rfc9699.original.xml   rfc9699.xml 
<?xml version='1.0' encoding='utf-8'?> <?xml version='1.0' encoding='UTF-8'?>
<!DOCTYPE rfc [ <!DOCTYPE rfc [
<!ENTITY nbsp "&#160;"> <!ENTITY nbsp "&#160;">
<!ENTITY zwsp "&#8203;"> <!ENTITY zwsp "&#8203;">
<!ENTITY nbhy "&#8209;"> <!ENTITY nbhy "&#8209;">
<!ENTITY wj "&#8288;"> <!ENTITY wj "&#8288;">
]> ]>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" category="info
" docName="draft-ietf-mops-ar-use-case-18" obsoletes="" updates="" submissionTyp <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" category="info
e="IETF" xml:lang="en" tocInclude="true" symRefs="true" sortRefs="true" version= " docName="draft-ietf-mops-ar-use-case-18" number="9699" consensus="true" obsole
"3"> tes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" symRefs=
<!-- xml2rfc v2v3 conversion 3.11.1 --> "true" sortRefs="true" version="3">
<front> <front>
<title abbrev="MOPS AR Use Case">Media Operations Use Case for an Extended R <title abbrev="XR Use Case">Media Operations Use Case for an Extended
eality Application on Edge Computing Infrastructure</title> Reality Application on Edge Computing Infrastructure</title>
<seriesInfo name="Internet-Draft" value="draft-ietf-mops-ar-use-case-18"/> <seriesInfo name="RFC" value="9699"/>
<author fullname="Renan Krishna" initials="R." surname="Krishna"> <author fullname="Renan Krishna" initials="R." surname="Krishna">
<address> <address>
<postal> <postal>
<country>United Kingdom</country> <country>United Kingdom</country>
</postal> </postal>
<email>renan.krishna@gmail.com</email> <email>renan.krishna@gmail.com</email>
<uri/>
</address> </address>
</author> </author>
<author initials="A." surname="Rahman" fullname="Akbar Rahman"> <author initials="A." surname="Rahman" fullname="Akbar Rahman">
<organization>Ericsson</organization> <organization>Ericsson</organization>
<address> <address>
<postal> <postal>
<street>349 Terry Fox Drive</street> <street>349 Terry Fox Drive</street>
<city>Ottawa Ontario</city> <city>Ottawa</city>
<region>Ontario</region>
<code>K2K 2V6</code> <code>K2K 2V6</code>
<country>Canada</country> <country>Canada</country>
<region/>
</postal> </postal>
<phone/>
<email>Akbar.Rahman@ericsson.com</email> <email>Akbar.Rahman@ericsson.com</email>
<uri/>
</address> </address>
</author> </author>
<date /> <date month="December" year="2024"/>
<area>Operations and Management</area> <area>OPS</area>
<workgroup> MOPS</workgroup> <workgroup>mops</workgroup>
<abstract>
<t>
This document explores the issues involved in the use of Edge Com
puting resources to operationalize media use cases
that involve Extended Reality (XR) applications. In particular, t
his document discusses those applications that run on devices having different
form factors (such as different physical sizes and shapes) and ne
ed Edge computing resources to mitigate the effect of problems such as a need to
support interactive communication
requiring low latency, limited battery power, and heat dissipatio
n from those devices. The intended audience for this document are network
operators who are interested in providing edge computing resource
s to operationalize the requirements of such applications.
This document discusses the expected behavior of XR applications
which can be used to manage the traffic.
In addition, the document discusses the service requirements of X
R applications to be able to run on the network.
<abstract>
<t>This document explores the issues involved in the use of edge
computing resources to operationalize a media use case that involves an
Extended Reality (XR) application. In particular, this document
discusses an XR application that can run on devices having different
form factors (such as different physical sizes and shapes) and needs edge
computing resources to mitigate the effect of problems such as the need
to support interactive communication requiring low latency, limited
battery power, and heat dissipation from those devices. This document
also discusses the expected behavior of XR applications, which can be
used to manage traffic, and the service requirements for XR applications
to be able to run on the network. Network operators who are interested
in providing edge computing resources to operationalize the requirements
of such applications are the intended audience for this document.
</t> </t>
</abstract> </abstract>
</front> </front>
<middle> <middle>
<section anchor="introduction" numbered="true" toc="default"> <section anchor="introduction" numbered="true" toc="default">
<name>Introduction</name> <name>Introduction</name>
<t> <t>
Extended Reality (XR) is a term that includes Augmented Reality ( Extended Reality (XR) is a term that includes Augmented
AR), Virtual Reality (VR) and Mixed Reality (MR) <xref target="XR" format="defau Reality (AR), Virtual Reality (VR), and Mixed Reality (MR)
lt"/>. <xref target="XR" format="default"/>. AR combines the real
AR combines the real and virtual, is interactive and is aligned t and virtual, is interactive, and is aligned to the physical
o the physical world of the user <xref target="AUGMENTED_2" format="default"/>. world of the user <xref target="AUGMENTED_2"
On the other hand, format="default"/>. On the other hand, VR places the user
VR places the user inside a virtual environment generated by a co inside a virtual environment generated by a computer <xref
mputer <xref target="AUGMENTED" format="default"/>.MR merges the real and virtua target="AUGMENTED" format="default"/>. MR merges the real and
l world along a virtual along a continuum that connects a completely real
continuum that connects completely real environment at one end to environment at one end to a completely virtual environment at
a completely virtual environment at the other end. In this continuum, all the other end. In this continuum, all combinations of the real
combinations of the real and virtual are captured <xref target="A and virtual are captured <xref target="AUGMENTED"
UGMENTED" format="default"/>. format="default"/>.
</t> </t>
<t>
XR applications will bring several requirements for the network and t <t>
he XR applications have several requirements for the network and the
mobile devices running these applications. Some XR applications s mobile devices running these applications. Some XR applications
uch as AR require a real-time processing of video streams to (such as AR applications) require real-time processing of video
recognize specific objects. This is then used to overlay informat streams to recognize specific objects. This processing is then
ion on the used to overlay information on the video being displayed to the
video being displayed to the user. In addition, XR applications user. In addition, other XR applications (such as AR and VR applicat
such as AR and VR will also require generation of new video ions) also
frames to be played to the user. Both the real-time processing of require generation of new video frames to be played to the
video streams and the generation of overlay information user. Both the real-time processing of video streams and the
are computationally intensive tasks that generate heat <xref targ generation of overlay information are computationally intensive
et="DEV_HEAT_1" format="default"/>, <xref target="DEV_HEAT_2" format="default"/> tasks that generate heat <xref target="DEV_HEAT_1"
and drain battery power <xref target="BATT_DRAIN" format="default format="default"/> <xref target="DEV_HEAT_2" format="default"/>
"/> on the mobile device running the XR application. and drain battery power <xref target="BATT_DRAIN"
Consequently, in order to run applications with XR characteristic format="default"/> on the mobile device running the XR
s application. Consequently, in order to run applications with XR
on mobile devices, computationally intensive tasks need to be off characteristics on mobile devices, computationally intensive tasks
loaded to resources provided by Edge Computing. need to be offloaded to resources provided by edge computing.
</t> </t>
<t> <t>
Edge Computing is an emerging paradigm where for the purpose of t Edge computing is an emerging paradigm where, for the purpose of
his document, computing resources and storage are made available in close this document, computing resources and storage are made available in close
network proximity at the edge of the Internet to mobile devices a network proximity at the edge of the Internet to mobile devices a
nd sensors <xref target="EDGE_1" format="default"/>, <xref target="EDGE_2" forma nd sensors <xref target="EDGE_1" format="default"/> <xref target="EDGE_2" format
t="default"/>. A computing resource or storage is in ="default"/>. A computing resource or storage is in
close network proximity to a mobile device or sensor if there is a short and high-capacity network path to it close network proximity to a mobile device or sensor if there is a short and high-capacity network path to it
such that the latency and bandwidth requirements of applications running on those mobile devices or sensors can be met. such that the latency and bandwidth requirements of applications running on those mobile devices or sensors can be met.
These edge computing devices use cloud technologies that enable t hem to support offloaded XR applications. In particular, cloud implementation te chniques <xref target="EDGE_3" format="default"/> such as the follows can be dep loyed: These edge computing devices use cloud technologies that enable t hem to support offloaded XR applications. In particular, cloud implementation te chniques <xref target="EDGE_3" format="default"/> such as the following can be d eployed:
</t> </t>
<ul spacing="normal"> <dl spacing="normal">
<li>Disaggregation (using SDN to break vertically integrated systems int <dt>Disaggregation:</dt><dd>Using Software-Defined Networking (SDN) to b
o independent components- these components can have open interfaces which are st reak vertically integrated systems into independent components. These components
andard, well documented and not proprietary), can have open interfaces that are standard, well documented, and non-proprietar
</li> y.</dd>
<li>Virtualization (being able to run multiple independent copies of tho
se components such as SDN Controller apps, Virtual Network Functions on a <dt>Virtualization:</dt><dd>Being able to run multiple independent copie
common hardware platform).</li> s of those components, such as SDN Controller applications and Virtual Network F
<li>Commoditization (being able to elastically scale those virtual compo unctions, on a
nents across commodity hardware as the workload dictates).</li> common hardware platform.</dd>
</ul> <dt>Commoditization:</dt><dd>Being able to elastically scale those virtu
al components across commodity hardware as the workload dictates.</dd>
</dl>
<t> <t>
Such techniques enable XR applications requiring low-latency and high bandwidth to be delivered by proximate edge devices. This is because the d isaggregated components can run on proximate edge devices rather than on remote cloud several hops away and deliver low latency, high bandwidth service to offlo aded applications <xref target="EDGE_2" format="default"/>. Such techniques enable XR applications that require low latency and high bandwidth to be delivered by proximate edge devices. This is because th e disaggregated components can run on proximate edge devices rather than on a re mote cloud several hops away and deliver low-latency, high-bandwidth service to offloaded applications <xref target="EDGE_2" format="default"/>.
</t> </t>
<t> <t>
This document discusses the issues involved when edge computing resourc This document discusses the issues involved when edge computing
es are offered by network operators to resources are offered by network operators to operationalize the
operationalize the requirements of XR applications running on devices w requirements of XR applications running on devices with various form
ith various form factors. A network operator for the purposes of this factors. For the purpose of this document, a network operator is any
document is any organization or individual that manages or operates the organization or individual that manages or operates the computing
compute resources or storage in close network proximity resources or storage in close network proximity to a mobile device
to a mobile device or sensors. Examples of form factors or sensor. Examples of form factors include the following: 1)
include Head Mounted Displays (HMD) such as Optical-see through HMDs an head-mounted displays (HMDs), such as optical see-through HMDs and
d video-see-through HMDs and Hand-held displays. video see-through HMDs, 2) hand-held displays, and 3) smartphones
Smart phones with video cameras and location sensing capabilities using with video cameras and location-sensing capabilities using systems
systems such as a global navigation satellite system (GNSS) are another example such as a global navigation satellite system (GNSS). These devices
of such devices. These devices have limited have limited battery capacity and dissipate heat when running. Also,
battery capacity and dissipate heat when running. Besides as the user o as the user of these devices moves around as they run the XR
f these devices moves around as they run the application, the wireless latency and bandwidth available to the
XR application, the wireless latency and bandwidth available to the dev devices fluctuates, and the communication link itself might fail. As
ices fluctuates and the communication link itself a result, algorithms such as those based on Adaptive Bitrate (ABR)
might fail. As a result, algorithms such as those based on adaptive-bit techniques that base their policy on heuristics or models of
-rate techniques that base their policy on heuristics deployment perform sub-optimally in such dynamic environments <xref
or models of deployment perform sub-optimally in such dynamic environme target="ABR_1" format="default"/>. In addition, network operators
nts <xref target="ABR_1" format="default"/>. can expect that the parameters that characterize the expected
In addition, network operators can expect that the parameters that char behavior of XR applications are heavy-tailed. Heaviness of tails is
acterize the expected behavior of XR applications defined as the difference from the normal distribution in the
are heavy-tailed. Heaviness of tails is defined as the difference from proportion of the values that fall a long way from the mean <xref
the normal distribution in the proportion of the values that fall a long way fro target="HEAVY_TAIL_3" format="default"/>. Such workloads require
m the mean <xref target="HEAVY_TAIL_3" format="default"/>. Such workloads requir appropriate resource management policies to be used on the edge.
e appropriate resource management policies to be used on the Edge. The service requirements of XR applications are also challenging
The service requirements of XR applications are also challenging when c when compared to current video applications. In particular, several
ompared to the current video applications. Quality-of-Experience (QoE) factors such as motion sickness are
In particular several Quality of Experience (QoE) factors such as motio unique to XR applications and must be considered when
n sickness are unique to XR applications and must be considered when operational operationalizing a network.
izing a network.
This document motivates these issues with a use-case that is pres ented in the following sections. This document examines these issues with the use case presented i n the following section.
</t> </t>
</section> </section>
<section anchor="use_case" numbered="true" toc="default"> <section anchor="use_case" numbered="true" toc="default">
<name>Use Case</name> <name>Use Case</name>
<t> <t>
A use case is now described that involves an application with This use case involves an XR application running on a mobile device. Consider
XR systems' characteristics. Consider a group of tourists who ar a group of tourists who are taking a tour around the historical site of the
e being Tower of London. As they move around the site and within the historical
conducted in a tour around the historical site of the Tower of L buildings, they can watch and listen to historical scenes in 3D that are
ondon. generated by the XR application and then overlaid by their XR headsets onto
As they move around the site and within the historical buildings their real-world view. The headset continuously updates their view as they
, they can move around.
watch and listen to historical scenes in 3D that are generated b
y the XR application and then
overlaid by their XR headsets onto their real-world view. The he
adset then continuously updates their view as they move around.
