Counting RFID Tags Efficiently and Anonymously
暂无分享,去创建一个
Bo Sheng | Weizhen Mao | Qun Li | Chiu Chiang Tan | Sanglu Lu | Hao Han
[1] M. Abramowitz,et al. Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .
[2] LiuYunhao,et al. Cardinality Estimation for Large-Scale RFID Systems , 2011 .
[3] Chae-Woo Lee,et al. An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[4] Bo Sheng,et al. Secure and Serverless RFID Authentication and Search Protocols , 2008, IEEE Transactions on Wireless Communications.
[5] Luca Trevisan,et al. Counting Distinct Elements in a Data Stream , 2002, RANDOM.
[6] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[7] Kai-Yeung Siu,et al. Efficient memoryless protocol for tag identification (extended abstract) , 2000, DIALM '00.
[8] Wonjun Lee,et al. Adaptive splitting protocols for RFID tag collision arbitration , 2006, MobiHoc '06.
[9] Murali S. Kodialam,et al. Anonymous Tracking Using RFID Tags , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[10] Masashi Shimizu,et al. Framed ALOHA for Multiple RFID Objects Identification , 2005, IEICE Trans. Commun..
[11] Chun-Hee Lee,et al. Efficient storage scheme and query processing for supply chain management using RFID , 2008, SIGMOD Conference.
[12] Feng Zhou,et al. Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems , 2004, Proceedings of the 2004 International Symposium on Low Power Electronics and Design (IEEE Cat. No.04TH8758).
[13] Bo Sheng,et al. Finding popular categories for RFID tags , 2008, MobiHoc '08.
[14] Yunhao Liu,et al. LANDMARC: Indoor Location Sensing Using Active RFID , 2004, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[15] Harald Vogt,et al. Efficient Object Identification with Passive RFID Tags , 2002, Pervasive.
[16] David A. Wagner,et al. Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[17] Yunhao Liu,et al. Cardinality Estimation for Large-Scale RFID Systems , 2011, IEEE Trans. Parallel Distributed Syst..
[18] D. R. Hush,et al. Analysis of tree algorithms for RFID arbitration , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[19] Jae-Hyun Kim,et al. Novel Anti-collision Algorithms for Fast Object Identification in RFID System , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).
[20] Norman Abramson,et al. The ALOHA System-Another Alternative for Computer Communications , 1899 .
[21] H. Tijms. Understanding Probability: Chance Rules in Everyday Life , 2004 .
[22] Bo Sheng,et al. How to Monitor for Missing RFID tags , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[23] Chong Wang,et al. RFID-Based 3-D Positioning Schemes , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[24] Jia Zhai,et al. An Anti-collision Algorithm Using Two-Functioned Estimation for RFID Tags , 2005, ICCSA.
[25] Lenin Ravindranath,et al. SixthSense: RFID-based Enterprise Intelligence , 2008, MobiSys '08.
[26] Murali S. Kodialam,et al. Fast and reliable estimation schemes in RFID systems , 2006, MobiCom '06.
[27] Prashant J. Shenoy,et al. Sherlock: automatically locating objects for humans , 2008, MobiSys '08.