-
1
-
-
27844491753
-
Integrating the supply chain with RFID: A technical and business analysis
-
Asif, Z. and Mandiviwalla, M. (2005) 'Integrating the supply chain with RFID: A technical and business analysis', Communications of the AIS Vol. 15, pp.393-427.
-
(2005)
Communications of the AIS
, vol.15
, pp. 393-427
-
-
Asif, Z.1
Mandiviwalla, M.2
-
4
-
-
0036042175
-
Models and issues in data stream systems
-
Madison, Wisconsin, 3-5 June, pp
-
Babcock, B., Babu, S., Datar, M., Motwani, R. and Widom, J. (2002) 'Models and issues in data stream systems', Proceedings of 21st ACM Symposium on Principles of Database Systems (PODS 2002), Madison, Wisconsin, 3-5 June, pp.1-16.
-
(2002)
Proceedings of 21st ACM Symposium on Principles of Database Systems (PODS 2002)
, pp. 1-16
-
-
Babcock, B.1
Babu, S.2
Datar, M.3
Motwani, R.4
Widom, J.5
-
5
-
-
33745625094
-
Integrating automatic data acquisition with business processes experiences with SAP's auto-ID infrastructure
-
Toronto, pp
-
Bornhövd, C., Lin, T., Haller, S. and Schaper, J. (2004) 'Integrating automatic data acquisition with business processes experiences with SAP's auto-ID infrastructure', Proceedings of the 30th VLDB Conference, Toronto, pp.1182-1188.
-
(2004)
Proceedings of the 30th VLDB Conference
, pp. 1182-1188
-
-
Bornhövd, C.1
Lin, T.2
Haller, S.3
Schaper, J.4
-
6
-
-
85130020670
-
Managing RFID data
-
Toronto, Canada, pp
-
Chawathe, S.S., Krishnamurthy, V., Ramachandran, S. and Sarma, S. (2004) 'Managing RFID data', Proceedings of the 30th VLDB Conference, Toronto, Canada, pp.1189-1195.
-
(2004)
Proceedings of the 30th VLDB Conference
, pp. 1189-1195
-
-
Chawathe, S.S.1
Krishnamurthy, V.2
Ramachandran, S.3
Sarma, S.4
-
7
-
-
33646698900
-
RFID data management and RFID information value chain support with RFID middleware platform implementation
-
Springer-Verlag, Berlin, Heidelberg, New York
-
Cheong, T. and Kim, Y. (2005) 'RFID data management and RFID information value chain support with RFID middleware platform implementation', Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, Vol. 3760, pp.557-575.
-
(2005)
Lecture Notes in Computer Science
, vol.3760
, pp. 557-575
-
-
Cheong, T.1
Kim, Y.2
-
8
-
-
33847739842
-
Metro group reaps gains from RFID
-
Collins, J. (2005) 'Metro group reaps gains from RFID', RFID Journal http://www.rfidjournal.com/article/articleview/1355/1/1/.
-
(2005)
RFID Journal
-
-
Collins, J.1
-
9
-
-
74549178701
-
RFID data management: Challenges and opportunities
-
Grapevine, Texas, USA, pp
-
Derakhshan, R., Orlowska, M.E. and Li, X. (2007) 'RFID data management: challenges and opportunities', IEEE First International Conference on RFID, Grapevine, Texas, USA, pp.175-182.
-
(2007)
IEEE First International Conference on RFID
, pp. 175-182
-
-
Derakhshan, R.1
Orlowska, M.E.2
Li, X.3
-
10
-
-
39749146654
-
Data-on-network vs. data-on-tag: Managing data in complex RFID environments
-
Hawaii, USA
-
Diekmann, T., Melski, A. and Schumann, M. (2007) 'Data-on-network vs. data-on-tag: Managing data in complex RFID environments', 40th Annual Hawaii International Conference on System Sciences, Big Island, Hawaii, USA.