</t> </t>
<t> <t>
The XR application first processes the scene that the walking to urist is watching in real-time and identifies objects The XR application first processes the scene that the walking to urist is watching in real time and identifies objects
that will be targeted for overlay of high-resolution videos. It t hen generates high-resolution 3D images that will be targeted for overlay of high-resolution videos. It t hen generates high-resolution 3D images
of historical scenes related to the perspective of the tourist i of historical scenes related to the perspective of the tourist in
n real-time. These generated video images are then real time. These generated video images are then
overlaid on the view of the real-world as seen by the tourist. overlaid on the view of the real world as seen by the tourist.
</t> </t>
<t> <t>
This processing of scenes This processing of scenes
and generation of high-resolution images is now discussed in grea ter detail. and generation of high-resolution images are discussed in greater detail below.
</t> </t>
<section anchor="processsing_of_scenes" numbered="true" toc="default"> <section anchor="processsing_of_scenes" numbered="true" toc="default">
<name>Processing of Scenes</name> <name>Processing of Scenes</name>
<t> <t>
The task of processing a scene can be broken down into a pipeline The task of processing a scene can be broken down into a pipeline
of three consecutive subtasks namely tracking, followed by an acquisition of a of three consecutive subtasks: tracking, acquisition of a
model of the real world, and finally registration <xref target="A model of the real world, and registration <xref target="AUGMENTED
UGMENTED" format="default"/>. " format="default"/>.
</t>
<t>
Tracking: The XR application that runs on the mobile device needs
to track the six-dimensional pose (translational in the three perpendicular axe
s and rotational about those three axes)
of the user's head, eyes and the objects that are in view <xref t
arget="AUGMENTED" format="default"/>. This requires tracking natural features (f
or example points or edges of objects) that are then used in the next stage of t
he pipeline.
</t>
<t>
Acquisition of a model of the real world: The tracked natural fea
tures are used to develop a model of the real world. One of the ways this is don
e is to develop an annotated
point cloud (a set of points in space that are annotated with des
criptors) based model that is then stored in a database. To ensure that this dat
abase can be scaled up, techniques such as
combining a client-side simultaneous tracking and mapping and a s
erver-side localization
are used to construct a model of the real world <xref target="SLA
M_1" format="default"/>, <xref target="SLAM_2" format="default"/>, <xref target=
"SLAM_3" format="default"/>, <xref target="SLAM_4" format="default"/>. Another m
odel that can be built is based on polygon mesh and texture mapping technique. T
he polygon mesh encodes a 3D object's shape which is expressed as a collection o
f small flat surfaces that are polygons. In texture mapping, color patterns are
mapped on to an object's surface. A third modelling technique uses a 2D lightfie
ld that describes the intensity or color of the light rays arriving at a single
point from arbitrary directions. Such a 2D lightfield is stored as a two-dimensi
onal table. Assuming distant light sources, the single point is approximately va
lid for small scenes. For larger scenes, many 3D positions are additionally stor
ed making the table 5D. A set of all such points (either 2D or 5D lightfield) ca
n then be used to construct a model of the real world <xref target="AUGMENTED" f
ormat="default"/>.
</t> </t>
<t>
Registration: The coordinate systems, brightness, and color
of virtual and real objects need to be aligned with each other an
d this process is called registration <xref target="REG" format="default"/>.
Once the
natural features are tracked as discussed above, virtual objects
are geometrically aligned with those features by geometric registration. This is
followed by
resolving occlusion that can occur between virtual and the real o
bjects <xref target="OCCL_1" format="default"/>, <xref target="OCCL_2" format="d
efault"/>.
The XR application also applies photometric registration <xref ta <dl newline="false" spacing="normal">
rget="PHOTO_REG" format="default"/>
by aligning the brightness and color between the virtual and <dt>Tracking:</dt><dd>The XR application that runs on the mobile
real objects. Additionally, algorithms that calculate global illu device
mination of both the virtual and real objects <xref target="GLB_ILLUM_1" format= needs to track the six-dimensional pose (translational in the
"default"/>, three perpendicular axes and rotational about those three
<xref target="GLB_ILLUM_2" format="default"/> are executed. Vario axes) of the user's head, eyes, and objects that are in
us algorithms to deal with artifacts generated by lens distortion <xref target=" view <xref target="AUGMENTED" format="default"/>. This
LENS_DIST" format="default"/>, requires tracking natural features (for example, points or
blur <xref target="BLUR" format="default"/>, noise <xref target=" edges of objects) that are then used in the next stage of the
NOISE" format="default"/> etc. are also required. pipeline.</dd>
</t>
<dt>Acquisition of a model of the real world:</dt><dd>The
tracked natural features are used to develop a model of the
real world. One of the ways this is done is to develop a model ba
sed on an
annotated point cloud (a set of points in space that are
annotated with descriptors) that is then stored in
a database. To ensure that this database can be scaled up,
techniques such as combining client-side simultaneous
tracking and mapping with server-side localization are used
to construct a model of the real world <xref target="SLAM_1"
format="default"/> <xref target="SLAM_2" format="default"/>
<xref target="SLAM_3" format="default"/> <xref target="SLAM_4"
format="default"/>. Another model that can be built is based
on a polygon mesh and texture mapping technique. The polygon
mesh encodes a 3D object's shape, which is expressed as a
collection of small flat surfaces that are polygons. In
texture mapping, color patterns are mapped onto an object's
surface. A third modeling technique uses a 2D lightfield that
describes the intensity or color of the light rays arriving at
a single point from arbitrary directions. Such a 2D lightfield
is stored as a two-dimensional table. Assuming distant light
sources, the single point is approximately valid for small
scenes. For larger scenes, many 3D positions are additionally
stored, making the table 5D. A set of all such points (either a
2D or 5D lightfield) can then be used to construct a model of
the real world <xref target="AUGMENTED"
format="default"/>.</dd>
<dt>Registration:</dt><dd>The coordinate systems,
brightness, and color of virtual and real objects need to be
aligned with each other; this process is called
"registration" <xref target="REG" format="default"/>. Once the
natural features are tracked as discussed above, virtual
objects are geometrically aligned with those features by
geometric registration. This is followed by resolving
occlusion that can occur between virtual and real objects
<xref target="OCCL_1" format="default"/> <xref target="OCCL_2"
format="default"/>.
The XR application also applies photometric registration <xref
target="PHOTO_REG" format="default"/> by aligning
brightness and color between the virtual and real
objects. Additionally, algorithms that calculate global
illumination of both the virtual and real objects <xref
target="GLB_ILLUM_1" format="default"/> <xref
target="GLB_ILLUM_2" format="default"/> are executed. Various
algorithms are also required to deal with artifacts generated by
lens distortion
<xref target="LENS_DIST" format="default"/>, blur <xref
target="BLUR" format="default"/>, noise <xref target="NOISE"
format="default"/>, etc.</dd>
</dl>
</section> </section>
<section anchor="generation" numbered="true" toc="default"> <section anchor="generation" numbered="true" toc="default">
<name>Generation of Images</name> <name>Generation of Images</name>
<t> <t>
The XR application must generate a high-quality video that has th The XR application must generate a high-quality video that has the
e properties described in the previous step properties described above and overlay the video on the XR device's
and overlay the video on the XR device's display- a step called s display. This step is called "situated visualization". A situated
ituated visualization. A situated visualization is a visualization in which the visualization is a visualization in which the virtual objects that need to
virtual objects that need to be seen by the XR user are overlaid correctly on th be seen by the XR user are overlaid correctly on the real world. This
e real world. This entails dealing with registration errors that entails dealing with registration errors that may arise, ensuring that
may arise, ensuring that there is no visual interference <xref ta there is no visual interference <xref target="VIS_INTERFERE"
rget="VIS_INTERFERE" format="default"/>, and finally maintaining format="default"/>, and finally maintaining temporal coherence by adapting
temporal coherence by adapting to the movement of user's eyes and to the movement of user's eyes and head.
head.
</t> </t>
</section> </section>
</section> </section>
<section anchor="Req" numbered="true" toc="default"> <section anchor="Req" numbered="true" toc="default">
<name>Technical Challenges and Solutions</name> <name>Technical Challenges and Solutions</name>
<t> <t>
As discussed in section 2, the components of XR applications perform task As discussed in <xref target="use_case"/>, the components of XR
s such as real-time generation and processing of applications perform tasks that are computationally intensive, such as
high-quality video content that are computationally intensive. Th real-time generation and processing of high-quality video content.
is section will discuss the challenges such applications can face as a consequen This section discusses the challenges such applications can face as a
ce.</t> <t>As a result of performing computationally intensive tasks on XR devic consequence and offers some solutions.
es such as XR glasses, </t>
excessive heat is generated by the chip-sets that are involved <t>As a result of performing computationally intensive tasks on XR devices
in the computation <xref target="DEV_HEAT_1" format="default"/>, such as XR glasses,
<xref target="DEV_HEAT_2" format="default"/>. Additionally, excessive heat is generated by the chipsets that are involved
in the computation <xref target="DEV_HEAT_1" format="default"/> <
xref target="DEV_HEAT_2" format="default"/>. Additionally,
the battery on such devices discharges quickly when running the battery on such devices discharges quickly when running
such applications <xref target="BATT_DRAIN" format="default"/>. such applications <xref target="BATT_DRAIN" format="default"/>.
</t> </t>
<t> <t>
A solution to the heat dissipation and battery drainage problem is to off load the processing and video generation tasks A solution to problem of heat dissipation and battery drainage is to offl oad the processing and video generation tasks
to the remote cloud. However, running such tasks on the cloud is not feas ible as the end-to-end delays to the remote cloud. However, running such tasks on the cloud is not feas ible as the end-to-end delays
must be within the order of a few milliseconds. Additionally, suc h applications require high bandwidth must be within the order of a few milliseconds. Additionally, suc h applications require high bandwidth
and low jitter to provide a high QoE to the user. In order to ach ieve such hard timing constraints, computationally intensive and low jitter to provide a high QoE to the user. In order to ach ieve such hard timing constraints, computationally intensive
tasks can be offloaded to Edge devices. tasks can be offloaded to edge devices.
</t> </t>
<t> <t>
Another requirement for our use case and similar applications, such as 36
Another requirement for our use case and similar applications such as 360 0-degree streaming (streaming of video that represents a view in every direction
-degree streaming (streaming of video that represents a view in every direction in 3D space), is that the display on
in 3D space) is that the display on
the XR device should synchronize the visual input with the way the user i s moving their head. This synchronization the XR device should synchronize the visual input with the way the user i s moving their head. This synchronization
is necessary to avoid motion sickness that results from a time-lag betwee is necessary to avoid motion sickness that results from a time lag betwee
n when the user moves their head and n when the user moves their head and
when the appropriate video scene is rendered. This time lag is often call when the appropriate video scene is rendered. This time lag is often call
ed "motion-to-photon" delay. ed "motion-to-photon delay".
Studies have shown <xref target="PER_SENSE" format="default"/>, <xref target="XR Studies have shown that this delay
" format="default"/>, <xref target="OCCL_3" format="default"/> that this delay can be at most 20 ms and preferably between 7-15 ms in
can be at most 20ms and preferably between 7-15ms in order to avoid motion sickness <xref target="PER_SENSE" format="default"/> <xref
order to avoid the motion sickness problem. Out of these 20ms, display technique target="XR" format="default"/> <xref target="OCCL_3" format="default"/>. Out of
s including the refresh these 20 ms, display techniques including the refresh
rate of write displays and pixel switching take 12-13ms <xref target="OCCL_3" fo rate of write displays and pixel switching take 12-13 ms <xref target="OCCL_3" f
rmat="default"/>, <xref target="CLOUD" format="default"/>. This leaves 7-8ms for ormat="default"/> <xref target="CLOUD" format="default"/>. This leaves 7-8 ms fo
the processing of r the processing of
motion sensor inputs, graphic rendering, and round-trip-time (RTT) between the X motion sensor inputs, graphic rendering, and round-trip time (RTT) between the X
R device and the Edge. R device and the edge.
The use of predictive techniques to mask latencies has been considered as a miti gating strategy to reduce motion sickness <xref target="PREDICT" format="default "/>. The use of predictive techniques to mask latencies has been considered as a miti gating strategy to reduce motion sickness <xref target="PREDICT" format="default "/>.
In addition, Edge Devices that are proximate to the user might be used to offloa In addition, edge devices that are proximate to the user might be used to offloa
d these computationally intensive tasks. d these computationally intensive tasks.
Towards this end, a 3GPP study indicates an Ultra Reliable Low Latency of 0.1ms Towards this end, a 3GPP study suggests an Ultra-Reliable Low Latency of
to 1ms for 0.1 to 1 ms for communication between an edge server and User Equipment
communication between an Edge server and User Equipment (UE) <xref target="URLL (UE) <xref target="URLLC" format="default"/>.
C" format="default"/>.
</t> </t>
<t> <t>
Note that the Edge device providing the computation and storage i Note that the edge device providing the computation and storage i
s itself limited in such resources compared to the Cloud. So, s itself limited in such resources compared to the cloud.
for example, a sudden surge in demand from a large group of touri For example, a sudden surge in demand from a large group of touri
sts can overwhelm that device. This will result in a degraded user sts can overwhelm the device. This will result in a degraded user
experience as their XR device experiences delays in receiving th e video frames. In order to deal experience as their XR device experiences delays in receiving th e video frames. In order to deal
with this problem, the client XR applications will need to use A daptive Bit Rate (ABR) algorithms that choose bit-rates policies with this problem, the client XR applications will need to use A BR algorithms that choose bitrate policies
tailored in a fine-grained manner tailored in a fine-grained manner
to the resource demands and playback the videos with appropriate QoE metrics as the user moves around with the group of tourists. to the resource demands and play back the videos with appropriat e QoE metrics as the user moves around with the group of tourists.
