-
1
-
-
33746364223
-
Snoopib: Interval-based event specification and detection for active databases
-
R. Adaikkalavan, S. Chakravarthy. Snoopib: interval-based event specification and detection for active databases. Data and Knowledge Engineering, 59(1): pp. 139-165, 2006.
-
(2006)
Data and Knowledge Engineering
, vol.59
, Issue.1
, pp. 139-165
-
-
Adaikkalavan, R.1
Chakravarthy, S.2
-
8
-
-
80955160447
-
That 'Internet of Things' thing
-
22 July
-
K. Ashton. That 'Internet of Things' Thing. In: RFID Journal, 22 July, 2009.
-
(2009)
RFID Journal
-
-
Ashton, K.1
-
9
-
-
34548717574
-
RFID data stream processing with a data stream query language
-
Y. Bai, F. Wang, P. Liu, C. Zaniolo, S. Liu. RFID Data Stream Processing with a Data Stream Query Language, ICDE Conference, 2007.
-
(2007)
ICDE Conference
-
-
Bai, Y.1
Wang, F.2
Liu, P.3
Zaniolo, C.4
Liu, S.5
-
10
-
-
84877887414
-
Security analysis of a cryptographically enabled RFID device
-
S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, M. Szydylo. Security Analysis of a Cryptographically Enabled RFID Device, USENIX Security, 2005.
-
(2005)
USENIX Security
-
-
Bono, S.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.5
Szydylo, M.6
-
11
-
-
33745625094
-
Integrating automatic data acquisition with business processes experiences with SAP?s auto-id infrastructure
-
C. Bornhovd, T. Lin, S. Haller, J. Schaper. Integrating Automatic Data Acquisition with Business Processes Experiences with SAP?s Auto-Id Infrastructure, VLDB Conference, 2004.
-
(2004)
VLDB Conference
-
-
Bornhovd, C.1
Lin, T.2
Haller, S.3
Schaper, J.4
-
13
-
-
84974721118
-
The HiPAC project: Combining active databases and timing constraints
-
M. J. Carey, M. Livny, R. Jauhari. The HiPAC project: Combining active databases and timing constraints. In SIGMOD Record, 17(1), 1988.
-
(1988)
SIGMOD Record
, vol.17
, Issue.1
-
-
Carey, M.J.1
Livny, M.2
Jauhari, R.3
-
14
-
-
0002962898
-
Composite events for active databases: Semantics, contexts and detection
-
S. Chakravarthy, V. Krishnaprasad, E. Anwar, S. Kim. Composite events for active databases: Semantics, contexts and detection. VLDB Conference, pp. 606-617, 1994.
-
(1994)
VLDB Conference
, pp. 606-617
-
-
Chakravarthy, S.1
Krishnaprasad, V.2
Anwar, E.3
Kim, S.4
-
16
-
-
84929554629
-
Zebra unveils RFID label maker
-
September 25
-
J. Collins. Zebra Unveils RFID Label Maker. RFID Journal, September 25, 2003. http://www.rfidjournal.com/article/articleview/592/1/1.
-
(2003)
RFID Journal
-
-
Collins, J.1
-
17
-
-
33750915630
-
Query evaluation on probabilistic databases
-
March
-
N. Dalvi, C. Re, D. Suciu. Query evaluation on probabilistic databases. IEEE Data Engineering Bulletin, 29(1), pp. 25-31, March 2006.
-
(2006)
IEEE Data Engineering Bulletin
, vol.29
, Issue.1
, pp. 25-31
-
-
Dalvi, N.1
Re, C.2
Suciu, D.3
-
18
-
-
35449002333
-
Towards expressive publish/subscribe systems
-
A. Demers, J. Gehrke, M. Hong, M. Riedewald, W.M. White. Towards expressive publish/subscribe systems. EDBT Conference, 2006.
