{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T09:35:04Z","timestamp":1774949704566,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T00:00:00Z","timestamp":1600387200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSF","award":["1942902, 1837607"],"award-info":[{"award-number":["1942902, 1837607"]}]},{"name":"CONIX Research Center"},{"name":"Scott Institute"},{"name":"Kavcic-Moura"},{"name":"Cylab-IoT"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,21]]},"DOI":"10.1145\/3372224.3419204","type":"proceedings-article","created":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T02:16:16Z","timestamp":1600481776000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Joltik"],"prefix":"10.1145","author":[{"given":"Mingran","family":"Yang","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Junbo","family":"Zhang","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Akshay","family":"Gadre","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Zaoxing","family":"Liu","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Swarun","family":"Kumar","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Vyas","family":"Sekar","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2020,9,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Mergeable summaries. ACM Transactions on Database Systems (TODS), 38(4):1--28","author":"Agarwal P. K.","year":"2013","unstructured":"P. K. Agarwal , G. Cormode , Z. Huang , J. M. Phillips , Z. Wei , and K. Yi . Mergeable summaries. ACM Transactions on Database Systems (TODS), 38(4):1--28 , 2013 . P. K. Agarwal, G. Cormode, Z. Huang, J. M. Phillips, Z. Wei, and K. Yi. Mergeable summaries. ACM Transactions on Database Systems (TODS), 38(4):1--28, 2013."},{"key":"e_1_3_2_1_2_1","volume-title":"Discrete cosine transform","author":"Ahmed N.","year":"1974","unstructured":"N. Ahmed , T. Natarajan , and K. R. Rao . Discrete cosine transform . IEEE transactions on Computers , 100(1):90--93, 1974 . N. Ahmed, T. Natarajan, and K. R. Rao. Discrete cosine transform. IEEE transactions on Computers, 100(1):90--93, 1974."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2700864"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237823"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1700081"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2003.1284221"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.830934"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127777.1127801"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2040894"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2902251.2902282"},{"key":"e_1_3_2_1_11_1","volume-title":"Universal streaming of subset norms. CoRR, abs\/1812.00241","author":"Braverman V.","year":"2018","unstructured":"V. Braverman , R. Krauthgamer , and L. F. Yang . Universal streaming of subset norms. CoRR, abs\/1812.00241 , 2018 . V. Braverman, R. Krauthgamer, and L. F. Yang. Universal streaming of subset norms. CoRR, abs\/1812.00241, 2018."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806729"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1007\/978-3-642-40328-6_5","volume-title":"Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques","author":"Braverman V.","year":"2013","unstructured":"V. Braverman and R. Ostrovsky . Generalizing the layering method of indyk and woodruff: Recursive sketches for frequency-based vectors on streams . In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques , pages 58 -- 70 . Springer , 2013 . V. Braverman and R. Ostrovsky. Generalizing the layering method of indyk and woodruff: Recursive sketches for frequency-based vectors on streams. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, pages 58--70. Springer, 2013."},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. of APPROX\/RANDOM","author":"Braverman V.","year":"2015","unstructured":"V. Braverman , R. Ostrovsky , and A. Roytman . Zero-one laws for sliding windows and universal sketches . In Proc. of APPROX\/RANDOM , 2015 . V. Braverman, R. Ostrovsky, and A. Roytman. Zero-one laws for sliding windows and universal sketches. In Proc. of APPROX\/RANDOM, 2015."