-
2
-
-
70450232823
-
Network applications of bloom filters: A survey
-
A. Broder and M. Mitzenmacher, "Network applications of bloom filters: A survey, " Internet Math., vol. 1, no. 4, pp. 485-509, 2003.
-
(2003)
Internet Math.
, vol.1
, Issue.4
, pp. 485-509
-
-
Broder, A.1
Mitzenmacher, M.2
-
3
-
-
60149096491
-
An empirical study of uhf RFID performance
-
M. Buettner and D. Wetherall, "An empirical study of uhf RFID performance, " in Proc. ACM MobiCom, 2008, pp. 223-234.
-
(2008)
Proc. ACM MobiCom
, pp. 223-234
-
-
Buettner, M.1
Wetherall, D.2
-
4
-
-
0018522043
-
Tree algorithms for packet broadcast channels
-
Sep
-
J. I. Capetanakis, "Tree algorithms for packet broadcast channels, " IEEE Trans. Inf. Theory, vol. IT-25, no. 5, pp. 505-515, Sep. 1979.
-
(1979)
IEEE Trans. Inf. Theory
, vol.IT-25
, Issue.5
, pp. 505-515
-
-
Capetanakis, J.I.1
-
5
-
-
78149289945
-
Efficient error estimating coding: Feasibility and applications
-
B. Chen, Z. Zhou, Y. Zhao, and H. Yu, "Efficient error estimating coding: Feasibility and applications, " in Proc. ACM SIGCOMM, 2010, pp. 3-14.
-
(2010)
Proc. ACM SIGCOMM
, pp. 3-14
-
-
Chen, B.1
Zhou, Z.2
Zhao, Y.3
Yu, H.4
-
6
-
-
79960879422
-
Efficient information collection protocols for sensor-augmented RFID networks
-
S. Chen, M. Zhang, and B. Xiao, "Efficient information collection protocols for sensor-augmented RFID networks, " in Proc. IEEE INFOCOM, 2011, pp. 3101-3109.
-
(2011)
Proc. IEEE INFOCOM
, pp. 3101-3109
-
-
Chen, S.1
Zhang, M.2
Xiao, B.3
-
8
-
-
77949949097
-
False negative problem of counting bloom filter
-
May
-
D. Guo, Y. Liu, X. Li, and P. Yang, "False negative problem of counting bloom filter, " IEEE Trans. Knowl. Data Eng., vol. 22, no. 5, pp. 651-664, May 2010.
-
(2010)
IEEE Trans. Knowl. Data Eng.
, vol.22
, Issue.5
, pp. 651-664
-
-
Guo, D.1
Liu, Y.2
Li, X.3
Yang, P.4
-
9
-
-
68949175522
-
Power-up SRAM state as an identifying fingerprint and source of true random numbers
-
Sep
-
D. Holcomb, W. Burleson, and K. Fu, "Power-up SRAM state as an identifying fingerprint and source of true random numbers, " IEEE Trans. Comput., vol. 58, no. 9, pp. 1198-1210, Sep. 2009.
-
(2009)
IEEE Trans. Comput.
, vol.58
, Issue.9
, pp. 1198-1210
-
-
Holcomb, D.1
Burleson, W.2
Fu, K.3
-
10
-
-
33751069820
-
Fast and reliable estimation schemes in RFID systems
-
M. Kodialam and T. Nandagopal, "Fast and reliable estimation schemes in RFID systems, " in Proc. ACM MobiCom, 2006, pp. 322-333.
-
(2006)
Proc. ACM MobiCom
, pp. 322-333
-
-
Kodialam, M.1
Nandagopal, T.2
-
11
-
-
83055194205
-
Anticollision protocols for single-reader RFID systems: Temporal analysis and optimization
-
Feb
-
T. F. La Porta, G. Maselli, and C. Petrioli, "Anticollision protocols for single-reader RFID systems: Temporal analysis and optimization, " IEEE Trans. Mobile Comput., vol. 10, no. 2, pp. 267-279, Feb. 2011.
-
(2011)
IEEE Trans. Mobile Comput.
, vol.10
, Issue.2
, pp. 267-279
-
-
La Porta, T.F.1
Maselli, G.2
Petrioli, C.3
-
12
-
-
57149131540
-
Efficient storage scheme and query processing for supply chain management using RFID
-
C.-H. Lee and C.-W. Chung, "Efficient storage scheme and query processing for supply chain management using RFID, " in Proc. ACM SIGMOD, 2008, pp. 291-302.
