{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:17:30Z","timestamp":1773235050317,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540744825","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74484-9_88","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T21:48:03Z","timestamp":1188337683000},"page":"1017-1026","source":"Crossref","is-referenced-by-count":6,"title":["Performance Analysis of EPC Class-1 Generation-2 RFID Anti-collision Protocol"],"prefix":"10.1007","author":[{"given":"Jeong Geun","family":"Kim","sequence":"first","affiliation":[]},{"given":"Woo Jin","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Ji Ho","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"88_CR1","doi-asserted-by":"crossref","DOI":"10.1002\/0470868023","volume-title":"RFID handbook","author":"K. Finkenzeller","year":"2003","unstructured":"Finkenzeller, K.: RFID handbook, 2nd edn. Wiley, Chichester (2003)","edition":"2"},{"key":"88_CR2","doi-asserted-by":"crossref","unstructured":"Law, C., Lee, K., Siu, K.: Efficient memoryless protocol for tag identification. In: Proc. International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, pp. 75\u201384 (2000)","DOI":"10.1145\/345848.345865"},{"key":"88_CR3","doi-asserted-by":"crossref","unstructured":"Vogt, H.: Efficient object identification with passive RFID tags. In: LNCS: International Conference on Pervasive Computing, pp. 1854\u20131858 (2002)","DOI":"10.1007\/3-540-45866-2_9"},{"key":"88_CR4","unstructured":"Choi, H., Cha, J., Kim, J.: Fast wireless anti-collision algorithm in ubiquitous ID system. In: Proc. VTC \u201904. vol. 6, pp. 26\u201329 (2004)"},{"key":"88_CR5","doi-asserted-by":"crossref","unstructured":"Hush, D., Wood, C.: Analysis of tree algorithms for RFID arbitration. In: Proc. ISIT \u201998, pp. 107\u2013115 (1998)","DOI":"10.1109\/ISIT.1998.708695"},{"key":"88_CR6","unstructured":"Barton, J., Kindberg, T.: The challenges and opportunities of integrating the physical world and networked systems. HPL Technical Report 2001-18 (2001)"},{"key":"88_CR7","doi-asserted-by":"crossref","unstructured":"Zhou, F., Chen, C., Jin, D., Huang, C., Min, H.: Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems. In: Proc. ISLPED \u201904, pp. 357\u2013362 (2004)","DOI":"10.1145\/1013235.1013321"},{"key":"88_CR8","first-page":"274","volume":"2","author":"H. Kim","year":"2005","unstructured":"Kim, H., Quan, C.: Performance analytsis of anti-collision algorithms for large-scale RFID systems. Telecommunications Review\u00a02, 274\u2013289 (2005)","journal-title":"Telecommunications Review"},{"key":"88_CR9","unstructured":"EPCglobal: EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz - 960 MHHz ver 1.0.9 (2004)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74484-9_88.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:33:45Z","timestamp":1619519625000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74484-9_88"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744825"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74484-9_88","relation":{},"subject":[]}}