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359427.3361912"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/646255.684566"},{"key":"e_1_3_2_1_17_1","first-page":"196","volume-title":"Artificial Intelligence and Statistics","author":"Clifford P.","year":"2013","unstructured":"P. Clifford and I. Cosma . A simple sketching algorithm for entropy estimation over streaming data . In Artificial Intelligence and Statistics , pages 196 -- 206 , 2013 . P. Clifford and I. Cosma. A simple sketching algorithm for entropy estimation over streaming data. In Artificial Intelligence and Statistics, pages 196--206, 2013."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247513"},{"key":"e_1_3_2_1_19_1","volume-title":"Algorithms","author":"Cormode G.","year":"2005","unstructured":"G. Cormode and S. Muthukrishnan . An Improved Data Stream Summary: The Count-Min Sketch and Its Applications. J . Algorithms , 2005 . G. Cormode and S. Muthukrishnan. An Improved Data Stream Summary: The Count-Min Sketch and Its Applications. J. Algorithms, 2005."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2018.00013"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098845"},{"key":"e_1_3_2_1_22_1","volume-title":"Hyperloglog: the analysis of a near-optimal cardinality estimation algorithm","author":"Flajolet P.","year":"2007","unstructured":"P. Flajolet , \u00c9. Fusy, O. Gandouet , and F. Meunier . Hyperloglog: the analysis of a near-optimal cardinality estimation algorithm . 2007 . P. Flajolet, \u00c9. Fusy, O. Gandouet, and F. Meunier. Hyperloglog: the analysis of a near-optimal cardinality estimation algorithm. 2007."},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX NSDI","author":"Gadre A.","year":"2020","unstructured":"A. Gadre , R. Narayanan , A. Luong , A. Rowe , B. Iannucci , and S. Kumar . Frequency Configuration for Low-Power Wide-Area Networks in a Heartbeat . In USENIX NSDI , 2020 . A. Gadre, R. Narayanan, A. Luong, A. Rowe, B. Iannucci, and S. Kumar. Frequency Configuration for Low-Power Wide-Area Networks in a Heartbeat. In USENIX NSDI, 2020."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN48710.2020.00031"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14778\/3236187.3236212"},{"key":"e_1_3_2_1_26_1","volume-title":"Catching elephants with mice: sparse sampling for monitoring sensor networks. ACM Transactions on Sensor Networks (TOSN), 6(1):1--27","author":"Gandhi S.","year":"2010","unstructured":"S. Gandhi , S. Suri , and E. Welzl . Catching elephants with mice: sparse sampling for monitoring sensor networks. ACM Transactions on Sensor Networks (TOSN), 6(1):1--27 , 2010 . S. Gandhi, S. Suri, and E. Welzl. Catching elephants with mice: sparse sampling for monitoring sensor networks. ACM Transactions on Sensor Networks (TOSN), 6(1):1--27, 2010."},{"key":"e_1_3_2_1_27_1","volume-title":"Vector quantization and signal compression","author":"Gersho A.","year":"2012","unstructured":"A. Gersho and R. M. Gray . Vector quantization and signal compression , volume 159 . Springer Science & Business Media , 2012 . A. Gersho and R. M. Gray. Vector quantization and signal compression, volume 159. Springer Science & Business Media, 2012."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2045092"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250824"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.2654726"},{"key":"e_1_3_2_1_31_1","volume-title":"USENIX NSDI","author":"Hessar M.","year":"2020","unstructured":"M. Hessar , A. Najafi , V. Iyer , and S. Gollakota . TinySDR: Low-Power SDR Platform for Over-the-Air Programmable IoT Testbeds . In USENIX NSDI , 2020 . M. Hessar, A. Najafi, V. Iyer, and S. Gollakota. TinySDR: Low-Power SDR Platform for Over-the-Air Programmable IoT Testbeds. In USENIX NSDI, 2020."},{"key":"e_1_3_2_1_32_1","volume-title":"Towards Energy Optimization in Environmental Wireless Sensor Networks for Lossless and Reliable Data Gathering. 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems","author":"Huang F.","year":"2007","unstructured":"F. Huang and Y. Liang . Towards Energy Optimization in Environmental Wireless Sensor Networks for Lossless and Reliable Data Gathering. 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems , 2007 . F. Huang and Y. Liang. Towards Energy Optimization in Environmental Wireless Sensor Networks for Lossless and Reliable Data Gathering. 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, 2007."