-
(2007)
40th Annual Hawaii International Conference on System Sciences, Big Island
-
-
Diekmann, T.1
Melski, A.2
Schumann, M.3
-
12
-
-
23944477452
-
Some methods for privacy in RFID communication
-
Springer, Berlin, Heidelberg, New York
-
Fishkin, K.P., Roy, S. and Jiang, B. (2005) 'Some methods for privacy in RFID communication', Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, New York, Vol. 3313, pp.42-53.
-
(2005)
Lecture Notes in Computer Science
, vol.3313
, pp. 42-53
-
-
Fishkin, K.P.1
Roy, S.2
Jiang, B.3
-
13
-
-
42149088003
-
The business value of ubiquitous computing technologies
-
Roussos, G, Ed, Springer, London, pp
-
Fleisch, E. and Tellkamp, C. (2006) 'The business value of ubiquitous computing technologies', in Roussos, G. (Ed.): Ubiquitous and Pervasive Commerce, Springer, London, pp.93-113.
-
(2006)
Ubiquitous and Pervasive Commerce
, pp. 93-113
-
-
Fleisch, E.1
Tellkamp, C.2
-
14
-
-
35048881133
-
Issues with RFID usage in ubiquitous computing applications
-
Springer, Berlin, Heidelberg, New York
-
Floerkemeier, C. and Lampe, M. (2004) 'Issues with RFID usage in ubiquitous computing applications', Lecture Notes in Computer Science Springer, Berlin, Heidelberg, New York, Vol. 3001, pp.188-193.
-
(2004)
Lecture Notes in Computer Science
, vol.3001
, pp. 188-193
-
-
Floerkemeier, C.1
Lampe, M.2
-
16
-
-
33749048273
-
Comparison of transmission schemes for framed ALOHA based RFID protocols
-
Phoenix, Arizona, pp
-
Floerkemeier, C. and Wille, M. (2006) 'Comparison of transmission schemes for framed ALOHA based RFID protocols', International Symposium on Applications and the Internet Workshops, Phoenix, Arizona, pp.92-97.
-
(2006)
International Symposium on Applications and the Internet Workshops
, pp. 92-97
-
-
Floerkemeier, C.1
Wille, M.2
-
17
-
-
26444442422
-
Sensors and tags - scanning with a purpose - supporting the fair information principles in RFID protocols
-
Springer, Berlin, Heidelberg, New York
-
Floerkemeier, C., Schneider, R. and Langheinrich, M. (2005) 'Sensors and tags - scanning with a purpose - supporting the fair information principles in RFID protocols', Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, New York, Vol. 3598, pp.214-231.
-
(2005)
Lecture Notes in Computer Science
, vol.3598
, pp. 214-231
-
-
Floerkemeier, C.1
Schneider, R.2
Langheinrich, M.3
-
18
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
Garfinkel, S., Juels, A. and Pappu, R. (2005) 'RFID privacy: An overview of problems and proposed solutions', IEEE Security and Privacy, Vol. 3, No. 3, pp.34-43.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.1
Juels, A.2
Pappu, R.3
-
19
-
-
33749586133
-
Warehousing and analyzing massive RFID data sets
-
Gonzales, H., Han, J., Li, X. and Klabjan, D. (2006) 'Warehousing and analyzing massive RFID data sets', Proceedings of the International Conference on Data Engineering, p.83, (http://csd12.computer.org/ persagen/DLAbsToc.jsp?resourcePath=/d1/proceedings/&toc= comp/proceedings/icde/2006/2570/00/2570toc.xml&DOI=10.1109/ ICDE.2006.171).
-
(2006)
Proceedings of the International Conference on Data Engineering
, pp. 83
-
-
Gonzales, H.1
Han, J.2
Li, X.3
Klabjan, D.4
-
21
-
-
39749105526
-
RFID assimilation hierarchy
-
Big Island, Hawaii
-
Hardgrave, B.C., Armstrong, D.J. and Riemenschneider, C.K. (2007) 'RFID assimilation hierarchy', 40th Annual Hawaii International Conference on System Sciences, Big Island, Hawaii.
