-
1
-
-
84866722352
-
-
EPC Radio-Frequency Identity Protocols Class-1 Gen-2 UHF RFID Protocol for Communications at 860MHz-960MHz, EPCglobal Apr.
-
"EPC Radio-Frequency Identity Protocols Class-1 Gen-2 UHF RFID Protocol for Communications at 860MHz-960MHz, EPCglobal," http://www.epcglobalinc.org/standards/uhfc1g2, Apr. 2011.
-
(2011)
-
-
-
3
-
-
0018522043
-
Tree algorithms for packet broadcast channels
-
Sept
-
J.I. Capetanakis, "Tree Algorithms for Packet Broadcast Channels," IEEE Trans. Information Theory, vol. 25, no. 5, pp. 505-515, Sept. 1979.
-
(1979)
IEEE Trans. Information Theory
, vol.25
, Issue.5
, pp. 505-515
-
-
Capetanakis, J.I.1
-
4
-
-
2442576849
-
Approximate aggregation techniques for sensor databases
-
J. Considine, F. Li, G. Kollios, and J. Byers, "Approximate Aggregation Techniques for Sensor Databases," Proc. IEEE 20th Int'l Conf. Data Eng. (ICDE '04), 2004.
-
(2004)
Proc. IEEE 20th Int'l Conf. Data Eng. (ICDE '04)
-
-
Considine, J.1
Li, F.2
Kollios, G.3
Byers, J.4
-
7
-
-
0029326388
-
Mellin transforms and asymptotics: Harmonic sums
-
P. Flajolet, X. Gourdon, and P. Dumas, "Mellin Transforms and Asymptotics: Harmonic Sums," Theoretical Computer Science, vol. 144, nos. 1/2, pp. 3-58, 1995.
-
(1995)
Theoretical Computer Science
, vol.144
, Issue.1-2
, pp. 3-58
-
-
Flajolet, P.1
Gourdon, X.2
Dumas, P.3
-
8
-
-
0020828424
-
Probabilistic counting algorithms for data base applications
-
P. Flajolet and G.N. Martin, "Probabilistic Counting Algorithms for Data Base Applications," J. Computer and System Science, vol. 31, no. 2, pp. 182-209, 1985.
-
(1985)
J. Computer and System Science
, vol.31
, Issue.2
, pp. 182-209
-
-
Flajolet, P.1
Martin, G.N.2
-
11
-
-
0002812751
-
Sampling-based estimation of the number of distinct values of an attribute
-
P.J. Haas, J.F. Naughton, S. Seshadri, and L. Stokes, "Sampling-Based Estimation of the Number of Distinct Values of an Attribute," Proc. 21st Int'l Conf. Very Large Data Bases (VLDB '95), 1995.
-
(1995)
Proc. 21st Int'l Conf. Very Large Data Bases (VLDB '95)
-
-
Haas, P.J.1
Naughton, J.F.2
Seshadri, S.3
Stokes, L.4
-
12
-
-
77953296741
-
Counting RFID tags efficiently and anonymously
-
H. Han, B. Sheng, C.C. Tan, Q. Li, W. Mao, and S. Lu, "Counting RFID Tags Efficiently and Anonymously," Proc. IEEE INFOCOM, 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Han, H.1
Sheng, B.2
Tan, C.C.3
Li, Q.4
Mao, W.5
Lu, S.6
-
13
-
-
0013449551
-
On the analysis of probabilistic counting
-
P. Kirschenhofer and H. Prodinger, "On the Analysis of Probabilistic Counting," Lecture Notes in Math., vol. 1452, pp. 117-120, 1990.
-
(1990)
Lecture Notes in Math.
, vol.1452
, pp. 117-120
-
-
Kirschenhofer, P.1
Prodinger, H.2
-
15
-
-
33751069820
-
Fast and reliable estimation schemes in RFID systems
-
M. Kodialam and T. Nandagopal, "Fast and Reliable Estimation Schemes in RFID Systems," Proc. ACM MobiCom, 2006.
-
(2006)
Proc. ACM MobiCom
-
-
Kodialam, M.1
Nandagopal, T.2
-
18
-
-
27644524713
-
Analysis of RFID anti-collision algorithms using smart antennas
-
J. Lee, T. Kwon, Y. Choi, S.K. Das, and K.-a. Kim, "Analysis of RFID Anti-Collision Algorithms Using Smart Antennas," Proc. Second Int'l Conf. Embedded Networked Sensor Systems (SenSys '04), 2004.
-
(2004)
Proc. Second Int'l Conf. Embedded Networked Sensor Systems (SenSys '04)
-
-
Lee, J.1
Kwon, T.2
Choi, Y.3
Das, S.K.4
Kim, K.-A.5
-
19
-
-
34547638948
-
Mining frequent trajectory patterns for activity monitoring using radio frequency tag arrays
-
Y. Liu, L. Chen, J. Pei, Q. Chen, and Y. Zhao, "Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays," Proc. IEEE Fifth Ann. Int'l Conf. Pervasive Computing and Comm. (PerCom '07), 2007.
