A robust RFID inventory
暂无分享,去创建一个
[1] Jairo A. Gutiérrez,et al. Effects of the RFID Mandate on Supply Chain Management , 2008, J. Theor. Appl. Electron. Commer. Res..
[2] Umakishore Ramachandran,et al. Load shedding based resource management techniques for RFID data , 2009, 2009 IEEE International Conference on RFID.
[3] Katina Michael,et al. The pros and cons of RFID in supply chain management , 2005, International Conference on Mobile Business (ICMB'05).
[4] Ralf W. Seifert,et al. Applications of RFID in Supply Chains , 2007 .
[5] Xue Li,et al. RFID Data Management: Challenges and Opportunities , 2007, 2007 IEEE International Conference on RFID.
[6] Martin Feldhofer,et al. A Case Against Currently Used Hash Functions in RFID Protocols , 2006, OTM Workshops.
[7] Michel Latteux,et al. Framed Aloha Based Anti-collision Protocol for RFID tags , 2007 .
[8] Samir Ranjan Das,et al. Collision avoidance in a dense RFID network , 2006, WiNTECH.
[9] Jürgen Bohn. Prototypical implementation of location-aware services based on a middleware architecture for super-distributed RFID tag infrastructures , 2006, Personal and Ubiquitous Computing.
[10] Daniel M. Dobkin,et al. The RF in RFID: Passive UHF RFID in Practice , 2007 .
[11] A. Raman,et al. Execution: The Missing Link in Retail Operations , 2001 .
[12] Roy Want,et al. An introduction to RFID technology , 2006, IEEE Pervasive Computing.
[13] Hyong-Woo Lee,et al. An Enhanced RFID Multiple Access Protocol for Fast Inventory , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[14] Michel Banâtre,et al. Ubi-Check: A Pervasive Integrity Checking System , 2009, NEW2AN.
[15] Weilian Su,et al. Multiple RFID Tags Access Algorithm , 2010, IEEE Transactions on Mobile Computing.
[16] Harald Vogt,et al. Efficient Object Identification with Passive RFID Tags , 2002, Pervasive.
[17] Christian Floerkemeier,et al. The Smart Box Concept for Ubiquitous Computing Environments , 2003 .
[18] Philippe Oechslin,et al. A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.