-
(2007)
40th Annual Hawaii International Conference on System Sciences
-
-
Hardgrave, B.C.1
Armstrong, D.J.2
Riemenschneider, C.K.3
-
22
-
-
42149159754
-
The necessity for a uniform organisation of user memory in RFID
-
Harmon, C.K. (2006) 'The necessity for a uniform organisation of user memory in RFID', Int. J. RFID Technology and Applications, Vol. 1, No. 1, pp.41-51.
-
(2006)
Int. J. RFID Technology and Applications
, vol.1
, Issue.1
, pp. 41-51
-
-
Harmon, C.K.1
-
23
-
-
35048847641
-
Tackling security and privacy issues in radio frequency identification
-
Ferscha, A. and Mattern, F, Eds, Springer, Berlin, Heidelberg, New York
-
Henrici, D. and Mueller, P. (2004) 'Tackling security and privacy issues in radio frequency identification', in Ferscha, A. and Mattern, F. (Eds.): Pervasive Computing. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, New York, Vol. 3001, pp.219-224.
-
(2004)
Pervasive Computing. Lecture Notes in Computer Science
, vol.3001
, pp. 219-224
-
-
Henrici, D.1
Mueller, P.2
-
24
-
-
33745611170
-
Supporting RFID-based item tracking applications in Oracle DBMS using a bitmap datatype
-
Trondheim, pp
-
Hu, Y., Sundara, S., Chorma, T. and Srinivasan, J. (2005) 'Supporting RFID-based item tracking applications in Oracle DBMS using a bitmap datatype', Proceedings of the 31st VLDB Conference, Trondheim, pp.1140-1151.
-
(2005)
Proceedings of the 31st VLDB Conference
, pp. 1140-1151
-
-
Hu, Y.1
Sundara, S.2
Chorma, T.3
Srinivasan, J.4
-
25
-
-
33750737795
-
An improved ALOHA algorithm for improved RFID identification
-
Springer, Berlin, Heidelberg, New York
-
Huang, X. (2006) 'An improved ALOHA algorithm for improved RFID identification', Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, New York, Vol. 4253, pp.1157-1162.
-
(2006)
Lecture Notes in Computer Science
, vol.4253
, pp. 1157-1162
-
-
Huang, X.1
-
26
-
-
27844473012
-
Information systems and health care II: Back to Lhe future with RFID: lessons learned - some old, some new
-
Janz, B.D., Pitz, M.G. and Otondo, R.F. (2005) 'Information systems and health care II: Back to Lhe future with RFID: lessons learned - some old, some new', Communications of the Association for Information Systems, Vol. 15, No. 7, pp.1-32.
-
(2005)
Communications of the Association for Information Systems
, vol.15
, Issue.7
, pp. 1-32
-
-
Janz, B.D.1
Pitz, M.G.2
Otondo, R.F.3
-
27
-
-
33745920526
-
Declarative support for sensor data cleaning
-
Jeffery, S.R., Alonso, G., Franklin, M.J., Hong, W. and Widom, J. (2006a) 'Declarative support for sensor data cleaning', Pervasive Computing, pp.83-100.
-
(2006)
Pervasive Computing
, pp. 83-100
-
-
Jeffery, S.R.1
Alonso, G.2
Franklin, M.J.3
Hong, W.4
Widom, J.5
-
28
-
-
33749611375
-
Proceedings of the 22nd International Conference on Data Engineering
-
see http:///xpl/ freeabs_all.jsp?arnumber=1617508
-
Jeffery, S.R., Alonso, G., Franklin, M.J., Hong, W. and Widom, J. (2006b) 'A pipelined framework for online cleaning of sensor data streams', Proceedings of the 22nd International Conference on Data Engineering, p.140, (see http://ieeexplore.ieee.org/xpl/ freeabs_all.jsp?arnumber=1617508).
