-
1
-
-
57349155031
-
Performance of random medium access control, an asymptotic approach
-
C. Bordenave, D. McDonald, and A. Proutiere, "Performance of random medium access control, an asymptotic approach," in Proc ACM SIGMETRICS, 2008, pp. 1-12.
-
Proc ACM SIGMETRICS, 2008
, pp. 1-12
-
-
Bordenave, C.1
McDonald, D.2
Proutiere, A.3
-
5
-
-
0020828424
-
Probabilistic counting algorithms for data base applications
-
P. Flajolet and G. N. Martin, "Probabilistic counting algorithms for data base applications," J. Comput. Syst. Sci., vol. 31, no. 2, pp. 182-209, 1985.
-
(1985)
J. Comput. Syst. Sci.
, vol.31
, Issue.2
, pp. 182-209
-
-
Flajolet, P.1
Martin, G.N.2
-
6
-
-
77953296741
-
Counting RFID tags efficiently and anonymously
-
H. Han, B. Sheng, C. C. Tan, Q. Li, W. Mao, and S. Lu, "Counting RFID tags efficiently and anonymously," in Proc. IEEE INFOCOM, 2010, pp. 1-9.
-
Proc. IEEE INFOCOM, 2010
, pp. 1-9
-
-
Han, H.1
Sheng, B.2
Tan, C.C.3
Li, Q.4
Mao, W.5
Lu, S.6
-
7
-
-
33751069820
-
Fast and reliable estimation schemes in RFID systems
-
M. Kodialam and T. Nandagopal, "Fast and reliable estimation schemes in RFID systems," in Proc. ACM MobiCom, 2006, pp. 322-333.
-
Proc. ACM MobiCom, 2006
, pp. 322-333
-
-
Kodialam, M.1
Nandagopal, T.2
-
8
-
-
34548349339
-
Anonymous tracking using RFID tags
-
M. Kodialam, T. Nandagopal, and W. C. Lau, "Anonymous tracking using RFID tags," in Proc. IEEE INFOCOM, 2007, pp. 1217-1225.
-
Proc. IEEE INFOCOM, 2007
, pp. 1217-1225
-
-
Kodialam, M.1
Nandagopal, T.2
Lau, W.C.3
-
9
-
-
57149131540
-
Efficient storage scheme and query processing for supply chain management using RFID
-
C. H. Lee and C. W. Chung, "Efficient storage scheme and query processing for supply chain management using RFID," in Proc. ACM SIGMOD, 2008, pp. 291-302.
-
Proc. ACM SIGMOD, 2008
, pp. 291-302
-
-
Lee, C.H.1
Chung, C.W.2
-
10
-
-
77953299114
-
Energy efficient algorithms for the RFID estimation problem
-
T. Li, S. Wu, S. Chen, and M. Yang, "Energy efficient algorithms for the RFID estimation problem," in Proc. IEEE INFOCOM, 2010, pp. 1-9.
-
Proc. IEEE INFOCOM, 2010
, pp. 1-9
-
-
Li, T.1
Wu, S.2
Chen, S.3
Yang, M.4
-
11
-
-
32844475127
-
RFID technology and applications
-
Jan.-Mar.
-
B. Nath, F. Reynolds, and R. Want, "RFID technology and applications,"IEEE Pervasive Comput., vol. 5, no. 1, pp. 22-24, Jan.-Mar. 2006.
-
(2006)
IEEE Pervasive Comput.
, vol.5
, Issue.1
, pp. 22-24
-
-
Nath, B.1
Reynolds, F.2
Want, R.3
-
12
-
-
85056280293
-
Sherlock: Automatically locating objects for humans
-
A. Nemmaluri, M. D. Corner, and P. Shenoy, "Sherlock: Automatically locating objects for humans," in Proc. ACM MobiSys, 2008, pp. 187-198.
-
Proc. ACM MobiSys, 2008
, pp. 187-198
-
-
Nemmaluri, A.1
Corner, M.D.2
Shenoy, P.3
-
13
-
-
5544326540
-
Landmarc: Indoor location sensing using active RFID
-
L. M. Ni, Y. Liu, Y. C. Lau, and A. P. Patil, "Landmarc: Indoor location sensing using active RFID," Wireless Netw., vol. 10, pp. 701-710, 2004.