-
(2007)
Proc. IEEE Fifth Ann. Int'l Conf. Pervasive Computing and Comm. (PerCom '07)
-
-
Liu, Y.1
Chen, L.2
Pei, J.3
Chen, Q.4
Zhao, Y.5
-
20
-
-
77953302294
-
Refresh: Weak privacy model for RFID systems
-
L. Lu, Y. Liu, X. Li, "Refresh: Weak Privacy Model for RFID Systems," Proc. IEEE INFOCOM, 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Lu, L.1
Liu, Y.2
Li, X.3
-
21
-
-
33748075808
-
Adaptive splitting protocols for RFID tag collision arbitration
-
J. Myung and W. Lee, "Adaptive Splitting Protocols for RFID Tag Collision Arbitration," Proc. ACM MobiHoc, 2006.
-
(2006)
Proc. ACM MobiHoc
-
-
Myung, J.1
Lee, W.2
-
23
-
-
78649697822
-
LANDMARC: Indoor location sensing using active RFID
-
L.M. Ni, Y. Liu, Y.C. Lau, and A. Patil, "LANDMARC: Indoor Location Sensing Using Active RFID," Proc. IEEE First Int'l Conf. Pervasive Computing and Comm. (PerCom '03), 2003.
-
(2003)
Proc. IEEE First Int'l Conf. Pervasive Computing and Comm. (PerCom '03)
-
-
Ni, L.M.1
Liu, Y.2
Lau, Y.C.3
Patil, A.4
-
25
-
-
77955886382
-
ASAP: Scalable identification and counting for contactless rfid systems
-
C. Qian, Y. Liu, H. Ngan, and L.M. Ni, "ASAP: Scalable Identification and Counting for Contactless RFID Systems," Proc. IEEE 30th Int'l Conf. Distributed Computing Systems (ICDCS '10), 2010.
-
(2010)
Proc. IEEE 30th Int'l Conf. Distributed Computing Systems (ICDCS '10)
-
-
Qian, C.1
Liu, Y.2
Ngan, H.3
Ni, L.M.4
-
26
-
-
0002544335
-
Aloha packet system with and without slots and capture
-
L.G. Roberts, "Aloha Packet System with and without Slots and Capture," ACM SIGCOMM Computer Comm. Rev., vol. 5, no. 2, pp. 28-42, 1975.
-
(1975)
ACM SIGCOMM Computer Comm. Rev.
, vol.5
, Issue.2
, pp. 28-42
-
-
Roberts, L.G.1
-
32
-
-
32844471136
-
An introduction to RFID technology
-
Jan-Mar
-
R. Want, "An Introduction to RFID Technology," IEEE Pervasive Computing, vol. 5, no. 1, pp. 25-33, Jan.-Mar. 2005.
-
(2005)
IEEE Pervasive Computing
, vol.5
, Issue.1
, pp. 25-33
-
-
Want, R.1
-
33
-
-
77953317751
-
Efficient tag identification in mobile RFID systems
-
L. Xie, B. Sheng, C.C. Tan, H. Han, Q. Li, and D. Chen, "Efficient Tag Identification in Mobile RFID Systems," Proc. IEEE INFO-COM, 2010.
-
(2010)
Proc. IEEE INFO-COM
-
-
Xie, L.1
Sheng, B.2
Tan, C.C.3
Han, H.4
Li, Q.5
Chen, D.6
-
34
-
-
77956439072
-
Negotiate power and performance in the reality of RFID systems
-
X. Xu, L. Gu, J. Wang, and G. Xing, "Negotiate Power and Performance in the Reality of RFID Systems," Proc. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom), 2010.
-
(2010)
Proc. IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom)
-
-
Xu, X.1
Gu, L.2
Wang, J.3
Xing, G.4
-
35
-
-
79957668373
-
Identification-free batch authentication for RFID tags
-
L. Yang, J. Han, Y. Qi, and Y. Liu, "Identification-Free Batch Authentication for RFID Tags," Proc. IEEE 18th Int'l Conf. Network Protocol (ICNP), 2010.
-
(2010)
Proc. IEEE 18th Int'l Conf. Network Protocol (ICNP)
-
-
Yang, L.1
Han, J.2
Qi, Y.3
Liu, Y.4
-
36
-
-
34547614424
-
An RF-based system for tracking transceiver-free objects
-
D. Zhang, J. Ma, Q. Chen, and L.M. Ni, "An RF-Based System for Tracking Transceiver-Free Objects," Proc. IEEE Fifth Ann. Int'l Conf. Pervasive Computing and Comm. (PerCom '07), 2007.
-
(2007)
Proc. IEEE Fifth Ann. Int'l Conf. Pervasive Computing and Comm. (PerCom '07)
-
-
Zhang, D.1
Ma, J.2
Chen, Q.3
Ni, L.M.4
-
37
-
-
80052800549
-
Fast identification of the missing tags in a large RFID system
-
R. Zhang, Y. Liu, Y. Zhang, and J. Sun, "Fast Identification of the Missing Tags in a Large RFID System," Proc. IEEE Eighth Ann. Comm. Soc. Conf. Sensor, Mesh, and Ad Hoc Comm. and Networks (SECON), 2011.
-
(2011)
Proc. IEEE Eighth Ann. Comm. Soc. Conf. Sensor, Mesh, and Ad Hoc Comm. and Networks (SECON)
-
-
Zhang, R.1
Liu, Y.2
Zhang, Y.3
Sun, J.4
-
38
-
-
34250355403
-
Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems
-
F. Zhou, C. Chen, D. Jin, C. Huang, and H. Min, "Evaluating and Optimizing Power Consumption of Anti-Collision Protocols for Applications in RFID Systems," Proc. Int'l Symp. Low Power Electronics and Design (ISLPED), 2004.
-
(2004)
Proc. Int'l Symp. Low Power Electronics and Design (ISLPED)
-
-
Zhou, F.1
Chen, C.2
Jin, D.3
Huang, C.4
Min, H.5
|