-
(2006)
, pp. 140
-
-
Jeffery, S.R.1
Alonso, G.2
Franklin, M.J.3
Hong, W.4
Widom, J.5
-
29
-
-
35448972745
-
Adaptive cleaning for RFID data streams
-
Seoul, pp
-
Jeffery, S.R., Garofalakis, M. and Franklin, M.J. (2006c) 'Adaptive cleaning for RFID data streams', Proceedings of the 32nd International Conference on Very Large Data Bases, Seoul, pp.163-174.
-
(2006)
Proceedings of the 32nd International Conference on Very Large Data Bases
, pp. 163-174
-
-
Jeffery, S.R.1
Garofalakis, M.2
Franklin, M.J.3
-
30
-
-
34247379089
-
Collision avoidance in a dense RFID network
-
ACM Press, New York, pp
-
Jain, S. and Das, S.R. (2006) 'Collision avoidance in a dense RFID network', Proceedings of the 1st International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization, ACM Press, New York, pp.49-56.
-
(2006)
Proceedings of the 1st International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization
, pp. 49-56
-
-
Jain, S.1
Das, S.R.2
-
31
-
-
23944476196
-
Authentication and identification - minimalist cryptography for low-cost RFID tags
-
Springer, Berlin, Heidelberg, New York
-
Juels, A. (2005) 'Authentication and identification - minimalist cryptography for low-cost RFID tags', Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, New York, Vol. 3352, pp.149-164.
-
(2005)
Lecture Notes in Computer Science
, vol.3352
, pp. 149-164
-
-
Juels, A.1
-
32
-
-
33144457479
-
RFID security and privacy: A research survey
-
Juels, A. (2006) 'RFID security and privacy: A research survey', IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp.381-394.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
33
-
-
33751069820
-
Fast and reliable estimation schemes in RFID systems
-
ACM Press, New York, pp
-
Kodialam, M. and Nandagopal, T. (2006) 'Fast and reliable estimation schemes in RFID systems', Proceedings of the 12th Annual International Conference on Mobile Computing and Networking. ACM Press, New York, pp.322-333.
-
(2006)
Proceedings of the 12th Annual International Conference on Mobile Computing and Networking
, pp. 322-333
-
-
Kodialam, M.1
Nandagopal, T.2
-
34
-
-
34547367358
-
The pros and cons of RFID in supply chain management
-
Sydney, Australia, pp
-
Michael, K. and McCathie, L. (2005) 'The pros and cons of RFID in supply chain management', Proceedings of the International Conference on Mobile Business, Sydney, Australia, pp.623-629.
-
(2005)
Proceedings of the International Conference on Mobile Business
, pp. 623-629
-
-
Michael, K.1
McCathie, L.2
-
35
-
-
33748075808
-
Adaptive splitting protocols for RFID tag collision arbitration
-
ACM Press, New York, pp
-
Myung, J. and Lee, W. (2006) 'Adaptive splitting protocols for RFID tag collision arbitration', Proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing, ACM Press, New York, pp.202-213.
-
(2006)
Proceedings of the Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 202-213
-
-
Myung, J.1
Lee, W.2
-
36
-
-
33646841032
-
Intrusion detection - tamper detection for ubiquitous RFID-enabled supply chain
-
Springer, Berlin, Heidelberg, New York
-
Potdar, V., Wu, C. and Chang, E. (2005) 'Intrusion detection - tamper detection for ubiquitous RFID-enabled supply chain', Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, New York, Vol. 3802, pp.273-278.
-
(2005)
Lecture Notes in Computer Science
, vol.3802
, pp. 273-278
-
-
Potdar, V.1
Wu, C.2
Chang, E.3
-
37
-
-
57149127334
-
A deferred cleansing method for RFID data analytics
-
Seoul, pp
-
Rao, J., Doraiswamy, S., Thakkar, H. and Colby, L.S. (2006) 'A deferred cleansing method for RFID data analytics', Proceedings of the 32nd VLDB Conference, Seoul, pp.175-186.
