Methods and software architecture for managing a system for verifying the authenticity of branded products
暂无分享,去创建一个
[1] Jukka Riekki,et al. Requesting Pervasive Services by Touching RFID Tags , 2006, IEEE Pervasive Computing.
[2] Roy Want,et al. RFID. A key to automating everything. , 2004, Scientific American.
[3] Lori Driscoll,et al. RFID SYSTEMS , 2006 .
[4] Seon Wook Kim,et al. Software architecture for a multi-protocol RFID reader on mobile devices , 2005, Second International Conference on Embedded Software and Systems (ICESS'05).
[5] Lee Jongyoung,et al. Performance Test Tool for RFID Middleware: Parameters, Design, Implementation, and Features , 2006, 2006 8th International Conference Advanced Communication Technology.
[6] Cheng-Ming Jimmy Li. An integrated software platform for RFID-enabled application development , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[7] Roy Want,et al. An introduction to RFID technology , 2006, IEEE Pervasive Computing.
[8] Heikki Huomo,et al. Virtual product design case study: the Nokia RFID tag reader , 2005, IEEE Pervasive Comput..
[9] Roy Want,et al. RFID Technology and Applications , 2006, IEEE Pervasive Computing.
[10] Ron Weinstein,et al. RFID: a technical overview and its application to the enterprise , 2005, IT Professional.
[11] Frédéric Thiesse,et al. RFID-based maintenance at Frankfurt airport , 2006, IEEE Pervasive Computing.
[12] J. Landt,et al. The history of RFID , 2005, IEEE Potentials.