-
2
-
-
79952489796
-
A survey of applications and requirements of unique identification systems and rfid techniques
-
April
-
E. Ilie-Zudora, Z. Kemnya, F. van Blommesteinb, L. Monostoria, and A. van der Meulen, "A survey of applications and requirements of unique identification systems and rfid techniques," Computers in Industry, vol. 62, no. 3, p. 227C252, April 2011.
-
(2011)
Computers in Industry
, vol.62
, Issue.3
-
-
Ilie-Zudora, E.1
Kemnya, Z.2
Van Blommesteinb, F.3
Monostoria, L.4
Meulen Der A.Van5
-
3
-
-
33847037887
-
Rfid: The state of the union between promise and practice
-
Jan.
-
P. M. Reyes, G. V. Frazier, E. L. Prater, and A. R. Cannon, "Rfid: the state of the union between promise and practice," Int. J. of Integrated Supply Management, vol. 3, no. 2, Jan. 2007.
-
(2007)
Int. J. of Integrated Supply Management
, vol.3
, Issue.2
-
-
Reyes, P.M.1
Frazier, G.V.2
Prater, E.L.3
Cannon, A.R.4
-
8
-
-
24644498485
-
RFID: A technical overview and its application to the enterprise
-
DOI 10.1109/MITP.2005.69
-
R. Weinstein, "Rfid: a technical overview and its application to the enterprise," IT Professional, vol. 7, no. 3, pp. 27-33, 2005. (Pubitemid 41273076)
-
(2005)
IT Professional
, vol.7
, Issue.3
, pp. 27-33
-
-
Weinstein, R.1
-
10
-
-
77955471092
-
A survey and tutorial of rfid anticollision protocols
-
Aug.
-
D. Klair, K.-W. Chin, and R. Raad, "A survey and tutorial of rfid anticollision protocols," IEEE Commun. Surveys and Tutorials, vol. 12, no. 3, Aug. 2010.
-
(2010)
IEEE Commun. Surveys and Tutorials
, vol.12
, Issue.3
-
-
Klair, D.1
Chin, K.-W.2
Raad, R.3
-
11
-
-
33644907731
-
Adaptive binary splitting for efficient RFID tag anti-collision
-
DOI 10.1109/LCOMM.2006.1603365
-
J. Myung, W. Lee, and S. Jaideep, "Adaptive binary splitting for efficient rfid tag anti-collision," IEEE Commun. Lett., vol. 10, no. 3, pp. 144-146, 2006. (Pubitemid 43379997)
-
(2006)
IEEE Communications Letters
, vol.10
, Issue.3
, pp. 144-146
-
-
Myung, J.1
Lee, W.2
Srivastava, J.3
-
13
-
-
58149496131
-
An optimal q-algorithm for the iso 18000-6c rfid protocol
-
Y. Maguire and R. Pappu, "An optimal q-algorithm for the iso 18000-6c rfid protocol," IEEE Trans. Automation Science and Engineering, vol. 6, no. 1, pp. 16-24, 2009.
-
(2009)
IEEE Trans. Automation Science and Engineering
, vol.6
, Issue.1
, pp. 16-24
-
-
Maguire, Y.1
Pappu, R.2
-
14
-
-
24144469833
-
Framed ALOHA for multiple RFID objects identification
-
DOI 10.1093/ietcom/e88-b.3.991
-
B. Zhen, M. Kobayashi, and M. Shimuzu, "Framed aloha for multiple rfid objects identification," IEICE Trans. Commun., vol. E88-B, no. 3, pp. 991-999, 2005. (Pubitemid 41228258)
-
(2005)
IEICE Transactions on Communications
, vol.E88-B
, Issue.3
, pp. 991-999
-
-
Zhen, B.1
Kobayashi, M.2
Shimizu, M.3
-
15
-
-
0020734120
-
Dynamic frame length aloha
-
F. Schoute, "Dynamic frame length aloha," IEEE Trans. Commun., vol. 31, no. 4, pp. 565-568, 1983.
-
(1983)
IEEE Trans. Commun.
