Edge Computing. In 2023 IEEE\/ACM Symposium on Edge Computing (SEC) (Wilmington, DE, 2023)."},{"key":"e_1_3_2_1_18_1","volume-title":"The Case for Cyber Foraging. In Proceedings of the 10th Workshop on ACM SIGOPS European Workshop (Saint-Emilion","author":"Balan R.","year":"2002","unstructured":"Balan, R., Flinn, J., Satyanarayanan, M., Sinnamohideen, S., and Yang, H.-I. The Case for Cyber Foraging. In Proceedings of the 10th Workshop on ACM SIGOPS European Workshop (Saint-Emilion, France, July 2002)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247692"},{"key":"e_1_3_2_1_20_1","first-page":"2710","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV)","author":"Bao H.","year":"2021","unstructured":"Bao, H., Dong, L., and Wei, F. Beit: Bert pre-training of image transformers. In Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV) (2021), IEEE, pp. 2701\u20132710."},{"key":"e_1_3_2_1_21_1","first-page":"22677","volume-title":"Advances in Neural Information Processing Systems (NeurIPS)","volume":"34","author":"Bello I.","year":"2021","unstructured":"Bello, I., Fedus, W., Du, X., Cubuk, E. D., Srinivas, A., Lin, T., Shlens, J., and Zoph, B. Revisiting resnets: Improved training and scaling strategies. In Advances in Neural Information Processing Systems (NeurIPS) (2021), vol. 34, Curran Associates, Inc., pp. 22664\u201322677."},{"key":"e_1_3_2_1_22_1","volume-title":"Scalable and Secure Onloading of Edge Functions Using AirBox. In 2016 IEEE\/ACM Symposium on Edge Computing (SEC)","author":"Bhardwaj K.","year":"2016","unstructured":"Bhardwaj, K., Shih, M.-W., Agarwal, P., Gavrilovska, A., Kim, T., and Schwan, K. Fast, Scalable and Secure Onloading of Edge Functions Using AirBox. In 2016 IEEE\/ACM Symposium on Edge Computing (SEC) (Washington, DC, 2016)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318216.3363306"},{"key":"e_1_3_2_1_24_1","first-page":"229","volume-title":"ECCV 2020","volume":"12346","author":"Carion N.","year":"2020","unstructured":"Carion, N., Massa, F., Synnaeve, G., Usunier, N., Kirillov, A., and Zagoruyko, S. End-to-end object detection with transformers. In ECCV 2020 (2020), vol. 12346 of Lecture Notes in Computer Science, Springer, pp. 213\u2013229."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","DOI":"10.1145\/3318216","volume-title":"Proceedings of the 4th ACM\/IEEE Symposium on Edge Computing","author":"Chen Q.","year":"2019","unstructured":"Chen, Q., Ma, X., Tang, S., Guo, J., Yang, Q., and Fu, S. F-cooper: Feature based cooperative perception for autonomous vehicle edge computing system using 3d point clouds. In Proceedings of the 4th ACM\/IEEE Symposium on Edge Computing (Arlington, VA, 2019)."},{"key":"e_1_3_2_1_26_1","volume-title":"International Conference on Learning Representations (ICLR)","author":"Chen Z.","year":"2023","unstructured":"Chen, Z., Duan, Y., Wang, W., He, J., Lu, T., Dai, J., and Qiao, Y. Vision transformer adapter for dense predictions. In International Conference on Learning Representations (ICLR) (2023)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132211.3134458"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of EuroSys 2011","author":"Chun B.-G.","year":"2011","unstructured":"Chun, B.-G., Ihm, S., Maniatis, P., Naik, M., and Patti, A. CloneCloud: Elastic Execution between Mobile Device and Cloud. In Proceedings of EuroSys 2011 (Salzburg, Switzerland, April 2011)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2010.36"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814441"},{"key":"e_1_3_2_1_31_1","unstructured":"CVD Foundation. Kinetics human action video dataset. https:\/\/github.com\/cvdfoundation\/kinetics-dataset. Accessed on June 18 2025."