{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:57:05Z","timestamp":1725494225163},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540755111"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75512-8_17","type":"book-chapter","created":{"date-parts":[[2007,11,7]],"date-time":"2007-11-07T08:26:10Z","timestamp":1194423970000},"page":"232-251","source":"Crossref","is-referenced-by-count":9,"title":["Real-Time Event Handling in an RFID Middleware System"],"prefix":"10.1007","author":[{"given":"Kaushik","family":"Dutta","sequence":"first","affiliation":[]},{"given":"Krithi","family":"Ramamritham","sequence":"additional","affiliation":[]},{"given":"B.","family":"Karthik","sequence":"additional","affiliation":[]},{"given":"Kamlesh","family":"Laddhad","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Glover, B., Bhatt, H.: Rfid essentials - theory in practice (2005)"},{"key":"17_CR2","unstructured":"IDTechEx: Rfid progress at wal-mart (2005)"},{"key":"17_CR3","unstructured":"TechWeb: Albertsons launches rfid initiative (2005)"},{"key":"17_CR4","unstructured":"RFID Journal: Rfids in pharmaceuticals (2005)"},{"key":"17_CR5","unstructured":"RFID Journal: Rfids in healthcare (2005)"},{"key":"17_CR6","unstructured":"Ton, Z., Dessain, V., Stachowiak-Joulain, M.: Rfids at the metro group (2005)"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Gonzalez, H., Han, J., Li, X., Klabjan, D.: Warehousing and analyzing massive rfid data sets. In: ICDE 2006. Proceedings of the 22nd International Conference on Data Engineering, p. 85 (2006)","DOI":"10.1109\/ICDE.2006.171"},{"issue":"5","key":"17_CR8","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MIC.2006.94","volume":"10","author":"J.E. Hoag","year":"2006","unstructured":"Hoag, J.E., Thompson, C.W.: Architecting rfid middleware. IEEE Internet Computing\u00a010(5), 88 (2006)","journal-title":"IEEE Internet Computing"},{"key":"17_CR9","unstructured":"Sun Microsystems: Software solutions: Epc and rfid (2006)"},{"key":"17_CR10","unstructured":"IBM Inc.: Integrate your enterprise application with ibm websphere rfid middleware (2006)"},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1145\/253260.253409","volume-title":"SIGMOD 1997","author":"S. Chakravarthy","year":"1997","unstructured":"Chakravarthy, S.: Sentinel: an object-oriented dbms with event-based rules. In: SIGMOD 1997. Proceedings of the 1997 ACM SIGMOD international conference on Management of data, pp. 572\u2013575. ACM Press, New York, NY, USA (1997)"},{"issue":"1","key":"17_CR12","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/311531.311623","volume":"31","author":"N.W. Paton","year":"1999","unstructured":"Paton, N.W., D\u00edaz, O.: Active database systems. ACM Comput. Surv.\u00a031(1), 63\u2013103 (1999)","journal-title":"ACM Comput. Surv."},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Chakravarthy, S., Le, R., Dasari, R.: Eca rule processing in distributed and heterogeneous environments. In: Proceedings of the International Symposium on Distributed Objects and Applications, pp. 330\u2013339 (1999)","DOI":"10.1109\/DOA.1999.794056"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Hanson, E.N., Carnes, C., Huang, L., Konyala, M., Noronha, L., Parthasarathy, S., Park, J.B., Vernon, A.: Scalable trigger processing. In: Proceedings. of 15th International Conference on Data Engineering, pp. 266\u2013275 (1999)","DOI":"10.1109\/ICDE.1999.754942"},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1007\/11408079_62","volume-title":"Database Systems for Advanced Applications","author":"A. Nagargadde","year":"2005","unstructured":"Nagargadde, A., Varadarajan, S., Ramamritham, K.: Semantic characterization of real world events. In: Zhou, L.-z., Ooi, B.-C., Meng, X. (eds.) DASFAA 2005. LNCS, vol.\u00a03453, pp. 675\u2013687. Springer, Heidelberg (2005)"},{"key":"17_CR16","unstructured":"Rao, J., Doraiswamy, S., Thakkar, H., Colby, L.S.: A deferred cleansing method for rfid data analytics. In: Proceeding of VLDB Conference, pp. 175\u2013186 (2006)"},{"key":"17_CR17","unstructured":"Jeffery, S.R., Garofalakis, M.N., Franklin, M.J.: Adaptive cleaning for rfid data streams. In: Proceeding of VLDB Conference, pp. 163\u2013174 (2006)"},{"key":"17_CR18","unstructured":"Subramaniam, S., Palpanas, T., Papadopoulos, D., Kalogeraki, V., Gunopulos, D.: Online outlier detection in sensor data using non-parametric models. In: Proceeding of VLDB Conference, pp. 187\u2013198 (2006)"},{"key":"17_CR19","unstructured":"Song, J., Kim, H.: The rfid middleware system supporting context-aware access control service. In: ICACT 2006. Proceedings of The 8th International Conference Advanced Communication Technology, 2006, p. 4 (2006)"},{"issue":"5","key":"17_CR20","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MIC.2006.94","volume":"10","author":"J. Hoag","year":"2006","unstructured":"Hoag, J., Thompson, C.: Architecting rfid middleware. IEEE Internet Computing\u00a010(5), 88\u201392 (2006)","journal-title":"IEEE Internet Computing"},{"key":"17_CR21","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/602259.602266","volume-title":"SIGMOD 1984","author":"A. Guttman","year":"1984","unstructured":"Guttman, A.: R-trees: a dynamic index structure for spatial searching. In: SIGMOD 1984. Proceedings of the 1984 ACM SIGMOD international conference on Management of data, pp. 47\u201357. ACM Press, New York, NY, USA (1984)"},{"key":"17_CR22","unstructured":"Oracle Inc.: Oracle database 10g express edition (2006)"},{"issue":"1","key":"17_CR23","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1145\/248621.248624","volume":"29","author":"F. Pong","year":"1997","unstructured":"Pong, F., Dubois, M.: Verification techniques for cache coherence protocols. ACM Comput. Surv.\u00a029(1), 82\u2013126 (1997)","journal-title":"ACM Comput. Surv."}],"container-title":["Lecture Notes in Computer Science","Databases in Networked Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75512-8_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:22:26Z","timestamp":1619518946000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75512-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540755111"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75512-8_17","relation":{},"subject":[]}}