{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:18:07Z","timestamp":1773235087720,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540440604","type":"print"},{"value":"9783540458661","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45866-2_9","type":"book-chapter","created":{"date-parts":[[2007,5,15]],"date-time":"2007-05-15T23:09:44Z","timestamp":1179270584000},"page":"98-113","source":"Crossref","is-referenced-by-count":393,"title":["Efficient Object Identification with Passive RFID Tags"],"prefix":"10.1007","author":[{"given":"Harald","family":"Vogt","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,8,21]]},"reference":[{"key":"9_CR1","unstructured":"Klaus Finkenzeller. RFID-Handbuch. Hanser Fachbuch, 1999. Also available in English as RFID Handbook: Radio-Frequency Identification Fundamentals and Applications, John Wiley & Sons, 2000."},{"key":"9_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/3-540-48157-5_22","volume-title":"Handheld and Ubiquitous Computing","author":"L. E. Holmquist","year":"1999","unstructured":"L. E. Holmquist, J. Redstr\u00f6m, and P. Ljungstrand. Token-Based Access to Digital Information. In Hans-W. Gellersen, editor, Handheld and Ubiquitous Computing, volume 1707 of LNCS, pages 234\u2013245. Springer-Verlag, 1999."},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Don R. Hush and Cliff Wood. Analysis of Tree Algorithms for RFID Arbitration. In IEEE International Symposium on Information Theory, pages 107. IEEE, 1998.","DOI":"10.1109\/ISIT.1998.708695"},{"key":"9_CR4","unstructured":"Normal Lloyd Johnson and Samuel Kotz. Urn Models and Their Applications. Wiley, 1977."},{"key":"9_CR5","unstructured":"Valentin F. Kolchin, Boris A. Svast\u2019yanov, and Vladimir P. Christyakov. Random Allocations. V H. Winston & Sons, 1978."},{"key":"9_CR6","unstructured":"Marc Langheinrich, Friedemann Mattern, Kay R\u00f6mer, and Harald Vogt. First Steps Towards an Event-Based Infrastructure for Smart Things. Ubiquitous Computing Workshop (PACT 2000), October 2000."},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Ching Law, Kayi Lee, and Kai-Yeung Siu. Efficient Memoryless Protocol for Tag Identification. In Proceedings of the 4th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, pages 75\u201384. ACM, August 2000.","DOI":"10.1145\/345848.345865"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Rajeev Motwani and Prabhakar Raghavan. Randomized Algorithms. Cambridge University Press, 1995.","DOI":"10.1017\/CBO9780511814075"},{"key":"9_CR9","unstructured":"Fred S. Roberts. Applied Combinatorics. Prentice-Hall, 1984."},{"key":"9_CR10","unstructured":"Kay R\u00f6mer. Smart Playing Cards-A Ubiquitous Computing Game. Workshop on Designing Ubiquitous Computing Games, Ubicomp, 2001."},{"key":"9_CR11","unstructured":"Frits C. Schoute. Control of ALOHA Signalling in a Mobile Radio Trunking System. In International Conference on Radio Spectrum Conservation Techniques, pages 38\u201342. IEE, 1980."},{"issue":"4","key":"9_CR12","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1109\/TCOM.1983.1095854","volume":"31","author":"C. Frits","year":"1983","unstructured":"Frits C. Schoute. Dynamic Frame Length ALOHA. IEEE Transactions on Communications, COM-31(4):565\u2013568, April 1983.","journal-title":"IEEE Transactions on Communications"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Wojciech Szpankowski. Packet Switching in Multiple Radio Channels: Analysis and Stability of a Random Access System. Computer Networks: The International Journal of Distributed Informatique, 7(1):17\u201326, February 1983.","DOI":"10.1016\/0376-5075(83)90004-1"},{"issue":"6","key":"9_CR14","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/40.977757","volume":"21","author":"K. Takaragi","year":"2001","unstructured":"K. Takaragi, M. Usami, R. Imura, R. Itsuki, and T. Satoh. An Ultra Small Individual Recognition Security Chip. IEEE Micro, 21(6):43\u201349, 2001.","journal-title":"IEEE Micro"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Roy Want, Kenneth P. Fishkin, Anuj Gujar, and Beverly L. Harrison. Bridging Physical and Virtual Worlds with Electronic Tags. In Proceeding of the CHI 99 Conference on Human Factors in Computing Systems: the CHI is the Limit, pages 370\u2013377. ACM Press, 1999.","DOI":"10.1145\/302979.303111"},{"issue":"2","key":"9_CR16","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/26.20080","volume":"COM-37","author":"J. E. Wieselthier","year":"1989","unstructured":"Jeffrey E. Wieselthier, Anthony Ephremides, and Larry A. Michaels. An Exact Analysis and Performance Evaluation of Framed ALOHA with Capture. IEEE Transactions on Communications, COM-37,2:125\u2013137, 1989.","journal-title":"IEEE Transactions on Communications"}],"container-title":["Lecture Notes in Computer Science","Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45866-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T20:55:35Z","timestamp":1556398535000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45866-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440604","9783540458661"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-45866-2_9","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}