메뉴 건너뛰기




Volumn , Issue , 2015, Pages 129-136

Wireless firmware execution control in computational RFID systems

Author keywords

Computational RFID; EPC; Execution Flexibility; Firmware Execution

Indexed keywords

COMPUTATIONAL EFFICIENCY; ENERGY EFFICIENCY; FLASH MEMORY; SWITCHING; USER INTERFACES;

EID: 84936744067     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RFID.2015.7113083     Document Type: Conference Paper
Times cited : (11)

References (25)
  • 2
    • 79951662076 scopus 로고    scopus 로고
    • Monitoring body positions and movements during sleep using wisps
    • E. Hoque, R. F. Dickerson and J. A. Stankovic. Monitoring Body Positions and Movements During Sleep Using WISPs. In Wireless Health, pages 44-53, 2010.
    • (2010) Wireless Health , pp. 44-53
    • Hoque, E.1    Dickerson, R.F.2    Stankovic, J.A.3
  • 3
    • 84936790652 scopus 로고    scopus 로고
    • Still and silent: Motion detection for enhanced RFID security and privacy without changing the usage model
    • N. Saxena and J. Voris. Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing The Usage Model. In Radio Frequency Identification: Security and Privacy Issues. 2010.
    • (2010) Radio Frequency Identification: Security and Privacy Issues.
    • Saxena, N.1    Voris, J.2
  • 4
    • 84883288220 scopus 로고    scopus 로고
    • Ambient backscatter: Wireless communication out of thin air
    • V. Liu et. al. Ambient Backscatter: Wireless Communication Out of Thin Air. In ACM SIGCOMM, 2013.
    • (2013) ACM SIGCOMM
    • Liu, V.1
  • 5
    • 84901259218 scopus 로고    scopus 로고
    • Sifting through the airwaves: Efficient and scalable multiband rf harvesting
    • In
    • A. N. Parks and J. R. Smith. Sifting Through The Airwaves: Efficient and Scalable Multiband RF Harvesting. In IEEE RFID Conference, 2014.
    • (2014) IEEE RFID Conference
    • Parks, A.N.1    Smith, J.R.2
  • 7
    • 17044439481 scopus 로고    scopus 로고
    • Battery-free wireless identification and sensing
    • M. Philipose et. al. Battery-free Wireless Identification and Sensing. Pervasive Computing, IEEE, 4(1):37-45, 2005.
    • (2005) Pervasive Computing IEEE , vol.4 , Issue.1 , pp. 37-45
    • Philipose, M.1
  • 9
    • 77954968837 scopus 로고    scopus 로고
    • On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors
    • In
    • J. Gummeson, S. S. Clark and K. Fu et. al. On The Limits of Effective Hybrid Micro-Energy Harvesting on Mobile CRFID Sensors. In ACM MobiSys, 2010.
    • (2010) ACM MobiSys
    • Gummeson, J.1    Clark, S.S.2    Fu, K.3
  • 12
    • 84936790657 scopus 로고    scopus 로고
    • Accessed December 04
    • UMASS MOO in Concrete, https://spqr. eecs. umich. edu/moo/apps/concrete/[Accessed December 04, 2014].
    • (2014) UMASS MOO in Concrete
  • 13
    • 84858398386 scopus 로고    scopus 로고
    • Getting things done on computational RFIDs with energy-aware checkpointing and voltage-aware scheduling
    • B. Ransford and S. S. Clark et. al. Getting Things Done on Computational RFIDs with Energy-Aware Checkpointing and Voltage-Aware Scheduling. In HotPower, 2008.
    • (2008) HotPower
    • Ransford, B.1    Clark, S.S.2
  • 14
    • 84904443863 scopus 로고    scopus 로고
    • Read bulk data from computational RFIDs
    • Y. Zheng and M. Li. Read Bulk Data from Computational RFIDs. In IEEE INFOCOM, 2014.
    • (2014) IEEE INFOCOM
    • Zheng, Y.1    Li, M.2
  • 17
    • 70349301622 scopus 로고    scopus 로고
    • Rfids and secret handshakes: Defending against ghost-and-leech attacks and unauthorized reads with context-aware communications
    • In
    • A. Czeskis K. Koscher J. R. Smith et. al. RFIDs and Secret Handshakes: Defending Against Ghost-and-Leech Attacks and Unauthorized Reads with Context-Aware Communications. In ACM CCS 2008.
    • (2008) ACM CCS
    • Czeskis, A.1    Koscher, K.2    Smith, J.R.3
  • 19
    • 85077050951 scopus 로고    scopus 로고
    • Exploiting half-wits: Smarter storage for low-power devices
    • M. Salajegheh, Y. Wang and K. Fu et. al. Exploiting Half-Wits: Smarter Storage for Low-Power Devices. In FAST, 2011.
    • (2011) FAST
    • Salajegheh, M.1    Wang, Y.2    Fu, K.3
  • 20
    • 68949175522 scopus 로고    scopus 로고
    • Power-up SRAM state as an identifying fingerprint and source of true Random Numbers.computers
    • D. E. Holcomb, W. P. Burleson and K. Fu. Power-Up SRAM State As An Identifying Fingerprint and Source of True Random Numbers.computers, IEEE Transactions on, 58(9):1198-1210, 2009.
    • (2009) IEEE Transactions on , vol.58 , Issue.9 , pp. 1198-1210
    • Holcomb, D.E.1    Burleson, W.P.2    Fu, K.3
  • 21
    • 84864377086 scopus 로고    scopus 로고
    • Blink: A high throughput link layer for backscatter communication
    • In
    • P. Zhang, J. Gummeson and D. Ganesan. BLINK: A High Throughput Link Layer for Backscatter Communication. In ACM MobiSys, 2012.
    • (2012) ACM MobiSys
    • Zhang, P.1    Gummeson, J.2    Ganesan, D.3
  • 24
    • 84936790662 scopus 로고    scopus 로고
    • NCP583 Datasheet, Ult ra Low current LDO Regulator
    • [Accessed December 04
    • NCP583 Datasheet, Ult ra Low current LDO Regulator. OnSemiconductor, http://www.onsemi.com/pub link/Collateral/NCP583-D.pdf [Accessed December 04, 2014].
    • (2014) OnSemiconductor
  • 25
    • 79955565633 scopus 로고    scopus 로고
    • Power efficient multi-stage CMOS rectifier des ign for uhf RFID tags
    • S. Wong and C. Chen. Power Efficient Multi-Stage CMOS Rectifier Des ign for UHF RFID Tags. INTEGRATION, the VLSI journal, 44(3):242-255, 2011.
    • (2011) INTEGRATION the VLSI Journal , vol.44 , Issue.3 , pp. 242-255
    • Wong, S.1    Chen, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.