},{"key":"e_1_3_2_1_32_1","first-page":"7485","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Dai X.","year":"2021","unstructured":"Dai, X., Chen, D., Liu, M., Yuan, L., Zhang, L., et al. Dynamic head: Unifying object detection heads with attentions. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2021), IEEE, pp. 7476\u20137485."},{"key":"e_1_3_2_1_33_1","volume-title":"M. Execution Plans for Cyber Foraging. In MobMid '08: Proceedings of the 1st Workshop on Mobile Middleware","author":"Dar\u00f8Kristensen","year":"2008","unstructured":"Dar\u00f8Kristensen, M. Execution Plans for Cyber Foraging. In MobMid '08: Proceedings of the 1st Workshop on Mobile Middleware (Leuven, Belgium, 2008)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3638550.3641126"},{"key":"e_1_3_2_1_35_1","volume-title":"International Conference on Learning Representations (ICLR) (2021","author":"Dosovitskiy A.","year":"2010","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer, M., Heigold, G., Gelly, S., Uszkoreit, J., and Houlsby, N. An image is worth 16x16 words: Transformers for image recognition at scale. International Conference on Learning Representations (ICLR) (2021). arXiv:2010.11929."},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the Second ACM\/IEEE Symposium on Edge Computing","author":"Drolia U.","year":"2017","unstructured":"Drolia, U., Guo, K., and Narasimhan, P. Precog: Prefetching for Image Recognition Applications at the Edge. In Proceedings of the Second ACM\/IEEE Symposium on Edge Computing (San Jose, CA, 2017)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1037\/e577162012-006"},{"key":"e_1_3_2_1_38_1","volume-title":"An Interdisciplinary Review of Current Issues in AI Evaluation, 2025","author":"Eriksson M.","year":"2025","unstructured":"Eriksson, M., Purificato, E., Noroozian, A., Vinagre, J., Chaslot, G., Gomez, E., and Fernandez-Llorca, D. Can We Trust AI Benchmarks? An Interdisciplinary Review of Current Issues in AI Evaluation, 2025. Last accessed on June 11, 2025."},{"key":"e_1_3_2_1_39_1","first-page":"16308","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Fang Y.","year":"2023","unstructured":"Fang, Y., Wang, W., Xie, B., Sun, Q., Wu, L., et AL. Eva: Exploring the limits of masked visual representation learning at scale. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2023), IEEE, pp. 16298\u201316308."},{"key":"e_1_3_2_1_40_1","first-page":"6527","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV)","author":"Fang Y.","year":"2021","unstructured":"Fang, Y., Yang, S., Wang, X., Li, Y., Fang, C., Shan, Y., Feng, B., and Liu, W. Instances as queries. In Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV) (2021), IEEE, pp. 6518\u20136527."},{"key":"e_1_3_2_1_41_1","volume-title":"FFmpeg: A complete, cross-platform solution to record, convert and stream audio and video. https:\/\/ffmpeg.org. Version 6.0, accessed","author":"Fmpeg Developers","year":"2025","unstructured":"FFmpeg Developers. FFmpeg: A complete, cross-platform solution to record, convert and stream audio and video. https:\/\/ffmpeg.org. Version 6.0, accessed June 18, 2025."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-02481-8"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/874075.876398"},{"key":"e_1_3_2_1_44_1","volume-title":"Energy Conservation and Application Quality in Pervasive Computing. In Proceedings of the 22nd International Conference on Distributed Computing Systems","author":"Flinn J.","year":"2002","unstructured":"Flinn, J., Park, S., and Satyanarayanan, M. Balancing Performance, Energy Conservation and Application Quality in Pervasive Computing. In Proceedings of the 22nd International Conference on Distributed Computing Systems (Vienna, Austria, July 2002)."