-
(2006)
Proceedings of the 32nd VLDB Conference
, pp. 175-186
-
-
Rao, J.1
Doraiswamy, S.2
Thakkar, H.3
Colby, L.S.4
-
38
-
-
26444435642
-
Mobile security - RFID guardian: A battery-powered mobile device for RFID privacy management
-
Springer, Berlin, Heidelberg, New York
-
Rieback, M.R., Crispo, B. and Tanenbaum, A.S. (2005) 'Mobile security - RFID guardian: A battery-powered mobile device for RFID privacy management', Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, New York, Vol. 3574, pp.184-194.
-
(2005)
Lecture Notes in Computer Science
, vol.3574
, pp. 184-194
-
-
Rieback, M.R.1
Crispo, B.2
Tanenbaum, A.S.3
-
39
-
-
33749685397
-
The role of collective mental models in IOS adoption: Opening the black box of rationality in RFID deployment
-
Kauai, Hawaii, p
-
Riggins, F. and Slaughter, K. (2006) 'The role of collective mental models in IOS adoption: Opening the black box of rationality in RFID deployment', 39th Annual Hawaii International Conference on System Sciences, Kauai, Hawaii, p.184, http://ieeexplore.ieee.org/xpl/ freeabs_all.jsp?arnumber=1579667).
-
(2006)
39th Annual Hawaii International Conference on System Sciences
, pp. 184
-
-
Riggins, F.1
Slaughter, K.2
-
40
-
-
85008011696
-
Integrating RFID
-
Sarma, S. (2004) 'Integrating RFID', QUEUE, No. 10, Vol. 2, No. 7, pp.50-57.
-
(2004)
QUEUE
, vol.2
, Issue.10-17
, pp. 50-57
-
-
Sarma, S.1
-
41
-
-
39749179145
-
A history of the EPC
-
Garfinkel, S. and Rosenberg, B, Eds, Addison-Wesley, Upper Saddle River, NJ, pp
-
Sarma, S. (2006) 'A history of the EPC', in Garfinkel, S. and Rosenberg, B. (Eds.): RFID - Applications, Security and Privacy, Addison-Wesley, Upper Saddle River, NJ, pp.37-56.
-
(2006)
RFID - Applications, Security and Privacy
, pp. 37-56
-
-
Sarma, S.1
-
42
-
-
84890005651
-
-
Springer, Berlin, Heidelberg, New York
-
Schuster, E.W., Allen, S.J. and Brock, D.L. (2007) Global RFID: The Value of the EPCglobal Network for Supply Chain Management, Springer, Berlin, Heidelberg, New York.
-
(2007)
Global RFID: The Value of the EPCglobal Network for Supply Chain Management
-
-
Schuster, E.W.1
Allen, S.J.2
Brock, D.L.3
-
43
-
-
33747471981
-
The race for RFID
-
Seidman, T. (2003) 'The race for RFID', The Journal of Commerce, Vol. 4, No. 48, pp.16-18.
-
(2003)
The Journal of Commerce
, vol.4
, Issue.48
, pp. 16-18
-
-
Seidman, T.1
-
44
-
-
33745762633
-
Taxonomy and survey of RFID anti-collision protocols
-
Shih, D., Sun, P-L. and Yen, D.C. (2006) 'Taxonomy and survey of RFID anti-collision protocols', Computer and Communications, Vol. 29, No. 11, pp.2150-2166.
-
(2006)
Computer and Communications
, vol.29
, Issue.11
, pp. 2150-2166
-
-
Shih, D.1
Sun, P.-L.2
Yen, D.C.3
-
45
-
-
42149100858
-
Making (13.56) waves
-
Speer, J.K. (2006) 'Making (13.56) waves', Apparel, Vol. 2, pp.22-24.
