{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:14:12Z","timestamp":1749701652725,"version":"3.41.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491080"},{"type":"electronic","value":"9783319491097"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_36","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T09:03:15Z","timestamp":1477040595000},"page":"383-390","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient RFID Reader Network Planning Strategy Based on P2P Computing"],"prefix":"10.1007","author":[{"given":"He","family":"XU","sequence":"first","affiliation":[]},{"given":"Weiwei","family":"SHEN","sequence":"additional","affiliation":[]},{"given":"Peng","family":"LI","sequence":"additional","affiliation":[]},{"given":"Cong","family":"QIAN","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Karmakar, Nemai Chandra. Handbook of smart antennas for RFID systems[M]. New Jersey: Wiley, 2010.","DOI":"10.1002\/9780470872178"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Wu Y, Sheng Q Z, Zeadally S. RFID: opportunities and challenges[M]. Next-Generation Wireless Technologies. Springer London, 2013: 105-129.","DOI":"10.1007\/978-1-4471-5164-7_7"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Sakurai S. Prediction of sales volume based on the RFID data collected from apparel shops[J]. International Journal of Space-Based and Situated Computing, 2011, 1(2-3): 174-182.","DOI":"10.1504\/IJSSC.2011.040343"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Takeda A, Oide T, Takahashi A. Simple dynamic load balancing mechanism for structured P2P network and its evaluation[J]. International Journal of Grid and Utility Computing, 2012, 3(2-3): 126-135.","DOI":"10.1504\/IJGUC.2012.047763"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Okaie Y, Nakano T. A game theoretic framework for peer-to-peer market economy[J]. International Journal of Grid and Utility Computing, 2011, 2(3): 183-195.","DOI":"10.1504\/IJGUC.2011.042041"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Sharifkhani F, Pakravan M R. A review of new advances in resource discovery approaches in unstructured P2P networks[C]. Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on. IEEE, 2013: 828-833.","DOI":"10.1109\/ICACCI.2013.6637283"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Eftychiou A, Vrusias B, Antonopoulos N. A dynamically semantic platform for efficient information retrieval in P2P networks[J]. International Journal of Grid and Utility Computing, 2012, 3(4): 271-283.","DOI":"10.1504\/IJGUC.2012.051424"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Takaoka M, Uchida M, Ohnishi K, et al. A generalised diffusion-based file replication scheme for load balancing in P2P file-sharing networks[J]. International Journal of Grid and Utility Computing, 2012, 3(4): 242-252.","DOI":"10.1504\/IJGUC.2012.051421"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Sula A, Spaho E, Matsuo K, et al. A new system for supporting children with autism spectrum disorder based on IoT and P2P technology[J]. International Journal of Space-Based and Situated Computing, 2014, 4(1): 55-64.","DOI":"10.1504\/IJSSC.2014.060688"},{"key":"36_CR10","unstructured":"Nandakumar R, Chintalapudi K K, Padmanabhan V, et al. Dhwani: secure peer-to-peer acoustic NFC[C]. ACM SIGCOMM Computer Communication Review. ACM, 2013, 43(4): 63-74."},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Wang C S, Chen C L, Deng D J. P2P-based mobile navigation system with location service[J]. Peer-to-Peer Networking and Applications, 2015, 8(1): 22-31.","DOI":"10.1007\/s12083-013-0204-8"},{"key":"36_CR12","unstructured":"Hui F C P, Chan H C B. Position Estimation Methods for an RFID-based Positioning System with a P2P Network Architecture[C]. European Wireless 2014; 20th European Wireless Conference; Proceedings of. VDE, 2014: 1-6"},{"key":"36_CR13","unstructured":"Hui C P. RFID-based location tracking system using a peer-to-peer network architecture[D]. The Hong Kong Polytechnic University, 2015."},{"key":"36_CR14","unstructured":"Urien P, Piramuthu S. LLCPS and SISO: A TLS-based framework with RFID for NFC P2P retail transaction processing[C]. 2013 IEEE International Conference on RFID. IEEE, 2013: 152-159."},{"key":"36_CR15","unstructured":"D. W. Engels. The reader collision problem[R]. White Paper MIT-AUTOID-WH-007, MIT Auto ID Center, November 2001."},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"D.-Y. Kim, B.-J. Jang, H.