{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,11]],"date-time":"2024-08-11T05:10:50Z","timestamp":1723353050880},"reference-count":53,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/cogmi48466.2019.00036","type":"proceedings-article","created":{"date-parts":[[2020,2,18]],"date-time":"2020-02-18T09:38:07Z","timestamp":1582018687000},"source":"Crossref","is-referenced-by-count":13,"title":["Social Edge Intelligence: Integrating Human and Artificial Intelligence at the Edge"],"prefix":"10.1109","author":[{"given":"Dong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Md Tahmid","family":"Rashid","sequence":"additional","affiliation":[]},{"given":"Lanyu","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Na","family":"Wei","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"farshchi","year":"2019","journal-title":"Integrating nvidia deep learning accelerator (nvdla) with risc-v soc on firesim"},{"key":"ref38","first-page":"23","author":"lane","year":"2016","journal-title":"Deepx A software accelerator for low-power deep learning inference on mobile devices"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2008.4562953"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2018.00039"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2018.00042"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.04.033"},{"key":"ref37","year":"0","journal-title":"NVIDIA EGX Edge Computing Platform"},{"key":"ref36","year":"0","journal-title":"AWS Deeplens"},{"key":"ref35","author":"han","year":"2015","journal-title":"Deep compression Compressing deep neural networks with pruning trained quantization and huffman coding"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737409"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15561-1_32"},{"key":"ref27","author":"nushi","year":"2018","journal-title":"Towards accountable ai Hybrid human-machine analyses for characterizing system failure"},{"key":"ref29","first-page":"1546","article-title":"Active learning with amazon mechanical turk","author":"laws","year":"2011","journal-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.2890173"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2530289"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2014.6846739"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2185677.2185737"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8257911"},{"key":"ref23","article-title":"On scalable and robust truth discovery in big data social media sensing applications","author":"zhang","year":"2018","journal-title":"IEEE Transactions on Big Data"},{"key":"ref26","first-page":"1017","article-title":"On human intellect and machine failures: Troubleshooting integrative machine learning systems","author":"nushi","year":"2017","journal-title":"AAAI"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0553-0"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30141-7_6"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600679"},{"key":"ref53","article-title":"Scalable privacy-preserving participant selection for mobile crowdsensing systems: Participant grouping and secure group bidding","author":"li","year":"2018","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/PADSW.2018.8644556"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2019.00039"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/1097-0142(20010415)91:8+<1615::AID-CNCR1175>3.0.CO;2-L"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.54"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1109\/RTSS46320.2019.00040","article-title":"Towards ai-empowered optimal task batching in intelligent edge systems","author":"zhang","year":"2019","journal-title":"The 40th IEEE Real-Time Systems Symposium (RTSS) (RTSS 2019)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.196"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2019.8847125"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS47876.2019.00097"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3132211.3132459"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v30i1.10011","article-title":"Learning deep representation from big and heterogeneous data for traffic accident inference","author":"chen","year":"2016","journal-title":"THIRTIETH AAAI Conference on Artificial Intelligence"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8621996"},{"key":"ref19","author":"wang","year":"2015","journal-title":"Social Sensing Building Reliable Systems on Unreliable Data"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3110109"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HotWeb.2016.12"},{"key":"ref5","article-title":"Socialcar: A task allocation framework for social media driven vehicular network sensing systems","author":"rashid","year":"2019","journal-title":"to appear in The 15th International Conference on Mobile Ad-hoc and Sensor Networks (MSN 19)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00123"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3341161.3342912"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022244"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2014.2311586"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130605"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840710"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00860"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2013.29"},{"key":"ref42","author":"konecny","year":"2016","journal-title":"Federated learning Strategies for improving communication efficiency"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737409"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2012.6275819"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2019.00066"}],"event":{"name":"2019 IEEE First International Conference on Cognitive Machine Intelligence (CogMI)","location":"Los Angeles, CA, USA","start":{"date-parts":[[2019,12,12]]},"end":{"date-parts":[[2019,12,14]]}},"container-title":["2019 IEEE First International Conference on Cognitive Machine Intelligence (CogMI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8977235\/8998777\/08998993.pdf?arnumber=8998993","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,15]],"date-time":"2022-10-15T21:14:16Z","timestamp":1665868456000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8998993\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/cogmi48466.2019.00036","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}