Managing RFID data in supply chains
暂无分享,去创建一个
[1] David C. Yen,et al. Taxonomy and survey of RFID anti-collision protocols , 2006, Comput. Commun..
[2] Paul Müller,et al. Tackling Security and Privacy Issues in Radio Frequency Identification Devices , 2004, Pervasive.
[3] Nitin H. Vaidya,et al. RFID-based networks: exploiting diversity and redundancy , 2008, MOCO.
[4] Gustavo Alonso,et al. Declarative Support for Sensor Data Cleaning , 2006, Pervasive.
[5] Simson L. Garfinkel,et al. RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.
[6] Munir Mandviwalla,et al. Integrating the Supply Chain with RFID: A Technical and Business Analysis , 2005, Commun. Assoc. Inf. Syst..
[7] E. W. Schuster,et al. Global RFID: The Value of the EPCglobal Network for Supply Chain Management , 2007 .
[8] Elizabeth Chang,et al. Tamper Detection for Ubiquitous RFID-Enabled Supply Chain , 2005, CIS.
[9] Craig K. Harmon,et al. The necessity for a uniform organisation of User Memory in RFID , 2006, Int. J. Radio Freq. Identif. Technol. Appl..
[10] Xue Li,et al. RFID Data Management: Challenges and Opportunities , 2007, 2007 IEEE International Conference on RFID.
[11] Matthias Schumann,et al. Data-on-Network vs. Data-on-Tag: Managing Data in Complex RFID Environments , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[12] Holger Ziekow,et al. RFID: A 7-Point Plan to Ensure Privacy , 2005, ECIS.
[13] Katina Michael,et al. The pros and cons of RFID in supply chain management , 2005, International Conference on Mobile Business (ICMB'05).
[14] Kelly T. Slaughter,et al. The Role of Collective Mental Models in IOS Adoption: Opening the Black Box of Rationality in RFID Deployment , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[15] Andrew S. Tanenbaum,et al. RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.
[16] Tao Hu,et al. Radio Frequency Identification: The Initiator of a Domino Effect , 2006 .
[17] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[18] Christian Floerkemeier,et al. Issues with RFID Usage in Ubiquitous Computing Applications , 2004, Pervasive.
[19] Elgar Fleisch,et al. The Business Value of Ubiquitous Computing Technologies , 2006 .
[20] Minos N. Garofalakis,et al. Adaptive cleaning for RFID data streams , 2006, VLDB.
[21] Christian Floerkemeier,et al. RFID middleware design: addressing application requirements and RFID constraints , 2005, sOc-EUSAI '05.
[22] Youngil Kim,et al. RFID Data Management and RFID Information Value Chain Support with RFID Middleware Platform Implementation , 2005, OTM Conferences.
[23] Christian Floerkemeier,et al. Comparison of transmission schemes for framed ALOHA based RFID protocols , 2006, International Symposium on Applications and the Internet Workshops (SAINTW'06).
[24] Samir Ranjan Das,et al. Collision avoidance in a dense RFID network , 2006, WiNTECH.
[25] Wonjun Lee,et al. Adaptive splitting protocols for RFID tag collision arbitration , 2006, MobiHoc '06.
[26] Xu Huang,et al. An Improved ALOHA Algorithm for RFID Tag Identification , 2006, KES.
[27] Deborah J. Armstrong,et al. RFID Assimilation Hierarchy , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[28] Jennifer Widom,et al. Models and issues in data stream systems , 2002, PODS.
[29] Ari Juels,et al. Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.
[30] Diego Klabjan,et al. Warehousing and Analyzing Massive RFID Data Sets , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[31] Tao Lin,et al. Integrating Automatic Data Acquisition with Business Processes - Experiences with SAP's Auto-ID Infrastructure , 2004, VLDB.
[32] Murali S. Kodialam,et al. Fast and reliable estimation schemes in RFID systems , 2006, MobiCom '06.
[33] Sarah Spiekermann,et al. Maintaining Privacy in Rfid Enabled Environments - Proposal for a Disable-Model , 2005 .
[34] Ying Hu,et al. Supporting RFID-based Item Tracking Applications in Oracle DBMS Using a Bitmap Datatype , 2005, VLDB.
[35] Sudarshan S. Chawathe,et al. Managing RFID Data , 2004, VLDB.
[36] Bing Jiang,et al. Some Methods for Privacy in RFID Communication , 2004, ESAS.
[37] Florian Michahelles,et al. An overview of EPC technology , 2006 .
[38] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[39] Sanjay E. Sarma. Integrating RFID , 2004, ACM Queue.
[40] Jun Rao,et al. A deferred cleansing method for RFID data analytics , 2006, VLDB.
[41] Marc Langheinrich,et al. Scanning with a Purpose - Supporting the Fair Information Principles in RFID Protocols , 2004, UCS.
[42] M. Lynn. Hawaii International Conference on System Sciences , 1996 .
[43] Gustavo Alonso,et al. A Pipelined Framework for Online Cleaning of Sensor Data Streams , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[44] Robert F. Otondo,et al. Information Systems and Health Care-II: Back to the Future with RFID: Lessons Learned - Some Old, Some New , 2005, Commun. Assoc. Inf. Syst..
[45] Gildas Avoine. Cryptography in radio frequency identification and fair exchange protocols , 2005 .
[46] Fusheng Wang,et al. Temporal Management of RFID Data , 2005, VLDB.