-
(2004)
Wireless Netw.
, vol.10
, pp. 701-710
-
-
Ni, L.M.1
Liu, Y.2
Lau, Y.C.3
Patil, A.P.4
-
15
-
-
49149086533
-
Cardinality estimation for large-scale RFID systems
-
C. Qian, H. Ngan, and Y. Liu, "Cardinality estimation for large-scale RFID systems," in Proc. 6th IEEE PerCom, 2008, pp. 30-39.
-
Proc. 6th IEEE PerCom, 2008
, pp. 30-39
-
-
Qian, C.1
Ngan, H.2
Liu, Y.3
-
16
-
-
42149100284
-
A 5-cent breakthrough
-
[Online]. Available
-
M. Roberti, "A 5-cent breakthrough," RFID J. vol. 5, no. 6, 2006 [Online]. Available: http://www.rfidjournal.com/articles/view?2295
-
(2006)
RFID J
, vol.5
, Issue.6
-
-
Roberti, M.1
-
17
-
-
77951611947
-
Anonymous cardinality estimation in RFID systems with multiple readers
-
V. Shah-Mansouri and V. W. Wongm, "Anonymous cardinality estimation in RFID systems with multiple readers," in Proc. IEEE GLOBECOM, 2009, pp. 1-6.
-
Proc. IEEE GLOBECOM, 2009
, pp. 1-6
-
-
Shah-Mansouri, V.1
Wongm, V.W.2
-
18
-
-
84866621052
-
Every bit counts: Fast and scalable RFID estimation
-
M. Shahzad and A. X. Liu, "Every bit counts: Fast and scalable RFID estimation," in Proc. ACM MobiCom, 2012, pp. 365-376.
-
Proc. ACM MobiCom, 2012
, pp. 365-376
-
-
Shahzad, M.1
Liu, A.X.2
-
19
-
-
84880244169
-
Probabilistic optimal tree hopping for RFID identification
-
M. Shahzad and A. X. Liu, "Probabilistic optimal tree hopping for RFID identification," in Proc. ACM SIGMETRICS, 2013, pp. 293-304.
-
Proc. ACM SIGMETRICS, 2013
, pp. 293-304
-
-
Shahzad, M.1
Liu, A.X.2
-
20
-
-
77951571790
-
Efficient object identification with passive RFID tags
-
H. Vogt, "Efficient object identification with passive RFID tags," Pervasive Comput., vol. 2414, pp. 98-113, 2002.
-
(2002)
Pervasive Comput.
, vol.2414
, pp. 98-113
-
-
Vogt, H.1
-
21
-
-
34548312518
-
RFID-based 3-D positioning schemes
-
C. Wang, H. Wu, and N.-F. Tzeng, "RFID-based 3-D positioning schemes," in Proc. IEEE INFOCOM, 2007, pp. 1235-1243.
-
Proc. IEEE INFOCOM, 2007
, pp. 1235-1243
-
-
Wang, C.1
Wu, H.2
Tzeng, N.-F.3
-
22
-
-
84858323855
-
Estimating collision set size in framed slotted aloha wireless networks and RFID systems
-
Mar.
-
A. Zanella, "Estimating collision set size in framed slotted aloha wireless networks and RFID systems," IEEE Commun. Lett., vol. 16, no. 3, pp. 300-303, Mar. 2012.
-
(2012)
IEEE Commun. Lett.
, vol.16
, Issue.3
, pp. 300-303
-
-
Zanella, A.1
-
23
-
-
24144469833
-
Framed ALOHA for multiple RFID objects identification
-
B. Zhen, M. Kobayashi, and M. Shimizu, "Framed ALOHA for multiple RFID objects identification," IEICE Trans. Commun., vol. 88, pp. 991-999, 2005.
-
(2005)
IEICE Trans. Commun.
, vol.88
, pp. 991-999
-
-
Zhen, B.1
Kobayashi, M.2
Shimizu, M.3
|