{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T22:10:02Z","timestamp":1746396602349,"version":"3.40.4"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319115689"},{"type":"electronic","value":"9783319115696"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11569-6_27","type":"book-chapter","created":{"date-parts":[[2014,9,27]],"date-time":"2014-09-27T05:00:33Z","timestamp":1411794033000},"page":"344-357","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Focus and Shoot: Efficient Identification Over RFID Tags in the Specified Area"],"prefix":"10.1007","author":[{"given":"Yafeng","family":"Yin","sequence":"first","affiliation":[]},{"given":"Lei","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Athanasios V.","family":"Vasilakos","sequence":"additional","affiliation":[]},{"given":"Sanglu","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,28]]},"reference":[{"key":"27_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/3-540-45866-2_9","volume-title":"Pervasive Computing","author":"H Vogt","year":"2002","unstructured":"Vogt, H.: Efficient object identification with passive RFID tags. In: Mattern, F., Naghshineh, M. (eds.) PERVASIVE 2002. LNCS, vol. 2414, p. 98. Springer, Heidelberg (2002)"},{"issue":"1","key":"27_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TASE.2008.2007266","volume":"6","author":"Y Maguire","year":"2009","unstructured":"Maguire, Y., Pappu, R.: An optimal q-algorithm for the ISO 18000-6C RFID protocol. IEEE Trans. Autom. Sci. Eng. 6(1), 16\u201324 (2009)","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"issue":"3","key":"27_CR3","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1093\/ietcom\/e88-b.3.991","volume":"E80\u2013B","author":"B Zhen","year":"2005","unstructured":"Zhen, B., Kobayashi, M., Shimuzu, M.: Framed aloha for multiple RFID objects identification. IEICE Trans. Commun. E80\u2013B(3), 991\u2013999 (2005)","journal-title":"IEICE Trans. Commun."},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Lee, S., Joo, S., Lee, C.: An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification. In: Proceedings of MobiQuitous, pp. 166\u2013172. IEEE (2005)","DOI":"10.1109\/MOBIQUITOUS.2005.13"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Tan, C.C., Sheng, B., Li, Q.: How to monitor for missing RFID tags. In: IEEE ICDCS, pp. 295\u2013302. IEEE (2008)","DOI":"10.1109\/ICDCS.2008.67"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Li, T., Chen, S., Ling, Y.: Identifying the missing tags in a large RFID system. In: ACM MobiHoc, pp. 1\u201310. ACM (2010)","DOI":"10.1145\/1860093.1860095"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Li, M.: Fast tag searching protocol for large-scale RFID systems. In: IEEE ICNP, pp. 363\u2013372. IEEE (2011)","DOI":"10.1109\/ICNP.2011.6089075"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Kodialam, M., Nandagopal, T.: Fast and reliable estimation schemes in RFID systems. In: ACM MobiCom, pp. 322\u2013333. ACM (2006)","DOI":"10.1145\/1161089.1161126"},{"issue":"9","key":"27_CR9","doi-asserted-by":"publisher","first-page":"1441","DOI":"10.1109\/TPDS.2011.36","volume":"22","author":"C Qian","year":"2011","unstructured":"Qian, C., Ngan, H., Liu, Y., Ni, L.M.: Cardinality estimation for large-scale RFID systems. IEEE Trans. Parallel Distrib. Syst. 22(9), 1441\u20131454 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Li, M., Qian, C.: PET: probabilistic estimating tree for large-scale RFID estimation. In: IEEE ICDCS, pp. 37\u201346. IEEE (2011)","DOI":"10.1109\/ICDCS.2011.9"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Buettner, M., Wetherall, D.: An emprical study of UHF RFID performance. In: Proceedings of MobiCom, pp. 223\u2013234. ACM (2008)","DOI":"10.1145\/1409944.1409970"},{"issue":"2","key":"27_CR12","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1109\/JSYST.2007.909179","volume":"1","author":"SR Arror","year":"2007","unstructured":"Arror, S.R., Deavours, D.D.: Evaluation of the state of passive UHF RFID: an experimental approach. IEEE Syst. J. 1(2), 168\u2013176 (2007)","journal-title":"IEEE Syst. J."},{"key":"27_CR13","unstructured":"Jeffery, S.R., Garofalakis, M., Franklin, M.J.: Adaptive cleaning for RFID data streams. In: Proceedings of VLDB, pp. 163\u2013174. ACM (2006)"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Xu, X., Gu, L., Wang, J., Xing, G.: Negotiate power and performance in the reality of RFID systems. In: IEEE PerCom, pp. 88\u201397. IEEE (2010)","DOI":"10.1109\/PERCOM.2010.5466989"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking, and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11569-6_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T21:52:39Z","timestamp":1746395559000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11569-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319115689","9783319115696"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11569-6_27","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"28 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}