},{"key":"e_1_3_2_1_45_1","first-page":"164","volume-title":"Proceedings of the European Conference on Computer Vision (ECCV)","author":"Gao S.","year":"2022","unstructured":"Gao, S., Zhou, C., Ma, C., Wang, X., and Yuan, J. Aiatrack: Attention in attention for transformer visual tracking. In Proceedings of the European Conference on Computer Vision (ECCV) (2022), Springer, pp. 146\u2013164."},{"key":"e_1_3_2_1_46_1","volume-title":"10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12)","author":"Gordon M. S.","year":"2012","unstructured":"Gordon, M. S., Jamshidi, D. A., Mahlke, S., Mao, Z. M., and Chen, X. COMET: Code Offload by Migrating Execution Transparently. In 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12) (Hollywood, CA, October 2012)."},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the 6th IEEE Workshop on Mobile Computing Systems and Applications","author":"Goyal S.","year":"2004","unstructured":"Goyal, S., and Carter, J. A Lightweight Secure Cyber Foraging Infrastructure for Resource-constrained Devices. In Proceedings of the 6th IEEE Workshop on Mobile Computing Systems and Applications (2004)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594383"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the IEEE International Conference on Cloud Engineering","author":"Ha K.","year":"2013","unstructured":"Ha, K., Pillai, P., Lewis, G., Simanta, S., Clinch, S., Davies, N., and Satyanarayanan, M. The Impact of Mobile Multimedia Applications on Data Center Consolidation. In Proceedings of the IEEE International Conference on Cloud Engineering (San Francisco, CA, March 2013)."},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the 4th ACM\/IEEE Symposium on Edge Computing","author":"Hsu K.-J.","year":"2019","unstructured":"Hsu, K.-J., Bhardwaj, K., and Gavrilovska, A. Couper: DNN Model Slicing for Visual Analytics Containers at the Edge. In Proceedings of the 4th ACM\/IEEE Symposium on Edge Computing (Arlington, VA, 2019)."},{"key":"e_1_3_2_1_51_1","volume-title":"Colibri: Efficient Collection of Fine-Grained Resource Metrics Necessary for Mobile Edge Computing. In 2024 IEEE\/ACM Symposium on Edge Computing (SEC)","author":"Hsu K.-J.","year":"2024","unstructured":"Hsu, K.-J., Bhardwaj, K., and Gavrilovska, A. Colibri: Efficient Collection of Fine-Grained Resource Metrics Necessary for Mobile Edge Computing. In 2024 IEEE\/ACM Symposium on Edge Computing (SEC) (Rome, Italy, 2024)."},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of HotMobile 2015","author":"Hu W.","year":"2015","unstructured":"Hu, W., Amos, B., Chen, Z., Ha, K., Richter, W., Pillai, P., Gilbert, B., Harkes, J., and Satyanarayanan, M. The Case for Offload Shaping. In Proceedings of HotMobile 2015 (Santa Fe, NM, 2015)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127540.3127543"},{"key":"e_1_3_2_1_54_1","volume-title":"2018 IEEE\/ACM Symposium on Edge Computing (SEC)","author":"Hung C.-C.","year":"2018","unstructured":"Hung, C.-C., Ananthanarayanan, G., Bodik, P., Golubchik, L., Yu, M., Bahl, P., and Philipose, M. VideoEdge: Processing Camera Streams using Hierarchical Clusters. In 2018 IEEE\/ACM Symposium on Edge Computing (SEC) (2018)."},{"key":"e_1_3_2_1_55_1","volume-title":"2016 IEEE\/ACM Symposium on Edge Computing (SEC)","author":"Jang M.","year":"2016","unstructured":"Jang, M., Lee, H., Schwan, K., and Bhardwaj, K. SOUL: An Edge-Cloud System for Mobile Applications in a Sensor-Rich World. In 2016 IEEE\/ACM Symposium on Edge Computing (SEC) (Washington, DC, 2016)."