, vol.31
, Issue.4
, pp. 565-568
-
-
Schoute, F.1
-
16
-
-
84933522872
-
Bayesian transmission strategy for framed aloha based rfid protocols
-
C. Floerkemeier, "Bayesian transmission strategy for framed aloha based rfid protocols," in Proc. IEEE Int. Conf. on RFID, 2007.
-
(2007)
Proc. IEEE Int. Conf. on RFID
-
-
Floerkemeier, C.1
-
19
-
-
71949090853
-
Raspberry: A stable reader activation scheduling protocol in multi-reader rfid systems
-
S. Tang, J. Yuan, X. Y. Li, G. Chen, Y. Liu, and J. Zhao, "Raspberry: A stable reader activation scheduling protocol in multi-reader rfid systems," in Proc. 17th IEEE Int. Conf. on Network Protocols, 2009.
-
(2009)
Proc. 17th IEEE Int. Conf. on Network Protocols
-
-
Tang, S.1
Yuan, J.2
Li, X.Y.3
Chen, G.4
Liu, Y.5
Zhao, J.6
-
20
-
-
79960879870
-
Season: Shelving interference and joint identification in large-scale rfid systems
-
L. Yang, J. Han, Y. Qi, C. Wang, T. Gu, and Y. Liu, "Season: Shelving interference and joint identification in large-scale rfid systems," in Proc. 30th Annu. Joint Conf. of the IEEE Computer and Commun. Societies (INFOCOM), 2011.
-
(2011)
Proc. 30th Annu. Joint Conf. of the IEEE Computer and Commun. Societies (INFOCOM)
-
-
Yang, L.1
Han, J.2
Qi, Y.3
Wang, C.4
Gu, T.5
Liu, Y.6
-
22
-
-
77953317751
-
Efficient tag identification in mobile rfid systems
-
L. Xie, B. Sheng, C. C. Tan, H. Han, Q. Li, and D. Chen, "Efficient tag identification in mobile rfid systems," in Proc. 29th Annu. Joint Conf. of the IEEE Computer and Commun. Societies (INFOCOM), 2010.
-
(2010)
Proc. 29th Annu. Joint Conf. of the IEEE Computer and Commun. Societies (INFOCOM)
-
-
Xie, L.1
Sheng, B.2
Tan, C.C.3
Han, H.4
Li, Q.5
Chen, D.6
-
23
-
-
84882948194
-
Continuous scanning with mobile reader in rfid systems: An experimental study
-
L. Xie, Q. Li, X. Chen, S. Lu, and D. Chen, "Continuous scanning with mobile reader in rfid systems: An experimental study," in Proc. 14th ACM Int. Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc), 2013.
-
(2013)
Proc. 14th ACM Int. Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc)
-
-
Xie, L.1
Li, Q.2
Chen, X.3
Lu, S.4
Chen, D.5
-
24
-
-
84906785367
-
Focus and shoot: Efficient identification over rfid tags in the specified area
-
Y. Yin, L. Xie, J. Wu, A. V. Vasilakos, and S. Lu, "Focus and shoot: Efficient identification over rfid tags in the specified area," in Proc. Int. Conf. on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), 2013.
-
(2013)
Proc. Int. Conf. on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous)
-
-
Yin, Y.1
Xie, L.2
Wu, J.3
Vasilakos, A.V.4
Lu, S.5
-
26
-
-
58149525989
-
An accurate tag estimate method for improving the performance of an rfid anticollision algorithm based on dynamic frame length aloha
-
W. Chen, "An accurate tag estimate method for improving the performance of an rfid anticollision algorithm based on dynamic frame length aloha," IEEE Trans. Automation Science and Engineering, vol. 6, no. 1, pp. 9-15, 2009.