-
(2006)
EDBT Conference
-
-
Demers, A.1
Gehrke, J.2
Hong, M.3
Riedewald, M.4
White, W.M.5
-
19
-
-
70849095464
-
DejaVu: Declarative pattern matching over live and archived streams of events
-
N. Dindhar, B. Guc, P. Lau, A. Ozal, M. Soner, N. Tatbul. DejaVu: Declarative Pattern Matching over Live and Archived Streams of Events, ACM SIGMOD Conference, 2009.
-
(2009)
ACM SIGMOD Conference
-
-
Dindhar, N.1
Guc, B.2
Lau, P.3
Ozal, A.4
Soner, M.5
Tatbul, N.6
-
21
-
-
14844290165
-
Enhancing RFID privacy via antenna energy analysis
-
Intel Research, Seattle
-
K. Fishkin, S. Roy. Enhancing RFID Privacy via Antenna Energy Analysis, Tech. Memo IRS-TR-03-012, Intel Research, Seattle, 2003.
-
(2003)
Tech. Memo IRS-TR-03-012
-
-
Fishkin, K.1
Roy, S.2
-
23
-
-
85193181903
-
Design considerations of high fan-in systems
-
M. J. Franklin, S. R. Jeffrey, S. Krishnamurthy, F. Reiss, E. Wu, O. Cooper, A. Edakkunni, W. Hong. Design Considerations of High Fan-In Systems, CIDR Conference, 2005.
-
(2005)
CIDR Conference
-
-
Franklin, M.J.1
Jeffrey, S.R.2
Krishnamurthy, S.3
Reiss, F.4
Wu, E.5
Cooper, O.6
Edakkunni, A.7
Hong, W.8
-
24
-
-
20844459862
-
RFID privacy: An overview of problems and proposed solutions
-
S. L. Garfinkel, A. Juels, R. Pappu. RFID Privacy: An Overview of Problems and Proposed Solutions, IEEE Security and Privacy, 3(3), 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
-
-
Garfinkel, S.L.1
Juels, A.2
Pappu, R.3
-
25
-
-
34547637493
-
Probabilistic data management for pervasive computing: The data furnace project
-
M. Garofalakis, K. Brown, M. Franklin, J. Hellerstein, D. Wang, E. Michelakis, L. Tancau, E. Wu, S. Jeffery, R. Aipperspach. Probabilistic Data Management for Pervasive Computing: The Data Furnace Project. IEEE Data Engineering Bulletin, 29(1): pp 57-63, 2006.
-
(2006)
IEEE Data Engineering Bulletin
, vol.29
, Issue.1
, pp. 57-63
-
-
Garofalakis, M.1
Brown, K.2
Franklin, M.3
Hellerstein, J.4
Wang, D.5
Michelakis, E.6
Tancau, L.7
Wu, E.8
Jeffery, S.9
Aipperspach, R.10
-
26
-
-
0002095024
-
Composite event specification in active databases: Model and implementation
-
N. H. Gehani, H. V. Jagadish, O. Shmueli. Composite Event Specification in Active Databases: Model and Implementation, VLDB Conference, 1992.
-
(1992)
VLDB Conference
-
-
Gehani, N.H.1
Jagadish, H.V.2
Shmueli, O.3
-
28
-
-
34547617685
-
Mining compressed commodity workflows from massive RFID data sets
-
H. Gonzalez, J. Han, X. Li. Mining compressed commodity workflows from massive RFID data sets. CIKM Conference, 2006.
-
(2006)
CIKM Conference
-
-
Gonzalez, H.1
Han, J.2
Li, X.3
-
30
-
-
84937145492
-
FlowCube: Constructing RFID flowcubes for multi-dimensional analysis of commodity flows
-
H. Gonzalez, J. Han, X. Li. FlowCube: Constructing RFID FlowCubes for Multi-Dimensional Analysis of Commodity Flows. VLDB Conference, 2006.
-
(2006)
VLDB Conference
-
-
Gonzalez, H.1
Han, J.2
Li, X.3
-
31
-
-
34548770803
-
Models for incomplete and probabilistic information
-
March
-
T. J. Green, V. Tannen. Models for incomplete and probabilistic information. IEEE Data Engineering Bulletin, 29(1), pp. 17-24, March 2006.
