{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:09:19Z","timestamp":1725516559655},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540692928"},{"type":"electronic","value":"9783540692935"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69293-5_39","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T16:07:43Z","timestamp":1218557263000},"page":"490-504","source":"Crossref","is-referenced-by-count":2,"title":["RFID: An Ideal Technology for Ubiquitous Computing?"],"prefix":"10.1007","author":[{"given":"Ciaran","family":"O\u2019Driscoll","sequence":"first","affiliation":[]},{"given":"Daniel","family":"MacCormac","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Deegan","sequence":"additional","affiliation":[]},{"given":"Fred","family":"Mtenzi","sequence":"additional","affiliation":[]},{"given":"Brendan","family":"O\u2019Shea","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","doi-asserted-by":"crossref","unstructured":"Wamba, S.F., Lefebvre, L.A., Lefebvre., E.: Enabling intelligent B-to-B eCommerce supply chain management using RFID and the EPC network: A case study in the retail industry. In: The 8th international conference on Electronic commerce, pp. 281\u2013288 (2006)","DOI":"10.1145\/1151454.1151502"},{"key":"39_CR2","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.bushor.2004.09.009","volume":"47\/6","author":"B. Srivastava","year":"2004","unstructured":"Srivastava, B.: Radio Frequency ID technology: The next revolution in SCM. Business Horizons\u00a047\/6, 60\u201368 (2004)","journal-title":"Business Horizons"},{"key":"39_CR3","unstructured":"EPC Global (2006), http:\/\/www.epcglobalinc.org"},{"key":"39_CR4","unstructured":"Roberti, M.: Analysis: RFID - Wal-Mart\u2019s network effect. CIO Insight (2006)"},{"key":"39_CR5","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","volume":"265\/3","author":"M. Weiser","year":"1991","unstructured":"Weiser, M.: The computer for the 21st century. Scientific American\u00a0265\/3, 94\u2013104 (1991)","journal-title":"Scientific American"},{"key":"39_CR6","first-page":"4","volume":"6","author":"W.H. Mangione-Smith","year":"1998","unstructured":"Mangione-Smith, W.H.: Mobile computing and smart spaces. IEEE Concurrency\u00a06\/4 (1998)","journal-title":"IEEE Concurrency"},{"key":"39_CR7","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1016\/S1389-1286(00)00180-8","volume":"35\/4","author":"M. Beigl","year":"2001","unstructured":"Beigl, M., Gellersen, H., Schmidt, A.: Mediacups: Experience with design and use of computer-augmented everyday objects. Computer Networks\u00a035\/4, 401\u2013409 (2001)","journal-title":"Computer Networks"},{"key":"39_CR8","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1023\/B:WINE.0000044028.20424.85","volume":"10","author":"K. R\u00f6mer","year":"2004","unstructured":"R\u00f6mer, K., Schoch, T., Mattern, F., D\u00fcbendorfer, T.: Smart identification frameworks for ubiquitous computing applications. Wireless Networks\u00a010, 689\u2013700 (2004)","journal-title":"Wireless Networks"},{"key":"39_CR9","unstructured":"Philips ICODE smart label solutions, http:\/\/www.philips.semiconductors.com\/products\/identification\/icode\/index.html"},{"key":"39_CR10","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MPRV.2002.993146","volume":"1\/1","author":"T. Kindberg","year":"2002","unstructured":"Kindberg, T., Fox, A.: System software for ubiquitous computing. IEEE Pervasive Computing\u00a01\/1, 70\u201381 (2002)","journal-title":"IEEE Pervasive Computing"},{"key":"39_CR11","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1049\/cce:20050204","volume":"16\/2","author":"N. Baker","year":"2005","unstructured":"Baker, N.: Zigbee and bluetooth strengths and weaknesses for industrial applications. Computing & Control Engineering Journal\u00a016\/2, 20\u201325 (2005)","journal-title":"Computing & Control Engineering Journal"},{"key":"39_CR12","unstructured":"Antoniou, Z., Krishnamurthi, G., Reynolds., F.: Intuitive service discovery in RFID-enhanced networks. In: Proceedings of IEEE COMSWARE Conference (January 2006)"},{"key":"39_CR13","unstructured":"NFC forum, http:\/\/www.nfc-forum.org"},{"key":"39_CR14","unstructured":"UPnP forum, http:\/\/www.upnp.org"},{"key":"39_CR15","unstructured":"Shan, Q., Liu, Y., Prossec, G., Brown., D.: Wireless intelligent sensor networksfor refrigerated vehicle. In: IEEE 6th CAS Symposium on Emerging Technologies: Mobile and Wireless Communication (2004)"},{"key":"39_CR16","unstructured":"Lopez, T.S., Kim, D., Park, T.: A service framework for mobile ubiquitous sensor networks and RFID. In: 1st International Symposium on Wireless Pervasive Computing, pp. 16\u201318 (2006)"},{"key":"39_CR17","doi-asserted-by":"crossref","unstructured":"Siegemund, F., Florkemeier, C.: Interaction in pervasive computing settings using bluetooth-enabled active tags and passive RFID technology together with mobile phones. In: The First IEEE International Conference on Pervasive Computing and Communications (PerCom) (2003)","DOI":"10.1109\/PERCOM.2003.1192762"},{"key":"39_CR18","unstructured":"Beutel, J., Kasten., O.: A minimal bluetooth-based computing and communication