-
(2009)
IEEE Trans. Automation Science and Engineering
, vol.6
, Issue.1
, pp. 9-15
-
-
Chen, W.1
-
27
-
-
77953296741
-
Counting rfid tags efficiently and anonymously
-
H. Han, B. Sheng, C. C. Tan, Q. Li, W. Mao, and S. Lu, "Counting rfid tags efficiently and anonymously," in Proc. 29th Annu. Joint Conf. of the IEEE Computer and Commun. Societies (INFOCOM), 2010.
-
(2010)
Proc. 29th Annu. Joint Conf. of the IEEE Computer and Commun. Societies (INFOCOM)
-
-
Han, H.1
Sheng, B.2
Tan, C.C.3
Li, Q.4
Mao, W.5
Lu, S.6
-
28
-
-
79960838804
-
Cardinality estimation for largescale rfid systems
-
Q. Chen, H. Ngan, Y. Liu, and L. Ni, "Cardinality estimation for largescale rfid systems," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 9, pp. 1441-1454, 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.9
, pp. 1441-1454
-
-
Chen, Q.1
Ngan, H.2
Liu, Y.3
Ni, L.4
-
29
-
-
77955886382
-
Asap: Scalable identification and counting for contactless rfid systems
-
Q. Chen, Y. Liu, H. Ngan, and L. Ni, "Asap: Scalable identification and counting for contactless rfid systems," in Proc. 30th IEEE Int. Conf. on Distrib. Computing Syst. (ICDCS), 2010.
-
(2010)
Proc. 30th IEEE Int. Conf. on Distrib. Computing Syst. (ICDCS)
-
-
Chen, Q.1
Liu, Y.2
Ngan, H.3
Ni, L.4
-
31
-
-
57349154239
-
Finding popular categories for rfid tags
-
B. Sheng, C. C. Tan, Q. Li, and W. Mao, "Finding popular categories for rfid tags," in Proc. 9th ACM Int. Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc), 2008.
-
(2008)
Proc. 9th ACM Int. Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc)
-
-
Sheng, B.1
Tan, C.C.2
Li, Q.3
Mao, W.4
-
34
-
-
84863149341
-
Energy-efficient polling protocols in rfid systems
-
Y. Qiao, S. Chen, T. Li, and S. Chen, "Energy-efficient polling protocols in rfid systems," in Proc. 12th ACM Int. Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc), 2011.
-
(2011)
Proc. 12th ACM Int. Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc)
-
-
Qiao, Y.1
Chen, S.2
Li, T.3
Chen, S.4
-
36
-
-
79957668373
-
Identification-free batch authentication for rfid tags
-
L. Yang, J. Han, Y. Qi, and Y. Liu, "Identification-free batch authentication for rfid tags," in Proc. 18th IEEE Int. Conf. on Network Protocols (ICNP), 2010.
-
(2010)
Proc. 18th IEEE Int. Conf. on Network Protocols (ICNP)
-
-
Yang, L.1
Han, J.2
Qi, Y.3
Liu, Y.4
-
41
-
-
55549097077
-
A cross-layer framework for privacy enhancement in rfid systems
-
T. Lim, T. Li, and S. Yeo, "A cross-layer framework for privacy enhancement in rfid systems," Pervasive and Mobile Computing, vol. 4, no. 6, pp. 889-905, 2008.
-
(2008)
Pervasive and Mobile Computing
, vol.4
, Issue.6
, pp. 889-905
-
-
Lim, T.1
Li, T.2
Yeo, S.3
-
43
-
-
77953303552
-
Lightweight mutual authentication and ownership transfer for rfid systems
-
L. Kulseng, Z. Yu, Y.Wei, and Y. Guan, "Lightweight mutual authentication and ownership transfer for rfid systems," in Proc. IEEE INFOCOM, 2010.
-
(2010)
Proc. IEEE INFOCOM
-
-
Kulseng, L.1
Yu, Z.2
Wei, Y.3
Guan, Y.4
-
44
-
-
84870563092
-
Dynamic bit encoding for privacy protection against correlation attacks in rfid backward channel
-
K. Sakai, W. Ku, R. Zimmermann, and M. Sun, "Dynamic bit encoding for privacy protection against correlation attacks in rfid backward channel," IEEE Trans. Comput., vol. 62, no. 1, pp. 112-123, 2013.