-
(2006)
IEEE Data Engineering Bulletin
, vol.29
, Issue.1
, pp. 17-24
-
-
Green, T.J.1
Tannen, V.2
-
34
-
-
84880209852
-
Mining massive RFID trajectory and traffic data sets (tutorial)
-
J. Han, J.-G. Lee, H. Gonzalez, X. Li. Mining Massive RFID, Trajectory, and Traffic Data Sets (Tutorial). ACM KDD Conference, 2008. Video of Tutoral Lecture at: http://videolectures.net/kdd08-han-mmrfid/
-
(2008)
ACM KDD Conference
-
-
Han, J.1
Lee, J.-G.2
Gonzalez, H.3
Li, X.4
-
37
-
-
39149095618
-
An adaptive RFID middleware for supporting metaphysical data independence
-
S. R. Jeffery, M. J. Franklin, M. Garofalakis. An Adaptive RFID Middleware for Supporting Metaphysical Data Independence. VLDB Journal, 17(2), pp. 265-289, 2008.
-
(2008)
VLDB Journal
, vol.17
, Issue.2
, pp. 265-289
-
-
Jeffery, S.R.1
Franklin, M.J.2
Garofalakis, M.3
-
38
-
-
33749611375
-
A pipelined framework for online cleaning of sensor data streams
-
S. R. Jeffrey, G. Alonso, M. Franklin, W. Hong, J. Widom. A pipelined framework for online cleaning of sensor data streams. ICDE Conference, 2006.
-
(2006)
ICDE Conference
-
-
Jeffrey, S.R.1
Alonso, G.2
Franklin, M.3
Hong, W.4
Widom, J.5
-
39
-
-
85032420454
-
Declarative support for RFID data cleaning
-
S. R. Jeffrey, G. Alonso, M. Franklin, W. Hong, J. Widom. Declarative Support for RFID Data Cleaning, Pervasive, 2006.
-
(2006)
Pervasive
-
-
Jeffrey, S.R.1
Alonso, G.2
Franklin, M.3
Hong, W.4
Widom, J.5
-
43
-
-
33144457479
-
RFID security and privacy: A research survey
-
Feb.
-
A. Juels. RFID Security and Privacy: A Research Survey, IEEE Journal on Selected Areas in Communication, vol. 24, pp. 381-394, Feb. 2006.
-
(2006)
IEEE Journal on Selected Areas in Communication
, vol.24
, pp. 381-394
-
-
Juels, A.1
-
44
-
-
2942524989
-
Squealing Euros: Privacy protection in RFIDenabled banknotes
-
Springer-Verlag
-
A. Juels, R. Pappu. Squealing Euros: Privacy protection in RFIDenabled banknotes. Proceedings of Financial Cryptography, Springer- Verlag, 2003.
-
(2003)
Proceedings of Financial Cryptography
-
-
Juels, A.1
Pappu, R.2
-
47
-
-
70350555664
-
-
Technical Report 2007-11-02, Department of Computer Science and Engineering, University of Washington
-
N. Khoussainova, M. Balazinska, D. Suciu. Peex: Extracting probabilistic events from RFID data. Technical Report 2007-11-02, Department of Computer Science and Engineering, University of Washington, 2007.
-
Peex: Extracting Probabilistic Events from RFID Data
, vol.2007
-
-
Khoussainova, N.1
Balazinska, M.2
Suciu, D.3
-
48
-
-
25444508507
-
Low-cost RFID privacy protection scheme
-
S. Kinoshita, F. Hoshino, T. Komuro, A. Fujimura, M. Ohkubo. Low-cost RFID privacy protection scheme. IPS Journal, 45(8), 2004.
