How to Monitor for Missing RFID tags
暂无分享,去创建一个
[1] Selwyn Piramuthu,et al. On Existence Proofs for Multiple RFID Tags , 2006, 2006 ACS/IEEE International Conference on Pervasive Services.
[2] Leonid Bolotnyy,et al. Generalized "Yoking-Proofs" for a Group of RFID Tags , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.
[3] Francesca Lonetti,et al. Tree slotted aloha: a new protocol for tag identification in RFID networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[4] Juan E. Tapiador,et al. Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).
[5] Yunhao Liu,et al. Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[6] Roy H. Campbell,et al. MiddleWhere: A Middleware for Location Awareness in Ubiquitous Computing Applications , 2004, Middleware.
[7] Chae-Woo Lee,et al. An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[8] Yanyong Zhang,et al. RollCall : The Design For A Low-Cost And Power Efficient Active RFID Asset Tracking System , 2007, EUROCON 2007 - The International Conference on "Computer as a Tool".
[9] Vikram Srinivasan,et al. MAX: human-centric search of the physical world , 2005, SenSys '05.
[10] Ari Juels,et al. "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[11] Jae-Hyun Kim,et al. Novel Anti-collision Algorithms for Fast Object Identification in RFID System , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).
[12] Bo Sheng,et al. Finding popular categories for RFID tags , 2008, MobiHoc '08.
[13] Bo Sheng,et al. Severless Search and Authentication Protocols for RFID , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[14] Harald Vogt,et al. Efficient Object Identification with Passive RFID Tags , 2002, Pervasive.
[15] Roy Want,et al. Bridging physical and virtual worlds with electronic tags , 1999, CHI '99.
[16] Murali S. Kodialam,et al. Fast and reliable estimation schemes in RFID systems , 2006, MobiCom '06.
[17] Nitin H. Vaidya,et al. RFID-based networks: exploiting diversity and redundancy , 2008, MOCO.
[18] Ivan Stojmenovic,et al. A hybrid randomized protocol for RFID tag identification , 2006 .
[19] Kouichi Sakurai,et al. Grouping proof for RFID tags , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[20] Diego Klabjan,et al. Warehousing and Analyzing Massive RFID Data Sets , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[21] Sajal K. Das,et al. An RFID based technique for handling object distribution and recalls in pervasive transaction environments , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).