Building the Internet of Things Using RFID: The RFID Ecosystem Experience
暂无分享,去创建一个
Leilani Battle | Magdalena Balazinska | Gaetano Borriello | Evan Welbourne | Kyle Rector | Garrett Cole | Kayla Gould | Samuel Raymer | M. Balazinska | G. Borriello | E. Welbourne | L. Battle | Garrett Cole | K. Gould | Kyle Rector | Samuel Raymer | Evan Welbourne
[1] Mark S. Ackerman,et al. Personal and Ubiquitous Computing , 2004, Personal and Ubiquitous Computing.
[2] Henry A. Kautz,et al. Inferring activities from interactions with objects , 2004, IEEE Pervasive Computing.
[3] Sunny Consolvo,et al. Learning and Recognizing the Places We Go , 2005, UbiComp.
[4] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[5] Dan Suciu,et al. Physical Access Control for Captured RFID Data , 2007, IEEE Pervasive Computing.
[6] Yang Li,et al. Cascadia: A System for Specifying, Detecting, and Managing RFID Events , 2008, MobiSys '08.
[7] Prashant J. Shenoy,et al. Sherlock: automatically locating objects for humans , 2008, MobiSys '08.
[8] Dan Suciu,et al. Access control over uncertain data , 2008, Proc. VLDB Endow..
[9] Marc Langheinrich,et al. A survey of RFID privacy approaches , 2009, Personal and Ubiquitous Computing.