-
(2013)
IEEE Trans. Comput.
, vol.62
, Issue.1
, pp. 112-123
-
-
Sakai, K.1
Ku, W.2
Zimmermann, R.3
Sun, M.4
-
45
-
-
33144457479
-
RFID security and privacy: A research survey
-
DOI 10.1109/JSAC.2005.861395
-
A. Juels, "Rfid security and privacy: a research survey," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 381-394, 2006. (Pubitemid 43269757)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
47
-
-
70349288869
-
Private information retrieval using trusted hardware
-
S. Wang, X. Ding, R. H. Deng, and F. Bao, "Private information retrieval using trusted hardware," in Proc. 11th European Symp. on Research in Computer Security (ESORICS), 2006.
-
(2006)
Proc. 11th European Symp. on Research in Computer Security (ESORICS)
-
-
Wang, S.1
Ding, X.2
Deng, R.H.3
Bao, F.4
-
50
-
-
34548860970
-
New lightweight crypto algorithms for rfid
-
A. Poschmann, G. Leander, K. Schramm, and C. Paar, "New lightweight crypto algorithms for rfid," in Proc. IEEE Int. Symp. on Circuits and Systems (ISCAS), 2007.
-
(2007)
Proc. IEEE Int. Symp. on Circuits and Systems (ISCAS)
-
-
Poschmann, A.1
Leander, G.2
Schramm, K.3
Paar, C.4
-
51
-
-
52949115173
-
Hight: A new block cipher suitable for low-resource device
-
D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, H. Kim, and S. Chee, "Hight: A new block cipher suitable for low-resource device," in Proc. 8th Int. Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2006.
-
(2006)
Proc. 8th Int. Workshop on Cryptographic Hardware and Embedded Systems (CHES)
-
-
Hong, D.1
Sung, J.2
Hong, S.3
Lim, J.4
Lee, S.5
Koo, B.6
Lee, C.7
Chang, D.8
Lee, J.9
Jeong, K.10
Kim, H.11
Kim, H.12
Chee, S.13
-
52
-
-
67649484364
-
A gen2-based rfid authentication protocol for security and privacy
-
H. Sun and W. Ting, "A gen2-based rfid authentication protocol for security and privacy," IEEE Trans. Mobile Comput., vol. 8, no. 8, pp. 1052-1062, 2009.
-
(2009)
IEEE Trans. Mobile Comput.
, vol.8
, Issue.8
, pp. 1052-1062
-
-
Sun, H.1
Ting, W.2
-
55
-
-
34547617482
-
Dynamic key-updating: Privacypreserving authentication for rfid systems
-
L. Lu, J. Han, L. Hu, Y. Liu, and L. Ni, "Dynamic key-updating: Privacypreserving authentication for rfid systems," in Proc. IEEE Int. Conf. on Pervasive Computing and Commun. (PerCom), 2007.
-
(2007)
Proc. IEEE Int. Conf. on Pervasive Computing and Commun. (PerCom)
-
-
Lu, L.1
Han, J.2
Hu, L.3
Liu, Y.4
Ni, L.5
-
56
-
-
84861624862
-
Privacy-preserving rfid authentication based on cryptographical encoding
-
T. Li, W. Luo, Z. Mo, and S. Chen, "Privacy-preserving rfid authentication based on cryptographical encoding," in Proc. IEEE INFOCOM, 2012.
-
(2012)
Proc. IEEE INFOCOM
-
-
Li, T.1
Luo, W.2
Mo, Z.3
Chen, S.4
-
57
-
-
70349666896
-
Action: Breaking the privacy barrier for rfid systems
-
L. Lu, J. Han, R. Xiao, and Y. Liu, "Action: Breaking the privacy barrier for rfid systems," in Proc. IEEE INFOCOM, 2009.
