Potluck: Cross-Application Approximate Deduplication for Computation-Intensive Mobile Applications
暂无分享,去创建一个
[1] A. Broggi,et al. Pedestrian Detection using Infrared images and Histograms of Oriented Gradients , 2006, 2006 IEEE Intelligent Vehicles Symposium.
[2] Tom Drummond,et al. Machine Learning for High-Speed Corner Detection , 2006, ECCV.
[3] Junfeng Yang,et al. Secure Deduplication of General Computations , 2015, USENIX Annual Technical Conference.
[4] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[5] Kalapriya Kannan,et al. SEeSAW - Similarity Exploiting Storage for Accelerating Analytics Workflows , 2016, HotStorage.
[6] Yuan Yu,et al. TensorFlow: A system for large-scale machine learning , 2016, OSDI.
[7] G LoweDavid,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004 .
[8] Deborah Estrin,et al. Diversity in smartphone usage , 2010, MobiSys '10.
[9] Natalie D. Enright Jerger,et al. Doppelgänger: A cache for approximate computing , 2015, 2015 48th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[10] Xiaoyan Sun,et al. Lossless Compression of JPEG Coded Photo Collections , 2016, IEEE Transactions on Image Processing.
[11] Michael Isard,et al. DryadInc: Reusing Work in Large-scale Computations , 2009, HotCloud.
[12] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[13] James Lee Hafner,et al. Efficient Color Histogram Indexing for Quadratic Form Distance Functions , 1995, IEEE Trans. Pattern Anal. Mach. Intell..
[14] Alex Krizhevsky,et al. Learning Multiple Layers of Features from Tiny Images , 2009 .
[15] Thomas S. Huang,et al. Deep Networks for Image Super-Resolution with Sparse Prior , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[16] Jun Wu,et al. Joint Compression of Near-Duplicate Videos , 2017, IEEE Transactions on Multimedia.
[17] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[18] Mahadev Satyanarayanan,et al. Towards wearable cognitive assistance , 2014, MobiSys.
[19] Lin Zhong,et al. Starfish: Efficient Concurrency Support for Computer Vision Applications , 2015, MobiSys.
[20] Cecilia Mascolo,et al. LEO: scheduling sensor inference algorithms across heterogeneous mobile processors and network resources , 2016, MobiCom.
[21] I. Jolliffe. Principal Component Analysis , 2002 .
[22] Leonard McMillan,et al. Plenoptic Modeling: An Image-Based Rendering System , 2023 .
[23] Jason Flinn,et al. Cyber Foraging: Bridging Mobile and Cloud Computing , 2012, Cyber Foraging: Bridging Mobile and Cloud Computing.
[24] Alec Wolman,et al. MCDNN: An Approximation-Based Execution Framework for Deep Stream Processing Under Resource Constraints , 2016, MobiSys.
[25] A. Shashua,et al. Pedestrian detection for driving assistance systems: single-frame classification and system level performance , 2004, IEEE Intelligent Vehicles Symposium, 2004.
[26] Aakanksha Chowdhery,et al. The Design and Implementation of a Wireless Video Surveillance System , 2015, MobiCom.
[27] Christopher Hunt,et al. Notes on the OpenSURF Library , 2009 .
[28] Emin Gün Sirer,et al. Experience with an Object Reputation System for Peer-to-Peer Filesharing , 2006, NSDI.
[29] Mickaël Raulet,et al. Ultra high definition HEVC DASH data set , 2014, MMSys '14.
[30] Paramvir Bahl,et al. Glimpse: Continuous, Real-Time Object Recognition on Mobile Devices , 2015, SenSys.
[31] Mahadev Satyanarayanan,et al. Agile application-aware adaptation for mobility , 1997, SOSP.
[32] Christopher G. Harris,et al. A Combined Corner and Edge Detector , 1988, Alvey Vision Conference.
[33] Lenin Ravindranath,et al. Nectar: Automatic Management of Data and Computation in Datacenters , 2010, OSDI.
[34] James M. Keller,et al. A fuzzy K-nearest neighbor algorithm , 1985, IEEE Transactions on Systems, Man, and Cybernetics.
[35] Xuanzhe Liu,et al. Understanding Diverse Smarpthone Usage Patterns from Large-Scale Appstore-Service Profiles , 2017 .
[36] Jianbo Shi,et al. DeepEdge: A multi-scale bifurcated deep network for top-down contour detection , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[37] Alec Wolman,et al. Outatime: Using Speculation to Enable Low-Latency Continuous Interaction for Mobile Cloud Gaming , 2015, MobiSys.
[38] P. Mermelstein,et al. Distance measures for speech recognition, psychological and instrumental , 1976 .
[39] David Chu,et al. FlashBack: Immersive Virtual Reality on Mobile Devices via Rendering Memoization , 2016, MobiSys.
[40] Nicole Immorlica,et al. Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.
[41] Kun Zhou,et al. Real-time KD-tree construction on graphics hardware , 2008, SIGGRAPH Asia '08.