-
(2006)
Apparel
, vol.2
, pp. 22-24
-
-
Speer, J.K.1
-
46
-
-
42149195728
-
Maintaining privacy in RFID enabled environments - proposal for a disable-model
-
Robinson, P, Vogt, H. and Wagealla, W, Eds, Springer, Berlin, Heidelberg, New York, pp
-
Spiekermann, S. and Berthold, O. (2005) 'Maintaining privacy in RFID enabled environments - proposal for a disable-model', in Robinson, P., Vogt, H. and Wagealla, W. (Eds.): Privacy, Security and Trust within the Context of Pervasive Computing, Springer, Berlin, Heidelberg, New York, pp.137-146.
-
(2005)
Privacy, Security and Trust within the Context of Pervasive Computing
, pp. 137-146
-
-
Spiekermann, S.1
Berthold, O.2
-
47
-
-
85088742778
-
RFID: A 7-point plan to ensure privacy
-
Regensburg, Germany, pp
-
Spiekermann, S. and Ziekow, H. (2005) 'RFID: A 7-point plan to ensure privacy', European Conference on Information Systems (ECIS '05), Regensburg, Germany, pp.688-699.
-
(2005)
European Conference on Information Systems (ECIS '05)
, pp. 688-699
-
-
Spiekermann, S.1
Ziekow, H.2
-
48
-
-
33645523062
-
An overview of EPC technology
-
Thiesse, F. and Michahelles, F. (2006) 'An overview of EPC technology', Sensor Review, Vol. 26, No. 2, pp.101-105.
-
(2006)
Sensor Review
, vol.26
, Issue.2
, pp. 101-105
-
-
Thiesse, F.1
Michahelles, F.2
-
49
-
-
38149039318
-
Progress for RFID: An Architectural Overview and Use Case Review
-
Technical Report
-
Trigg, J.B. (2005) Progress for RFID: An Architectural Overview and Use Case Review, Technical Report, www.progress.com/realtime/docs/ whitepapers/arch_overview_rfid_jtrigg2.pdf.
-
(2005)
-
-
Trigg, J.B.1
-
50
-
-
42149132417
-
Digital camels: The hunger for more data on passive RFID tags
-
Tsougas, N. (2006) 'Digital camels: The hunger for more data on passive RFID tags', RFID Journal, www.rfidba.org/s-rfidba/news/files/ Digital-Camels-RFID-Nick-T-Article.pdf.
-
(2006)
RFID Journal
-
-
Tsougas, N.1
-
51
-
-
42149127987
-
RFID-Based Networks - Exploiting Diversity and Redundancy
-
Technical Report, online
-
Vaidya, N. and Das, S.R. (2006) RFID-Based Networks - Exploiting Diversity and Redundancy, Technical Report, online http://www.cs.sunysb.edu/~samir/Pubs/rfid-vision.pdf.
-
(2006)
-
-
Vaidya, N.1
Das, S.R.2
-
53
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Hutter, D, Mueller, G, Stephan, W. and Ullmann, M, Eds, Springer, Berlin, Heidelberg, New York
-
Weis, S.A., Sarma, S.E., Rivest, R.L. and Engels, D.W. (2003) 'Security and privacy aspects of low-cost radio frequency identification systems', in Hutter, D., Mueller, G., Stephan, W. and Ullmann, M. (Eds.): International Conference on Security in Pervasive Computing - SPC 2003, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, New York, Vol. 2802, pp.454-469.
-
(2003)
International Conference on Security in Pervasive Computing - SPC 2003, Lecture Notes in Computer Science
, vol.2802
, pp. 454-469
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
54
-
-
42149170894
-
Radio frequency identification: The initiator of a Domino effect
-
Zhang, X., Hu, T., Janz, B.D. and Gillenson, M.L. (2006) 'Radio frequency identification: The initiator of a Domino effect', Proceedings of the 2006 Southern Association for Information Systems Conference, pp.191-196.
-
(2006)
Proceedings of the 2006 Southern Association for Information Systems Conference
, pp. 191-196
-
-
Zhang, X.1
Hu, T.2
Janz, B.D.3
Gillenson, M.L.4
|