platform. Technical report, Computer Engineering and Networks Lab, Swiss Federal Institute of Technology (ETH) Zurich (2001)"},{"key":"39_CR19","unstructured":"Floerkemeier, C., Lampe, M., Schoch, T. : The smart box concept for ubiquitous computing environments"},{"key":"39_CR20","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/s007790200042","volume":"6","author":"K. Romer","year":"2004","unstructured":"Romer, K., Domnitcheva, S.: Smart playing cards: A ubiquitous computing game. Personal and Ubiquitous Computing\u00a06, 371\u2013377 (2004)","journal-title":"Personal and Ubiquitous Computing"},{"key":"39_CR21","unstructured":"Langheinrich, M., Mattern, F., Rmer, K., Vogt, H.: First steps towards an event-based infrastructure for smart things. Technical report, ETH Zurich, Swiss Federal Institute of Technology (2000)"},{"key":"39_CR22","unstructured":"Boss, R.W.: RFID technology for libraries (2004)"},{"key":"39_CR23","unstructured":"Smart, L.: Making sense of RFID. Netconnect (Fall, 2004), 4\u201314 (2004)"},{"key":"39_CR24","doi-asserted-by":"crossref","unstructured":"Morales-Salcedo, R., Ogata, H., Yano, Y.: Towards a new digital library infrastructure with RFID for mobile e-learning. In: IEEE International Workshop on Wireless and Mobile Technologies in Education (WMTE 2005) (2005)","DOI":"10.1109\/WMTE.2005.66"},{"key":"39_CR25","doi-asserted-by":"crossref","unstructured":"Molnar, D., Wagner, D.: Privacy and security in library RFID issues, practices, and architectures. In: Conference on Computer and Communication Security (2004)","DOI":"10.1145\/1030083.1030112"},{"key":"39_CR26","series-title":"Lecture Notes in Computer Science","volume-title":"UbiComp 2004: Ubiquitous Computing","author":"S. Hsi","year":"2004","unstructured":"Hsi, S., Semper, R., Brunette, W., Rhea, A., Boriello, G.: eXspot: A wireless RFID transceiver for recording and extending museum visits. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, vol.\u00a03205, Springer, Heidelberg (2004)"},{"key":"39_CR27","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/1081992.1082021","volume":"48 \/ 9","author":"S. Hsi","year":"2005","unstructured":"Hsi, S., Fait, H.: RFID enhances visitors\u2019 museum experience at the Exploratorium. Communications of the ACM\u00a048 \/ 9, 60\u201365 (2005)","journal-title":"Communications of the ACM"},{"key":"39_CR28","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MPRV.2002.1012333","volume":"1","author":"M. Fleck","year":"2002","unstructured":"Fleck, M., Frid, M., Kindberg, T., Rajani, R., OBrien, E.: From informing to remembering: Deploying a ubiquitous system in an interactive science museum. IEEE Pervasive Computing\u00a01, 13\u201321 (2002)","journal-title":"IEEE Pervasive Computing"},{"key":"39_CR29","doi-asserted-by":"crossref","unstructured":"Miur, M., Kunifuji, S., Shizuki, B., Tanaka, J.: Airtransnote augmented classrooms with digital pen devices and RFID tags. In: IEEE International Workshop on Wireless and Mobile Technologies in Education (WMTE 2005) (2005)","DOI":"10.1109\/WMTE.2005.9"},{"key":"39_CR30","doi-asserted-by":"crossref","unstructured":"Elrod, S., Bruce, R., Gold, R., Goldberg, D.: Liveboard: A large interactive display supporting group meetings, presentations, and remote collaboration. In: Conference on Human Factors in Computing Systems (1992)","DOI":"10.1145\/142750.143052"},{"key":"39_CR31","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1109\/PERCOMW.2007.26","volume-title":"PERCOMW 2007: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops","author":"E. Welbourne","year":"2007","unstructured":"Welbourne, E., Balazinska, M., Borriello, G., Brunette, W.: Challenges for pervasive rfid-based infrastructures. In: PERCOMW 2007: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops, Washington, DC, USA, pp. 388\u2013394. IEEE Computer Society, Los Alamitos (2007)"},{"key":"39_CR32","unstructured":"Jeffery, S.R., Garofalakis, M., Franklin, M.J.: Adaptive cleaning for rfid data streams. In: VLDB 2006: Proceedings of the 32nd international conference on Very large data bases, VLDB Endowment, pp. 163\u2013174 (2006)"},{"key":"39_CR33","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/1140104.1140114","volume-title":"MobiDE 2006: Proceedings of the 5th ACM international workshop on Data engineering for wireless and mobile access","author":"N. Khoussainova","year":"2006","unstructured":"Khoussainova, N., Balazinska, M., Suciu, D.: Towards correcting input data errors probabilistically using integrity constraints. In: MobiDE 2006: Proceedings of the 5th ACM international workshop on Data engineering for wireless and mobile access, pp. 43\u201350. ACM, New York (2006)"}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Intelligence and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69293-5_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:57:02Z","timestamp":1605761822000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69293-5_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540692928","9783540692935"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69293-5_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}