},{"key":"e_1_3_2_1_56_1","volume-title":"Application-Aware IoT Camera Virtualization for Video Analytics Edge Computing. In 2018 IEEE\/ACM Symposium on Edge Computing (SEC).","author":"Jang S. Y.","unstructured":"Jang, S. Y., Lee, Y., Shin, B., and Lee, D. Application-Aware IoT Camera Virtualization for Video Analytics Edge Computing. In 2018 IEEE\/ACM Symposium on Edge Computing (SEC)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEC62691.2024.00025"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/j.jpdc.2009.01.006","volume":"69","author":"Komatitsch D.","year":"2009","unstructured":"Komatitsch, D., Michea, D., and Erlebacher, G. Porting a high-order finite-element earthquake modeling application to NVIDIA graphics cards using CUDA. Journal of Parallel and Distributed Computing 69, 5 (2009), 451\u2013460.","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"e_1_3_2_1_59_1","first-page":"12178","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Kondratyuk D.","year":"2021","unstructured":"Kondratyuk, D., Yuan, L., Li, Y., Zhang, L., Tan, M., Brown, M., and Gong, B. Movinets: Mobile video networks for efficient video recognition. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2021), IEEE, pp. 12169\u201312178."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.pmcj.2010.07.004","volume":"6","author":"Kristensen M. D.","year":"2010","unstructured":"Kristensen, M. D., and Bouvin, N. O. Scheduling and development support in the Scavenger cyber foraging system. Pervasive and Mobile Computing 6, 6 (2010).","journal-title":"Pervasive and Mobile Computing"},{"key":"e_1_3_2_1_61_1","volume-title":"Advances in Neural Information Processing Systems (NIPS 2012)","author":"Krizhevsky A.","year":"2012","unstructured":"Krizhevsky, A., Sutskever, I., and Hinton, G. E. ImageNet Classification with Deep Convolutional Neural Networks. In Advances in Neural Information Processing Systems (NIPS 2012) (2012)."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"Lewis G. Software Architecture Strategies for Cyber-Foraging Systems. PhD thesis Vrije Universiteit Amsterdam 2016.","DOI":"10.1109\/WICSA.2016.38"},{"key":"e_1_3_2_1_63_1","first-page":"15040","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV)","author":"Li K.","year":"2023","unstructured":"Li, K., Wang, Y., He, Y., Li, Y., Wang, Y., and Qiao, Y. Unmasked teacher: Towards training-efficient video foundation models. In Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV) (2023), IEEE, pp. 15030\u201315040."},{"key":"e_1_3_2_1_64_1","first-page":"14051","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV)","author":"Li K.","year":"2023","unstructured":"Li, K., Wang, Y., He, Y., Li, Y., Wang, Y., Wang, L., and Qiao, Y. Uniformerv2: Spatiotemporal learning by arming image vits with video uniformer. In Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV) (2023), IEEE, pp. 14041\u201314051."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2022.3216771"},{"key":"e_1_3_2_1_66_1","volume-title":"Advances in Neural Information Processing Systems (NeurIPS)","volume":"35","author":"Lin L.","year":"2022","unstructured":"Lin, L., Fan, H., Zhang, Z., Xu, Y., and Ling, H. Swintrack: A simple and strong baseline for transformer tracking. In Advances in Neural Information Processing Systems (NeurIPS) (2022), vol. 35."},{"key":"e_1_3_2_1_67_1","first-page":"12122","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Liu Z.","year":"2022","unstructured":"Liu, Z., Zhang, H., Lin, Y., Cao, Y., Hu, H., Wei, Y., Zhang, Z., Guo, B., Zhang, L., Yuille, A., and Dai, J. Swin transformer v2: Scaling up capacity and resolution. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2022), IEEE, pp. 12113\u201312122."},{"key":"e_1_3_2_1_68_1","volume-title":"Proceedings of the 4th ACM\/IEEE Symposium on Edge Computing","author":"McChesney J.","year":"2019","unstructured":"McChesney, J., Wang, N., Tanwer, A., de Lara, E., and Varghese, B. DeFog: Fog Computing Benchmarks. In Proceedings of the 4th ACM\/IEEE Symposium on Edge Computing (Arlington, VA, 2019)."