-
(2008)
Proc. ACM SIGMOD
, pp. 291-302
-
-
Lee, C.-H.1
Chung, C.-W.2
-
13
-
-
33749512062
-
An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification
-
S.-R. Lee, S.-D. Joo, and C.-W. Lee, "An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification, " in Proc. IEEE MobiQuitous, 2005, pp. 166-172.
-
(2005)
Proc. IEEE MobiQuitous
, pp. 166-172
-
-
Lee, S.-R.1
Joo, S.-D.2
Lee, C.-W.3
-
14
-
-
78649253728
-
Identifying the missing tags in a large RFID system
-
T. Li, S. Chen, and Y. Ling, "Identifying the missing tags in a large RFID system, " in Proc. ACM MobiHoc, 2010, pp. 1-10.
-
(2010)
Proc. ACM MobiHoc
, pp. 1-10
-
-
Li, T.1
Chen, S.2
Ling, Y.3
-
15
-
-
77953299114
-
Energy efficient algorithms for the RFID estimation problem
-
T. Li, S. Wu, S. Chen, and M. Yang, "Energy efficient algorithms for the RFID estimation problem, " in Proc. IEEE INFOCOM, 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Li, T.1
Wu, S.2
Chen, S.3
Yang, M.4
-
16
-
-
77953302294
-
Refresh: Weak privacy model for RFID systems
-
L. Lu, Y. Liu, and X. Li, "Refresh: Weak privacy model for RFID systems, " in Proc. IEEE INFOCOM, 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Lu, L.1
Liu, Y.2
Li, X.3
-
17
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
D. Molnar and D. Wagner, "Privacy and security in library RFID: issues, practices, and architectures, " in Proc. ACM CCS, 2004, pp. 210-219.
-
(2004)
Proc. ACM CCS
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
18
-
-
33748075808
-
Adaptive splitting protocols for RFID tag collision arbitration
-
J. Myung and W. Lee, "Adaptive splitting protocols for RFID tag collision arbitration, " in Proc. ACM MobiHoc, 2006, pp. 202-213.
-
(2006)
Proc. ACM MobiHoc
, pp. 202-213
-
-
Myung, J.1
Lee, W.2
-
19
-
-
5544326540
-
LANDMARC: Indoor location sensing using active RFID
-
L. M. Ni, Y. Liu, Y. C. Lau, and A. Patil, "LANDMARC: Indoor location sensing using active RFID, " Wireless Netw., vol. 10, no. 6, pp. 701-710, 2004.
-
(2004)
Wireless Netw.
, vol.10
, Issue.6
, pp. 701-710
-
-
Ni, L.M.1
Liu, Y.2
Lau, Y.C.3
Patil, A.4
-
20
-
-
79960838804
-
Cardinality estimation for large-scale RFID systems
-
Sep
-
C. Qian, H. Ngan, and Y. Liu, "Cardinality estimation for large-scale RFID systems, " IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 9, pp. 1441-1454, Sep. 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.9
, pp. 1441-1454
-
-
Qian, C.1
Ngan, H.2
Liu, Y.3
-
21
-
-
84863149341
-
Energy-efficient polling protocols in RFID systems
-
Article
-
Y. Qiao, S. Chen, T. Li, and S. Chen, "Energy-efficient polling protocols in RFID systems, " in Proc. ACM MobiHoc, 2011, Article no. 25.
-
(2011)
Proc. ACM MobiHoc
, Issue.25
-
-
Qiao, Y.1
Chen, S.2
Li, T.3
Chen, S.4
-
22
-
-
37749020501
-
A general model of wireless interference
-
L. Qiu, Y. Zhang, F. Wang, M. K. Han, and R. Mahajan, "A general model of wireless interference, " in Proc. ACM MobiCom, 2007, pp. 171-182.
-
(2007)
Proc. ACM MobiCom
, pp. 171-182
-
-
Qiu, L.1
Zhang, Y.2
Wang, F.3
Han, M.K.4
Mahajan, R.5
-
23
-
-
0002544335
-
Aloha packet system with and without slots and capture
-
L. G. Roberts, "Aloha packet system with and without slots and capture, " Comput. Commun. Rev., vol. 5, no. 2, pp. 28-42, 1975.