</t> </t>
<t> <t>
However, heavy-tailed nature of several operational parameters m However, the heavy-tailed nature of several operational parameters (e.g.,
akes prediction-based adaptation by ABR algorithms sub-optimal <xref target="AB buffer occupancy, throughput, client-server latency, and variable
R_2" format="default"/>. transmission times) makes prediction-based adaptation by ABR algorithms
This is because with such distributions, law of large numbers (ho sub-optimal <xref target="ABR_2" format="default"/>. This is because with
w long does it take for sample mean to stabilize) works too slowly <xref target= such distributions, the law of large numbers (how long it takes for the
"HEAVY_TAIL_2" format="default"/>, the mean of sample does not equal the mean of sample mean to stabilize) works too slowly <xref target="HEAVY_TAIL_2"
distribution <xref target="HEAVY_TAIL_2" format="default"/>, format="default"/> and the mean of sample does not equal the mean of
and as a result standard deviation and variance are unsuitable as distribution <xref target="HEAVY_TAIL_2" format="default"/>; as a result,
metrics for such operational parameters <xref target="HEAVY_TAIL_1" format="def standard deviation and variance are unsuitable as metrics for such
ault"/>. Other subtle issues with operational parameters <xref target="HEAVY_TAIL_1"
these distributions include the "expectation paradox" <xref targe format="default"/>.
t="HEAVY_TAIL_1" format="default"/> where the longer the wait for an event, the Other subtle issues with these distributions include
longer a further need to wait and the the "expectation paradox" <xref target="HEAVY_TAIL_1" format="default"/>
issue of mismatch between the size and count of events <xref targ (the longer the wait for an event, the longer a further need to wait) and
et="HEAVY_TAIL_1" format="default"/>. This makes designing an algorithm for the mismatch between the size and count of events <xref
adaptation error-prone and challenging. target="HEAVY_TAIL_1" format="default"/>. These issues make designing an algo
Such operational parameters include but are not limited to buffer rithm
occupancy, throughput, client-server latency, and variable transmission for adaptation error-prone and challenging.
times. In addition, edge devices and communication links may fai In addition, edge devices and
l and logical communication relationships between various software components communication links may fail, and logical communication relationships
change frequently as the user moves around with their XR device < between various software components change frequently as the user moves
xref target="UBICOMP" format="default"/>. around with their XR device <xref target="UBICOMP" format="default"/>.
</t> </t>
</section> </section>
<section anchor="ArTraffic" numbered="true" toc="default"> <section anchor="ArTraffic" numbered="true" toc="default">
<name>XR Network Traffic</name> <name>XR Network Traffic</name>
<section anchor="traffic_workload" numbered="true" toc="default"> <section anchor="traffic_workload" numbered="true" toc="default">
<name>Traffic Workload</name> <name>Traffic Workload</name>
<t> <t>
As discussed earlier, the parameters that capture the characteris As discussed in Sections <xref target="introduction" format="coun
tics of XR application behavior are heavy-tailed. ter"/> and <xref target="Req" format="counter" />, the parameters that capture t
Examples of such parameters include the distribution of arrival t he characteristics of XR application behavior are heavy-tailed.
imes between XR application invocation, the amount Examples of such parameters include the distribution of arrival t
imes between XR application invocations, the amount
of data transferred, and the inter-arrival times of packets withi n a session. As a result, any traffic model based on of data transferred, and the inter-arrival times of packets withi n a session. As a result, any traffic model based on
such parameters are themselves heavy-tailed. Using such parameters is also heavy-tailed. Using
these models to predict performance under alternative resource al locations by the network operator is challenging. For example, both uplink and d ownlink traffic to a user device has parameters such as volume of XR data, burst time, and idle time that are heavy-tailed. these models to predict performance under alternative resource al locations by the network operator is challenging. For example, both uplink and d ownlink traffic to a user device has parameters such as volume of XR data, burst time, and idle time that are heavy-tailed.
</t> </t>
<t> <t>
<xref target="TABLE_1" format="default"/> below shows various streaming
video applications and their associated throughput requirements <xref target="M <xref target="TABLE_1" format="default"/> below shows various
ETRICS_1" format="default"/>. Since our use case envisages a 6 degrees of freedo streaming video applications and their associated throughput
m (6DoF) video or point cloud, it can be seen from the table that it will requir requirements <xref target="METRICS_1" format="default"/>. Since our
e 200 to 1000Mbps of bandwidth. use case envisages a 6 degrees of freedom (6DoF) video or point
As seen from the table, the XR application such as our use case transmit a large cloud, the table indicates that it will require 200 to 1000 Mbps of
r amount of data per unit time as compared to traditional video applications. As bandwidth. Also, the table shows that XR applications, such as the
a result, issues arising out of heavy-tailed parameters such as long-range depe one in our use case, transmit a larger amount of data per unit time
ndent traffic <xref target="METRICS_2" format="default"/>, self-similar traffic as compared to regular video applications. As a result, issues
<xref target="METRICS_3" format="default"/>, would be experienced at time scales arising from heavy-tailed parameters, such as long-range dependent
of milliseconds and microseconds rather than hours or seconds. Additionally, bu traffic <xref target="METRICS_2" format="default"/> and self-similar
rstiness at the time scale of tens of milliseconds due to multi-fractal spectrum traffic <xref target="METRICS_3" format="default"/>, would be
of traffic will be experienced <xref target="METRICS_4" format="default"/>. experienced at timescales of milliseconds and microseconds rather
Long-range dependent traffic can have long bursts and various traffic parameters than hours or seconds. Additionally, burstiness at the timescale of
from widely separated time can show correlation <xref target="HEAVY_TAIL_1" for tens of milliseconds due to the multi-fractal spectrum of traffic
mat="default"/>. Self-similar traffic contains bursts at a wide range of time sc will be experienced <xref target="METRICS_4" format="default"/>.
ales <xref target="HEAVY_TAIL_1" format="default"/>. Multi-fractal spectrum burs Long-range dependent traffic can have long bursts, and various
ts for traffic summarizes the statistical distribution of local scaling exponent traffic parameters from widely separated times can show correlation
s found in a traffic trace <xref target="HEAVY_TAIL_1" format="default"/>. <xref target="HEAVY_TAIL_1" format="default"/>. Self-similar traffic
The operational consequences of XR traffic having characteristics such as long-r contains bursts at a wide range of timescales <xref
ange dependency, and self-similarity is that the edge servers to which multiple target="HEAVY_TAIL_1" format="default"/>. Multi-fractal spectrum
XR devices are connected wirelessly could face long bursts of traffic <xref targ bursts for traffic summarize the statistical distribution of local
et="METRICS_2" format="default"/>, <xref target="METRICS_3" format="default"/>. scaling exponents found in a traffic trace <xref
In addition, multi-fractal spectrum burstiness at the scale of milli-seconds cou target="HEAVY_TAIL_1" format="default"/>. The operational
ld induce jitter contributing to motion sickness <xref target="METRICS_4" format consequence of XR traffic having characteristics such as long-range
="default"/>. This is because bursty traffic combined with variable queueing del dependency and self-similarity is that the edge servers to which
ays leads to large delay jitter <xref target="METRICS_4" format="default"/>. multiple XR devices are connected wirelessly could face long bursts
The operators of edge servers will need to run a 'managed edge cloud service' <x of traffic <xref target="METRICS_2" format="default"/> <xref
ref target="METRICS_5" format="default"/> to deal with the above problems. Funct target="METRICS_3" format="default"/>. In addition, multi-fractal
ionalities that such a managed edge cloud service could operationally provide in spectrum burstiness at the scale of milliseconds could induce jitter
clude dynamic placement of XR servers, mobility support and energy management <x contributing to motion sickness <xref target="METRICS_4"
ref target="METRICS_6" format="default"/>. Providing Edge server support for the format="default"/>. This is because bursty traffic combined with
techniques being developed at the DETNET Working Group at the IETF <xref target variable queueing delays leads to large delay jitter <xref
="RFC8939" format="default"/>, <xref target="RFC9023" format="default"/>, <xref target="METRICS_4" format="default"/>. The operators of edge servers
target="RFC9450" format="default"/> could guarantee performance of XR applicatio will need to run a "managed edge cloud service" <xref
ns. For example, these techniques could be used for the link between the XR devi target="METRICS_5" format="default"/> to deal with the above
ce and the edge as well as within the managed edge cloud service. Another option problems. Functionalities that such a managed edge cloud service
for the network operators could be to deploy equipment that supports differenti could operationally provide include dynamic placement of XR servers,
ated services <xref target="RFC2475" format="default"/> or per-connection qualit mobility support, and energy management <xref target="METRICS_6"
y-of-service guarantees <xref target="RFC2210" format="default"/>. format="default"/>. Providing support for edge servers in techniques
such as those described in <xref target="RFC8939" format="default"/>,
<xref target="RFC9023" format="default"/>, and <xref target="RFC9450"
format="default"/> could guarantee performance of XR
applications. For example, these techniques could be used for the
link between the XR device and the edge as well as within the managed
edge cloud service. Another option for network operators could be to
deploy equipment that supports differentiated services <xref
target="RFC2475" format="default"/> or per-connection
Quality-of-Service (QoS) guarantees using RSVP <xref target="RFC2210"
format="default"/>.
</t> </t>
<t>
Thus, the provisioning of edge servers (in terms of the number of
servers, the topology, the placement of servers, the assignment of link
capacity, CPUs, and Graphics Processing Units (GPUs)) should be performed
with the above factors in mind.
</t>
<table anchor="TABLE_1"> <table anchor="TABLE_1">
<name>Throughput requirement for streaming video applications</name> <name>Throughput Requirements for Streaming Video Applications</name>
<thead> <thead>
<tr> <tr>
<th> Application</th> <th> Throughput Required</th> <th>Application</th>
<th>Throughput Required</th>
</tr> </tr>
</thead> </thead>
<tbody> <tbody>
<tr> <tr>
<td> <t>Real-world objects annotated with text and images for w <td><t>Real-world objects annotated with text and images for wo
orkflow assistance (e.g. repair)</t></td> <td> <t>1 Mbps</t></td> rkflow assistance (e.g., repair)</t></td>
<td> <t>1 Mbps</t></td>
</tr> </tr>
<tr> <tr>
<td> <t>Video Conferencing</t></td> <td> <t>2 Mbps</t></td> <td><t>Video conferencing</t></td>
<td> <t>2 Mbps</t></td>
</tr> </tr>
<tr> <tr>
<td> <t>3D Model and Data Visualization</t></td> <td> <t>2 to 2 <td> <t>3D model and data visualization</t></td>
0 Mbps</t></td> <td> <t>2 to 20 Mbps</t></td>
</tr> </tr>
<tr> <tr>
<td> <t>Two-way 3D Telepresence</t></td> <td> <t>5 to 25 Mbps</ <td> <t>Two-way 3D telepresence</t></td>
t></td> <td> <t>5 to 25 Mbps</t></td>
</tr> </tr>
<tr> <tr>
<td> <t>Current-Gen 360-degree video (4K)</t></td> <td> <t>10 t <td> <t>Current-Gen 360-degree video (4K)</t></td>
o 50 Mbps</t></td> <td> <t>10 to 50 Mbps</t></td>
</tr> </tr>
<tr> <tr>
<td> <t>Next-Gen 360-degree video (8K, 90+ Frames-per-second, H <td> <t>Next-Gen 360-degree video (8K, 90+ frames per second, h
igh Dynamic Range, Stereoscopic)</t></td> <td> <t>50 to 200 Mbps</t></td> igh dynamic range, stereoscopic)</t></td>
<td> <t>50 to 200 Mbps</t></td>
</tr> </tr>
<tr> <tr>
<td> <t>6 Degree of Freedom Video or Point Cloud</t></td> <td> <td> <t>6DoF video or point cloud</t></td>
<t>200 to 1000 Mbps</t></td> <td> <t>200 to 1000 Mbps</t></td>
</tr> </tr>
</tbody> </tbody>
</table> </table>
<t>
Thus, the provisioning of edge servers in terms of the number of servers, the t
opology, where to place them, the assignment of link capacity, CPUs and GPUs sho
uld keep the above factors in mind.
</t>
</section> </section>
<section anchor="traffic_performance" numbered="true" toc="default"> <section anchor="traffic_performance" numbered="true" toc="default">
<name>Traffic Performance Metrics</name> <name>Traffic Performance Metrics</name>
<t> <t>
The performance requirements for XR traffic have characteristics that n eed to be considered when operationalizing a network. The performance requirements for XR traffic have characteristics that n eed to be considered when operationalizing a network.
These characteristics are now discussed.</t> These characteristics are discussed in this section.</t>
<t>The bandwidth requirements of XR applications are substantially higher than t hose of video-based applications.</t> <t>The bandwidth requirements of XR applications are substantially higher than t hose of video-based applications.</t>
<t>The latency requirements of XR applications have been studied recently <xref target="XR_TRAFFIC" format="default"/>. The following characteristics we re identified.: <t>The latency requirements of XR applications have been studied recently <xref target="XR_TRAFFIC" format="default"/>. The following characteristics we re identified:
</t> </t>
<ul spacing="normal"> <ul spacing="normal">
<li>The uploading of data from an XR device to a remote server for proce ssing dominates the end-to-end latency. <li>The uploading of data from an XR device to a remote server for proce ssing dominates the end-to-end latency.
</li> </li>
<li> A lack of visual features in the grid environment can cause increas ed latencies as the XR device <li> A lack of visual features in the grid environment can cause increas ed latencies as the XR device
uploads additional visual data for processing to the r emote server.</li> uploads additional visual data for processing to the r emote server.</li>
<li>XR applications tend to have large bursts that are separated by sign ificant time gaps.</li> <li>XR applications tend to have large bursts that are separated by sign ificant time gaps.</li>
</ul> </ul>
<t> Additionally, XR applications interact with each other on a time sca <t> Additionally, XR applications interact with each other on a timescal
le of a round-trip-time propagation, and this must be considered when operationa e of an RTT propagation, and this must be considered when operationalizing a net
lizing a network.</t> work.</t>
<!-- [rfced] Section 4.2: What is the relationship between Table 2 and
[METRICS_6]? We do not see the table in [METRIC_6].
Original:
The following Table 2 [METRICS_6] shows a taxonomy of applications
with their associated required response times and bandwidths.
