Challenges for Pervasive RFID-Based Infrastructures
暂无分享,去创建一个
Magdalena Balazinska | Gaetano Borriello | Waylon Brunette | Evan Welbourne | M. Balazinska | G. Borriello | Evan Welbourne | Waylon Brunette
[1] Wei Tsang Ooi,et al. WinRFID: A Middleware for the Enablement of Radiofrequency Identification (RFID)Based Applications , 2005 .
[2] R. Gadh,et al. WinRFID – A Middleware for the enablement of Radio Frequency Identification ( RFID ) based Applications , 2005 .
[3] Christian Floerkemeier,et al. Issues with RFID Usage in Ubiquitous Computing Applications , 2004, Pervasive.
[4] Gaetano Borriello,et al. Reminding About Tagged Objects Using Passive RFIDs , 2004, UbiComp.
[5] Bill N. Schilit,et al. An overview of the PARCTAB ubiquitous computing experiment , 1995, IEEE Wirel. Commun..
[6] Prashant J. Shenoy,et al. Ferret: RFID Localization for Pervasive Multimedia , 2006, UbiComp.
[7] Minos N. Garofalakis,et al. Adaptive cleaning for RFID data streams , 2006, VLDB.
[8] D. McCullagh. RFID tags : Big Brother in small pachkages , 2003 .
[9] Irit Dinur,et al. Revealing information while preserving privacy , 2003, PODS.
[10] Vincent M. Stanford,et al. Pervasive Computing Goes the Last 100 Feet with RFID Systems , 2003, IEEE Pervasive Comput..
[11] Roy Want,et al. The Magic of RFID , 2004, ACM Queue.
[12] Gaetano Borriello,et al. Location Systems for Ubiquitous Computing , 2001, Computer.
[13] Yanlei Diao,et al. High-performance complex event processing over streams , 2006, SIGMOD Conference.
[14] Joshua R. Smith,et al. RFID-based techniques for human-activity detection , 2005, Commun. ACM.
[15] Ying Xing,et al. The Design of the Borealis Stream Processing Engine , 2005, CIDR.
[16] Frederick Reiss,et al. Design Considerations for High Fan-In Systems: The HiFi Approach , 2005, CIDR.
[17] Dan Suciu,et al. Towards correcting input data errors probabilistically using integrity constraints , 2006, MobiDE '06.
[18] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[19] Christian Floerkemeier,et al. RFID middleware design: addressing application requirements and RFID constraints , 2005, sOc-EUSAI '05.
[20] Roy Want,et al. Bridging physical and virtual worlds with electronic tags , 1999, CHI '99.