-
(2009)
Proc. IEEE INFOCOM
-
-
Lu, L.1
Han, J.2
Xiao, R.3
Liu, Y.4
-
59
-
-
84882938261
-
Informative counting: Fine-grained batch authentication for large-scale rfid systems
-
W. Gong, K. Liu, X. Miao, Q. Ma, Z. Yang, and Y. Liu, "Informative counting: Fine-grained batch authentication for large-scale rfid systems," in Proc. 14th ACM Int. Symp. on Mobile ad hoc networking and computing (MobiHoc), 2013.
-
(2013)
Proc. 14th ACM Int. Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc)
-
-
Gong, W.1
Liu, K.2
Miao, X.3
Ma, Q.4
Yang, Z.5
Liu, Y.6
-
60
-
-
84882935824
-
Randomized skip lists-based private authentication for large-scale rfid systems
-
K. Sakai, M. Sun, W. Ku, and T. Lai, "Randomized skip lists-based private authentication for large-scale rfid systems," in Proc. 14th ACM Int. Symp. on Mobile ad hoc networking and computing (MobiHoc), 2013.
-
(2013)
Proc. 14th ACM Int. Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc)
-
-
Sakai, K.1
Sun, M.2
Ku, W.3
Lai, T.4
-
61
-
-
70349337026
-
Randomizing rfid private authentication
-
Q. Yao, Y. Qi, J. Han, J. Zhao, X. Li, and Y. Liu, "Randomizing rfid private authentication," in Proc. IEEE Int. Conf. Pervasive Computing and Commun. (PerCom), 2009.
-
(2009)
Proc. IEEE Int. Conf. Pervasive Computing and Commun. (PerCom)
-
-
Yao, Q.1
Qi, Y.2
Han, J.3
Zhao, J.4
Li, X.5
Liu, Y.6
-
62
-
-
2942556410
-
Radio frequency identification: Secure risks and challenges
-
S. E. Sarma, S. A. Weis, and D. W. Engels, "Radio frequency identification: Secure risks and challenges," RSA Laboratories Cryptobytes, vol. 6, no. 1, pp. 2-9, 2003.
-
(2003)
RSA Laboratories Cryptobytes
, vol.6
, Issue.1
, pp. 2-9
-
-
Sarma, S.E.1
Weis, S.A.2
Engels, D.W.3
-
63
-
-
21144438831
-
Security and privacy aspect s of low-cost radio frequency identification systems
-
S. A.Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, "Security and privacy aspect s of low-cost radio frequency identification systems," in Proc. 1st Int. Conf. on Security in Pervasive Computing (SPC), 2003.
-
(2003)
Proc. 1st Int. Conf. on Security in Pervasive Computing (SPC)
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
65
-
-
0026819732
-
914mhz path loss prediction models for indoor wireless communications in multifloored buildings
-
S. Y. Seidel and T. S. Rappaport, "914mhz path loss prediction models for indoor wireless communications in multifloored buildings," IEEE Trans. Antennas Propag., vol. 40, no. 2, pp. 209-217, 1992.
-
(1992)
IEEE Trans. Antennas Propag.
, vol.40
, Issue.2
, pp. 209-217
-
-
Seidel, S.Y.1
Rappaport, T.S.2
-
66
-
-
0004415562
-
-
Univ. Washington, Tech. Rep.
-
J. Hightower, G. Borriello, and R. Want, "Spoton: An indoor 3d location sensing technology based on rf signal strength," Univ. Washington, Tech. Rep., 2000.
-
(2000)
Spoton: An Indoor 3d Location Sensing Technology Based on Rf Signal Strength
-
-
Hightower, J.1
Borriello, G.2
Want, R.3
-
67
-
-
78751613883
-
An environmental-adaptive rssi based indoor positioning approach using rfid
-
X. Xiao, X. Jing, S. You, and J. Zeng, "An environmental-adaptive rssi based indoor positioning approach using rfid," in Proc. Int. Conf. on Advanced Intelligence and Awarenss Internet, 2010, pp. 127-130.