-->
<t> <t>
The following <xref target="TABLE_2" format="default"/> <xref target <xref target="TABLE_2" format="default"/> <xref target="METRICS_6" f
="METRICS_6" format="default"/> shows a taxonomy of applications with their asso ormat="default"/> shows a taxonomy of applications with their associated require
ciated required response times and bandwidths. Response times can d response times and bandwidths. Response times can
be defined as the time interval between the end of a request submission and the be defined as the time interval between the end of a request submission and the
end of the corresponding response from a system. If the XR device offloads a tas end of the corresponding response from a system. If the XR device offloads a tas
k to an edge server, the response time of the server is the round-trip time from k to an edge server, the response time of the server is the RTT from when a data
when a data packet is sent from the XR device until a response is received. Not packet is sent from the XR device until a response is received. Note that the r
e that the required response time provides an upper bound on the sum of the time equired response time provides an upper bound for the sum of the time taken by c
taken by computational tasks such as processing of scenes, generation of images omputational tasks (such as processing of scenes and generation of images) and t
and the round-trip time. This response time depends only on the Quality of Serv he RTT. This response time depends only on the QoS required by an application. T
ice (QOS) required by an application. The response time is therefore independent he response time is therefore independent of the underlying technology of the ne
of the underlying technology of the network and the time taken by the computati twork and the time taken by the computational tasks.
onal tasks.
</t> </t>
<t>
Our use case requires a response time of 20ms at most and preferably between 7-1
5ms as discussed earlier. This requirement for response time is similar to the f
irst two entries of <xref target="TABLE_2" format="default"/> below. Additionall
y, the required bandwidth for our use case as discussed in section 5.1, <xref t
arget="TABLE_1" format="default"/>, is 200Mbps-1000Mbps.
Since our use case envisages multiple users running the XR applications on their
devices, and connected to an edge server that is closest to them, these latency
and bandwidth connections will grow linearly with the number of users. The oper
ators should match the network provisioning to the maximum number of tourists th
at can be supported by a link to an edge server.
<t>
Our use case requires a response time of 20 ms at most and
preferably between 7-15 ms, as discussed earlier. This requirement
for response time is similar to the first two entries in <xref
target="TABLE_2" format="default"/>. Additionally, the required
bandwidth for our use case is 200 to 1000 Mbps (see <xref
target="traffic_workload"/>). Since our use case envisages multiple
users running the XR application on their devices and connecting to
the edge server that is closest to them, these latency and bandwidth
connections will grow linearly with the number of users.
The operators should match the network provisioning to the maximum
number of tourists that can be supported by a link to an edge
server.
</t> </t>
<table anchor="TABLE_2"> <table anchor="TABLE_2">
<name>Traffic Performance Metrics of Selected XR Applications</name> <name>Traffic Performance Metrics of Selected XR Applications</name>
<thead> <thead>
<tr> <tr>
<th> Application</th> <th> Required Response Time</th> <th> Ex <th> Application</th>
pected Data Capacity</th> <th> Possible Implementations/ Examples</th> <th> Required Response Time</th>
<th> Expected Data Capacity</th>
<th> Possible Implementations/ Examples</th>
</tr> </tr>
</thead> </thead>
<tbody> <tbody>
<tr> <tr>
<td> <t>Mobile XR based remote assistance with uncompressed 4K <td><t>Mobile XR-based remote assistance with uncompressed
(1920x1080 pixels) 120 fps HDR 10-bit real-time video stream</t></td> 4K (1920x1080 pixels) 120 fps HDR 10-bit real-time video
<td> <t>Less than 10 milliseconds</t></td> stream</t></td>
<td> <t>Greater than 7.5 Gbps</t></td> <td><t>Less than 10 milliseconds</t></td>
<td> <t>Assisting maintenance technicians, Industry 4.0 remote <td><t>Greater than 7.5 Gbps</t></td>
maintenance, remote assistance in robotics industry</t></td> <td><t>Assisting maintenance technicians, Industry 4.0
remote maintenance, remote assistance in robotics
industry</t></td>
</tr> </tr>
<tr> <tr>
<td> <t>Indoor and localized outdoor navigation </t></td> <td><t>Indoor and localized outdoor navigation </t></td>
<td> <t>Less than 20 milliseconds</t></td> <td><t>Less than 20 milliseconds</t></td>
<td> <t>50 to 200 Mbps</t></td> <td><t>50 to 200 Mbps</t></td>
<td> <t>Theme Parks, Shopping Malls, Archaeological Sites, Muse <td><t>Guidance in theme parks, shopping malls, archaeological
um guidance</t></td> sites, and
museums</t></td>
</tr> </tr>
<tr> <tr>
<td> <t>Cloud-based Mobile XR applications</t></td> <td><t>Cloud-based mobile XR applications</t></td>
<td> <t>Less than 50 milliseconds</t></td> <td><t>Less than 50 milliseconds</t></td>
<td> <t>50 to 100 Mbps</t></td> <td><t>50 to 100 Mbps</t></td>
<td> <t>Google Live View, XR-enhanced Google Translate </t></td <td><t>Google Live View, XR-enhanced Google Translate </t></td>
>
</tr> </tr>
</tbody> </tbody>
</table> </table>
</section> </section>
</section> </section>
<section anchor="conclusion" numbered="true" toc="default"> <section anchor="conclusion" numbered="true" toc="default">
<name>Conclusion</name> <name>Conclusion</name>
<t> <t>
In order to operationalize a use case such as the one presented in th In order to operationalize a use case such as the one presented in th
is document, a network operator could dimension their network to provide a short is document, a network operator could dimension their network to provide a short
and high-capacity network path from the edge compute and high-capacity network path from the edge computing
resources or storage to the mobile devices running the XR application resources or storage to the mobile devices running the XR application
. This is required to ensure a response time of 20ms at most and preferably betw . This is required to ensure a response time of 20 ms at most and preferably bet
een 7-15ms. Additionally, a bandwidth of 200 ween 7-15 ms. Additionally, a bandwidth of 200
to 1000Mbps is required by such applications. To deal with the charac to 1000 Mbps is required by such applications. To deal with the chara
teristics of XR traffic as discussed in this document, network operators could d cteristics of XR traffic as discussed in this document, network operators could
eploy a managed edge cloud service that operationally deploy a managed edge cloud service that operationally
provides dynamic placement of XR servers, mobility support and energy provides dynamic placement of XR servers, mobility support, and energ
management. Although the use case is technically feasible, economic viability i y management. Although the use case is technically feasible, economic viability
s an important factor that must be considered. is an important factor that must be considered.
</t> </t>
</section> </section>
<section anchor="iana" numbered="true" toc="default"> <section anchor="iana" numbered="true" toc="default">
<name>IANA Considerations</name> <name>IANA Considerations</name>
<t> <t>
This document has no IANA actions. This document has no IANA actions.
</t> </t>
</section> </section>
<section anchor="Sec" numbered="true" toc="default"> <section anchor="Sec" numbered="true" toc="default">
<name>Security Considerations</name> <name>Security Considerations</name>
<t>
The security issues for the presented use case are similar to other s
treaming applications <xref target="DIST" format="default"/>, <xref target="NIST
1" format="default"/>, <xref target="CWE" format="default"/>, <xref target="NIST
2" format="default"/>. This document itself introduces no new security issues.
</t>
</section>
<section anchor="ack" numbered="true" toc="default">
<name>Acknowledgements</name>
<t> <t>
Many Thanks to Spencer Dawkins, Rohit Abhishek, Jake Holland, Kir The security issues for the presented use case are similar to
an Makhijani, Ali Begen, Cullen Jennings, Stephan Wenger, Eric Vyncke, Wesley Ed those described in <xref target="DIST" format="default"/>, <xref
dy, Paul Kyzivat, Jim Guichard, Roman Danyliw, Warren Kumari, and Zaheduzzaman S target="NIST1" format="default"/>, <xref target="CWE"
arker for providing very helpful feedback, suggestions and comments. format="default"/>, and <xref target="NIST2"
format="default"/>. This document does not introduce any new
security issues.
</t> </t>
</section> </section>
</middle> </middle>
<back> <back>
<references> <references>
<name>Informative References</name> <name>Informative References</name>
<reference anchor="DEV_HEAT_1" target=""> <reference anchor="DEV_HEAT_1" target="https://dl.acm.org/doi/10.1145/2637 166.2637230">
<front> <front>
<title> Draining our Glass: An Energy and Heat characterization of Goo gle Glass</title> <title> Draining our glass: an energy and heat characterization of Goo gle Glass</title>
<author initials="R" surname="LiKamWa" fullname="Robert LiKamWa"> <author initials="R" surname="LiKamWa" fullname="Robert LiKamWa">
<organization/> <organization/>
</author> </author>
<author initials="Z" surname="Wang" fullname="Zhen Wang"> <author initials="Z" surname="Wang" fullname="Zhen Wang">
<organization/> <organization/>
</author> </author>
<author initials="A" surname="Carroll" fullname="Aaron Carroll"> <author initials="A" surname="Carroll" fullname="Aaron Carroll">
<organization/> <organization/>
</author> </author>
<author initials="F" surname="Lin" fullname="Felix Xiaozhu Lin"> <author initials="F" surname="Lin" fullname="Felix Xiaozhu Lin">
<organization/> <organization/>
</author> </author>
<author initials="L" surname="Zhong" fullname="Lin Zhong"> <author initials="L" surname="Zhong" fullname="Lin Zhong">
<organization/> <organization/>
</author> </author>
<date year="2013"/> <date year="2014"/>
</front> </front>
<seriesInfo name="In Proceedings of" value="5th Asia-Pacific Workshop on <refcontent>APSys '14: 5th Asia-Pacific Workshop on Systems, pp. 1-7</re
Systems pp. 1-7"/> fcontent>
<seriesInfo name="DOI" value="10.1145/2637166.2637230"/>
</reference> </reference>
<reference anchor="EDGE_1" target="">
<reference anchor="EDGE_1" target="https://ieeexplore.ieee.org/document/78
07196">
<front> <front>
<title> The Emergence of Edge Computing</title> <title> The Emergence of Edge Computing</title>
<author initials="M" surname="Satyanarayanan" fullname="Mahadev Satyan arayanan"> <author initials="M" surname="Satyanarayanan" fullname="Mahadev Satyan arayanan">
<organization/> <organization/>
</author> </author>
<date year="2017"/> <date year="2017"/>
</front> </front>
<seriesInfo name="In " value="Computer 50(1) pp. 30-39"/> <refcontent>Computer, vol. 50, no. 1, pp. 30-39</refcontent>
<seriesInfo name="DOI" value="10.1109/MC.2017.9"/>
</reference> </reference>
<reference anchor="EDGE_2" target="">
<reference anchor="EDGE_2" target="https://ieeexplore.ieee.org/document/88
12200">
<front> <front>
<title> The Seminal Role of Edge-Native Applications</title> <title> The Seminal Role of Edge-Native Applications</title>
<author initials="M" surname="Satyanarayanan" fullname="Mahadev Satyan arayanan"> <author initials="M" surname="Satyanarayanan" fullname="Mahadev Satyan arayanan">
<organization/> <organization/>
</author> </author>
<author initials="G" surname="Klas" fullname="Guenter Klas"> <author initials="G" surname="Klas" fullname="Guenter Klas">
<organization/> <organization/>
</author> </author>
<author initials="M" surname="Silva" fullname="Marco Silva"> <author initials="M" surname="Silva" fullname="Marco Silva">