-
(2004)
IPS Journal
, vol.45
, Issue.8
-
-
Kinoshita, S.1
Hoshino, F.2
Komuro, T.3
Fujimura, A.4
Ohkubo, M.5
-
49
-
-
35348826790
-
Physical access control for captured RFID data
-
T. Kriplean, E. Welbourne, N. Khoussainova, V. Rastogi, M. Balazinska, G. Borriello, T. Kohno, D. Suciu. Physical Access Control for Captured RFID Data, IEEE Pervasive Computing, 6(4), 2007.
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.4
-
-
Kriplean, T.1
Welbourne, E.2
Khoussainova, N.3
Rastogi, V.4
Balazinska, M.5
Borriello, G.6
Kohno, T.7
Suciu, D.8
-
50
-
-
33847741124
-
The history of RFID
-
October/November
-
J. Landt. The History of RFID. IEEE Potentials, October/November 2005.
-
(2005)
IEEE Potentials
-
-
Landt, J.1
-
54
-
-
85193186298
-
The end of lost luggage? RFID slowly coming to airports
-
R. McManus. The End of Lost Luggage? RFID Slowly Coming to Airports, ReadWriteWeb, 2009. http://www.readwriteweb.com/archives/the-end-of-lost-luggage-rfid.php
-
(2009)
ReadWriteWeb
-
-
McManus, R.1
-
55
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices and architectures
-
D. Molnar, D. Wagner. Privacy and Security in Library RFID: Issues, Practices and Architectures, CCS, 2004.
-
(2004)
CCS
-
-
Molnar, D.1
Wagner, D.2
-
56
-
-
5544326540
-
LANDMARC: Indoor location sensing using active RFID
-
L. Ni, Y. Liu, Y. Lau, A. Patil. LANDMARC: Indoor Location Sensing using Active RFID, Wireless Networks, 10(6), pp. 701-710, 2004.
-
(2004)
Wireless Networks
, vol.10
, Issue.6
, pp. 701-710
-
-
Ni, L.1
Liu, Y.2
Lau, Y.3
Patil, A.4
-
57
-
-
25444432606
-
RFID privacy issues and technical challenges
-
M. Ohkubo, K. Suzuki, S. Kinoshita. RFID Privacy Issues and Technical Challenges, Communications of the ACM, 48(9), 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.9
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
60
-
-
85193179433
-
Expressing privacy policies using authorization views
-
V. Rastogi, E. Welbourne, N. Khoussainova, T. Kriplean, M. Balazinska, G. Borriello, T. Kohno, D. Suciu. Expressing Privacy Policies using Authorization Views, International Workshop on Privacy in UbiComp (UbiComp?07), 2007.
-
(2007)
International Workshop on Privacy in UbiComp (UbiComp?07)
-
-
Rastogi, V.1
Welbourne, E.2
Khoussainova, N.3
Kriplean, T.4
Balazinska, M.5
Borriello, G.6
Kohno, T.7
Suciu, D.8
-
62
-
-
29844447838
-
Events on the edge
-
S. Rizvi, S. R. Jeffrey, S. Krishnamurthy, M. J. Franklin, N. Burkhart, A. Edakkunni, L. Liang. Events on the edge, ACM SIGMOD Conference, 2005.
-
(2005)
ACM SIGMOD Conference
-
-
Rizvi, S.1
Jeffrey, S.R.2
Krishnamurthy, S.3
Franklin, M.J.4
Burkhart, N.5
Edakkunni, A.6
Liang, L.7
-
63
-
-
2942593615
-
Radio-frequency identification systems
-
S. E. Sarma, S. A. Weis, D.W. Engels. Radio-frequency identification systems. CHES, pp. 454-469, 2002.
-
(2002)
CHES
, pp. 454-469
-
-
Sarma, S.E.1
Weis, S.A.2
Engels, D.W.3
-
64
-
-
2942623480
-
RFID systems, security and privacy implications
-
AutoID Center, MIT
-
S. E. Sarma, S. A. Weis, D.W. Engels. RFID systems, security and privacy implications. Technical Report MIT-AUTOID-WH-014, AutoID Center, MIT, 2002.
