RFID data management: challenges and opportunities

R Derakhshan, ME Orlowska… - 2007 IEEE International …, 2007 - ieeexplore.ieee.org
Radio-frequency identification (RFID) technology promises to revolutionize the way we track
items in supply chain, retail store, and asset management applications. The size and …

RFID 安全协议的设计与分析

周永彬, 冯登国 - 计算机学报, 2006 - cqvip.com
RFID安全协议的设计与分析-[维普官方网站]-www.cqvip.com-维普网  我的维普 购物车 充值 客服
首页 | 期刊大全 | 文献分类 | 优先出版 | 论文检测 | 论文选题 | 在线分享 | 学者空间 | 学术机构 您的 …

Middleware for pervasive computing: A survey

V Raychoudhury, J Cao, M Kumar, D Zhang - Pervasive and Mobile …, 2013 - Elsevier
The rapidly emerging area of pervasive computing faces many challenging research issues
critical to application developers. Wide heterogeneity of hardware, software, and network …

Authenticating pervasive devices with human protocols

A Juels, SA Weis - Advances in Cryptology–CRYPTO 2005: 25th Annual …, 2005 - Springer
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive
computing devices. These devices lack the computational, storage, power, and …

[图书][B] RFID handbook: applications, technology, security, and privacy

SA Ahson, M Ilyas - 2017 - books.google.com
Radio Frequency Identification (RFID) tagging is now used by the department of defense
and many of the world's largest retailers including Wal-Mart. As RFID continues to infiltrate …

Determining technology trends and forecasts of RFID by a historical review and bibliometric analysis from 1991 to 2005

CC Chao, JM Yang, WY Jen - Technovation, 2007 - Elsevier
Radio frequency identification (RFID) has been identified as one of the ten greatest
contributory technologies of the 21st century. This technology has found a rapidly growing …

Declarative support for sensor data cleaning

SR Jeffery, G Alonso, MJ Franklin, W Hong… - Pervasive Computing: 4th …, 2006 - Springer
Pervasive applications rely on data captured from the physical world through sensor
devices. Data provided by these devices, however, tend to be unreliable. The data must …

Tag-splitting: adaptive collision arbitration protocols for RFID tag identification

J Myung, W Lee, J Srivastava… - IEEE transactions on …, 2007 - ieeexplore.ieee.org
Tag identification is an important tool in RFID systems with applications for monitoring and
tracking. A RFID reader recognizes tags through communication over a shared wireless …

Framed ALOHA for multiple RFID objects identification

B Zhen, M Kobayashi, M Shimizu - IEICE Transactions on …, 2005 - search.ieice.org
Radio frequency identification (RFID) enables everyday objects to be identified, tracked, and
recorded. The RFID tags are must be extremely simple and of low cost to be suitable for …

A pipelined framework for online cleaning of sensor data streams

SR Jeffery, G Alonso, MJ Franklin… - … Conference on Data …, 2006 - ieeexplore.ieee.org
Data captured from the physical world through sensor devices tends to be noisy and
unreliable. The data cleaning process for such data is not easily handled by standard data …