<organization/> <organization/>
</author> </author>
<author initials="S" surname="Mangiante" fullname="Simone Mangiante"> <author initials="S" surname="Mangiante" fullname="Simone Mangiante">
<organization/> <organization/>
</author> </author>
<date year="2019"/> <date year="2019"/>
</front> </front>
<seriesInfo name="In " value="IEEE International Conference on Edge Comp <refcontent>2019 IEEE International Conference on Edge Computing (EDGE),
uting (EDGE) pp. 33-40"/> pp. 33-40</refcontent>
<seriesInfo name="DOI" value="10.1109/EDGE.2019.00022"/>
</reference> </reference>
<reference anchor="ABR_1" target="">
<reference anchor="ABR_1" target="https://dl.acm.org/doi/10.1145/3098822.3
098843">
<front> <front>
<title> Neural Adaptive Video Streaming with Pensieve</title> <title> Neural Adaptive Video Streaming with Pensieve</title>
<author initials="H" surname="Mao" fullname="Hongzi Mao"> <author initials="H" surname="Mao" fullname="Hongzi Mao">
<organization/> <organization/>
</author> </author>
<author initials="R" surname="Netravali" fullname="Ravi Netravali"> <author initials="R" surname="Netravali" fullname="Ravi Netravali">
<organization/> <organization/>
</author> </author>
<author initials="M" surname="Alizadeh" fullname="Mohammad Alizadeh"> <author initials="M" surname="Alizadeh" fullname="Mohammad Alizadeh">
<organization/> <organization/>
</author> </author>
<date year="2017"/> <date year="2017"/>
</front> </front>
<seriesInfo name="In " value="Proceedings of the Conference of the ACM S <refcontent>SIGCOMM '17: Proceedings of the Conference of the ACM Specia
pecial Interest Group on Data Communication, pp. 197-210"/> l Interest Group on Data Communication, pp. 197-210</refcontent>
<seriesInfo name="DOI" value="10.1145/3098822.3098843"/>
</reference> </reference>
<reference anchor="ABR_2" target="">
<reference anchor="ABR_2" target="https://www.usenix.org/conference/nsdi20
/presentation/yan">
<front> <front>
<title> Learning in situ: a randomized experiment in video streaming < /title> <title> Learning in situ: a randomized experiment in video streaming < /title>
<author initials="F" surname="Yan" fullname="Francis Y. Yan"> <author initials="F" surname="Yan" fullname="Francis Y. Yan">
<organization/> <organization/>
</author> </author>
<author initials="H" surname="Ayers" fullname="Hudson Ayers"> <author initials="H" surname="Ayers" fullname="Hudson Ayers">
<organization/> <organization/>
</author> </author>
<author initials="C" surname="Zhu" fullname="Chenzhi Zhu"> <author initials="C" surname="Zhu" fullname="Chenzhi Zhu">
<organization/> <organization/>
skipping to change at line 506 skipping to change at line 680
</author> </author>
<author initials="K" surname="Zhang" fullname="Keyi Zhang"> <author initials="K" surname="Zhang" fullname="Keyi Zhang">
<organization/> <organization/>
</author> </author>
<author initials="P" surname="Levis" fullname="Philip Levis"> <author initials="P" surname="Levis" fullname="Philip Levis">
<organization/> <organization/>
</author> </author>
<author initials="K" surname="Winstein" fullname="Keith Winstein"> <author initials="K" surname="Winstein" fullname="Keith Winstein">
<organization/> <organization/>
</author> </author>
<date year="2020"/> <date month="February" year="2020"/>
</front> </front>
<seriesInfo name="In " value=" 17th USENIX Symposium on Networked Syste ms Design and Implementation (NSDI 20), pp. 495-511"/> <refcontent>17th USENIX Symposium on Networked Systems Design and Implem entation (NSDI '20), pp. 495-511</refcontent>
</reference> </reference>
<reference anchor="HEAVY_TAIL_1" target="">
<reference anchor="HEAVY_TAIL_1" target="https://www.wiley.com/en-us/Inter
net+Measurement%3A+Infrastructure%2C+Traffic+and+Applications-p-9780470014615">
<front> <front>
<title> Internet measurement: infrastructure, traffic and applications </title> <title>Internet Measurement: Infrastructure, Traffic and Applications< /title>
<author initials="M" surname="Crovella" fullname="Mark Crovella"> <author initials="M" surname="Crovella" fullname="Mark Crovella">
<organization/> <organization/>
</author> </author>
<author initials="B" surname="Krishnamurthy" fullname="Balachander Kri shnamurthy"> <author initials="B" surname="Krishnamurthy" fullname="Balachander Kri shnamurthy">
<organization/> <organization/>
</author> </author>
<date year="2006"/> <date year="2006"/>
</front> </front>
<seriesInfo name="John " value="Wiley and Sons Inc."/> <refcontent>John Wiley and Sons</refcontent>
</reference> </reference>
<reference anchor="HEAVY_TAIL_2" target="">
<reference anchor="HEAVY_TAIL_2" target="https://arxiv.org/pdf/2001.10488"
>
<front> <front>
<title> The Statistical Consequences of Fat Tails</title> <title>Statistical Consequences of Fat Tails: Real World Preasymptotic s, Epistemology, and Applications</title>
<author initials="N" surname="Taleb" fullname="Nassim Nicholas Taleb"> <author initials="N" surname="Taleb" fullname="Nassim Nicholas Taleb">
<organization/> <organization/>
</author> </author>
<date year="2020"/> <date year="2022"/>
</front> </front>
<seriesInfo name="STEM " value="Academic Press"/> <refcontent>Revised Edition, STEM Academic Press</refcontent>
</reference> </reference>
<reference anchor="UBICOMP" target="">
<reference anchor="UBICOMP" target="https://www.taylorfrancis.com/chapters
/edit/10.1201/9781420093612-6/ubiquitous-computing-systems-jakob-bardram-adrian-
friday">
<front> <front>
<title> Ubiquitous Computing Systems</title> <title>Ubiquitous Computing Systems</title>
<author initials="J" surname="Bardram" fullname="Jakob Eyvind Bardram" > <author initials="J" surname="Bardram" fullname="Jakob Eyvind Bardram" >
<organization/> <organization/>
</author> </author>
<author initials="A" surname="Friday" fullname="Adrian Friday"> <author initials="A" surname="Friday" fullname="Adrian Friday">
<organization/> <organization/>
</author> </author>
<date year="2009"/> <date year="2009"/>
</front> </front>
<seriesInfo name="In " value=" Ubiquitous Computing Fundamentals pp. 37- 94. CRC Press"/> <refcontent>Ubiquitous Computing Fundamentals, 1st Edition, Chapman and Hall/CRC Press, pp. 37-94</refcontent>
</reference> </reference>
<reference anchor="SLAM_1" target="">
<reference anchor="SLAM_1" target="https://ieeexplore.ieee.org/document/69
09455">
<front> <front>
<title> A minimal solution to the generalized pose-and-scale problem < /title> <title>A Minimal Solution to the Generalized Pose-and-Scale Problem</t itle>
<author initials="J" surname="Ventura" fullname="Jonathan Ventura"> <author initials="J" surname="Ventura" fullname="Jonathan Ventura">
<organization/> <organization/>
</author> </author>
<author initials="C" surname="Arth" fullname="Clemens Arth"> <author initials="C" surname="Arth" fullname="Clemens Arth">
<organization/> <organization/>
</author> </author>
<author initials="G" surname="Reitmayr" fullname="Gerhard Reitmayr"> <author initials="G" surname="Reitmayr" fullname="Gerhard Reitmayr">
<organization/> <organization/>
</author> </author>
<author initials="D" surname="Schmalstieg" fullname="Dieter Schmalstie g"> <author initials="D" surname="Schmalstieg" fullname="Dieter Schmalstie g">
<organization/> <organization/>
</author> </author>
<date year="2014"/> <date year="2014"/>
</front> </front>
<seriesInfo name="In " value="Proceedings of the IEEE Conference on Comp <refcontent>2014 IEEE Conference on Computer Vision and Pattern Recognit
uter Vision and Pattern Recognition, pp. 422-429"/> ion, pp. 422-429</refcontent>
<seriesInfo name="DOI" value="10.1109/CVPR.2014.61"/>
</reference> </reference>
<reference anchor="SLAM_2" target="">
<reference anchor="SLAM_2" target="https://link.springer.com/chapter/10.10
07/978-3-319-10593-2_2">
<front> <front>
<title> A scalable solution to the generalized pose and scale problem </title> <title>gDLS: A Scalable Solution to the Generalized Pose and Scale Pro blem</title>
<author initials="C" surname="Sweeny" fullname="Chris Sweeny"> <author initials="C" surname="Sweeny" fullname="Chris Sweeny">
<organization/> <organization/>
</author> </author>
<author initials="V" surname="Fragoso" fullname="Victor Fragoso"> <author initials="V" surname="Fragoso" fullname="Victor Fragoso">
<organization/> <organization/>
</author> </author>
<author initials="T" surname="Hollerer" fullname="Tobias Hollerer"> <author initials="T" surname="Höllerer" fullname="Tobias Höllerer">
<organization/> <organization/>
</author> </author>
<author initials="M" surname="Turk" fullname="Matthew Turk"> <author initials="M" surname="Turk" fullname="Matthew Turk">
<organization/> <organization/>
</author> </author>
<date year="2014"/> <date year="2014"/>
</front> </front>
<seriesInfo name="In " value="European Conference on Computer Vision, pp <refcontent>Computer Vision - ECCV 2014, pp. 16-31</refcontent>
. 16-31"/> <seriesInfo name="DOI" value="10.1007/978-3-319-10593-2_2"/>
</reference> </reference>
<reference anchor="SLAM_3" target="">
<reference anchor="SLAM_3" target="https://ieeexplore.ieee.org/document/66
36302">
<front> <front>
<title> Model estimation and selection towards unconstrained real-time tracking and mapping </title> <title>Model Estimation and Selection towards Unconstrained Real-Time Tracking and Mapping</title>
<author initials="S" surname="Gauglitz" fullname="Steffen Gauglitz"> <author initials="S" surname="Gauglitz" fullname="Steffen Gauglitz">
<organization/> <organization/>
</author> </author>
<author initials="C" surname="Sweeny" fullname="Chris Sweeny"> <author initials="C" surname="Sweeney" fullname="Chris Sweeney">
<organization/> <organization/>
</author> </author>
<author initials="J" surname="Ventura" fullname="Jonathan Ventura"> <author initials="J" surname="Ventura" fullname="Jonathan Ventura">
<organization/> <organization/>
</author> </author>
<author initials="M" surname="Turk" fullname="Matthew Turk"> <author initials="M" surname="Turk" fullname="Matthew Turk">
<organization/> <organization/>
</author> </author>
<author initials="T" surname="Hollerer" fullname="Tobias Hollerer"> <author initials="T" surname="Höllerer" fullname="Tobias Höllerer">
<organization/> <organization/>
</author> </author>
<date year="2013"/> <date year="2014"/>
</front> </front>
<seriesInfo name="In " value="IEEE transactions on visualization and com <refcontent>IEEE Transactions on Visualization and Computer Graphics, vo
puter graphics, 20(6), pp. 825-838"/> l. 20, no. 6, pp. 825-838</refcontent>
<seriesInfo name="DOI" value="10.1109/TVCG.2013.243"/>
</reference> </reference>
<reference anchor="SLAM_4" target="">
<reference anchor="SLAM_4" target="https://ieeexplore.ieee.org/document/66
71783">
<front> <front>
<title> Handling pure camera rotation in keyframe-based SLAM </title> <title>Handling pure camera rotation in keyframe-based SLAM</title>
<author initials="C" surname="Pirchheim" fullname="Christian Pirchheim "> <author initials="C" surname="Pirchheim" fullname="Christian Pirchheim ">
<organization/> <organization/>
</author> </author>
<author initials="D" surname="Schmalstieg" fullname="Dieter Schmalstie g"> <author initials="D" surname="Schmalstieg" fullname="Dieter Schmalstie g">
<organization/> <organization/>
</author> </author>
<author initials="G" surname="Reitmayr" fullname="Gerhard Reitmayr"> <author initials="G" surname="Reitmayr" fullname="Gerhard Reitmayr">
<organization/> <organization/>
</author> </author>
<date year="2013"/> <date year="2013"/>
</front> </front>
<seriesInfo name="In " value="2013 IEEE international symposium on mixed <refcontent>2013 IEEE International Symposium on Mixed and Augmented Rea
and augmented reality (ISMAR), pp. 229-238"/> lity (ISMAR), pp. 229-238</refcontent>
<seriesInfo name="DOI" value="10.1109/ISMAR.2013.6671783"/>
</reference> </reference>
<reference anchor="OCCL_1" target="">
<reference anchor="OCCL_1" target="https://onlinelibrary.wiley.com/doi/10.
