{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:51Z","timestamp":1750220451734,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3448891.3448921","type":"proceedings-article","created":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T01:43:00Z","timestamp":1628559780000},"page":"318-326","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Resource-aware log monitoring data transmission for Smart and IoT devices"],"prefix":"10.1145","author":[{"given":"Tomasz","family":"Szydlo","sequence":"first","affiliation":[{"name":"Institute of Computer Science Faculty of Computer Science Electronics and Telecommunications AGH University of Science and Technology Krakow, Poland"}]},{"given":"Krzysztof","family":"Zielinski","sequence":"additional","affiliation":[{"name":"Institute of Computer Science Faculty of Computer Science Electronics and Telecommunications AGH University of Science and Technology Krakow, Poland"}]},{"given":"Marcin","family":"Jarzab","sequence":"additional","affiliation":[{"name":"Samsung R&amp;D Institute Poland Samsung Electronics Krakow, Poland"}]}],"member":"320","published-online":{"date-parts":[[2021,8,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.02.004"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.02.004"},{"volume-title":"Vol.\u00a07003. Department of Automatic Control","author":"Astr\u00f6m Karl Johan","key":"e_1_3_2_1_4_1","unstructured":"Karl Johan Astr\u00f6m . 1968. On the Choice of Sampling Rates in Parametric Identification of Time Series. Report TFRT , Vol.\u00a07003. Department of Automatic Control , Lund Institute of Technology (LTH) . Karl Johan Astr\u00f6m. 1968. On the Choice of Sampling Rates in Parametric Identification of Time Series. Report TFRT, Vol.\u00a07003. Department of Automatic Control, Lund Institute of Technology (LTH)."},{"volume-title":"Datenbanksysteme f\u00fcr Business, Technologie und Web (BTW 2017) - Workshopband","author":"Bader Andreas","key":"e_1_3_2_1_5_1","unstructured":"Andreas Bader , Oliver Kopp , and Michael Falkenthal . 2017. Survey and Comparison of Open Source Time Series Databases . In Datenbanksysteme f\u00fcr Business, Technologie und Web (BTW 2017) - Workshopband , Bernhard Mitschang , Daniela Nicklas, Frank Leymann, Harald Sch\u00f6ning, Melanie Herschel, Jens Teubner, Theo H\u00e4rder, Oliver Kopp, and Matthias Wieland(Eds.). Gesellschaft f\u00fcr Informatik e.V., Bonn , 249\u2013268. Andreas Bader, Oliver Kopp, and Michael Falkenthal. 2017. Survey and Comparison of Open Source Time Series Databases. In Datenbanksysteme f\u00fcr Business, Technologie und Web (BTW 2017) - Workshopband, Bernhard Mitschang, Daniela Nicklas, Frank Leymann, Harald Sch\u00f6ning, Melanie Herschel, Jens Teubner, Theo H\u00e4rder, Oliver Kopp, and Matthias Wieland(Eds.). Gesellschaft f\u00fcr Informatik e.V., Bonn, 249\u2013268."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"#cr-split#-e_1_3_2_1_7_1.1","doi-asserted-by":"crossref","unstructured":"Mostafa Farshchi Jean-Guy Schneider Ingo Weber and John Grundy. 2017. Metric selection and anomaly detection for cloud operations using log and metric correlation analysis. Journal of Systems and Software(2017). https:\/\/doi.org\/10.1016\/j.jss.2017.03.012 10.1016\/j.jss.2017.03.012","DOI":"10.1016\/j.jss.2017.03.012"},{"key":"#cr-split#-e_1_3_2_1_7_1.2","doi-asserted-by":"crossref","unstructured":"Mostafa Farshchi Jean-Guy Schneider Ingo Weber and John Grundy. 2017. Metric selection and anomaly detection for cloud operations using log and metric correlation analysis. Journal of Systems and Software(2017). https:\/\/doi.org\/10.1016\/j.jss.2017.03.012","DOI":"10.1016\/j.jss.2017.03.012"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.06.016"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"R. Gerhards. 2009. The Syslog Protocol. RFC 5424 (Proposed Standard). http:\/\/www.ietf.org\/rfc\/rfc5424.txt  R. Gerhards. 2009. The Syslog Protocol. RFC 5424 (Proposed Standard). http:\/\/www.ietf.org\/rfc\/rfc5424.txt","DOI":"10.17487\/rfc5424"},{"volume-title":"Guide to Computer Security Log Management","author":"Kent Karen","key":"e_1_3_2_1_10_1","unstructured":"Karen Kent and Murugiah\u00a0 P. Souppaya . 2006. SP 800-92. Guide to Computer Security Log Management . Technical Report. Gaithersburg, MD , United States . Karen Kent and Murugiah\u00a0P. Souppaya. 2006. SP 800-92. Guide to Computer Security Log Management. Technical Report. Gaithersburg, MD, United States."},{"key":"e_1_3_2_1_11_1","unstructured":"Eamonn Keogh. 1997. A Fast and Robust Method for Pattern Matching in Time Series Databases. In IN PROC. OF THE 9TH INT. CONF. ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI-97. 578\u2013584.  Eamonn Keogh. 1997. A Fast and Robust Method for Pattern Matching in Time Series Databases. In IN PROC. OF THE 9TH INT. CONF. ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI-97. 578\u2013584."},{"key":"e_1_3_2_1_12_1","volume-title":"Prometheus: A Next-Generation Monitoring System (Talk)","author":"Rabenstein Bj\u00f6rn","year":"2015","unstructured":"Bj\u00f6rn Rabenstein and Julius Volz . 2015 . Prometheus: A Next-Generation Monitoring System (Talk) . USENIX Association , Dublin . Bj\u00f6rn Rabenstein and Julius Volz. 2015. Prometheus: A Next-Generation Monitoring System (Talk). USENIX Association, Dublin."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.04.035"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/645481.653263"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.08.021"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.067"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/645926.671689"}],"event":{"name":"MobiQuitous '20: Computing, Networking and Services","acronym":"MobiQuitous '20","location":"Darmstadt Germany"},"container-title":["MobiQuitous 2020 - 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448891.3448921","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448891.3448921","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:54Z","timestamp":1750193274000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448891.3448921"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":18,"alternative-id":["10.1145\/3448891.3448921","10.1145\/3448891"],"URL":"https:\/\/doi.org\/10.1145\/3448891.3448921","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2021-08-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}