{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:14Z","timestamp":1750220894374,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T00:00:00Z","timestamp":1583193600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1908910"],"award-info":[{"award-number":["1908910"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,3]]},"DOI":"10.1145\/3376897.3377863","type":"proceedings-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T20:55:23Z","timestamp":1582664123000},"page":"92-97","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Rethinking Wireless Network Management Through Sensor-driven Contextual Analysis"],"prefix":"10.1145","author":[{"given":"Shazal","family":"Irshad","sequence":"first","affiliation":[{"name":"University of Colorado Boulder, Boulder, CO, USA"}]},{"given":"Eric","family":"Rozner","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder, Boulder, CO, USA"}]},{"given":"Apurv","family":"Bhartia","sequence":"additional","affiliation":[{"name":"Cisco Meraki, San Francisco, CA, USA"}]},{"given":"Bo","family":"Chen","sequence":"additional","affiliation":[{"name":"Cisco Meraki, San Francisco, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,3,3]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"3","article-title":"Rogue Access Point Detection","volume":"90","author":"Alotaibi Bandar","year":"2016","unstructured":"Bandar Alotaibi and Khaled Elleithy . 2016 . Rogue Access Point Detection : Taxonomy, Challenges, and Future Directions. Wirel. Pers. Commun. , Vol. 90 , 3 (Oct. 2016), 1261--1290. Bandar Alotaibi and Khaled Elleithy. 2016. Rogue Access Point Detection: Taxonomy, Challenges, and Future Directions. Wirel. Pers. Commun. , Vol. 90, 3 (Oct. 2016), 1261--1290.","journal-title":"Taxonomy, Challenges, and Future Directions. Wirel. Pers. Commun."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2007.014070"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3300135"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214266"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2005.1506566"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1859997"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2018.8480384"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5706317"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.938993"},{"volume-title":"Mainstream: Dynamic Stem-Sharing for Multi-Tenant Video Processing. In 2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Jiang Angela H.","key":"e_1_3_2_1_11_1","unstructured":"Angela H. Jiang , Daniel L.-K. Wong , Christopher Canel , Lilia Tang , Ishan Misra , Michael Kaminsky , Michael A. Kozuch , Padmanabhan Pillai , David G. Andersen , and Gregory R. Ganger . 2018b . Mainstream: Dynamic Stem-Sharing for Multi-Tenant Video Processing. In 2018 USENIX Annual Technical Conference (USENIX ATC 18) . USENIX Association, Boston, MA, 29--42. Angela H. Jiang, Daniel L.-K. Wong, Christopher Canel, Lilia Tang, Ishan Misra, Michael Kaminsky, Michael A. Kozuch, Padmanabhan Pillai, David G. Andersen, and Gregory R. Ganger. 2018b. Mainstream: Dynamic Stem-Sharing for Multi-Tenant Video Processing. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). USENIX Association, Boston, MA, 29--42."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230574"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2337886"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736761"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1403005"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2483967"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307670"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210342"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6461192"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2636072"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2693843"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2012-216"},{"key":"e_1_3_2_1_24_1","volume-title":"MegaMIMO: Scaling Wireless Capacity with User Demands. In ACM SIGCOMM 2012","author":"Rahul Hariharan","year":"2012","unstructured":"Hariharan Rahul , Swarun Kumar , and Dina Katabi . 2012 . MegaMIMO: Scaling Wireless Capacity with User Demands. In ACM SIGCOMM 2012 . Helsinki, Finland. Hariharan Rahul, Swarun Kumar, and Dina Katabi. 2012. MegaMIMO: Scaling Wireless Capacity with User Demands. In ACM SIGCOMM 2012 . Helsinki, Finland."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2205701"},{"key":"e_1_3_2_1_26_1","volume-title":"Traffic-Aware Channel Assignment in Enterprise Wireless LANs. In 2007 IEEE International Conference on Network Protocols. 133--143","author":"Rozner E.","year":"2007","unstructured":"E. Rozner , Y. Mehta , A. Akella , and L. Qiu . 2007 . Traffic-Aware Channel Assignment in Enterprise Wireless LANs. In 2007 IEEE International Conference on Network Protocols. 133--143 . https:\/\/doi.org\/10.1109\/ICNP. 2007 .4375844 10.1109\/ICNP.2007.4375844 E. Rozner, Y. Mehta , A. Akella, and L. Qiu. 2007. Traffic-Aware Channel Assignment in Enterprise Wireless LANs. In 2007 IEEE International Conference on Network Protocols. 133--143. https:\/\/doi.org\/10.1109\/ICNP.2007.4375844"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814445"},{"key":"e_1_3_2_1_28_1","unstructured":"Nick Tabor. 2018. Smile! The Secretive Business of Facial-Recognition Software in Retail Stores. http:\/\/nymag.com\/intelligencer\/2018\/10\/retailers-are-using-facial-recognition-technology-too.html .  Nick Tabor. 2018. Smile! The Secretive Business of Facial-Recognition Software in Retail Stores. http:\/\/nymag.com\/intelligencer\/2018\/10\/retailers-are-using-facial-recognition-technology-too.html ."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2274283"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2444776.2444786"},{"key":"e_1_3_2_1_31_1","unstructured":"Alec Wolman Stefan Saroiu Paramvir Bahl and Victor Bahl. 2010. Using Trusted Sensors to Monitor Patients' Habits. In 1st USENIX Workshop on Health Security and Privacy (HealthSec) 1st usenix workshop on health security and privacy (healthsec) ed.). https:\/\/www.microsoft.com\/en-us\/research\/publication\/using-trusted-sensors-to-monitor-patients-habits\/  Alec Wolman Stefan Saroiu Paramvir Bahl and Victor Bahl. 2010. Using Trusted Sensors to Monitor Patients' Habits. In 1st USENIX Workshop on Health Security and Privacy (HealthSec) 1st usenix workshop on health security and privacy (healthsec) ed.). https:\/\/www.microsoft.com\/en-us\/research\/publication\/using-trusted-sensors-to-monitor-patients-habits\/"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/I2MTC.2016.7520438"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351272"}],"event":{"name":"HotMobile '20: The 21st International Workshop on Mobile Computing Systems and Applications","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Austin TX USA","acronym":"HotMobile '20"},"container-title":["Proceedings of the 21st International Workshop on Mobile Computing Systems and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3376897.3377863","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3376897.3377863","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3376897.3377863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:34Z","timestamp":1750203874000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3376897.3377863"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,3]]},"references-count":33,"alternative-id":["10.1145\/3376897.3377863","10.1145\/3376897"],"URL":"https:\/\/doi.org\/10.1145\/3376897.3377863","relation":{},"subject":[],"published":{"date-parts":[[2020,3,3]]},"assertion":[{"value":"2020-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}