1111/1467-8659.1530011">
<front> <front>
<title> Interactive Occlusion and automatic object placementfor augmen ted reality </title> <title>Interactive Occlusion and Automatic Object Placement for Augmen ted Reality</title>
<author initials="D.E" surname="Breen" fullname="David E. Breen"> <author initials="D.E" surname="Breen" fullname="David E. Breen">
<organization/> <organization/>
</author> </author>
<author initials="R.T" surname="Whitaker" fullname="Ross T. Whitaker"> <author initials="R.T" surname="Whitaker" fullname="Ross T. Whitaker">
<organization/> <organization/>
</author> </author>
<author initials="E" surname="Rose" fullname="Eric Rose">
<organization/>
</author>
<author initials="M" surname="Tuceryan" fullname="Mihran Tuceryan"> <author initials="M" surname="Tuceryan" fullname="Mihran Tuceryan">
<organization/> <organization/>
</author> </author>
<date year="1996"/> <date month="August" year="1996"/>
</front> </front>
<seriesInfo name="In " value="Computer Graphics Forum, vol. 15, no. 3 , <refcontent>Computer Graphics Forum, vol. 15, no. 3, pp. 11-22</refconte
pp. 229-238,Edinburgh, UK: Blackwell Science Ltd"/> nt>
<seriesInfo name="DOI" value="10.1111/1467-8659.1530011"/>
</reference> </reference>
<reference anchor="OCCL_2" target="">
<reference anchor="OCCL_2" target="https://ieeexplore.ieee.org/document/69
48419">
<front> <front>
<title> Pixel-wise closed-loop registration in video-based augmented r eality </title> <title>Pixel-wise closed-loop registration in video-based augmented re ality</title>
<author initials="F" surname="Zheng" fullname="Feng Zheng"> <author initials="F" surname="Zheng" fullname="Feng Zheng">
<organization/> <organization/>
</author> </author>
<author initials="D" surname="Schmalstieg" fullname="Dieter Schmalstie g"> <author initials="D" surname="Schmalstieg" fullname="Dieter Schmalstie g">
<organization/> <organization/>
</author> </author>
<author initials="G" surname="Welch" fullname="Greg Welch"> <author initials="G" surname="Welch" fullname="Greg Welch">
<organization/> <organization/>
</author> </author>
<date year="2014"/> <date year="2014"/>
</front> </front>
<seriesInfo name="In " value="IEEE International Symposium on Mixed and <refcontent>2014 IEEE International Symposium on Mixed and Augmented Rea
Augmented Reality (ISMAR), pp. 135-143"/> lity (ISMAR), pp. 135-143</refcontent>
<seriesInfo name="DOI" value="10.1109/ISMAR.2014.6948419"/>
</reference> </reference>
<reference anchor="PHOTO_REG" target="">
<reference anchor="PHOTO_REG" target="https://ieeexplore.ieee.org/document
/6165138">
<front> <front>
<title> Online tracking of outdoor lighting variations for augmented r eality with moving cameras </title> <title>Online Tracking of Outdoor Lighting Variations for Augmented Re ality with Moving Cameras</title>
<author initials="Y" surname="Liu" fullname="Yanli Liu"> <author initials="Y" surname="Liu" fullname="Yanli Liu">
<organization/> <organization/>
</author> </author>
<author initials="X" surname="Granier" fullname="Xavier Granier"> <author initials="X" surname="Granier" fullname="Xavier Granier">
<organization/> <organization/>
</author> </author>
<date year="2012"/> <date year="2012"/>
</front> </front>
<seriesInfo name="In " value="IEEE Transactions on visualization and com <refcontent>IEEE Transactions on Visualization and Computer Graphics, vo
puter graphics, 18(4), pp.573-580"/> l. 18, no. 4, pp. 573-580</refcontent>
<seriesInfo name="DOI" value="10.1109/TVCG.2012.53"/>
</reference> </reference>
<reference anchor="GLB_ILLUM_1" target="">
<reference anchor="GLB_ILLUM_1" target="https://ieeexplore.ieee.org/docume
nt/6671773">
<front> <front>
<title> Differential irradiance caching for fast high-quality light tr ansport between virtual and real worlds.</title> <title>Differential Irradiance Caching for fast high-quality light tra nsport between virtual and real worlds</title>
<author initials="P" surname="Kan" fullname="Peter Kan"> <author initials="P" surname="Kan" fullname="Peter Kan">
<organization/> <organization/>
</author> </author>
<author initials="H" surname="Kaufmann" fullname="Hannes Kaufmann"> <author initials="H" surname="Kaufmann" fullname="Hannes Kaufmann">
<organization/> <organization/>
</author> </author>
<date year="2013"/> <date year="2013"/>
</front> </front>
<seriesInfo name="In " value="IEEE International Symposium on Mixed and <refcontent>2013 IEEE International Symposium on Mixed and Augmented Rea
Augmented Reality (ISMAR),pp. 133-141"/> lity (ISMAR), pp. 133-141</refcontent>
<seriesInfo name="DOI" value="10.1109/ISMAR.2013.6671773"/>
</reference> </reference>
<reference anchor="GLB_ILLUM_2" target="">
<reference anchor="GLB_ILLUM_2" target="https://ieeexplore.ieee.org/docume
nt/6948407">
<front> <front>
<title> Delta voxel cone tracing.</title> <title>Delta Voxel Cone Tracing</title>
<author initials="T" surname="Franke" fullname="Tobias Franke"> <author initials="T" surname="Franke" fullname="Tobias Franke">
<organization/> <organization/>
</author> </author>
<date year="2014"/> <date year="2014"/>
</front> </front>
<seriesInfo name="In " value="IEEE International Symposium on Mixed and <refcontent>2014 IEEE International Symposium on Mixed and Augmented Rea
Augmented Reality (ISMAR), pp. 39-44"/> lity (ISMAR), pp. 39-44</refcontent>
<seriesInfo name="DOI" value="10.1109/ISMAR.2014.6948407"/>
</reference> </reference>
<reference anchor="LENS_DIST" target="">
<reference anchor="LENS_DIST" target="https://link.springer.com/chapter/10
.1007/978-3-7091-6785-4_2">
<front> <front>
<title> Practical calibration procedures for augmented reality.</title > <title>Practical Calibration Procedures for Augmented Reality</title>
<author initials="A" surname="Fuhrmann" fullname="Anton Fuhrmann"> <author initials="A" surname="Fuhrmann" fullname="Anton Fuhrmann">
<organization/> <organization/>
</author> </author>
<author initials="D" surname="Schmalstieg" fullname="Dieter Schmalstie g"> <author initials="D" surname="Schmalstieg" fullname="Dieter Schmalstie g">
<organization/> <organization/>
</author> </author>
<author initials="W" surname="Purgathofer" fullname="Werner Purgathofe
r">
<organization/>
</author>
<date year="2000"/> <date year="2000"/>
</front> </front>
<seriesInfo name="In " value="Virtual Environments 2000, pp. 3-12. Sprin <refcontent>Virtual Environments 2000, pp. 3-12</refcontent>
ger, Vienna"/> <seriesInfo name="DOI" value="10.1007/978-3-7091-6785-4_2"/>
</reference> </reference>
<reference anchor="BLUR" target="">
<reference anchor="BLUR" target="https://diglib.eg.org/items/6954bf7e-5852
-44cf-8155-4ba269dc4cee">
<front> <front>
<title> Physically-Based Depth of Field in Augmented Reality.</title> <title>Physically-Based Depth of Field in Augmented Reality</title>
<author initials="P" surname="Kan" fullname="Peter Kan"> <author initials="P" surname="Kan" fullname="Peter Kan">
<organization/> <organization/>
</author> </author>
<author initials="H" surname="Kaufmann" fullname="Hannes Kaufmann"> <author initials="H" surname="Kaufmann" fullname="Hannes Kaufmann">
<organization/> <organization/>
</author> </author>
<date year="2012"/> <date year="2012"/>
</front> </front>
<seriesInfo name="In " value="Eurographics (Short Papers), pp. 89-92."/> <refcontent>Eurographics 2012 - Short Papers, pp. 89-92</refcontent>
<seriesInfo name="DOI" value="10.2312/conf/EG2012/short/089-092"/>
</reference> </reference>
<reference anchor="NOISE" target="">
<reference anchor="NOISE" target="https://ieeexplore.ieee.org/document/407
9277">
<front> <front>
<title> Enhanced visual realism by incorporating camera image effects. </title> <title>Enhanced visual realism by incorporating camera image effects</ title>
<author initials="J" surname="Fischer" fullname="Jan Fischer"> <author initials="J" surname="Fischer" fullname="Jan Fischer">
<organization/> <organization/>
</author> </author>
<author initials="D" surname="Bartz" fullname="Dirk Bartz"> <author initials="D" surname="Bartz" fullname="Dirk Bartz">
<organization/> <organization/>
</author> </author>
<author initials="W" surname="Straßer" fullname="Wolfgang Straßer"> <author initials="W" surname="Strasser" fullname="Wolfgang Strasser">
<organization/> <organization/>
</author> </author>
<date year="2006"/> <date year="2006"/>
</front> </front>
<seriesInfo name="In " value="IEEE/ACM International Symposium on Mixed <refcontent>2006 IEEE/ACM International Symposium on Mixed and Augmented
and Augmented Reality, pp. 205-208."/> Reality, pp. 205-208</refcontent>
<seriesInfo name="DOI" value="10.1109/ISMAR.2006.297815"/>
</reference> </reference>
<reference anchor="VIS_INTERFERE" target="">
<reference anchor="VIS_INTERFERE" target="https://ieeexplore.ieee.org/docu
ment/4538846">
<front> <front>
<title> Interactive focus and context visualization for augmented real ity.</title> <title>Interactive Focus and Context Visualization for Augmented Reali ty</title>
<author initials="D" surname="Kalkofen" fullname="Denis Kalkofen"> <author initials="D" surname="Kalkofen" fullname="Denis Kalkofen">
<organization/> <organization/>
</author> </author>
<author initials="E" surname="Mendez" fullname="Erick Mendez"> <author initials="E" surname="Mendez" fullname="Erick Mendez">
<organization/> <organization/>
</author> </author>
<author initials="D" surname="Schmalstieg" fullname="Dieter Schmalstie g"> <author initials="D" surname="Schmalstieg" fullname="Dieter Schmalstie g">
<organization/> <organization/>
</author> </author>
<date year="2007"/> <date year="2007"/>
</front> </front>
<seriesInfo name="In " value="6th IEEE and ACM International Symposium o <refcontent>2007 6th IEEE and ACM International Symposium on Mixed and A
n Mixed and Augmented Reality, pp. 191-201."/> ugmented Reality, pp. 191-201</refcontent>
<seriesInfo name="DOI" value="10.1109/ISMAR.2007.4538846"/>
</reference> </reference>
<reference anchor="DEV_HEAT_2" target="">
<reference anchor="DEV_HEAT_2" target="https://www.mdpi.com/1424-8220/20/5
/1446">
<front> <front>
<title> Thermal model and countermeasures for future smart glasses.</t itle> <title>Thermal Model and Countermeasures for Future Smart Glasses</tit le>
<author initials="K" surname="Matsuhashi" fullname="Kodai Matsuhashi"> <author initials="K" surname="Matsuhashi" fullname="Kodai Matsuhashi">
<organization/> <organization/>
</author> </author>
<author initials="T" surname="Kanamoto" fullname="Toshiki Kanamoto"> <author initials="T" surname="Kanamoto" fullname="Toshiki Kanamoto">
<organization/> <organization/>
</author> </author>
<author initials="A" surname="Kurokawa" fullname=" Atsushi Kurokawa"> <author initials="A" surname="Kurokawa" fullname="Atsushi Kurokawa">
<organization/> <organization/>
</author> </author>
<date year="2020"/> <date year="2020"/>
</front> </front>
<seriesInfo name="In " value="Sensors, 20(5), p.1446."/> <refcontent>Sensors, vol. 20, no. 5, p. 1446</refcontent>
<seriesInfo name="DOI" value="10.3390/s20051446"/>
</reference> </reference>
<reference anchor="BATT_DRAIN" target="">
<reference anchor="BATT_DRAIN" target="https://ieeexplore.ieee.org/documen
t/7993011">
<front> <front>
<title> A survey of wearable devices and challenges.</title> <title>A Survey of Wearable Devices and Challenges</title>
<author initials="S" surname="Seneviratne" fullname="Suranga Senevirat ne"> <author initials="S" surname="Seneviratne" fullname="Suranga Senevirat ne">
<organization/> <organization/>
</author> </author>
<author initials="Y" surname="Hu" fullname="Yining Hu"> <author initials="Y" surname="Hu" fullname="Yining Hu">
<organization/> <organization/>
</author> </author>
<author initials="T" surname="Nguyen" fullname=" Tham Nguyen"> <author initials="T" surname="Nguyen" fullname="Tham Nguyen">
<organization/> <organization/>
</author> </author>
<author initials="G" surname="Lan" fullname=" Guohao Lan"> <author initials="G" surname="Lan" fullname="Guohao Lan">
<organization/> <organization/>
</author> </author>
<author initials="S" surname="Khalifa" fullname=" Sara Khalifa"> <author initials="S" surname="Khalifa" fullname="Sara Khalifa">
<organization/> <organization/>
</author> </author>
<author initials="K" surname="Thilakarathna" fullname=" Kanchana Thila karathna"> <author initials="K" surname="Thilakarathna" fullname="Kanchana Thilak arathna">
<organization/> <organization/>
</author> </author>
<author initials="M" surname="Hassan" fullname=" Mahbub Hassan"> <author initials="M" surname="Hassan" fullname="Mahbub Hassan">
<organization/> <organization/>
</author> </author>
<author initials="A" surname="Seneviratne" fullname=" Aruna Seneviratn e"> <author initials="A" surname="Seneviratne" fullname="Aruna Seneviratne ">
<organization/> <organization/>
</author> </author>
<date year="2017"/> <date year="2017"/>
</front> </front>
<seriesInfo name="In " value="IEEE Communication Surveys and Tutorials, <refcontent>IEEE Communication Surveys and Tutorials, vol. 19 no. 4, pp.
