{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:44:16Z","timestamp":1725515056421},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540726944"},{"type":"electronic","value":"9783540726975"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72697-5_24","type":"book-chapter","created":{"date-parts":[[2007,6,23]],"date-time":"2007-06-23T13:07:18Z","timestamp":1182604038000},"page":"279-289","source":"Crossref","is-referenced-by-count":10,"title":["Performance Evaluation of Non-persistent CSMA as Anti-collision Protocol for Active RFID Tags"],"prefix":"10.1007","author":[{"given":"E.","family":"Egea-L\u00f3pez","sequence":"first","affiliation":[]},{"given":"J.","family":"Vales-Alonso","sequence":"additional","affiliation":[]},{"given":"A. S.","family":"Mart\u00ednez-Sala","sequence":"additional","affiliation":[]},{"given":"M. V.","family":"Bueno-Delgado","sequence":"additional","affiliation":[]},{"given":"J.","family":"Garc\u00eda-Haro","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"24_CR1","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/MPRV.2003.1203746","volume":"2","author":"V. Stanford","year":"2004","unstructured":"Stanford, V.: Pervasive Computing Goes the Last Hundred Feet with RFID Systems. IEEE Pervasive Computing\u00a02(2), 9\u201314 (2004)","journal-title":"IEEE Pervasive Computing"},{"key":"24_CR2","doi-asserted-by":"crossref","first-page":"2150","DOI":"10.1016\/j.comcom.2005.12.011","volume":"29","author":"D. Shih","year":"2006","unstructured":"Shih, D., Sun, P., Yen, D., Huang, S.: Taxonomy and survey of RFID anti-collision protocols. Elsevier Computer Communications\u00a029, 2150\u20132166 (2006)","journal-title":"Elsevier Computer Communications"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/3-540-45866-2_9","volume-title":"Pervasive Computing","author":"H. Vogt","year":"2002","unstructured":"Vogt, H.: Efficient Object Identification with Passive RFID Tags. In: Mattern, F., Naghshineh, M. (eds.) PERVASIVE 2002. LNCS, vol.\u00a02414, pp. 98\u2013113. Springer, Heidelberg (2002)"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Zhou, F., Chen, C., Jin, D., Huang, C., Min, H.: Evaluating and Optimizing Power Consumption for Anti-Collision Protocols for Applications in RFID Systems. In: Proc. Int. Symp. on Low Power Electronics and Design 2004, pp. 357\u2013362 (2004)","DOI":"10.1145\/1013235.1013321"},{"key":"24_CR5","unstructured":"ISO\/IEC 18000-7:2004 Information technology\u2013Radio frequency identification for item management\u2013Part 7: Parameters for active air interface at 433 MHz (2004)"},{"issue":"2","key":"24_CR6","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/26.20080","volume":"37","author":"J.E. Wieselthier","year":"1988","unstructured":"Wieselthier, J.E., Ephremides, A., Michaels, L.A.: An exact analysis and performance evaluation of framed ALOHA with capture. IEEE Transactions on Communications\u00a037(2), 125\u2013137 (1988)","journal-title":"IEEE Transactions on Communications"},{"key":"24_CR7","unstructured":"Class 1 Generation 2 UHF Air Interface Protocol Standard Version 1.0.9: \u201cGen 2\u201d. Available online at: \n                    \n                      http:\/\/www.epcglobalinc.org\/standards"},{"key":"24_CR8","volume-title":"Wireless Sensor Networks. An information processing approach","author":"F. Zhao","year":"2004","unstructured":"Zhao, F., Guibas, L.: Wireless Sensor Networks. An information processing approach. Morgan Kaufmann, San Francisco (2004)"},{"issue":"6","key":"24_CR9","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.1109\/JSAC.2004.830898","volume":"22","author":"Y.C. Tay","year":"2004","unstructured":"Tay, Y.C., Jamieson, K., Balakrishnan, H.: Collision-Minimizing CSMA and its Applications to Wireless Sensor Networks. IEEE Journal on Selected Areas in Communications\u00a022(6), 1048\u20131057 (2004)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"24_CR10","doi-asserted-by":"publisher","first-page":"1400","DOI":"10.1109\/TCOM.1975.1092768","volume":"23","author":"L. Kleinrock","year":"1975","unstructured":"Kleinrock, L., Tobagi, F.: Packet Switching in Radio Channels: Part I-Carrier Sense Multiple Access and their throughput-delay characteristics. IEEE Transactions on Communications\u00a023, 1400\u20131416 (1975)","journal-title":"IEEE Transactions on Communications"},{"key":"24_CR11","volume-title":"Introduction to Probability","author":"C.M. Grinstead","year":"2003","unstructured":"Grinstead, C.M., Snell, J.L.: Introduction to Probability, 2nd edn. American Mathematical Society, Providence (2003)","edition":"2"},{"key":"24_CR12","unstructured":"Ramachandran, I., Das, A., Roy, S.: Clear Channel Assessment in Energy-constrained Wideband Wireless Networks. IEEE Wireless Communications Magazine (forthcoming)"}],"container-title":["Lecture Notes in Computer Science","Wired\/Wireless Internet Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72697-5_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:04:07Z","timestamp":1605762247000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72697-5_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540726944","9783540726975"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72697-5_24","relation":{},"subject":[]}}