{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:47Z","timestamp":1750306967694,"version":"3.41.0"},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2013,7,1]],"date-time":"2013-07-01T00:00:00Z","timestamp":1372636800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["834529"],"award-info":[{"award-number":["834529"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2013,7]]},"abstract":"<jats:p>Wireless sensor networks are typically deployed in harsh environments, thus post-deployment failures are not infrequent. An execution trace containing events in their order of execution could play a crucial role in postmortem diagnosis of these failures. Obtaining such a trace however is challenging due to stringent resource constraints. We propose an efficient approach to intraprocedural and interprocedural control-flow tracing that generates traces of all interleaving concurrent events and of the control-flow paths taken inside those events. We demonstrate the effectiveness of our approach with the help of case studies and illustrate its low overhead through measurements and simulations.<\/jats:p>","DOI":"10.1145\/2489253.2489255","type":"journal-article","created":{"date-parts":[[2013,7,25]],"date-time":"2013-07-25T19:12:41Z","timestamp":1374779561000},"page":"1-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Diagnostic tracing for wireless sensor networks"],"prefix":"10.1145","volume":"9","author":[{"given":"Vinaitheerthan","family":"Sundaram","sequence":"first","affiliation":[{"name":"Purdue University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Patrick","family":"Eugster","sequence":"additional","affiliation":[{"name":"Purdue University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiangyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Purdue University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vamsidhar","family":"Addanki","sequence":"additional","affiliation":[{"name":"Purdue University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2013,7,23]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/183432.183527"},{"volume-title":"Proceedings of the 29th Annual ACM\/IEEE International Symposium on Microarcritecture (MICRO).","author":"Ball T.","key":"e_1_2_1_2_1"},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Beutel J. R\u00f6mer K. Ringwald M. and Woehrle M. 2009. Deployment techniques for sensor networks. In Sensor Networks: Where Theory Meets Practice G. Ferrari Ed. Signals and Communications Theory Springer Verlag Berlin Heiddberg 219--248.  Beutel J. R\u00f6mer K. Ringwald M. and Woehrle M. 2009. Deployment techniques for sensor networks. In Sensor Networks: Where Theory Meets Practice G. Ferrari Ed. Signals and Communications Theory Springer Verlag Berlin Heiddberg 219--248.","DOI":"10.1007\/978-3-642-01341-6_9"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460422"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69170-9_6"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322283"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182811"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127777.1127838"},{"volume-title":"Proceedings of the ACM Symposium on Networked Systems Design and Implementation (NSDI).","author":"Geels D.","key":"e_1_2_1_10_1"},{"volume-title":"Proceedings of the 9th International Conference on Permafrost (NICOP).","author":"Hasler A.","key":"e_1_2_1_11_1"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2002.804190"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278460.1278462"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644038.1644113"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460423"},{"volume-title":"Proceedings of the IEEE International Conference on Distributed Computing in Sensor System (DCOSS).","author":"Khan M. M. H.","key":"e_1_2_1_16_1"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644038.1644052"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.62"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.61"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247669"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453115"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/301618.301678"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958506"},{"key":"e_1_2_1_24_1","unstructured":"Levis P. Madden S. Polastre J. Szewczyk R. Whitehouse K. Woo A. Gay D. Hill J. Welsh M. Brewer E. and Culler D. 2005. TinyOS: An operating system for sensor networks. In Ambient Intelligence W. Weber J. M. Rabaey and E. Aarts Eds. Springer Verlag Berlin Heidelberg Chapter 7.  Levis P. Madden S. Polastre J. Szewczyk R. Whitehouse K. Woo A. Gay D. Hill J. Welsh M. Brewer E. and Culler D. 2005. TinyOS: An operating system for sensor networks. In Ambient Intelligence W. Weber J. M. Rabaey and E. Aarts Eds. Springer Verlag Berlin Heidelberg Chapter 7."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1791212.1791234"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460424"},{"volume-title":"Proceedings of the ACM Symposium on Networked Systems Design and Implementation (NSDI).","author":"Liu X.","key":"e_1_2_1_27_1"},{"volume-title":"Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM).","author":"Luo L.","key":"e_1_2_1_28_1"},{"volume-title":"Proceedings of the ACM International Conference on Compiler Construction (CC).","author":"Melski D.","key":"e_1_2_1_29_1"},{"volume-title":"Proceedings of the ACM USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Musuvathi M.","key":"e_1_2_1_30_1"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294921.1294925"},{"volume-title":"Proceedings of the IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON).","author":"Polley J.","key":"e_1_2_1_32_1"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1098918.1098946"},{"volume-title":"Proceedings of the IEEE Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM).","author":"Sauter R.","key":"e_1_2_1_34_1"},{"volume-title":"Proceedings of the Conference and Exhibition on Design, Automation and Test in Europe (DATE).","author":"Shea R.","key":"e_1_2_1_35_1"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644038.1644053"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2008.29"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869983.1870001"},{"volume-title":"Proceedings of the ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN).","author":"Sundaram V.","key":"e_1_2_1_39_1"},{"volume-title":"Proceedings of the ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN).","author":"Titzer B. L.","key":"e_1_2_1_40_1"},{"volume-title":"Proceedings of the 2nd European Workshop on Wireless Sensor Networks (EWSN).","author":"Tolle G.","key":"e_1_2_1_41_1"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1984.1659158"},{"volume-title":"Proceedings of the ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN).","author":"Werner-Allen G.","key":"e_1_2_1_43_1"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127777.1127840"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322282"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2489253.2489255","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2489253.2489255","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:21Z","timestamp":1750235961000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2489253.2489255"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,7]]}},"alternative-id":["10.1145\/2489253.2489255"],"URL":"https:\/\/doi.org\/10.1145\/2489253.2489255","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2013,7]]},"assertion":[{"value":"2011-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}