{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:13:06Z","timestamp":1725534786523},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642028298"},{"type":"electronic","value":"9783642028304"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02830-4_28","type":"book-chapter","created":{"date-parts":[[2009,7,6]],"date-time":"2009-07-06T01:23:32Z","timestamp":1246843412000},"page":"367-376","source":"Crossref","is-referenced-by-count":0,"title":["Anticipative Wrap-Around Inquiry Method towards Efficient RFID Tag Identification"],"prefix":"10.1007","author":[{"given":"Ching-Hsien","family":"Hsu","sequence":"first","affiliation":[]},{"given":"Wei-Jau","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yeh-Ching","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1007\/978-3-540-30542-2_86","volume-title":"Advances in Multimedia Information Processing - PCM 2004","author":"H.S. Choi","year":"2004","unstructured":"Choi, H.S., Cha, J.R., Kim, J.H.: Improved Bit-by-bit Binary Tree Algorithm in Ubiquitous ID System. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol.\u00a03332, pp. 696\u2013703. Springer, Heidelberg (2004)"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Klair, D.K., Chin, K.-W., Raad, R.: An investigation into the energy efficiency of pure and slotted aloha based RFID anti-collision protocols. In: Proceedings of the IEEE WoWMoM 2007, Helsinki, Finland, June 18-21 (2007)","DOI":"10.1109\/WOWMOM.2007.4351749"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Law, C., Lee, K., Siu, K.-Y.: Efficient Memoryless Protocol for Tag Identification. In: Proceedings of the International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (August 2000)","DOI":"10.1145\/345848.345865"},{"key":"28_CR4","unstructured":"Lee, S., Joo, S.D., Lee, C.W.: An enhanced dynamic framed slotted aloha algorithm for RFID tag identification. In: Proceedings of ACM Mobiquitous 2005 (July 2005)"},{"key":"28_CR5","unstructured":"Myung, J., Lee, W.: An adaptive memoryless tag anti-collision protocol for RFID networks. In: Proceedings of IEEE INFOCOM 2005, Poster Session (March 2005)"},{"issue":"3","key":"28_CR6","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/LCOMM.2006.1603365","volume":"10","author":"J. Myung","year":"2006","unstructured":"Myung, J., Lee, W., Srivastava, J.: Adaptive binary splitting for efficient RFID tag anti-collision. IEEE Communication Letter\u00a010(3), 144\u2013146 (2006)","journal-title":"IEEE Communication Letter"},{"key":"28_CR7","unstructured":"Sahoo, A., Iyer, S., Bhandari, N.: Improving RFID System to Read Tags Efficiently, KRSIT Technical Report, IIT Bombay (June 2006)"},{"key":"28_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/3-540-45866-2_9","volume-title":"Pervasive Computing","author":"H. Vogt","year":"2002","unstructured":"Vogt, H.: Efficient Object Identification with Passive RFID Tags. In: Mattern, F., Naghshineh, M. (eds.) PERVASIVE 2002. LNCS, vol.\u00a02414, pp. 98\u2013113. Springer, Heidelberg (2002)"},{"issue":"3","key":"28_CR9","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1093\/ietcom\/e88-b.3.991","volume":"88","author":"B. Zhen","year":"2005","unstructured":"Zhen, B., Kobayashi, M., Shimizui, M.: Framed aloha for multiple RFID objects Identification. IEICE Trans. on Comm.\u00a0E88-B(3), 991\u2013999 (2005)","journal-title":"IEICE Trans. on Comm."},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Gupta, H., Das, S.R., Zhu, X.: Slotted Scheduled Tag Access in Multi-Reader RFID Systems. In: Proceedings of the IEEE International Conference on Networks Protocols (ICNP), pp. 61\u201370 (2007)","DOI":"10.1109\/ICNP.2007.4375837"}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Intelligence and Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02830-4_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T07:18:23Z","timestamp":1558423103000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02830-4_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642028298","9783642028304"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02830-4_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}