{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:34:47Z","timestamp":1776112487451,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T00:00:00Z","timestamp":1539216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["IIS 1149799"],"award-info":[{"award-number":["IIS 1149799"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS 1505728"],"award-info":[{"award-number":["CNS 1505728"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,11]]},"DOI":"10.1145\/3242587.3242668","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T13:30:26Z","timestamp":1539696626000},"page":"447-455","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["WiFr\u00f6st"],"prefix":"10.1145","author":[{"given":"William","family":"McGrath","sequence":"first","affiliation":[{"name":"Stanford University &amp; University of California, Berkeley, Stanford, CA, USA"}]},{"given":"Jeremy","family":"Warner","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Mitchell","family":"Karchemsky","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Andrew","family":"Head","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Daniel","family":"Drew","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Bjoern","family":"Hartmann","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,11]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Arduino -- wifi. https:\/\/www.arduino.cc\/en\/Reference\/WiFi. Accessed 04-04--2018.  Arduino -- wifi. https:\/\/www.arduino.cc\/en\/Reference\/WiFi. Accessed 04-04--2018."},{"key":"e_1_3_2_2_2_1","unstructured":"Available memory -- arduino playground. https:\/\/playground.arduino.cc\/Code\/AvailableMemory. Accessed 04-04--2018.  Available memory -- arduino playground. https:\/\/playground.arduino.cc\/Code\/AvailableMemory. Accessed 04-04--2018."},{"key":"e_1_3_2_2_3_1","unstructured":"Ntp: The network time protocol. http:\/\/www.ntp.org\/index.html. Accessed 04-04--2018.  Ntp: The network time protocol. http:\/\/www.ntp.org\/index.html. Accessed 04-04--2018."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.2307\/1269768"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/354401.354754"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858533"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501988.2502050"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272998.1273001"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2016.07.004"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/647883.738238"},{"key":"e_1_3_2_2_11_1","volume-title":"Proceedings of the Third International Conference on Internet-of-Things Design and Implementation, ACM","author":"Chiang H.","year":"2018"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984511.2984566"},{"key":"e_1_3_2_2_13_1","first-page":"323","article-title":"Quanto: Tracking energy in networked embedded systems","volume":"8","author":"Fonseca R.","year":"2008","journal-title":"OSDI"},{"key":"e_1_3_2_2_14_1","volume-title":"Proceedings of the 4th USENIX conference on Networked systems design & implementation, USENIX Association","author":"Fonseca R.","year":"2007"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2641638.2641652"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/22627.22367"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342453"},{"key":"e_1_3_2_2_18_1","first-page":"71","article-title":"know what your packet did last hop: Using packet histories to troubleshoot networks","volume":"14","author":"Handigol N.","year":"2014","journal-title":"NSDI"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1166253.1166300"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807468"},{"key":"e_1_3_2_2_21_1","volume-title":"Adafruit io. https:\/\/io.adafruit.com\/","author":"Industries A.","year":"2018"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380116.2380142"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/C5.2010.20"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368130"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518942"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557409"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1709886.1709896"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126594.3126658"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2774225.2774835"},{"key":"e_1_3_2_2_30_1","volume-title":"Proc. CHI","volume":"2007","author":"Mellis D.","year":"2007"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901833"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380250705"},{"key":"e_1_3_2_2_33_1","volume-title":"Particle cloud. https:\/\/www.particle.io\/","author":"Particle","year":"2018"},{"key":"e_1_3_2_2_34_1","first-page":"9","article-title":"Pip: Detecting the unexpected in distributed systems","volume":"6","author":"Reynolds P.","year":"2006","journal-title":"NSDI"},{"key":"e_1_3_2_2_35_1","first-page":"1","article-title":"Diagnosing performance changes by comparing request flows","volume":"5","author":"Sambasivan R. R.","year":"2011","journal-title":"NSDI"},{"key":"e_1_3_2_2_36_1","volume-title":"Google","author":"Sigelman B. H.","year":"2010"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126594.3126618"},{"key":"e_1_3_2_2_38_1","volume-title":"USENIX Annual Technical Conference","author":"Wundsam A.","year":"2011"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1980.1094702"}],"event":{"name":"UIST '18: The 31st Annual ACM Symposium on User Interface Software and Technology","location":"Berlin Germany","acronym":"UIST '18","sponsor":["SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 31st Annual ACM Symposium on User Interface Software and Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242587.3242668","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3242587.3242668","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3242587.3242668","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:32Z","timestamp":1750207472000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242587.3242668"}},"subtitle":["Bridging the Information Gap for Debugging of Networked Embedded Systems"],"short-title":[],"issued":{"date-parts":[[2018,10,11]]},"references-count":39,"alternative-id":["10.1145\/3242587.3242668","10.1145\/3242587"],"URL":"https:\/\/doi.org\/10.1145\/3242587.3242668","relation":{},"subject":[],"published":{"date-parts":[[2018,10,11]]},"assertion":[{"value":"2018-10-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}