-
(2010)
Proc. Int. Conf. on Advanced Intelligence and Awarenss Internet
, pp. 127-130
-
-
Xiao, X.1
Jing, X.2
You, S.3
Zeng, J.4
-
68
-
-
84862090658
-
A real-time rfid localization experiment using propagation models
-
J. Brchan, L. Zhao, J. Wu, R. Williams, and L. Perez, "A real-time rfid localization experiment using propagation models," in Proc. IEEE Int. Conf. on RFID (RFID), 2012, pp. 141-148.
-
(2012)
Proc. IEEE Int. Conf. on RFID (RFID
, pp. 141-148
-
-
Brchan, J.1
Zhao, L.2
Wu, J.3
Williams, R.4
Perez, L.5
-
69
-
-
84866633671
-
Locating in fingerprint space: Wireless indoor localization with little human intervention
-
Z. Yang, C. Wu, and Y. Liu, "Locating in fingerprint space: Wireless indoor localization with little human intervention," in Proc. Proceedings IEEE MobiCOM, 2012.
-
(2012)
Proc. Proceedings IEEE MobiCOM
-
-
Yang, Z.1
Wu, C.2
Liu, Y.3
-
70
-
-
84866594899
-
Zee: Zeroeffort crowdsourcing for indoor localization
-
A. Rai, K. K. Chintalapudi, V. N. Padmanabhan, and R. Sen, "Zee: Zeroeffort crowdsourcing for indoor localization," in Proc. ACM MobiCOM, 2012.
-
(2012)
Proc. ACM MobiCOM
-
-
Rai, A.1
Chintalapudi, K.K.2
Padmanabhan, V.N.3
Sen, R.4
-
71
-
-
76249107155
-
Rf vision: Rfid receive signal strength indicator (rssi) images for sensor fusion and mobile manipulation
-
T. Deyle, H. Nguyen, M. Reynolds, and C. Kemp, "Rf vision: Rfid receive signal strength indicator (rssi) images for sensor fusion and mobile manipulation," in Proc.IEEE/RSJ Int. Conf. on Intelligent Robots and Systems, 2009, pp. 5553-5560.
-
(2009)
Proc. IEEE/RSJ Int. Conf. on Intelligent Robots and Systems
, pp. 5553-5560
-
-
Deyle, T.1
Nguyen, H.2
Reynolds, M.3
Kemp, C.4
-
72
-
-
5544326540
-
Landmarc: Indoor location sensing using active rfid
-
L. Ni, Y. Liu, Y. Lau, and P. Abhishek, "Landmarc: Indoor location sensing using active rfid," Wireless Networks, vol. 10, no. 6, pp. 701-710, 2004.
-
(2004)
Wireless Networks
, vol.10
, Issue.6
, pp. 701-710
-
-
Ni, L.1
Liu, Y.2
Lau, Y.3
Abhishek, P.4
-
74
-
-
82155182079
-
Localization of uhf rfid labels with reference tags and unscented kalman filter
-
T. Nick, J. Gotze, W. John, and G. Stoenner, "Localization of uhf rfid labels with reference tags and unscented kalman filter," in Proc. IEEE Int. Conf. on RFID-Technologies and Applications (RFID-TA), 2011, pp. 168-173.
-
(2011)
Proc. IEEE Int. Conf. on RFID-Technologies and Applications (RFID-TA
, pp. 168-173
-
-
Nick, T.1
Gotze, J.2
John, W.3
Stoenner, G.4
-
75
-
-
66249139919
-
Location estimation technique using extended 3-d landmarc algorithm for passive rfid tag
-
M. Khan and V. Antiwal, "Location estimation technique using extended 3-d landmarc algorithm for passive rfid tag," in Proc. IEEE Int. Conf. on Advance Computing Conf., 2009, pp. 249-253.
-
(2009)
Proc. IEEE Int. Conf. on Advance Computing Conf.
