RFID as an Infrastructure
暂无分享,去创建一个
Shigang Chen | Yan Qiao | Tao Li | Tao Li | Shigang Chen | Yan Qiao
[1] G. Casella,et al. Statistical Inference , 2003, Encyclopedia of Social Network Analysis and Mining.
[2] Chae-Woo Lee,et al. An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[3] Yuanqing Zheng,et al. Fast tag searching protocol for large-scale RFID systems , 2011, ICNP 2011.
[4] Yunhao Liu,et al. Cardinality Estimation for Large-Scale RFID Systems , 2011, IEEE Trans. Parallel Distributed Syst..
[5] Shigang Chen,et al. Probabilistic missing-tag detection and energy-time tradeoff in large-scale RFID systems , 2012, MobiHoc '12.
[6] Yunhao Liu,et al. Refresh: Weak Privacy Model for RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.
[7] Motoki Miura,et al. An Empirical Study of an RFID Mat Sensor System in a Group Home , 2009, J. Networks.
[8] Kai Bu,et al. Efficient pinpointing of misplaced tags in large RFID systems , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[9] Ming Zhang,et al. Efficient information collection protocols for sensor-augmented RFID networks , 2011, 2011 Proceedings IEEE INFOCOM.
[10] Bo Sheng,et al. Efficient Continuous Scanning in RFID Systems , 2010, 2010 Proceedings IEEE INFOCOM.
[11] D. Wyld. Radio Frequency Identification , 2008 .
[12] Chenling Huang,et al. A two-stage wake-up circuit for semi-passive RFID tag , 2009, 2009 IEEE 8th International Conference on ASIC.
[13] Sridhar Radhakrishnan,et al. A framework for fast RFID tag reading in static and mobile environments , 2008, Comput. Networks.
[14] Tassos Dimitriou,et al. A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[15] Murali S. Kodialam,et al. Anonymous Tracking Using RFID Tags , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[16] Feng Zhou,et al. Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems , 2004, Proceedings of the 2004 International Symposium on Low Power Electronics and Design (IEEE Cat. No.04TH8758).
[17] E. L. Lehmann,et al. Theory of point estimation , 1950 .
[18] Yunhao Liu,et al. Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, PerCom.
[19] Bo Sheng,et al. Finding popular categories for RFID tags , 2008, MobiHoc '08.
[20] Shigang Chen,et al. Energy Efficient Algorithms for the RFID Estimation Problem , 2010, 2010 Proceedings IEEE INFOCOM.
[21] Yunhao Liu,et al. LANDMARC: Indoor Location Sensing Using Active RFID , 2004, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[22] Bo Li,et al. Using Analog Network Coding to Improve the RFID Reading Throughput , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[23] Lawrence G. Roberts,et al. ALOHA packet system with and without slots and capture , 1975, CCRV.
[24] Na Yang,et al. Congestion Avoidance Based on Lightweight Buffer Management in Sensor Networks , 2006 .
[25] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[26] Shiping Chen,et al. Energy-efficient polling protocols in RFID systems , 2011, MobiHoc '11.
[27] Murali S. Kodialam,et al. Fast and reliable estimation schemes in RFID systems , 2006, MobiCom '06.
[28] Roy Want,et al. An introduction to RFID technology , 2006, IEEE Pervasive Computing.
[29] Yunhao Liu,et al. ACTION: Breaking the Privacy Barrier for RFID Systems , 2009, IEEE INFOCOM 2009.
[30] Shigang Chen,et al. Efficient Protocols for Identifying the Missing Tags in a Large RFID System , 2013, IEEE/ACM Transactions on Networking.
[31] Christian Floerkemeier,et al. Comparison of transmission schemes for framed ALOHA based RFID protocols , 2006, International Symposium on Applications and the Internet Workshops (SAINTW'06).
[32] Shigang Chen,et al. Privacy-preserving RFID authentication based on cryptographical encoding , 2012, 2012 Proceedings IEEE INFOCOM.
[33] Masashi Shimizu,et al. Framed ALOHA for Multiple RFID Objects Identification , 2005, IEICE Trans. Commun..
[34] Damith C. Ranasinghe,et al. Sensor-enabled RFID tag handbook , 2008 .
[35] Wonjun Lee,et al. Adaptive splitting protocols for RFID tag collision arbitration , 2006, MobiHoc '06.
[36] Jae-Hyun Kim,et al. Dynamic framed slotted ALOHA algorithms using fast tag estimation method for RFID system , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[37] C. Floerkemeier. Transmission control scheme for fast RFID object identification , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[38] Bo Sheng,et al. Counting RFID Tags Efficiently and Anonymously , 2010, 2010 Proceedings IEEE INFOCOM.
[39] Harald Vogt,et al. Efficient Object Identification with Passive RFID Tags , 2002, Pervasive.
[40] Yunhao Liu,et al. Randomizing RFID private authentication , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[41] Shiping Chen,et al. Efficient missing tag detection in RFID systems , 2011, 2011 Proceedings IEEE INFOCOM.
[42] Miao Pan,et al. A time-efficient information collection protocol for large-scale RFID systems , 2012, 2012 Proceedings IEEE INFOCOM.
[43] Anirudha Sahoo,et al. Intelligent Query Tree (IQT) Protocol to Improve RFID Tag Read Efficiency , 2006, 9th International Conference on Information Technology (ICIT'06).
[44] Yuguang Fang,et al. Lexicographic Maxmin Fairness for Data Collection in Wireless Sensor Networks , 2007, IEEE Transactions on Mobile Computing.
[45] Kyu-Young Whang,et al. A linear-time probabilistic counting algorithm for database applications , 1990, TODS.
[46] Bo Sheng,et al. How to Monitor for Missing RFID tags , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[47] Úlfar Erlingsson,et al. A cool and practical alternative to traditional hash tables , 2006 .
[48] P. Flajolet,et al. Loglog counting of large cardinalities , 2003 .