19(4), p.2573-2620."/> 2573-2620</refcontent>
<seriesInfo name="DOI" value="10.1109/COMST.2017.2731979"/>
</reference> </reference>
<reference anchor="PER_SENSE" target="">
<reference anchor="PER_SENSE" target="https://dl.acm.org/doi/10.1145/10125
51.1012559">
<front> <front>
<title> Perceptual sensitivity to head tracking latency in virtual env ironments with varying degrees of scene complexity.</title> <title> Perceptual sensitivity to head tracking latency in virtual env ironments with varying degrees of scene complexity.</title>
<author initials="K" surname="Mania" fullname="Katrina Mania"> <author initials="K" surname="Mania" fullname="Katerina Mania">
<organization/> <organization/>
</author> </author>
<author initials="B.D." surname="Adelstein" fullname="Bernard D. Adels tein "> <author initials="B.D." surname="Adelstein" fullname="Bernard D. Adels tein">
<organization/> <organization/>
</author> </author>
<author initials="S.R." surname="Ellis" fullname=" Stephen R. Ellis"> <author initials="S.R." surname="Ellis" fullname="Stephen R. Ellis">
<organization/> <organization/>
</author> </author>
<author initials="M.I." surname="Hill" fullname=" Michael I. Hill"> <author initials="M.I." surname="Hill" fullname="Michael I. Hill">
<organization/> <organization/>
</author> </author>
<date year="2004"/> <date year="2004"/>
</front> </front>
<seriesInfo name="In " value="Proceedings of the 1st Symposium on Applie <refcontent>APGV '04: Proceedings of the 1st Symposium on Applied percep
d perception in graphics and visualization pp. 39-47."/> tion in graphics and visualization, pp. 39-47</refcontent>
<seriesInfo name="DOI" value="10.1145/1012551.1012559"/>
</reference> </reference>
<reference anchor="XR" target="">
<reference anchor="XR" target="https://portal.3gpp.org/desktopmodules/Spec
ifications/SpecificationDetails.aspx?specificationId=3534">
<front> <front>
<title> 3GPP TR 26.928: Extended Reality (XR) in 5G.</title> <title>Extended Reality (XR) in 5G</title>
<author initials="" surname="3GPP" fullname="3GPP"> <author>
<organization/> <organization>3GPP</organization>
</author> </author>
<date year="2020"/> <date year="2020"/>
</front> </front>
<seriesInfo name="" value="https://portal.3gpp.org/desktopmodules/Specif ications/SpecificationDetails.aspx?specificationId=3534"/> <seriesInfo name="3GPP TR" value="26.928"/>
</reference> </reference>
<reference anchor="CLOUD" target="">
<reference anchor="CLOUD" target="https://dl.acm.org/doi/10.1145/3442381.3
449854">
<front> <front>
<title> Surrounded by the Clouds: A Comprehensive Cloud Reachability S <title>Surrounded by the Clouds: A Comprehensive Cloud Reachability St
tudy.</title> udy</title>
<author initials="L." surname="Corneo" fullname=" Lorenzo Corneo"> <author initials="L." surname="Corneo" fullname="Lorenzo Corneo">
<organization/> <organization/>
</author> </author>
<author initials="M." surname="Eder" fullname=" Maximilian Eder"> <author initials="M." surname="Eder" fullname="Maximilian Eder">
<organization/> <organization/>
</author> </author>
<author initials="N." surname="Mohan" fullname=" Nitinder Mohan"> <author initials="N." surname="Mohan" fullname="Nitinder Mohan">
<organization/> <organization/>
</author> </author>
<author initials="A." surname="Zavodovski" fullname=" Aleksandr Zavodo vski"> <author initials="A." surname="Zavodovski" fullname="Aleksandr Zavodov ski">
<organization/> <organization/>
</author> </author>
<author initials="S." surname="Bayhan" fullname=" Suzan Bayhan"> <author initials="S." surname="Bayhan" fullname="Suzan Bayhan">
<organization/> <organization/>
</author> </author>
<author initials="W." surname="Wong" fullname=" Walter Wong"> <author initials="W." surname="Wong" fullname="Walter Wong">
<organization/> <organization/>
</author> </author>
<author initials="P." surname="Gunningberg" fullname=" Per Gunningberg "> <author initials="P." surname="Gunningberg" fullname="Per Gunningberg" >
<organization/> <organization/>
</author> </author>
<author initials="J." surname="Kangasharju" fullname=" Jussi Kangashar ju"> <author initials="J." surname="Kangasharju" fullname="Jussi Kangasharj u">
<organization/> <organization/>
</author> </author>
<author initials="J." surname="Ott" fullname=" Jörg Ott"> <author initials="J." surname="Ott" fullname="Jörg Ott">
<organization/> <organization/>
</author> </author>
<date year="2021"/> <date year="2021"/>
</front> </front>
<seriesInfo name="In" value="Proceedings of the Web Conference 2021, pp. <refcontent>WWW '21: Proceedings of the Web Conference 2021, pp. 295-304
295-304"/> </refcontent>
<seriesInfo name="DOI" value="10.1145/3442381.3449854"/>
</reference> </reference>
<reference anchor="OCCL_3" target="">
<reference anchor="OCCL_3" target="https://www.roadtovr.com/oculus-shares-
5-key-ingredients-for-presence-in-virtual-reality/">
<front> <front>
<title> Oculus Shares 5 Key Ingredients for Presence in Virtual Realit y.</title> <title>Oculus Shares 5 Key Ingredients for Presence in Virtual Reality </title>
<author initials="B." surname="Lang" fullname="Ben Lang"> <author initials="B." surname="Lang" fullname="Ben Lang">
<organization/> <organization/>
</author> </author>
<date year="2014"/> <date day="24" month="September" year="2014"/>
</front> </front>
<seriesInfo name="" value="https://www.roadtovr.com/oculus-shares-5-key- ingredients-for-presence-in-virtual-reality/"/> <refcontent>Road to VR</refcontent>
</reference> </reference>
<reference anchor="PREDICT" target="">
<reference anchor="PREDICT" target="https://pubmed.ncbi.nlm.nih.gov/226242
90/">
<front> <front>
<title> The effect of apparent latency on simulator sickness while usi <title>The effect of apparent latency on simulator sickness while usin
ng a see-through helmet-mounted display: Reducing apparent latency with predicti g a see-through helmet-mounted display: reducing apparent latency with predictiv
ve compensation..</title> e compensation</title>
<author initials="T. J." surname="Buker" fullname="Timothy J. Buker"> <author initials="T.J." surname="Buker" fullname="Timothy J. Buker">
<organization/> <organization/>
</author> </author>
<author initials="D.A." surname="Vincenzi" fullname="Dennis A. Vincenz i "> <author initials="D.A." surname="Vincenzi" fullname="Dennis A. Vincenz i ">
<organization/> <organization/>
</author> </author>
<author initials="J.E." surname="Deaton" fullname=" John E. Deaton"> <author initials="J.E." surname="Deaton" fullname=" John E. Deaton">
<organization/> <organization/>
</author> </author>
<date year="2012"/> <date month="April" year="2012"/>
</front> </front>
<seriesInfo name="In " value="Human factors 54.2, pp. 235-249."/> <refcontent>Human Factors, vol. 54, no. 2, pp. 235-249</refcontent>
<seriesInfo name="DOI" value="10.1177/0018720811428734"/>
</reference> </reference>
<reference anchor="URLLC" target="">
<reference anchor="URLLC" target="https://portal.3gpp.org/desktopmodules/S
pecifications/SpecificationDetails.aspx?specificationId=3453">
<front> <front>
<title> 3GPP TR 23.725: Study on enhancement of Ultra-Reliable <title>Study on enhancement of Ultra-Reliable
Low-Latency Communication (URLLC) support in the 5G Core Low-Latency Communication (URLLC) support in the 5G Core
network (5GC).</title> network (5GC)</title>
<author initials="" surname="3GPP" fullname="3GPP"> <author>
<organization/> <organization>3GPP</organization>
</author> </author>
<date year="2019"/> <date year="2019"/>
</front> </front>
<seriesInfo name="" value="https://portal.3gpp.org/desktopmodules/Specif ications/ SpecificationDetails.aspx?specificationId=3453"/> <seriesInfo name="3GPP TR" value="23.725"/>
</reference> </reference>
<reference anchor="AUGMENTED" target="">
<reference anchor="AUGMENTED" target="https://www.oreilly.com/library/view
/augmented-reality-principles/9780133153217/">
<front> <front>
<title> Augmented Reality</title> <title>Augmented Reality: Principles and Practice</title>
<author initials="D. S." surname="Schmalstieg" fullname="Dieter Schmal <author initials="D" surname="Schmalstieg" fullname="Dieter Schmalstie
stieg"> g">
<organization/> <organization/>
</author> </author>
<author initials="T.H." surname="Hollerer" fullname="Dennis A.Hollerer "> <author initials="T" surname="Höllerer" fullname="Tobias Höllerer">
<organization/> <organization/>
</author> </author>
<date year="2016"/> <date year="2016"/>
</front> </front>
<seriesInfo name="" value="Addison Wesley"/> <refcontent>Addison-Wesley Professional</refcontent>
</reference> </reference>
<reference anchor="REG" target=""> <reference anchor="REG" target="https://direct.mit.edu/pvar/article-abstra ct/6/4/413/18334/Registration-Error-Analysis-for-Augmented-Reality?redirectedFro m=fulltext">
<front> <front>
<title> Registration error analysis for augmented reality.</title> <title>Registration Error Analysis for Augmented Reality</title>
<author initials="R. L." surname="Holloway" fullname="Richard L. Hollo <author initials="R.L." surname="Holloway" fullname="Richard L. Hollow
way"> ay">
<organization/> <organization/>
</author> </author>
<date year="1997"/> <date month="August" year="1997"/>
</front> </front>
<seriesInfo name="In " value="Presence:Teleoperators and Virtual Environ <refcontent>Presence: Teleoperators and Virtual Environments, vol. 6, no
ments 6.4, pp. 413-432."/> . 4, pp. 413-432</refcontent>
<seriesInfo name="DOI" value="10.1162/pres.1997.6.4.413"/>
</reference> </reference>
<reference anchor="XR_TRAFFIC" target=""> <reference anchor="XR_TRAFFIC" target="https://ieeexplore.ieee.org/documen t/9158434">
<front> <front>
<title> Characterization of Multi-User Augmented Reality over Cellular Networks </title> <title> Characterization of Multi-User Augmented Reality over Cellular Networks </title>
<author initials="K." surname="Apicharttrisorn" fullname="Kittipat Api charttrisorn"> <author initials="K." surname="Apicharttrisorn" fullname="Kittipat Api charttrisorn">
<organization/> <organization/>
</author> </author>
<author initials="B." surname="Balasubramanian" fullname="Bharath Bala subramanian "> <author initials="B." surname="Balasubramanian" fullname="Bharath Bala subramanian ">
<organization/> <organization/>
</author> </author>
<author initials="J." surname="Chen" fullname=" Jiasi Chen"> <author initials="J." surname="Chen" fullname="Jiasi Chen">
<organization/> <organization/>
</author> </author>
<author initials="R." surname="Sivaraj" fullname=" Rajarajan Sivaraj"> <author initials="R." surname="Sivaraj" fullname="Rajarajan Sivaraj">
<organization/> <organization/>
</author> </author>
<author initials="Y." surname="Tsai" fullname=" Yi-Zhen Tsai"> <author initials="Y." surname="Tsai" fullname="Yi-Zhen Tsai">
<organization/> <organization/>
</author> </author>
<author initials="R." surname="Jana" fullname="Rittwik Jana"> <author initials="R." surname="Jana" fullname="Rittwik Jana">
<organization/> <organization/>
</author> </author>
<author initials="S." surname="Krishnamurthy" fullname="Srikanth Krish namurthy"> <author initials="S." surname="Krishnamurthy" fullname="Srikanth Krish namurthy">
<organization/> <organization/>
</author> </author>
<author initials="T." surname="Tran" fullname="Tuyen Tran"> <author initials="T." surname="Tran" fullname="Tuyen Tran">
<organization/> <organization/>
</author> </author>
<author initials="Y." surname="Zhou" fullname="Yu Zhou"> <author initials="Y." surname="Zhou" fullname="Yu Zhou">
<organization/> <organization/>
</author> </author>
<date year="2020"/> <date year="2020"/>
</front> </front>
<seriesInfo name="In " value="17th Annual IEEE International Conference <refcontent>2020 17th Annual IEEE International Conference on Sensing, C
on Sensing, Communication, and Networking (SECON), pp. 1-9. IEEE"/> ommunication, and Networking (SECON), pp. 1-9</refcontent>
<seriesInfo name="DOI" value="10.1109/SECON48991.2020.9158434"/>
</reference> </reference>
<reference anchor="EDGE_3" target=""> <reference anchor="EDGE_3" target="https://link.springer.com/book/10.1007/ 978-3-031-79733-0">
<front> <front>
<title> 5G mobile networks: A systems approach.</title> <title>5G Mobile Networks: A Systems Approach</title>
<author initials="L." surname="Peterson" fullname="Larry Peterson"> <author initials="L." surname="Peterson" fullname="Larry Peterson">
<organization/> <organization/>
</author> </author>
<author initials="O." surname="Sunay" fullname="Oguz Sunay">
<author initials="O." surname="Sunay" fullname="Oguz Sunay">
<organization/> <organization/>
</author> </author>
<date year="2020"/> <date year="2020"/>
</front> </front>
<seriesInfo name="In " value="Synthesis Lectures on Network Systems."/> <refcontent>Synthesis Lectures on Network Systems</refcontent>
<seriesInfo name="DOI" value="10.1007/978-3-031-79733-0"/>
</reference> </reference>
<reference anchor="AUGMENTED_2" target=""> <reference anchor="AUGMENTED_2" target="https://direct.mit.edu/pvar/articl e-abstract/6/4/355/18336/A-Survey-of-Augmented-Reality?redirectedFrom=fulltext">
<front> <front>
<title> A Survey of Augmented Reality.</title> <title>A Survey of Augmented Reality</title>
<author initials="R. T." surname="Azuma" fullname="Ronald T. Azuma"> <author initials="R.T." surname="Azuma" fullname="Ronald T. Azuma">
<organization/> <organization/>
</author> </author>
<date year="1997"/> <date month="August" year="1997"/>
</front> </front>
<seriesInfo name="" value="Presence:Teleoperators and Virtual Environmen <refcontent>Presence: Teleoperators and Virtual Environments, vol. 6, no
ts 6.4, pp. 355-385."/> . 4, pp. 355-385</refcontent>
<seriesInfo name="DOI" value="10.1162/pres.1997.6.4.355"/>
</reference> </reference>
<reference anchor="METRICS_1" target=""> <reference anchor="METRICS_1" target="https://gsacom.com/paper/augmented-v irtual-reality-first-wave-5g-killer-apps-qualcomm-abi-research/">
<front> <front>
<title> Augmented and Virtual Reality: The first Wave of Killer Apps. <title>Augmented and Virtual Reality: The first Wave of Killer Apps: Q
</title> ualcomm - ABI Research</title>
<author initials="" surname="ABI Research" fullname="ABI Research"> <author>
<organization/> <organization>ABI Research</organization>
</author> </author>
<date month="April" year="2017"/>
<date year="2017"/>
</front> </front>
<seriesInfo name="" value="https://gsacom.com/paper/augmented-virtual-re ality-first-wave-5g-killer-apps-qualcomm-abi-research/"/>
</reference> </reference>
<reference anchor="METRICS_2" target=""> <reference anchor="METRICS_2" target="https://ieeexplore.ieee.org/document /392383">
<front> <front>
<title> Wide Area Traffic: The Failure of Poisson Modelling.</title> <title>Wide area traffic: the failure of Poisson modeling</title>
<author initials="V." surname="Paxon" fullname="Vern Paxon"> <author initials="V." surname="Paxon" fullname="Vern Paxon">
<organization/> <organization/>
</author> </author>
<author initials="S." surname="Floyd" fullname="Sally Floyd">
<author initials="S." surname="Floyd" fullname="Sally Floyd">
<organization/> <organization/>
</author> </author>
<date month="June" year="1995"/>