, pp. 249-253
-
-
Khan, M.1
Antiwal, V.2
-
76
-
-
84900849742
-
Adaptive accurate indoorlocalization using passive rfid
-
X. Chen, L. Xie, C. Wang, and S. Lu, "Adaptive accurate indoorlocalization using passive rfid," in Proc. IEEE Int. Conf. Parallel Distrib. Syst. (ICPADS), 2013.
-
(2013)
Proc. IEEE Int. Conf. Parallel Distrib. Syst. (ICPADS
-
-
Chen, X.1
Xie, L.2
Wang, C.3
Lu, S.4
-
77
-
-
77953885463
-
Phase based spatial identification of uhf rfid tags
-
P. Nikitin, R. Martinez, S. Ramamurthy, H. Leland, G. Spiess, and K. V. S. Rao, "Phase based spatial identification of uhf rfid tags," in Proc. IEEE Int. Conf. on RFID, 2010, pp. 102-109.
-
(2010)
Proc. IEEE Int. Conf. on RFID
, pp. 102-109
-
-
Nikitin, P.1
Martinez, R.2
Ramamurthy, S.3
Leland, H.4
Spiess, G.5
Rao, K.V.S.6
-
78
-
-
79957449955
-
Holographic localization of passive uhf rfid transponders
-
R. Miesen, F. Kirsch, and M. Vossiek, "Holographic localization of passive uhf rfid transponders," in Proc. IEEE Int. Conf. on RFID (RFID), 2011, pp. 32-37.
-
(2011)
Proc. IEEE Int. Conf. on RFID (RFID
, pp. 32-37
-
-
Miesen, R.1
Kirsch, F.2
Vossiek, M.3
-
79
-
-
79957471263
-
Phase difference based rfid navigation for medical applications
-
A. Wille, M. Broll, and S. Winter, "Phase difference based rfid navigation for medical applications," in Proc. IEEE Int. Conf. on RFID (RFID), 2011, pp. 98-105.
-
(2011)
Proc. IEEE Int. Conf. on RFID (RFID
, pp. 98-105
-
-
Wille, A.1
Broll, M.2
Winter, S.3
-
80
-
-
79957518253
-
New measurement results for the localization of uhf rfid transponders using an angle of arrival (aoa) approach
-
S. Azzouzi, M. Cremer, U. Dettmar, R. Kronberger, and T. Knie, "New measurement results for the localization of uhf rfid transponders using an angle of arrival (aoa) approach," in Proc. IEEE Int. Conf. on RFID (RFID), 2011, pp. 91-97.
-
(2011)
Proc. IEEE Int. Conf. on RFID (RFID)
, pp. 91-97
-
-
Azzouzi, S.1
Cremer, M.2
Dettmar, U.3
Kronberger, R.4
Knie, T.5
-
81
-
-
83455168965
-
Indoor rfid localization improved by motion segmentation
-
Z. Babic, M. Ljubojevic, and V. Risojevic, "Indoor rfid localization improved by motion segmentation," in Proc. 7th Int. Symp. Image and Signal Processing and Analysis (ISPA), 2011, pp. 271-276.
-
(2011)
Proc. 7th Int. Symp. Image and Signal Processing and Analysis (ISPA)
, pp. 271-276
-
-
Babic, Z.1
Ljubojevic, M.2
Risojevic, V.3
-
82
-
-
84861615577
-
Fault-tolerant rfid reader localization based on passive rfid tags
-
W. Zhu, J. Cao, Y. Xu, L. Yang, and J. Kong, "Fault-tolerant rfid reader localization based on passive rfid tags," in Proc. IEEE INFOCOM, 2012, pp. 2183-2191.
-
(2012)
Proc. IEEE INFOCOM
, pp. 2183-2191
-
-
Zhu, W.1
Cao, J.2
Xu, Y.3
Yang, L.4
Kong, J.5
-
83
-
-
84861632986
-
A hybrid method for achieving high accuracy and efficiency in object tracking using passive rfid
-
L. Yang, J. Cao, W. Zhu, and S. Tang, "A hybrid method for achieving high accuracy and efficiency in object tracking using passive rfid," in Proc. IEEE Int. Conf. on Pervasive Computing and Commun. (PerCom), 2012, pp. 109-115.
