{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:49:26Z","timestamp":1761648566033,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,10]],"date-time":"2018-06-10T00:00:00Z","timestamp":1528588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,10]]},"DOI":"10.1145\/3210240.3210318","type":"proceedings-article","created":{"date-parts":[[2018,7,6]],"date-time":"2018-07-06T12:36:06Z","timestamp":1530880566000},"page":"178-190","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":59,"title":["Explicit Channel Coordination via Cross-technology Communication"],"prefix":"10.1145","author":[{"given":"Zhimeng","family":"Yin","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, University of Minnesota"}]},{"given":"Zhijun","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Minnesota"}]},{"given":"Song Min","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer Science, George Mason University"}]},{"given":"Tian","family":"He","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Minnesota"}]}],"member":"320","published-online":{"date-parts":[[2018,6,10]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"CC2420. www.ti.com\/lit\/ds\/symlink\/cc2420.pdf.  CC2420. www.ti.com\/lit\/ds\/symlink\/cc2420.pdf."},{"key":"e_1_3_2_2_2_1","unstructured":"Iperf. https:\/\/iperf.fr\/.  Iperf. https:\/\/iperf.fr\/."},{"key":"e_1_3_2_2_3_1","unstructured":"Nest. https:\/\/nest.com\/?from-chooser=true.  Nest. https:\/\/nest.com\/?from-chooser=true."},{"key":"e_1_3_2_2_4_1","unstructured":"wips policy alarm encyclopedia. https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/wireless\/mse\/3350\/5-2\/wIPS\/configuration\/guide\/msecg_wIPS\/msecg_appA_wIPS.html.  wips policy alarm encyclopedia. https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/wireless\/mse\/3350\/5-2\/wIPS\/configuration\/guide\/msecg_wIPS\/msecg_appA_wIPS.html."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCDA.2010.5540694"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_3_2_2_7_1","first-page":"227","volume-title":"NSDI","author":"Bhardwaj R.","year":"2017","unstructured":"R. Bhardwaj , K. Chintalapudi , and R. Ramjee . Skip-correlation for multi-power wireless carrier sensing . In NSDI , pages 227 -- 242 , 2017 . R. Bhardwaj, K. Chintalapudi, and R. Ramjee. Skip-correlation for multi-power wireless carrier sensing. In NSDI, pages 227--242, 2017."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.840210"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2008.ECP.100"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973781"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614330"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/978-1-4419-6047-4_15","volume-title":"WirelessHART\u00e2\u010e\u0107","author":"Chen D.","year":"2010","unstructured":"D. Chen , M. Nixon , and A. Mok . Why wirelesshart . In WirelessHART\u00e2\u010e\u0107 , pages 195 -- 199 . Springer , 2010 . D. Chen, M. Nixon, and A. Mok. Why wirelesshart. In WirelessHART\u00e2\u010e\u0107, pages 195--199. Springer, 2010."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057109"},{"key":"e_1_3_2_2_14_1","unstructured":"CISCO. The zettabyte era: Trends and analysis. https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/vni-hyperconnectivity-wp.html.  CISCO. The zettabyte era: Trends and analysis. https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/vni-hyperconnectivity-wp.html."},{"key":"e_1_3_2_2_15_1","unstructured":"K. Devadiga. Ieee 802.15. 4 and the internet of things.  K. Devadiga. Ieee 802.15. 4 and the internet of things."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2476349"},{"key":"e_1_3_2_2_17_1","volume-title":"Gartner report","author":"Gartner I.","year":"2016","unstructured":"I. Gartner . Gartner report , 2016 . http:\/\/cloudtimes.org\/2013\/12\/20\/gartner-theinternet-of-things-will-grow-30-times-to-26-billion-by-2020\/. I. Gartner. Gartner report, 2016. http:\/\/cloudtimes.org\/2013\/12\/20\/gartner-theinternet-of-things-will-grow-30-times-to-26-billion-by-2020\/."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364667"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018456"},{"key":"e_1_3_2_2_20_1","volume-title":"IEEE standard part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications","author":"W. L. W. Group","year":"2012","unstructured":"W. L. W. Group . IEEE standard part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications . In IEEE Std 802.11- 2012 (Revision of IEEE Std 802.11-2007), March 2012. W. L. W. Group. IEEE standard part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications. In IEEE Std 802.11-2012 (Revision of IEEE Std 802.11-2007), March 2012."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057108"},{"key":"e_1_3_2_2_22_1","first-page":"205","volume-title":"NSDI","author":"Han B.","year":"2010","unstructured":"B. Han , A. Schulman , F. Gringoli , N. Spring , B. Bhattacharjee , L. Nava , L. Ji , S. Lee , and R. R. Miller . Maranello: Practical partial packet recovery for 802.11 . In NSDI , pages 205 -- 218 , 2010 . B. Han, A. Schulman, F. Gringoli, N. Spring, B. Bhattacharjee, L. Nava, L. Ji, S. Lee, and R. R. Miller. Maranello: Practical partial packet recovery for 802.11. In NSDI, pages 205--218, 2010."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848169"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.BODYNETS2009.6029"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2010.5762779"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CANDAR.2015.16"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131672.3131678"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790098"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2177274"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117816"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869983.1870014"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409984"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2008.016461"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413201"},{"key":"e_1_3_2_2_35_1","first-page":"159","volume-title":"NSDI","author":"Shi L.","year":"2015","unstructured":"L. Shi , P. Bahl , and D. Katabi . Beyond sensing: Multi-ghz realtime spectrum analytics . In NSDI , pages 159 -- 172 , 2015 . L. Shi, P. Bahl, and D. Katabi. Beyond sensing: Multi-ghz realtime spectrum analytics. In NSDI, pages 159--172, 2015."},{"key":"e_1_3_2_2_36_1","unstructured":"I. C. Society. Part 15.4: Low-rate wireless personal area networks.  I. C. Society. Part 15.4: Low-rate wireless personal area networks."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1969.7051"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2013.6689686"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.31"},{"key":"e_1_3_2_2_40_1","volume-title":"HealthSec","author":"Wolman A.","year":"2010","unstructured":"A. Wolman , S. Saroiu , and V. Bahl . Using trusted sensors to monitor patients' habits . In HealthSec , 2010 . A. Wolman, S. Saroiu, and V. Bahl. Using trusted sensors to monitor patients' habits. In HealthSec, 2010."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2011.84"},{"key":"e_1_3_2_2_42_1","volume-title":"Developing zigbee deployment guideline under wifi interference for smart grid applications","author":"Yi P.","year":"2011","unstructured":"P. Yi , A. Iwayemi , and C. Zhou . Developing zigbee deployment guideline under wifi interference for smart grid applications . IEEE transactions on smart grid, 2(1):110--120, 2011 . P. Yi, A. Iwayemi, and C. Zhou. Developing zigbee deployment guideline under wifi interference for smart grid applications. IEEE transactions on smart grid, 2(1):110--120, 2011."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057107"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2011.6033030"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500426"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2107502.2107510"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2200499"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566930"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860002"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494232.2465545"}],"event":{"name":"MobiSys '18: The 16th Annual International Conference on Mobile Systems, Applications, and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Munich Germany","acronym":"MobiSys '18"},"container-title":["Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3210240.3210318","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3210240.3210318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:48Z","timestamp":1750210788000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3210240.3210318"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,10]]},"references-count":50,"alternative-id":["10.1145\/3210240.3210318","10.1145\/3210240"],"URL":"https:\/\/doi.org\/10.1145\/3210240.3210318","relation":{},"subject":[],"published":{"date-parts":[[2018,6,10]]},"assertion":[{"value":"2018-06-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}