-
(1975)
Comput. Commun. Rev.
, vol.5
, Issue.2
, pp. 28-42
-
-
Roberts, L.G.1
-
24
-
-
85008055668
-
Secure and serverless RFID authentication and search protocols
-
Apr
-
C. C. Tan, B. Sheng, and Q. Li, "Secure and serverless RFID authentication and search protocols, " IEEE Trans. Wireless Commun., vol. 7, no. 4, pp. 1400-1407, Apr. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.4
, pp. 1400-1407
-
-
Tan, C.C.1
Sheng, B.2
Li, Q.3
-
25
-
-
51849107758
-
How to monitor for missing RFID tags
-
C. C. Tan, B. Sheng, and Q. Li, "How to monitor for missing RFID tags, " in Proc. IEEE ICDCS, 2008, pp. 295-302.
-
(2008)
Proc. IEEE ICDCS
, pp. 295-302
-
-
Tan, C.C.1
Sheng, B.2
Li, Q.3
-
26
-
-
71949090853
-
RASPberry: A stable reader activation scheduling protocol in multi-reader RFID systems
-
S. Tang, J. Yuan, X.-Y. Li, G. Chen, Y. Liu, and J. Zhao, "RASPberry: A stable reader activation scheduling protocol in multi-reader RFID systems, " in Proc. IEEE ICNP, 2009, pp. 304-313.
-
(2009)
Proc. IEEE ICNP
, pp. 304-313
-
-
Tang, S.1
Yuan, J.2
Li, X.-Y.3
Chen, G.4
Liu, Y.5
Zhao, J.6
-
27
-
-
77956439072
-
Negotiate power and performance in the reality of RFID systems
-
X. Xu, L. Gu, J. Wang, and G. Xing, "Negotiate power and performance in the reality of RFID systems, " in Proc. IEEE PerCom, 2010, pp. 88-97.
-
(2010)
Proc. IEEE PerCom
, pp. 88-97
-
-
Xu, X.1
Gu, L.2
Wang, J.3
Xing, G.4
-
28
-
-
79957668373
-
Identification-free batch authentication for RFID tags
-
L. Yang, J. Han, Y. Qi, and Y. Liu, "Identification-free batch authentication for RFID tags, " in Proc. IEEE ICNP, 2010, pp. 154-163.
-
(2010)
Proc. IEEE ICNP
, pp. 154-163
-
-
Yang, L.1
Han, J.2
Qi, Y.3
Liu, Y.4
-
29
-
-
79960879870
-
Season: Shelving interference and joint identification in large-scale RFID systems
-
L. Yang, J. Han, Y. Qi, C. Wang, T. Gu, and Y. Liu, "Season: Shelving interference and joint identification in large-scale RFID systems, " in Proc. IEEE INFOCOM, 2011, pp. 3092-3100.
-
(2011)
Proc. IEEE INFOCOM
, pp. 3092-3100
-
-
Yang, L.1
Han, J.2
Qi, Y.3
Wang, C.4
Gu, T.5
Liu, Y.6
-
30
-
-
63649165149
-
WISP:Apassively poweredUHF RFID tag with sensing and computation
-
S. Ahson and M. Ilyas, Eds. Boca Raton, FL: CRC Press Mar
-
D. Yeager, A. Sample, and J. Smith, "WISP:Apassively poweredUHF RFID tag with sensing and computation, " in RFID Handbook: Applications, Technology, Security, and Privacy, S. Ahson and M. Ilyas, Eds. Boca Raton, FL: CRC Press, Mar. 2008.
-
(2008)
RFID Handbook: Applications, Technology, Security, and Privacy
-
-
Yeager, D.1
Sample, A.2
Smith, J.3
-
31
-
-
79952068013
-
TASA: Tag-free activity sensing using RFID tag arrays
-
D. Zhang, J. Zhou, M. Guo, J. Cao, and T. Li, "TASA: Tag-free activity sensing using RFID tag arrays, " IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 4, pp. 558-570, 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.4
, pp. 558-570
-
-
Zhang, D.1
Zhou, J.2
Guo, M.3
Cao, J.4
Li, T.5
-
32
-
-
80052800549
-
Fast identification of the missing tags in a large RFID system
-
R. Zhang, Y. Liu, Y. Zhang, and J. Sun, "Fast identification of the missing tags in a large RFID system, " in Proc. IEEE SECON, 2011, pp. 278-286.