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1952.273898"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2008.82"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345920"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366709"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326088"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314344.3332482"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCS.2017.8034915"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1672308.1672311"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2016.2609914"},{"key":"e_1_3_2_1_42_1","volume-title":"https:\/\/www.link-labs.com\/blog\/firmware-over-the-air-fota-with-lora","year":"2017","unstructured":"LinkLabs. Firmware-over-the-air (fota) with lora. https:\/\/www.link-labs.com\/blog\/firmware-over-the-air-fota-with-lora , 2017 . LinkLabs. Firmware-over-the-air (fota) with lora. https:\/\/www.link-labs.com\/blog\/firmware-over-the-air-fota-with-lora, 2017."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342076"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/eScience.2015.73"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"e_1_3_2_1_46_1","volume-title":"Memory-efficient performance monitoring on programmable switches with lean algorithms","author":"Liu Z.","year":"2019","unstructured":"Z. Liu , S. Zhou , O. Rottenstreich , V. Braverman , and J. Rexford . Memory-efficient performance monitoring on programmable switches with lean algorithms . 2019 . Z. Liu, S. Zhou, O. Rottenstreich, V. Braverman, and J. Rexford. Memory-efficient performance monitoring on programmable switches with lean algorithms. 2019."},{"key":"e_1_3_2_1_47_1","volume-title":"Proc. of ACM SIGMETRICS","author":"Lu Y.","year":"2008","unstructured":"Y. Lu , A. Montanari , B. Prabhakar , S. Dharmapurikar , and A. Kabbani . Counter Braids: A Novel Counter Architecture for Per-FlowMeasurement . In Proc. of ACM SIGMETRICS , 2008 . Y. Lu, A. Montanari, B. Prabhakar, S. Dharmapurikar, and A. Kabbani. Counter Braids: A Novel Counter Architecture for Per-FlowMeasurement. In Proc. of ACM SIGMETRICS, 2008."},{"key":"e_1_3_2_1_48_1","volume-title":"Joltik source code. https:\/\/github.com\/Joltik-project\/Joltik","author":"Yang M.","year":"2020","unstructured":"M. Yang , J. Zhang , A. Gadre , Z. Liu , S. Kumar , and V. Sekar . Joltik source code. https:\/\/github.com\/Joltik-project\/Joltik , 2020 . M. Yang, J. Zhang, A. Gadre, Z. Liu, S. Kumar, and V. Sekar. Joltik source code. https:\/\/github.com\/Joltik-project\/Joltik, 2020."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.01.027"},{"key":"e_1_3_2_1_50_1","unstructured":"Mbed. Mbed development tools. https:\/\/os.mbed.com\/.  Mbed. Mbed development tools. https:\/\/os.mbed.com\/."},{"key":"e_1_3_2_1_51_1","volume-title":"Proc. of ICDT","author":"Metwally A.","year":"2005","unstructured":"A. Metwally , D. Agrawal , and A. E. Abbadi . Efficient computation of frequent and top-k elements in data streams . In Proc. of ICDT , 2005 . A. Metwally, D. Agrawal, and A. E. Abbadi. Efficient computation of frequent and top-k elements in data streams. In Proc. of ICDT, 2005."},{"key":"e_1_3_2_1_52_1","volume-title":"CoSaMP: Iterative signal recovery from incomplete and inaccurate samples. Applied and computational harmonic analysis, 26(3):301--321","author":"Needell D.","year":"2009","unstructured":"D. Needell and J. A. Tropp . CoSaMP: Iterative signal recovery from incomplete and inaccurate samples. Applied and computational harmonic analysis, 26(3):301--321 , 2009 . D. Needell and J. A. Tropp. CoSaMP: Iterative signal recovery from incomplete and inaccurate samples. Applied and computational harmonic analysis, 26(3):301--321, 2009."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1387663.1387670"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203366"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302506.3310408"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4674-5"},{"key":"e_1_3_2_1_57_1","volume-title":"The transform and data compression handbook","author":"Rao K. R.","year":"2018","unstructured":"K. R. Rao and P. C. Yip . The transform and data compression handbook . CRC press , 2018 . K. R. Rao and P. C. Yip. The transform and data compression handbook. CRC press, 2018."