<date year="1995"/>
</front> </front>
<seriesInfo name="In" value="IEEE/ACM Transactions on Networking, pp. 2 <refcontent>IEEE/ACM Transactions on Networking, vol. 3, no. 3, pp. 226-
26-244."/> 244</refcontent>
<seriesInfo name="DOI" value="10.1109/90.392383"/>
</reference> </reference>
<reference anchor="METRICS_3" target=""> <reference anchor="METRICS_3" target="https://ieeexplore.ieee.org/abstract /document/554723">
<front> <front>
<title> Self-Similarity Through High Variability: Statistical Analysis and Ethernet LAN Traffic at Source Level.</title> <title>Self-similarity through high variability: statistical analysis and Ethernet LAN traffic at source level</title>
<author initials="W." surname="Willinger" fullname="Walter Willinger"> <author initials="W." surname="Willinger" fullname="Walter Willinger">
<organization/> <organization/>
</author> </author>
<author initials="M.S." surname="Taqqu" fullname="Murad S. Taqqu"> <author initials="M.S." surname="Taqqu" fullname="Murad S. Taqqu">
<organization/> <organization/>
</author> </author>
<author initials="R." surname="Sherman" fullname="Robert Sherman"> <author initials="R." surname="Sherman" fullname="Robert Sherman">
<organization/> <organization/>
</author> </author>
<author initials="D.V." surname="Wilson" fullname="Daniel V. Wilson"> <author initials="D.V." surname="Wilson" fullname="Daniel V. Wilson">
<organization/> <organization/>
</author> </author>
<date month="February" year="1997"/>
<date year="1997"/>
</front> </front>
<seriesInfo name="In" value="IEEE/ACM Transactions on Networking, pp. 7 <refcontent>IEEE/ACM Transactions on Networking, vol. 5, no. 1, pp. 71-8
1-86."/> 6</refcontent>
<seriesInfo name="DOI" value="10.1109/90.554723"/>
</reference> </reference>
<reference anchor="METRICS_4" target=""> <reference anchor="METRICS_4" target="https://www.sciencedirect.com/scienc e/article/pii/S1063520300903427">
<front> <front>
<title> Multiscale Analysis and Data Networks.</title> <title>Multiscale Analysis and Data Networks</title>
<author initials="A.C." surname="Gilbert" fullname="A. C. Gilbert"> <author initials="A.C." surname="Gilbert" fullname="A.C. Gilbert">
<organization/> <organization/>
</author> </author>
<date month="May" year="2001"/>
<date year="2001"/>
</front> </front>
<seriesInfo name="In" value="Applied and Computational Harmonic Analysis <refcontent>Applied and Computational Harmonic Analysis, vol. 10, no. 3,
, pp. 185-202."/> pp. 185-202</refcontent>
<seriesInfo name="DOI" value="10.1006/acha.2000.0342"/>
</reference> </reference>
<reference anchor="METRICS_5" target=""> <reference anchor="METRICS_5" target="https://research.google/pubs/site-re liability-engineering-how-google-runs-production-systems/">
<front> <front>
<title> Site Reliability Engineering: How Google Runs Production Syste <title>Site Reliability Engineering: How Google Runs Production System
ms.</title> s</title>
<author initials="B." surname="Beyer" fullname="Betsy Beyer"> <author initials="B." surname="Beyer" fullname="Betsy Beyer" role="edi
tor">
<organization/> <organization/>
</author> </author>
<author initials="C." surname="Jones" fullname="Chris Jones" role="edit
<author initials="C." surname="Jones" fullname="Chris Jones"> or">
<organization/> <organization/>
</author> </author>
<author initials="J." surname="Petoff" fullname="Jennifer Petoff" role=
<author initials="J." surname="Petoff" fullname="Jennifer Petoff"> "editor">
<organization/> <organization/>
</author> </author>
<author initials="N.R." surname="Murphy" fullname="Niall Richard Murphy
<author initials="N.R." surname="Murphy" fullname="Niall Richard Murphy " role="editor">
">
<organization/> <organization/>
</author> </author>
<date year="2016"/> <date year="2016"/>
</front> </front>
<seriesInfo name="" value="O'Reilly Media, Inc."/> <refcontent>O'Reilly Media, Inc.</refcontent>
</reference> </reference>
<reference anchor="METRICS_6" target=""> <reference anchor="METRICS_6" target="https://ieeexplore.ieee.org/document /9363323">
<front> <front>
<title> A survey on mobile augmented reality with 5G mobile edge compu ting: architectures, applications, and technical aspects.</title> <title>A Survey on Mobile Augmented Reality With 5G Mobile Edge Comput ing: Architectures, Applications, and Technical Aspects</title>
<author initials="Y." surname="Siriwardhana" fullname="Yushan Siriward hana"> <author initials="Y." surname="Siriwardhana" fullname="Yushan Siriward hana">
<organization/> <organization/>
</author> </author>
<author initials="P." surname="Porambage" fullname="Pawani Porambage"> <author initials="P." surname="Porambage" fullname="Pawani Porambage">
<organization/> <organization/>
</author> </author>
<author initials="M." surname="Liyanage" fullname="Madhusanka Liyanage" > <author initials="M." surname="Liyanage" fullname="Madhusanka Liyanage" >
<organization/> <organization/>
</author> </author>
<author initials="M." surname="Ylianttila" fullname="Mika Ylianttila"> <author initials="M." surname="Ylianttila" fullname="Mika Ylianttila">
<organization/> <organization/>
</author> </author>
<date year="2021"/> <date year="2021"/>
</front> </front>
<seriesInfo name="In" value="IEEE Communications Surveys and Tutorials, <refcontent>IEEE Communications Surveys and Tutorials, vol. 23, no. 2, p
Vol 23, No. 2"/> p. 1160-1192</refcontent>
<seriesInfo name="DOI" value="10.1109/COMST.2021.3061981"/>
</reference> </reference>
<reference anchor="HEAVY_TAIL_3" target=""> <reference anchor="HEAVY_TAIL_3" target="https://www.wiley.com/en-us/A+Pri mer+in+Data+Reduction%3A+An+Introductory+Statistics+Textbook-p-9780471101352">
<front> <front>
<title> A Primer in Data Reduction.</title> <title>A Primer in Data Reduction: An Introductory Statistics Textbook </title>
<author initials="A." surname="Ehrenberg" fullname="A.S.C Ehrenberg "> <author initials="A." surname="Ehrenberg" fullname="A.S.C Ehrenberg ">
<organization/> <organization/>
</author> </author>
<date year="2007"/>
<date year="1982"/>
</front> </front>
<seriesInfo name="John" value="Wiley, London"/> <refcontent>John Wiley and Sons</refcontent>
</reference> </reference>
<reference anchor="RFC9023" target="https://www.rfc-editor.org/info/rfc9023"> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.902
<front> 3.xml"/>
<title>Deterministic Networking (DetNet) Data Plane: IP over IEEE 802.1 Time-Sen <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.893
sitive Networking (TSN)</title> 9.xml"/>
<author fullname="B. Varga" initials="B." role="editor" surname="Varga"/> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.945
<author fullname="J. Farkas" initials="J." surname="Farkas"/> 0.xml"/>
<author fullname="A. Malis" initials="A." surname="Malis"/>
<author fullname="S. Bryant" initials="S." surname="Bryant"/>
<date month="June" year="2021"/>
<abstract>
<t>This document specifies the Deterministic Networking IP data plane when opera
ting over a Time-Sensitive Networking (TSN) sub-network. This document does not
define new procedures or processes. Whenever this document makes statements or r
ecommendations, these are taken from normative text in the referenced RFCs.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="9023"/>
<seriesInfo name="DOI" value="10.17487/RFC9023"/>
</reference>
<reference anchor="RFC8939" target="https://www.rfc-editor.org/info/rfc8939"> <reference anchor="DIST" target="https://dl.acm.org/doi/10.5555/2029110">
<front> <front>
<title>Deterministic Networking (DetNet) Data Plane: IP</title> <title> Distributed Systems: Concepts and Design</title>
<author fullname="B. Varga" initials="B." role="editor" surname="Varga"/> <author initials="G" surname="Coulouris" fullname="George Coulouris">
<author fullname="J. Farkas" initials="J." surname="Farkas"/> <organization/>
<author fullname="L. Berger" initials="L." surname="Berger"/> </author>
<author fullname="D. Fedyk" initials="D." surname="Fedyk"/> <author initials="J" surname="Dollimore" fullname="Jean Dollimore">
<author fullname="S. Bryant" initials="S." surname="Bryant"/> <organization/>
<date month="November" year="2020"/> </author>
<abstract> <author initials="T" surname="Kindberg" fullname="Tim Kindberg">
<t>This document specifies the Deterministic Networking (DetNet) data plane oper <organization/>
ation for IP hosts and routers that provide DetNet service to IP-encapsulated da </author>
ta. No DetNet-specific encapsulation is defined to support IP flows; instead, th <author initials="G" surname="Blair" fullname="Gordon Blair">
e existing IP-layer and higher-layer protocol header information is used to supp <organization/>
ort flow identification and DetNet service delivery. This document builds on the </author>
DetNet architecture (RFC 8655) and data plane framework (RFC 8938).</t> <date year="2011"/>
</abstract> </front>
</front> <refcontent>Addison-Wesley</refcontent>
<seriesInfo name="RFC" value="8939"/> </reference>
<seriesInfo name="DOI" value="10.17487/RFC8939"/>
</reference>
<reference anchor="RFC9450" target="https://www.rfc-editor.org/info/rfc9450"> <reference anchor="NIST1" target="https://csrc.nist.gov/pubs/sp/800/146/fi
<front> nal">
<title>Reliable and Available Wireless (RAW) Use Cases</title> <front>
<author fullname="CJ. Bernardos" initials="CJ." role="editor" surname="Bernardos <title>Cloud Computing Synopsis and Recommendations</title>
"/> <author>
<author fullname="G. Papadopoulos" initials="G." surname="Papadopoulos"/> <organization>NIST</organization>
<author fullname="P. Thubert" initials="P." surname="Thubert"/> </author>
<author fullname="F. Theoleyre" initials="F." surname="Theoleyre"/> <date month="May" year="2012"/>
<date month="August" year="2023"/> </front>
<abstract> <seriesInfo name="NIST SP" value="800-146"/>
<t>The wireless medium presents significant specific challenges to achieve prope <seriesInfo name="DOI" value="10.6028/NIST.SP.800-146"/>
rties similar to those of wired deterministic networks. At the same time, a numb </reference>
er of use cases cannot be solved with wires and justify the extra effort of goin
g wireless. This document presents wireless use cases (such as aeronautical comm
unications, amusement parks, industrial applications, pro audio and video, gamin
g, Unmanned Aerial Vehicle (UAV) and vehicle-to-vehicle (V2V) control, edge robo
tics, and emergency vehicles), demanding reliable and available behavior.</t>
</abstract>
</front>
<seriesInfo name="RFC" value="9450"/>
<seriesInfo name="DOI" value="10.17487/RFC9450"/>
</reference>
<reference anchor="DIST" target=""> <reference anchor="CWE" target="https://www.sans.org/top25-software-errors
<front> /">
<title> Distributed Systems: Concepts and Design</title> <front>
<author initials="G" surname="Coulouris" fullname="George Coulouris"> <title>CWE/SANS TOP 25 Most Dangerous Software Errors</title>
<organization/> <author>
</author> <organization>SANS Institute</organization>
<author initials="J" surname="Dollimore" fullname="Jean Dollimore"> </author>
<organization/> </front>
</author> </reference>
<author initials="T" surname="Kindberg" fullname="Tim Kindberg">
<organization/>
</author>
<author initials="G" surname="Blair" fullname="Gordon Blair">
<organization/>
</author>
<date year="2011"/>
</front>
<seriesInfo name="" value="Addison Wesley"/>
</reference>
<reference anchor="NIST1" target="">
<front>
<title> NIST SP 800-146: Cloud Computing Synopsis and Recommendations</title>
<author initials="" surname="" fullname="NIST">
<organization/>
</author>
<date year="2012"/>
</front>
<seriesInfo name="" value="National Institute of Standards and Technology, US De
partment of Commerce"/>
</reference>
<reference anchor="CWE" target="">
<front>
<title> CWE/SANS TOP 25 Most Dangerous Software Errorss</title>
<author initials="" surname="" fullname="SANS Institute">
<organization/>
</author>
<date year="2012"/>
</front>
<seriesInfo name="" value="Common Weakness Enumeration, SANS Institute"/>
</reference>
<reference anchor="NIST2" target="">
<front>
<title> NIST SP 800-123: Guide to General Server Security</title>
<author initials="" surname="" fullname="NIST">
<organization/>
</author>
<date year="2008"/>
</front>
<seriesInfo name="" value="National Institute of Standards and Technology, US De
partment of Commerce"/>
</reference>
<reference anchor="RFC2210" target="https://www.rfc-editor.org/info/rfc22 <reference anchor="NIST2" target="https://csrc.nist.gov/pubs/sp/800/123/fi
10"> nal">
<front> <front>
<title>The Use of RSVP with IETF Integrated Services</title> <title>Guide to General Server Security</title>
<author fullname="J. Wroclawski" initials="J." surname="Wroclawski"/> <author>
<date month="September" year="1997"/> <organization>NIST</organization>
<abstract> </author>
<t>This note describes the use of the RSVP resource reservation protocol with th <date month="July" year="2008"/>
e Controlled-Load and Guaranteed QoS control services. [STANDARDS-TRACK]</t> </front>
</abstract> <seriesInfo name="NIST SP" value="800-123"/>
</front> <seriesInfo name="DOI" value="10.6028/NIST.SP.800-123"/>
<seriesInfo name="RFC" value="2210"/> </reference>
<seriesInfo name="DOI" value="10.17487/RFC2210"/>
</reference>
<reference anchor="RFC2475" target="https://www.rfc-editor.org/info/rfc2475"> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.22
<front> 10.xml"/>
<title>An Architecture for Differentiated Services</title> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.24
<author fullname="S. Blake" initials="S." surname="Blake"/> 75.xml"/>
<author fullname="D. Black" initials="D." surname="Black"/>
<author fullname="M. Carlson" initials="M." surname="Carlson"/> </references>
<author fullname="E. Davies" initials="E." surname="Davies"/>
<author fullname="Z. Wang" initials="Z." surname="Wang"/> <section anchor="ack" numbered="false" toc="default">
<author fullname="W. Weiss" initials="W." surname="Weiss"/> <name>Acknowledgements</name>
<date month="December" year="1998"/> <t>Many thanks to <contact fullname="Spencer Dawkins"/>, <contact
<abstract> fullname="Rohit Abhishek"/>, <contact fullname="Jake Holland"/>,
<t>This document defines an architecture for implementing scalable service diffe <contact fullname="Kiran Makhijani"/>, <contact fullname="Ali
rentiation in the Internet. This memo provides information for the Internet comm Begen"/>, <contact fullname="Cullen Jennings"/>, <contact
unity.</t> fullname="Stephan Wenger"/>, <contact fullname="Eric Vyncke"/>,
</abstract> <contact fullname="Wesley Eddy"/>, <contact fullname="Paul Kyzivat"/>,
</front> <contact fullname="Jim Guichard"/>, <contact fullname="Roman
<seriesInfo name="RFC" value="2475"/> Danyliw"/>, <contact fullname="Warren Kumari"/>, and <contact
<seriesInfo name="DOI" value="10.17487/RFC2475"/> fullname="Zaheduzzaman Sarker"/> for providing helpful feedback,
</reference> suggestions, and comments.</t>
</section>
</references>
</back> </back>
</rfc> </rfc>
 End of changes. 265 change blocks. 
800 lines changed or deleted 816 lines changed or added

This html diff was produced by rfcdiff 1.48.