A novel algorithm L-NCD for redundant reader elimination in P2P-RFID network
暂无分享,去创建一个
He Xu | Ruchuan Wang | Peng Li | Ru-chuan Wang | Peng Li | He Xu | Weiwei Shen | Jiawei Zhu | Weiwei Shen | Jiawei Zhu
[1] Jin Wang,et al. Method of Reduction the Redundant Reader Based on RFID Reader Communication Protocol , 2014 .
[2] Shunzheng Yu,et al. A fuzzy k-coverage approach for RFID network planning using plant growth simulation algorithm , 2014, J. Netw. Comput. Appl..
[3] Daniel W. Engels,et al. Colorwave: an anticollision algorithm for the reader collision problem , 2003, IEEE International Conference on Communications, 2003. ICC '03..
[4] Chao-Tung Yang,et al. A Layered Optimization Approach for Redundant Reader Elimination in Wireless RFID Networks , 2007 .
[5] Huang Yihua,et al. A middleware-based approach for redundant reader elimination , 2011, The 5th International Conference on New Trends in Information Science and Service Science.
[6] Zhiying Yang,et al. A Count Based Algorithm for Redundant Reader Elimination in RFID Application System , 2013, 2013 Third International Conference on Intelligent System Design and Engineering Applications.
[7] Minos N. Garofalakis,et al. Adaptive cleaning for RFID data streams , 2006, VLDB.
[8] Ananth Grama,et al. Redundant reader elimination in RFID systems , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..
[9] Kun-Ming Yu,et al. A Density-Based Algorithm for Redundant Reader Elimination in a RFID Network , 2008, 2008 Second International Conference on Future Generation Communication and Networking.
[10] Lida Xu,et al. Data Cleaning for RFID and WSN Integration , 2014, IEEE Transactions on Industrial Informatics.
[11] Jiming Chen,et al. Dynamic Authentication with Sensory Information for the Access Control Systems , 2014, IEEE Transactions on Parallel and Distributed Systems.
[12] Houn-Gee Chen,et al. Consumer's acceptance of high-tech products: the case of RFID credit cards in Taiwan , 2014 .
[13] Ziming Guo,et al. A Dynamic Bit Arbitration Anti-Collision Algorithm for RFID System , 2007, 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID).
[14] Hui Sheng,et al. An Improved Anti-Collision Algorithm in RFID System , 2013 .
[15] Xu Huang,et al. Efficient Dynamic Framed Slotted ALOHA for RFID Passive Tags , 2007, The 9th International Conference on Advanced Communication Technology.
[16] Shivani Kundra,et al. The study of recent technologies used in E-passport system , 2014, 2014 IEEE Global Humanitarian Technology Conference - South Asia Satellite (GHTC-SAS).
[17] Hairulnizam Mahdin,et al. Redundant readers elimination in dense radio frequency identification network , 2015 .
[18] Ruchuan Wang,et al. A Novel RFID Reader System Framework based on Peer-to-Peer Network , 2011 .
[19] Jae-Hyun Kim,et al. Dynamic framed slotted ALOHA algorithms using fast tag estimation method for RFID system , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[20] Ngoc-Tu Nguyen,et al. A Maximum-Weight-Independent-Set-Based Algorithm for Reader-Coverage Collision Avoidance Arrangement in RFID Networks , 2016, IEEE Sensors Journal.
[21] Daniel W. Engels,et al. The reader collision problem , 2002, IEEE International Conference on Systems, Man and Cybernetics.
[22] Gustavo Alonso,et al. A Pipelined Framework for Online Cleaning of Sensor Data Streams , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[23] Nazish Irfan,et al. Efficient Approach for Redundant Reader Elimination in Large-Scale RFID Networks , 2010, 2010 First International Conference on Integrated Intelligent Computing.
[24] Yang Li,et al. SA-PSO based optimizing reader deployment in large-scale RFID Systems , 2015, J. Netw. Comput. Appl..
[25] H. T. Mouftah,et al. Decentralized RFID Coverage Algorithms With Applications for the Reader Collisions Avoidance Problem , 2016, IEEE Transactions on Emerging Topics in Computing.
[26] Jun-Seok Park,et al. Effects of reader interference on the RFID interrogation range , 2007, 2007 European Microwave Conference.
[27] James C. Chen,et al. Supply chain management with lean production and RFID application: A case study , 2013, Expert Syst. Appl..
[28] Ari Juels,et al. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.
[29] Shengli Lai,et al. ALOHA-Based Anti-Collision Algorithms Used in RFID System , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.
[30] Manish Sharma,et al. Smart ration card using RFID and GSM technique , 2014, 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence).
[31] Meie Shen,et al. Optimizing RFID Network Planning by Using a Particle Swarm Optimization Algorithm With Redundant Reader Elimination , 2012, IEEE Transactions on Industrial Informatics.
[32] Chae-Woo Lee,et al. An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[33] Ching-Hsien Hsu,et al. An Overlap Aware Technique for Redundant Reader Elimination , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.
[34] Osama Moselhi,et al. RFID indoor location identification for construction projects , 2012 .