-
(2011)
Proc. IEEE SECON
, pp. 278-286
-
-
Zhang, R.1
Liu, Y.2
Zhang, Y.3
Sun, J.4
-
33
-
-
80051893916
-
PET: Probabilistic estimating tree for large-scale RFID estimation
-
Y. Zheng, M. Li, and C. Qian, "PET: Probabilistic estimating tree for large-scale RFID estimation, " in Proc. IEEE ICDCS, 2011, pp. 37-46.
-
(2011)
Proc. IEEE ICDCS
, pp. 37-46
-
-
Zheng, Y.1
Li, M.2
Qian, C.3
-
34
-
-
48349129475
-
Slotted scheduled tag access in multi-reader RFID systems
-
Z. Zhou, H. Gupta, S. R. Das, and X. Zhu, "Slotted scheduled tag access in multi-reader RFID systems, " in Proc. IEEE ICNP, 2007, pp. 61-70.
-
(2007)
Proc. IEEE ICNP
, pp. 61-70
-
-
Zhou, Z.1
Gupta, H.2
Das, S.R.3
Zhu, X.4
-
35
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zeropower defenses
-
D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel, "Pacemakers and implantable cardiac defibrillators: Software radio attacks and zeropower defenses, " in Proc. IEEE Symp. Security Privacy, 2008, pp. 129-142.
-
(2008)
Proc. IEEE Symp. Security Privacy
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.3
Clark, S.S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.H.9
-
36
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implanted medical devices
-
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, "They can hear your heartbeats: Non-invasive security for implanted medical devices, " in Proc. ACM SIGCOMM, 2011, pp. 2-13.
-
(2011)
Proc. ACM SIGCOMM
, pp. 2-13
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
37
-
-
77953296741
-
Counting RFID tags efficiently and anonymously
-
H. Han, B. Sheng, C. C. Tan, Q. Li, W. Mao, and S. Lu, "Counting RFID tags efficiently and anonymously, " in Proc. IEEE INFOCOM, 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Han, H.1
Sheng, B.2
Tan, C.C.3
Li, Q.4
Mao, W.5
Lu, S.6
-
38
-
-
72249093541
-
Energy-aware tag anti-collision protocols for RFID systems
-
Jan
-
V. Namboodiri and L. Gao, "Energy-aware tag anti-collision protocols for RFID systems, " IEEE Trans. Mobile Comput., vol. 9, no. 1, pp. 33-59, Jan. 2010.
-
(2010)
IEEE Trans. Mobile Comput.
, vol.9
, Issue.1
, pp. 33-59
-
-
Namboodiri, V.1
Gao, L.2
-
39
-
-
83555173693
-
Smart trend-traversal protocol for RFID tag arbitration
-
Nov
-
L. Pan and H. Wu, "Smart trend-traversal protocol for RFID tag arbitration, " IEEE Trans. Wireless Commun., vol. 10, no. 11, pp. 3565-3569, Nov. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.11
, pp. 3565-3569
-
-
Pan, L.1
Wu, H.2
-
40
-
-
85076603363
-
Dewdrop: An energyaware runtime for computational RFID
-
M. Buettner, B. Greenstein, and D. Wetherall, "Dewdrop: An energyaware runtime for computational RFID, " in Proc. USENIX NSDI, 2011, pp. 197-210.
-
(2011)
Proc. USENIX NSDI
, pp. 197-210
-
-
Buettner, M.1
Greenstein, B.2
Wetherall, D.3
-
41
-
-
79953123176
-
Mementos: System support for long-running computation on RFID-scale devices
-
B. Ransford, J. Sorber, and K. Fu, "Mementos: System support for long-running computation on RFID-scale devices, " in Proc. ASPLOS, 2011, pp. 159-170.
-
(2011)
Proc. ASPLOS
, pp. 159-170
-
-
Ransford, B.1
Sorber, J.2
Fu, K.3
-
42
-
-
84866484463
-
Efficient and reliable low-power backscatter networks
-
J. Wang, H. Hassanieh, D. Katabi, and P. Indyk, "Efficient and reliable low-power backscatter networks, " in Proc. ACM SIGCOMM, 2012, pp. 61-72.
-
(2012)
Proc. ACM SIGCOMM
, pp. 61-72
-
-
Wang, J.1
Hassanieh, H.2
Katabi, D.3
Indyk, P.4
|