},{"key":"e_1_3_2_1_69_1","volume-title":"E. Cloudpath: A Multi-Tier Cloud Computing Framework. In Proceedings of the Second ACM\/IEEE Symposium on Edge Computing","author":"Mortazavi S. H.","year":"2017","unstructured":"Mortazavi, S. H., Salehe, M., Gomes, C. S., Phillips, C., and de Lara, E. Cloudpath: A Multi-Tier Cloud Computing Framework. In Proceedings of the Second ACM\/IEEE Symposium on Edge Computing (San Jose, CA, 2017)."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189041"},{"key":"e_1_3_2_1_71_1","volume-title":"Engineering, and Medicine. Energy-Efficient Technologies for the Dismounted Soldier","author":"National Academies of Sciences","year":"1997","unstructured":"National Academies of Sciences, Engineering, and Medicine. Energy-Efficient Technologies for the Dismounted Soldier. National Academy Press, 1997."},{"key":"e_1_3_2_1_72_1","volume-title":"Engineering, and Medicine. Powering the U.S. Army of the Future","author":"National Academies of Sciences","year":"2021","unstructured":"National Academies of Sciences, Engineering, and Medicine. Powering the U.S. Army of the Future. National Academy Press, 2021."},{"key":"e_1_3_2_1_73_1","volume-title":"Proceedings of the 4th ACM\/IEEE Symposium on Edge Computing","author":"Nikouei S. Y.","year":"2019","unstructured":"Nikouei, S. Y., Chen, Y., Aved, A., Blasch, E., and Faughnan, T. R. I-SAFE: Instant Suspicious Activity Identification at the Edge using Fuzzy Decision Making. In Proceedings of the 4th ACM\/IEEE Symposium on Edge Computing (Arlington, VA, 2019)."},{"key":"e_1_3_2_1_74_1","volume-title":"Proceedings of the 16th ACM Symposium on Operating Systems Principles (Saint-Malo","author":"Noble B. D.","year":"1997","unstructured":"Noble, B. D., Satyanarayanan, M., Narayanan, D., Tilton, E. J., Flinn, J., and Walker, K. R. Agile Application-Aware Adaptation for Mobility. In Proceedings of the 16th ACM Symposium on Operating Systems Principles (Saint-Malo, France, October 1997)."},{"key":"e_1_3_2_1_75_1","series-title":"Lecture Notes in Computer Science","volume-title":"-S. A Distributed Resource Furnishing to Offload Resource-Constrained Devices in Cyber Foraging Toward Pervasive Computing","author":"Ok M.","year":"2007","unstructured":"Ok, M., Seo, J.-W., and Park, M.-S. A Distributed Resource Furnishing to Offload Resource-Constrained Devices in Cyber Foraging Toward Pervasive Computing. In Network-Based Information Systems, T. Enokido, L. Barolli, and M. Takizawa, Eds., vol. 4658 of Lecture Notes in Computer Science. Springer Berlin \/ Heidelberg, 2007."},{"key":"e_1_3_2_1_76_1","volume-title":"Mobilenetv4 - universal models for the mobile ecosystem","author":"Qin D.","year":"2024","unstructured":"Qin, D., Leichner, C., Delakis, M., Fornoni, M., Luo, S., Yang, F., Wang, W., Banbury, C., Ye, C., Akin, B., Aggarwal, V., Zhu, T., Moro, D., and Howard, A. Mobilenetv4 - universal models for the mobile ecosystem, 2024."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEC62691.2024.00021"},{"key":"e_1_3_2_1_78_1","volume-title":"Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys 2011)","author":"Ra M.","year":"2011","unstructured":"Ra, M., Sheth, A., Mummert, L., Pillai, P., Wetherall, D., and Govindan, R. Odessa: Enabling Interactive Perception Applications on Mobile Devices. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys 2011) (Bethesda, MD, June 2011)."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1068\/p6794"},{"key":"e_1_3_2_1_80_1","volume-title":"MLPerf Mobile Inference Benchmark","author":"Reddi V. J.","year":"2022","unstructured":"Reddi, V. J., Kanter, D., Mattson, P., Duke, J., Nguyen, T., Chukka, R., Shiring, K., Tan, K.-S., Charlebois, M., Chou, W., El-Khamy, M., Hong, J., John, T. S., Trinh, C., Buch, M., Mazumder, M., Markovic, R., Atta, T., Cakir, F., Charkhabi, M., Chen, X., Chiang, C.