-
2
-
-
78649697822
-
LANDMARC: Indoor location sensing using active RFID
-
L.M. Ni, Y. Liu, Y.C. Lau, and A. Patil, "LANDMARC: Indoor Location Sensing Using Active RFID," Proc. First IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom), 2003.
-
(2003)
Proc. First IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom)
-
-
Ni, L.M.1
Liu, Y.2
Lau, Y.C.3
Patil, A.4
-
3
-
-
33749044290
-
MiddleWhere: A middleware for location awareness in ubiquitous computing applications
-
A. Ranganathan, J. Al-Muhtadi, S. Chetan, R. Campbell, and M.D. Mickunas, "MiddleWhere: A Middleware for Location Awareness in Ubiquitous Computing Applications," Proc. Fifth ACM/IFIP/ USENIX Int'l Conf. Middleware, 2004.
-
(2004)
Proc. Fifth ACM/IFIP/ USENIX Int'l Conf. Middleware
-
-
Ranganathan, A.1
Al-Muhtadi, J.2
Chetan, S.3
Campbell, R.4
Mickunas, M.D.5
-
4
-
-
34547614424
-
An RF-based system for tracking transceiver-free objects
-
D. Zhang, J. Ma, Q. Chen, and L.M. Ni, "An RF-Based System for Tracking Transceiver-Free Objects," Proc. Fifth IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom), 2007.
-
(2007)
Proc. Fifth IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom)
-
-
Zhang, D.1
Ma, J.2
Chen, Q.3
Ni, L.M.4
-
5
-
-
34547638948
-
Mining frequent trajectory patterns for activity monitoring using radio frequency tag arrays
-
Y. Liu, L. Chen, J. Pei, Q. Chen, and Y. Zhao, "Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays," Proc. Fifth IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom), 2007.
-
(2007)
Proc. Fifth IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom)
-
-
Liu, Y.1
Chen, L.2
Pei, J.3
Chen, Q.4
Zhao, Y.5
-
7
-
-
32844471136
-
An introduction to RFID technology
-
DOI 10.1109/MPRV.2006.2
-
R. Want, "An Introduction to RFID Technology," IEEE Pervasive Computing, vol. 5, no. 1, pp. 25-33, Jan.-Mar. 2006. (Pubitemid 43254240)
-
(2006)
IEEE Pervasive Computing
, vol.5
, Issue.1
, pp. 25-33
-
-
Want, R.1
-
8
-
-
0032675633
-
Energy-conserving access protocols for identification networks
-
Feb.
-
I. Chlamtac, C. Petrioli, and J. Redi, "Energy-Conserving Access Protocols for Identification Networks," IEEE/ACM Trans. Networking, vol. 7, no. 1, pp. 51-59, Feb. 1999.
-
(1999)
IEEE/ACM Trans. Networking
, vol.7
, Issue.1
, pp. 51-59
-
-
Chlamtac, I.1
Petrioli, C.2
Redi, J.3
-
9
-
-
27644524713
-
Analysis of RFID anti-collision algorithms using smart antennas
-
J. Lee, T. Kwon, Y. Choi, S.K. Das, and K.-A. Kim, "Analysis of RFID Anti-Collision Algorithms Using Smart Antennas," Proc. Second Int'l Conf. Embedded Networked Sensor Systems (SenSys), 2004.
-
(2004)
Proc. Second Int'l Conf. Embedded Networked Sensor Systems (SenSys)
-
-
Lee, J.1
Kwon, T.2
Choi, Y.3
Das, S.K.4
Kim, K.-A.5
-
11
-
-
0002544335
-
Aloha packet system with and without slots and capture
-
L.G. Roberts, "Aloha Packet System with and without Slots and Capture," ACM SIGCOMM Computer Comm. Rev., vol. 5, pp. 28-42, 1975.
-
(1975)
ACM SIGCOMM Computer Comm. Rev.
, vol.5
, pp. 28-42
-
-
Roberts, L.G.1
-
12
-
-
0018522043
-
Tree algorithms for packet broadcast channels
-
Sept.
-
J.I. Capetanakis, "Tree Algorithms for Packet Broadcast Channels," IEEE Trans. Information Theory, vol. IT-25, no. 5, pp. 505-515, Sept. 1979.
-
(1979)
IEEE Trans. Information Theory
, vol.IT-25
, Issue.5
, pp. 505-515
-
-
Capetanakis, J.I.1
-
14
-
-
34248658262
-
Tag-splitting: Adaptive collision arbitration protocols for RFID tag identification
-
DOI 10.1109/TPDS.2007.1098
-
J. Myung, W. Lee, J. Srivastava, and T. Shih, "Tag-Splitting: Adaptive Collision Arbitration Protocols for RFID Tag Identification," IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 6, pp. 763-775, June 2007. (Pubitemid 46767740)
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.6
, pp. 763-775
-
-
Myung, J.1
Lee, W.2
Srivastava, J.3
Shih, T.K.4
-
19
-
-
57349154239
-
Finding popular categories for RFID tags
-
B. Sheng, C.C. Tan, Q. Li, and W. Mao, "Finding Popular Categories for RFID Tags," Proc. ACM Int'l Symp. Mobile Ad Hoc Networking and Computing (Mobihoc), 2008.
