{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T11:41:25Z","timestamp":1725018085172},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,12]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9927837","type":"proceedings-article","created":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T19:43:02Z","timestamp":1670960582000},"source":"Crossref","is-referenced-by-count":2,"title":["DataXc: Flexible and efficient communication in microservices-based stream analytics pipelines"],"prefix":"10.1109","author":[{"given":"Giuseppe","family":"Coviello","sequence":"first","affiliation":[{"name":"NEC Laboratories America, Inc.,Princeton,NJ"}]},{"given":"Kunal","family":"Rao","sequence":"additional","affiliation":[{"name":"NEC Laboratories America, Inc.,Princeton,NJ"}]},{"given":"Ciro Giuseppe","family":"De Vita","sequence":"additional","affiliation":[{"name":"NEC Laboratories America, Inc.,Princeton,NJ"}]},{"given":"Gennaro","family":"Mellone","sequence":"additional","affiliation":[{"name":"NEC Laboratories America, Inc.,Princeton,NJ"}]},{"given":"Srimat","family":"Chakradhar","sequence":"additional","affiliation":[{"name":"NEC Laboratories America, Inc.,Princeton,NJ"}]}],"member":"263","reference":[{"key":"ref10","article-title":"AXIS Network Cameras","author":"communication","year":"0"},{"key":"ref11","article-title":"Cisco Video Surveillance IP Cameras","year":"0"},{"key":"ref12","article-title":"i-PRO Network Camera","year":"0"},{"key":"ref13","article-title":"Face Recognition Vendor Test (FRVT)","author":"patrick grother","year":"2019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-96627-0_29"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.12688\/openreseurope.14505.1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111014"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2017.28"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2018.8539409"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701233"},{"key":"ref4","article-title":"Video Analytics Market Statistics: 2027","author":"gaikwad","year":"2021"},{"key":"ref3","article-title":"How 5G aims to end network latency","year":"2019"},{"key":"ref6","article-title":"gRPC","year":"0"},{"key":"ref5","article-title":"NATS","year":"0"},{"key":"ref8","article-title":"Istio","year":"2022"},{"key":"ref7","article-title":"Linkerd","year":"2022"},{"key":"ref2","article-title":"How 5G low latency improves your mobile experiences","year":"2019"},{"key":"ref1","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref9","article-title":"HashiCorp Consul","year":"2022"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3445"},{"key":"ref22","article-title":"gRPC load balancing","year":"2017"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486300"},{"key":"ref23","article-title":"gRPC Load Balancing on Kubernetes without Tears","author":"morgan","year":"2018"}],"event":{"name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","location":"Falerna, Italy","start":{"date-parts":[[2022,9,12]]},"end":{"date-parts":[[2022,9,15]]}},"container-title":["2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9927523\/9927699\/09927837.pdf?arnumber=9927837","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T20:12:08Z","timestamp":1674504728000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9927837\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9927837","relation":{},"subject":[],"published":{"date-parts":[[2022,9,12]]}}}