-M., Dexter, D., Heo, T., Schmuelling, G., Shabani, M., and Zika, D. MLPerf Mobile Inference Benchmark, 2022."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"e_1_3_2_1_82_1","first-page":"4","volume":"8","author":"Satyanarayanan M.","year":"2009","unstructured":"Satyanarayanan, M., Bahl, P., Caceres, R., and Davies, N. The Case for VM-Based Cloudlets in Mobile Computing. IEEE Pervasive Computing 8, 4 (2009).","journal-title":"The Case for VM-Based Cloudlets in Mobile Computing. IEEE Pervasive Computing"},{"key":"e_1_3_2_1_83_1","volume-title":"Proceedings of the 22nd International Workshop on Mobile Computing Systems and Applications (HotMobile 2021)","author":"Satyanarayanan M.","year":"2021","unstructured":"Satyanarayanan, M., Beckmann, N., Lewis, G. A., and Lucia, B. The Role of Edge Offload for Hardware-Accelerated Mobile Devices. In Proceedings of the 22nd International Workshop on Mobile Computing Systems and Applications (HotMobile 2021) (2021)."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2019.2911878"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301293.3302357"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"crossref","unstructured":"Savchenko A. V. HSEmotion: High-speed emotion recognition library. Software Impacts 14.","DOI":"10.1016\/j.simpa.2022.100433"},{"key":"e_1_3_2_1_87_1","first-page":"14","author":"Sharifi M.","year":"2012","unstructured":"Sharifi, M., Kafaie, S., and Kashefi, O. A Survey and Taxonomy of Cyber Foraging of Mobile Devices. IEEE Communications Surveys & Tutorials 14 (2012).","journal-title":"A Survey and Taxonomy of Cyber Foraging of Mobile Devices. IEEE Communications Surveys & Tutorials"},{"key":"e_1_3_2_1_88_1","volume-title":"Introducing Real-World AI Benchmarks for AGI Progress. (https:\/\/www.turing.com\/blog\/rethinking-ai-benchmarks-for-real-world-impact). Last accessed on","author":"Siddharth J.","year":"2025","unstructured":"Siddharth, J. Introducing Real-World AI Benchmarks for AGI Progress. (https:\/\/www.turing.com\/blog\/rethinking-ai-benchmarks-for-real-world-impact). Last accessed on June 11, 2025."},{"key":"e_1_3_2_1_89_1","volume-title":"CA","author":"Streiffer C.","year":"2017","unstructured":"Streiffer, C., Srivastava, A., Orlikowski, V., Velasco, Y., Martin, V., Raval, N., Machanavajjhala, A., and Cox, L. P. ePrivateeye: to the Edge and Beyond! In Proceedings of the Second ACM\/IEEE Symposium on Edge Computing (San Jose, CA, 2017)."},{"key":"e_1_3_2_1_90_1","first-page":"10106","volume-title":"Proceedings of the 38th International Conference on Machine Learning (ICML)","volume":"139","author":"Tan M.","year":"2021","unstructured":"Tan, M., and Le, Q. V. Efficientnetv2: Smaller models and faster training. In Proceedings of the 38th International Conference on Machine Learning (ICML) (2021), vol. 139, PMLR, pp. 10096\u201310106."},{"key":"e_1_3_2_1_91_1","volume-title":"An Advanced Desktop Humanoid Robot for Emotional Support with Flexible Motion and Artificial Intelligence. In Companion of the 2024 ACM\/IEEE International Conference on Human-Robot Interaction","author":"Wang C.","year":"2024","unstructured":"Wang, C., Cao, C., Sun, X., Jiang, Y., and Liu, T. An Advanced Desktop Humanoid Robot for Emotional Support with Flexible Motion and Artificial Intelligence. In Companion of the 2024 ACM\/IEEE International Conference on Human-Robot Interaction (Boulder, CO, 2024)."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2018.00019"},{"key":"e_1_3_2_1_93_1","first-page":"19186","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Wang W.","year":"2023","unstructured":"Wang, W., Bao, H., Dong, L., Bjorck, J., Peng, Z., Liu, Q., Aggarwal, K., Mohammed, O. K., Singhal, S., Som, S., and Wei, F. Image as a foreign language: BEiT pretraining for vision and vision-language tasks. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2023), IEEE, pp. 19175\u201319186."},{"key":"e_1_3_2_1_94_1","first-page":"676","volume-title":"Proceedings of the European Conference on Computer Vision (ECCV)","author":"Wang Y.","year":"2024","unstructured":"Wang, Y., Li, K., Li, X., Yu, J., He, Y., Pei, B., Yan, Z., Xu, J., Shi, Y., Jiang, T., Li, S., Zhang, H., Huang, Y., Qiao, Y., and Wang, L. Internvideo2: Scaling foundation models for multimodal video understanding. In Proceedings of the European Conference on Computer Vision (ECCV) (2024), Springer, pp. 659\u2013676."},{"key":"e_1_3_2_1_95_1","volume-title":"Contrastive learning rivals masked image modeling in fine-tuning via feature distillation. arXiv preprint, arXiv:2205.14141","author":"Wei Y.","year":"2022","unstructured":"Wei, Y., Hu, H., Xie, Z., Zhang, Z., Cao, Y., Bao, J., Chen, D., and Guo, B. Contrastive learning rivals masked image modeling in fine-tuning via feature distillation. arXiv preprint, arXiv:2205.14141 (2022)."},{"key":"e_1_3_2_1_96_1","volume-title":"CloudSLAM: Edge Offloading of Stateful Vehicular Applications. In 2020 IEEE\/ACM Symposium on Edge Computing (SEC)","author":"Wright K.-L.","year":"2020","unstructured":"Wright, K.-L., Sivakumar, A., Steenkiste, P., Yu, B., and Bai, F. CloudSLAM: Edge Offloading of Stateful Vehicular Applications. In 2020 IEEE\/ACM Symposium on Edge Computing (SEC) (2020)."},{"key":"e_1_3_2_1_97_1","volume-title":"Proceedings of the 3rd International Conference on Mobile systems, Applications, and Services","author":"Ya-Yunn S.","year":"2005","unstructured":"Ya-Yunn, S., and Flinn, J. Slingshot: Deploying Stateful Services in Wireless Hotspots. In Proceedings of the 3rd International Conference on Mobile systems, Applications, and Services (2005)."},{"key":"e_1_3_2_1_98_1","volume-title":"Coca: Contrastive captioners are image-text foundation models. arXiv preprint 2205.01917","author":"Yu J.","year":"2022","unstructured":"Yu, J., Wang, Z., Vasudevan, V., Yeung, L., Seyedhosseini, M., and Wu, Y. Coca: Contrastive captioners are image-text foundation models. arXiv preprint 2205.01917 (2022). arXiv:2205.01917."},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240801"},{"key":"e_1_3_2_1_100_1","first-page":"7596","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"38","author":"Zheng Y.","year":"2024","unstructured":"Zheng, Y., Zhong, B., Liang, Q., Mo, Z., Zhang, S., and Li, X. Odtrack: Online dense temporal token learning for visual tracking. In Proceedings of the AAAI Conference on Artificial Intelligence (2024), vol. 38, pp. 7588\u20137596."},{"key":"e_1_3_2_1_101_1","unstructured":"Zhou L. and Xie X. Predicting and explaining AI model performance: A new approach to evaluation. (https:\/\/www.microsoft.com\/en-us\/research\/blog\/predicting-and-explaining-ai-model-performance-a-new-approach-to-evaluation\/). Last accessed on June 11 2025."}],"event":{"name":"SEC '25: Tenth ACM\/IEEE Symposium on Edge Computing","location":"the Hilton Arlington National Landing Arlington VA USA","acronym":"SEC '25","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","IEEE Computer Society"]},"container-title":["Proceedings of the Tenth ACM\/IEEE Symposium on Edge Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3769102.3770616","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T16:01:53Z","timestamp":1764777713000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3769102.3770616"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":101,"alternative-id":["10.1145\/3769102.3770616","10.1145\/3769102"],"URL":"https:\/\/doi.org\/10.1145\/3769102.3770616","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]},"assertion":[{"value":"2025-12-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}