-
(2012)
Proc. IEEE Int. Conf. on Pervasive Computing and Commun. (PerCom)
, pp. 109-115
-
-
Yang, L.1
Cao, J.2
Zhu, W.3
Tang, S.4
-
84
-
-
34547638948
-
Mining frequent trajectory patterns for activity monitoring using radio frequency tag arrays
-
Y. Liu, L. Chen, J. Pei, Q. Chen, and Y. Zhao, "Mining frequent trajectory patterns for activity monitoring using radio frequency tag arrays," in Proc. 5th Annu. IEEE Int. Conf. Pervasive Computing and Commun. (PERCOM), 2007.
-
(2007)
Proc. 5th Annu. IEEE Int. Conf. Pervasive Computing and Commun. (PERCOM)
-
-
Liu, Y.1
Chen, L.2
Pei, J.3
Chen, Q.4
Zhao, Y.5
-
85
-
-
79952068013
-
Tasa: Tag-free activity sensing using rfid tag arrays
-
D. Zhang, J. Zhou, M. Guo, J. Cao, and T. Li, "Tasa: Tag-free activity sensing using rfid tag arrays," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 4, pp. 558-570, 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.4
, pp. 558-570
-
-
Zhang, D.1
Zhou, J.2
Guo, M.3
Cao, J.4
Li, T.5
-
88
-
-
85008043062
-
Evaluation of the state of passive uhf rfid: An experimental approach
-
S. R. Aroor and D. D. Deavours, "Evaluation of the state of passive uhf rfid: An experimental approach," IEEE Syst. J., vol. 1, no. 2, pp. 168-176, 2007.
-
(2007)
IEEE Syst. J.
, vol.1
, Issue.2
, pp. 168-176
-
-
Aroor, S.R.1
Deavours, D.D.2
-
91
-
-
77956439072
-
Negotiate power and performance in the reality of rfid systems
-
X. Xu, L. Gu, J. Wang, and G. Xing, "Negotiate power and performance in the reality of rfid systems," in Proc. 8th Annu. IEEE Int. Conf. Pervasive Computing and Commun. (PerCom), 2010.
-
(2010)
Proc. 8th Annu. IEEE Int. Conf. Pervasive Computing and Commun. (PerCom)
-
-
Xu, X.1
Gu, L.2
Wang, J.3
Xing, G.4
-
92
-
-
80052054392
-
Read more with less: An adaptive approach to energy-efficient rfid systems
-
X. Xu, L. Gu, J. Wang, G. Xing, and S. Cheung, "Read more with less: An adaptive approach to energy-efficient rfid systems," IEEE J. Sel. Areas Commun., vol. 29, no. 8, pp. 1684-1697, 2011.
-
(2011)
IEEE J. Sel. Areas Commun.
, vol.29
, Issue.8
, pp. 1684-1697
-
-
Xu, X.1
Gu, L.2
Wang, J.3
Xing, G.4
Cheung, S.5
-
93
-
-
73949137198
-
Multiple rfid tags access algorithm
-
W. Su, N. Alchazidis, and T. T. Ha, "Multiple rfid tags access algorithm," IEEE Trans. Mobile Comput., vol. 9, no. 2, pp. 174-187, 2010.
-
(2010)
IEEE Trans. Mobile Comput.
, vol.9
, Issue.2
, pp. 174-187
-
-
Su, W.1
Alchazidis, N.2
Ha, T.T.3
-
95
-
-
79551620222
-
A cross-layer optimization for a lp-based multireader coordination in rfid systems
-
J. Choi and C. Lee, "A cross-layer optimization for a lp-based multireader coordination in rfid systems," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), 2010, pp. 1-5.
-
(2010)
Proc. IEEE Global Telecommun. Conf. (GLOBECOM)
, pp. 1-5
-
-
Choi, J.1
Lee, C.2
|