-G. Yoon, J.-S. Park, and J.-G. Yook. Effects of reader interference on the RFID interrogation range[C]. In the Proceedings of the 37th European Microwave Conference, pages 728\u2013731, October 2007.","DOI":"10.1109\/EUMC.2007.4405295"},{"key":"36_CR17","unstructured":"N. lrfan and M. C. E Yagoub. Efficient Approach for Redundant Reader Elimination in Large-Scale RF10 Networks[C]. 2010 First International Conference on Integrated Intelligent Computing, pp. l 02-107,5-7 Aug. 2010."},{"key":"36_CR18","doi-asserted-by":"crossref","unstructured":"Leong K S, Ng M L, Cole P H. The reader collision problem in RFID systems[C]. 2005 IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications. IEEE, 2005, 1: 658-661.","DOI":"10.1109\/MAPE.2005.1617996"},{"key":"36_CR19","doi-asserted-by":"crossref","unstructured":"Su-Ryun Lee, Sung-Don Joo, and Chae-Woo Lee. An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification[C]. The Second Annual International Conference on Networking and Services, 2005, Page(s): 166\u2013172","DOI":"10.1109\/MOBIQUITOUS.2005.13"},{"key":"36_CR20","doi-asserted-by":"crossref","unstructured":"Jae-Ryong Cha and Jae-Hyun Kim. Dynamic framed slotted ALOHA algorithms using fast tag estimation method for RFID system[C]. Consumer Communications and Networking Conference, 2006, Page(s): 768\u2013772","DOI":"10.1109\/CCNC.2006.1593143"},{"key":"36_CR21","doi-asserted-by":"crossref","unstructured":"Xu Huang and Son Le. Efficient Dynamic Framed Slotted ALOHA for RFID Passive Tags[C]. The 9th International Conference on Advanced Communication Technology, 2007, Page(s):94\u201397","DOI":"10.1109\/ICACT.2007.358312"},{"key":"36_CR22","doi-asserted-by":"crossref","unstructured":"Leian Liu and Shengli Lai. ALOHA-Based AntiCollision Algorithms Used in RFID System[C]. International Conference on Wireless Communications, Networking and Mobile Computing, 2006, Page(s): 1\u20134.","DOI":"10.1109\/WiCOM.2006.342"},{"key":"36_CR23","doi-asserted-by":"crossref","unstructured":"J. Waldrop, D.W. Engels, and S.E. Sarma. Colorwave: an anticollision algorithm for the reader collision problem[C]. IEEE International Conference on Communications, 2003, Page(s): 1206-1210.","DOI":"10.1109\/ICC.2003.1204562"},{"key":"36_CR24","doi-asserted-by":"crossref","unstructured":"Ziming Guo and Binjie Hu. A Dynamic Bit Arbitration Anti-Collision Algorithm for RFID System[C]. IEEE International Workshop on Anticounterfeiting, Security, Identification, 2007, Page(s): 457\u2013460.","DOI":"10.1109\/IWASID.2007.373678"},{"key":"36_CR25","doi-asserted-by":"crossref","unstructured":"Leian Liu, Zhenhua Xie, Jingtian Xi, and Shengli Lai. An improved anti-collision algorithm in RFID system[C]. 2nd International Conference on Mobile Technology, Applications and Systems, 2005.","DOI":"10.1109\/MTAS.2005.243788"},{"key":"36_CR26","doi-asserted-by":"crossref","unstructured":"B. Carbunar, M. K. Ramanathan, M. Koyuturk, C. Hoffmann, and A. Grama. Redundant-reader elimination in RFID systmes[C]. Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON), pages 176\u2013184, September 2005.","DOI":"10.1109\/SAHCN.2005.1557073"},{"key":"36_CR27","doi-asserted-by":"crossref","unstructured":"C.-H. Hsu, Y.-M. Chen, and C.-T. Yang. A layered optimization approach for redundant reader elimination in wireless rfid networks[C]. In IEEE Asia-Pacific Services Computing Conference, pages 138\u2013145, 2007.","DOI":"10.1109\/APSCC.2007.59"},{"key":"36_CR28","unstructured":"Z. Guo, A.Zhou. Data quality and data cleaning research[J]. Journal of software, 2002, 13(11):2076-2082."},{"key":"36_CR29","unstructured":"Y. Gu, G.Yu, T.Zhang. RFID complex event processing technology[J]. Computer science and exploration, 2007(03)."},{"key":"36_CR30","doi-asserted-by":"crossref","unstructured":"Juels A, Pappu R. Squealing Euros: Privacy protection in RFID-enabled banknotes [C]. Financial cryptography. Springer Berlin Heidelberg, 2003:103-121.","DOI":"10.1007\/978-3-540-45126-6_8"},{"key":"36_CR31","doi-asserted-by":"crossref","unstructured":"Xu H, Wang S, Wang R. A Novel RFID Reader System Framework Based On Peer-to-Peer Network[J]. International Journal of Advancements in Computing Technology, 2011, 3(3): 104-110.","DOI":"10.4156\/ijact.vol3.issue3.10"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T19:00:33Z","timestamp":1749668433000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_36","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}