},{"key":"e_1_3_2_1_58_1","first-page":"1","volume-title":"NB-IoT system for M2M communication. In 2016 IEEE wireless communications and networking conference","author":"Ratasuk R.","year":"2016","unstructured":"R. Ratasuk , B. Vejlgaard , N. Mangalvedhe , and A. Ghosh . NB-IoT system for M2M communication. In 2016 IEEE wireless communications and networking conference , pages 1 -- 5 . IEEE , 2016 . R. Ratasuk, B. Vejlgaard, N. Mangalvedhe, and A. Ghosh. NB-IoT system for M2M communication. In 2016 IEEE wireless communications and networking conference, pages 1--5. IEEE, 2016."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1137\/07068816X"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182834"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.12.020"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4752-y"},{"key":"e_1_3_2_1_63_1","volume-title":"Workshop on Real-World Wireless Sensor Networks (REALWSN'05)","author":"Schmid T.","year":"2005","unstructured":"T. Schmid , H. Dubois-Ferri\u00e8re , and M. Vetterli . SensorScope: Experiences with a Wireless Building Monitoring Sensor Network . Workshop on Real-World Wireless Sensor Networks (REALWSN'05) , 2005 . T. Schmid, H. Dubois-Ferri\u00e8re, and M. Vetterli. SensorScope: Experiences with a Wireless Building Monitoring Sensor Network. Workshop on Real-World Wireless Sensor Networks (REALWSN'05), 2005."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028814"},{"key":"e_1_3_2_1_65_1","volume-title":"Smart Electricity Metering using LoRa. https:\/\/www.semtech.com\/lora\/lora-applications\/smart-electricity-metering","year":"2020","unstructured":"Semtech. Smart Electricity Metering using LoRa. https:\/\/www.semtech.com\/lora\/lora-applications\/smart-electricity-metering , 2020 . Semtech. Smart Electricity Metering using LoRa. https:\/\/www.semtech.com\/lora\/lora-applications\/smart-electricity-metering, 2020."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359427.3361910"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.03.001"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8809(02)00013-0"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2017.09.015"},{"key":"e_1_3_2_1_70_1","volume-title":"Power Aware Coding for Spatio-Temporally Correlated Wireless Sensor Data. 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975)","author":"Tang C.","year":"2004","unstructured":"C. Tang , C. Raghavendra , and V. Prasanna . Power Aware Coding for Spatio-Temporally Correlated Wireless Sensor Data. 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975) , 2004 . C. Tang, C. Raghavendra, and V. Prasanna. Power Aware Coding for Spatio-Temporally Correlated Wireless Sensor Data. 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975), 2004."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.909108"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.002"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2664418"},{"key":"e_1_3_2_1_75_1","volume-title":"Proc. of USENIX NSDI","author":"Yu M.","year":"2013","unstructured":"M. Yu , L. Jose , and R. Miao . Software defined traffic measurement with opensketch . In Proc. of USENIX NSDI , 2013 . M. Yu, L. Jose, and R. Miao. Software defined traffic measurement with opensketch. In Proc. of USENIX NSDI, 2013."}],"event":{"name":"MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking","location":"London United Kingdom","acronym":"MobiCom '20","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 26th Annual International Conference on Mobile Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372224.3419204","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372224.3419204","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:32:10Z","timestamp":1750195930000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372224.3419204"}},"subtitle":["enabling energy-efficient \"future-proof\" analytics on low-power wide-area networks"],"short-title":[],"issued":{"date-parts":[[2020,9,18]]},"references-count":75,"alternative-id":["10.1145\/3372224.3419204","10.1145\/3372224"],"URL":"https:\/\/doi.org\/10.1145\/3372224.3419204","relation":{},"subject":[],"published":{"date-parts":[[2020,9,18]]},"assertion":[{"value":"2020-09-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}