-
(2008)
Proc. ACM Int'l Symp. Mobile Ad Hoc Networking and Computing (Mobihoc)
-
-
Sheng, B.1
Tan, C.C.2
Li, Q.3
Mao, W.4
-
21
-
-
77953296741
-
Counting RFID tags efficiently and anonymously
-
H. Han, B. Sheng, C.C. Tan, Q. Li, W. Mao, and S. Lu, "Counting RFID Tags Efficiently and Anonymously," Proc. IEEE INFOCOM, 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Han, H.1
Sheng, B.2
Tan, C.C.3
Li, Q.4
Mao, W.5
Lu, S.6
-
22
-
-
77953315079
-
Efficient continuous scanning in RFID systems
-
B. Sheng, Q. Li, and W. Mao, "Efficient Continuous Scanning in RFID Systems," Proc. IEEE INFOCOM, 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Sheng, B.1
Li, Q.2
Mao, W.3
-
23
-
-
77953299114
-
Energy efficient algorithms for the RFID estimation problem
-
T. Li, S. Wu, S. Chen, and M. Yang, "Energy Efficient Algorithms for the RFID Estimation Problem," Proc. IEEE INFOCOM, 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Li, T.1
Wu, S.2
Chen, S.3
Yang, M.4
-
24
-
-
34547617482
-
Dynamic key-updating: Privacy-preserving authentication for RFID systems
-
L. Lu, J. Han, L. Hu, Y. Liu, and L.M. Ni, "Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems," Proc. Fifth IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom), 2007.
-
(2007)
Proc. Fifth IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom)
-
-
Lu, L.1
Han, J.2
Hu, L.3
Liu, Y.4
Ni, L.M.5
-
25
-
-
79960847985
-
-
master's thesis, Hong Kong Univ. of Science and Technology, July
-
C. Qian, "Efficient Cardinality Counting for Large-Scale RFID Systems," master's thesis, Hong Kong Univ. of Science and Technology, http://www.cs.utexas.edu/~cqian/thesis.pdf, July 2008.
-
(2008)
Efficient Cardinality Counting for Large-Scale RFID Systems
-
-
Qian, C.1
-
26
-
-
63449136362
-
Dynamic tag estimation for optimizing tree slotted aloha in RFID networks
-
G. Maselli, C. Petrioli, and C. Vicari, "Dynamic Tag Estimation for Optimizing Tree Slotted Aloha in RFID Networks," Proc.11th ACM Int'l Symp. Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), 2008.
-
(2008)
Proc.11th ACM Int'l Symp. Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM)
-
-
Maselli, G.1
Petrioli, C.2
Vicari, C.3
-
28
-
-
48349129475
-
Slotted scheduled tag access in multi-reader RFID Systems
-
Z. Zhou, H. Gupta, S.R. Das, and X. Zhu, "Slotted Scheduled Tag Access in Multi-Reader RFID Systems," Proc. 15th IEEE Int'l Conf. Network Protocols (ICNP), 2007.
-
(2007)
Proc. 15th IEEE Int'l Conf. Network Protocols (ICNP)
-
-
Zhou, Z.1
Gupta, H.2
Das, S.R.3
Zhu, X.4
-
29
-
-
0037969408
-
Colorwave: An anticollision algorithm for the reader collision problem
-
J. Waldrop, D.W. Engels, and S.E. Sarma, "Colorwave: An Anticollision Algorithm for the Reader Collision Problem," Proc. IEEE Int'l Conf. Comm., vol. 2, 2002.
-
(2002)
Proc. IEEE Int'l Conf. Comm.
, vol.2
-
-
Waldrop, J.1
Engels, D.W.2
Sarma, S.E.3
-
31
-
-
85008532893
-
Intelligent transportation systems
-
Oct.-Dec.
-
A.D. Joseph et al., "Intelligent Transportation Systems," IEEE Pervasive Computing, vol. 5, no. 4, pp. 63-67, Oct.-Dec. 2006.
-
(2006)
IEEE Pervasive Computing
, vol.5
, Issue.4
, pp. 63-67
-
-
Joseph, A.D.1
-
32
-
-
0025449292
-
A linear-time probabilistic counting algorithm for database applications
-
K.-Y. Whang, B.T. Vander-Zanden, and H.M. Taylor, "A Linear-Time Probabilistic Counting Algorithm for Database Applications," ACM Trans. Database Systems, vol. 15, pp. 208-229, 1990.
-
(1990)
ACM Trans. Database Systems
, vol.15
, pp. 208-229
-
-
Whang, K.-Y.1
Vander-Zanden, B.T.2
Taylor, H.M.3
-
33
-
-
0020828424
-
Probabilistic counting algorithms for data base applications
-
P. Flajolet and G.N. Martin, "Probabilistic Counting Algorithms for Data Base Applications," J. Computer and System Science, vol. 31, pp. 182-209, 1985.
-
(1985)
J. Computer and System Science
, vol.31
, pp. 182-209
-
-
Flajolet, P.1
Martin, G.N.2
-
36
-
-
68949175522
-
Power-Up SRAM state as an identifying fingerprint and source of true random numbers
-
Sept.
-
D. Holcomb, W. Burleson, and K. Fu, "Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers," IEEE Trans. Computers, vol. 58, no. 9, pp. 1198-1210, Sept. 2009
-
(2009)
IEEE Trans. Computers
, vol.58
, Issue.9
, pp. 1198-1210
-
-
Holcomb, D.1
Burleson, W.2
Fu, K.3
-
38
-
-
77955886382
-
ASAP: Scalable identification and counting for contactless RFID systems
-
C. Qian, Y. Liu, H. Ngan, and L.M. Ni, "ASAP: Scalable Identification and Counting for Contactless RFID Systems," Proc. IEEE 30th Int'l Conf. Distributed Computing Systems ( ICDCS), 2010.
-
(2010)
Proc. IEEE 30th Int'l Conf. Distributed Computing Systems ( ICDCS)
-
-
Qian, C.1
Liu, Y.2
Ngan, H.3
Ni, L.M.4
-
39
-
-
79960847753
-
-
Application Level Events (ALE) Standard, EPCglobal Board, http://www.epcglobalinc.org/standards/ale. 2011.
-
(2011)
-
-
|