Proceedings of the 21st Annual International Conference on Mobile Computing and Networking 2015
DOI: 10.1145/2789168.2790123
|View full text |Cite
|
Sign up to set email alerts
|

The Design and Implementation of a Wireless Video Surveillance System

Abstract: Internet-enabled cameras pervade daily life, generating a huge amount of data, but most of the video they generate is transmitted over wires and analyzed offline with a human in the loop. The ubiquity of cameras limits the amount of video that can be sent to the cloud, especially on wireless networks where capacity is at a premium. In this paper, we present Vigil, a real-time distributed wireless surveillance system that leverages edge computing to support real-time tracking and surveillance in enterprise camp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
132
0
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 226 publications
(134 citation statements)
references
References 30 publications
1
132
0
1
Order By: Relevance
“…The active cache technique can be applied to any vision application that has real-time constraints. For example, a surveillance control system [61] or video analysis application that tracks objects such as cars needs to hide the recognition delay to track the location of objects in real time. The trigger frame technique can be applied to any vision processing system to reduce the resources consumed.…”
Section: Discussionmentioning
confidence: 99%
“…The active cache technique can be applied to any vision application that has real-time constraints. For example, a surveillance control system [61] or video analysis application that tracks objects such as cars needs to hide the recognition delay to track the location of objects in real time. The trigger frame technique can be applied to any vision processing system to reduce the resources consumed.…”
Section: Discussionmentioning
confidence: 99%
“…Zhag et al [26] apply the data importance concept to eliminate redundant observations made by multiple surveillance cameras. In [27], visual data in a squash game is analyzed.…”
Section: Data Importancementioning
confidence: 99%
“…Although notion of data importance has been considered in various contexts [2,[25][26][27][28]30], our work is different from them in that we (1) enhance the total utility via adaptive sensor data transfer from IoT devices to the edge server based on data importance and (2) provide a real-time sensor data analytics framework at the network edge, while supporting generic data importance metrics.…”
Section: Related Workmentioning
confidence: 99%
“…Sensors detect intruders by infrared motion detectors (active and passive types), ultrasound motion detectors etc. The sensors may be directly wired to a control panel that provide sensor power, or may communicate wirelessly [3]. Using the active infrared as a sensor to detect intrusion has advantages of fast response, and is insensitive to mechanical and acoustics noise.…”
Section: Introductionmentioning
confidence: 99%