-
(2002)
Technical Report MIT-AUTOID-WH-014
-
-
Sarma, S.E.1
Weis, S.A.2
Engels, D.W.3
-
65
-
-
77954720804
-
RFID implementation challenges persist, all this time later
-
October
-
L. Sullivan. RFID Implementation Challenges Persist, All This Time Later. Information Week, October 2005.
-
(2005)
Information Week
-
-
Sullivan, L.1
-
66
-
-
85193172455
-
Reusable electronic baggage tag powered by RFID
-
October
-
C. Swedberg. Reusable Electronic Baggage Tag Powered by RFID, RFID Journal, October 2010.
-
(2010)
RFID Journal
-
-
Swedberg, C.1
-
67
-
-
57749119310
-
Identifying RFID-embedded objects in pervasive healthcare applications
-
W. J. Tu, W. Zhou, S. Piramuthu. Identifying RFID-embedded objects in Pervasive Healthcare Applications, Decision Support Systems, 46(2), 2009.
-
(2009)
Decision Support Systems
, vol.46
, Issue.2
-
-
Tu, W.J.1
Zhou, W.2
Piramuthu, S.3
-
69
-
-
70350543814
-
Complex RFID event processing
-
F. Wang, S. Liu, P. Liu. Complex RFID Event Processing, VLDB Journal, 18(4), 2009.
-
(2009)
VLDB Journal
, vol.18
, Issue.4
-
-
Wang, F.1
Liu, S.2
Liu, P.3
-
70
-
-
34147201546
-
Bridging physical and virtual worlds: Complex event processing for RFID data streams
-
F. Wang, S. Liu, P. Liu, Y. Bai. Bridging Physical and Virtual Worlds: Complex Event Processing for RFID Data Streams, EDBT Conference, 2006.
-
(2006)
EDBT Conference
-
-
Wang, F.1
Liu, S.2
Liu Y Bai, P.3
-
71
-
-
32844471136
-
An introduction to RFID technology
-
R. Want. An Introduction to RFID Technology, IEEE Pervasive, 2006.
-
(2006)
IEEE Pervasive
-
-
Want, R.1
-
72
-
-
1942500391
-
Enabling ubiquitous sensing with RFID
-
R. Want. Enabling Ubiquitous Sensing with RFID, Computer, 37(4), pp. 84-86, 2004.
-
(2004)
Computer
, vol.37
, Issue.4
, pp. 84-86
-
-
Want, R.1
-
74
-
-
67349277665
-
Building the internet of things using RFID
-
May-June
-
E. Welbourne, L. Battle, G. Cole, K. Gould, K. Rector, S. Raymer, M. Balazinska, G. Borriello. Building the Internet of Things Using RFID. IEEE Internet Computing, 13(3), May-June, 2009.
-
(2009)
IEEE Internet Computing
, vol.13
, Issue.3
-
-
Welbourne, E.1
Battle, L.2
Cole, G.3
Gould, K.4
Rector, K.5
Raymer, S.6
Balazinska, M.7
Borriello, G.8
-
77
-
-
84858835658
-
Trio: A system for integrated management of data, accuracy, and lineage
-
J. Widom. Trio: A system for integrated management of data, accuracy, and lineage. 2nd CIDR Conference, 2005.
-
(2005)
2nd CIDR Conference
-
-
Widom, J.1
-
78
-
-
34250735599
-
High-performance complex event processing over streams
-
E. Wu, Y. Diao, S. Rizvi. High-performance complex event processing over streams. ACM SIGMOD Conference, 2006.
-
(2006)
ACM SIGMOD Conference
-
-
Wu, E.1
Diao, Y.2
Rizvi, S.3
-
79
-
-
0032687306
-
On the semantics of complex events in active database management systems
-
D. Zimmer, R. Unland, On the semantics of complex events in active database management systems. ICDE Conference, 1999.
-
(1999)
ICDE Conference
-
-
Zimmer, D.1
Unland, R.2
-
82
-
-
85193171713
-
-
http://www.boycottbenetton.com
-
-
-
-
83
-
-
85193171425
-
-
http://www.boycotttesco.com
-
-
-
|