{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,4]],"date-time":"2023-10-04T09:36:04Z","timestamp":1696412164942},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2009,4,17]],"date-time":"2009-04-17T00:00:00Z","timestamp":1239926400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1007\/s00779-009-0224-9","type":"journal-article","created":{"date-parts":[[2009,4,16]],"date-time":"2009-04-16T05:41:49Z","timestamp":1239860509000},"page":"489-497","source":"Crossref","is-referenced-by-count":16,"title":["Alleviating reader collision problem in mobile RFID networks"],"prefix":"10.1007","volume":"13","author":[{"given":"Ching-Hsien","family":"Hsu","sequence":"first","affiliation":[]},{"given":"Shih-Chang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chia-Hao","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jong Hyuk","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,4,17]]},"reference":[{"key":"224_CR1","doi-asserted-by":"crossref","unstructured":"Bao L, Garcia-Luna-Aceves JJ (2000) Collision-free topology-dependent channel access scheduling. In: Proceedings of the IEEE 21st century military communications conference (MILCOM), pp 507\u2013511","DOI":"10.1109\/MILCOM.2000.905005"},{"key":"224_CR2","unstructured":"Birari SM (2005) Mitigating the reader collision problem in RFID networks with mobile readers. In: Proceedings of the 13th IEEE international conference on networks"},{"key":"224_CR3","doi-asserted-by":"crossref","unstructured":"Carbunar B, Grama A, Octavian Carbunar JV (2006) Redundancy and coverage detection in sensor networks. ACM Transactions on Sensor Networks (TOSN),vol 2, issue 1, February 2006","DOI":"10.1145\/1138127.1138131"},{"key":"224_CR4","unstructured":"Cha JR, Kim JH (2006) Dynamic framed slotted ALOHA algorithm using fast tag estimation method for RFID system. In: Proceedings. CCNC\u201906, Las Vegas, USA, 8\u201310 January 2006"},{"key":"224_CR5","unstructured":"Chen W-T, Ho T-W, Chen Y-C (2005) An MAC protocol for wireless ad-hoc networks using smart antennas. In: Proceedings of the 11th IEEE international conference on parallel and distributed systems (ICPADS\u201905), pp 446\u2013452"},{"key":"224_CR6","unstructured":"Diorio C, HAG Co-Chair (2004) Class-1 generation 2 UHF RFID. http:\/\/www.autoid.org\/sc31\/2004\/dec\/SG3_200411_430_Gen2Update.pdf . Accessed Dec 2004"},{"key":"224_CR7","unstructured":"Engels DW, Sarma SE (2002) The reader collision problem. In: Proceedings of the 2002 IEEE international conference on systems, man and cybernetics"},{"key":"224_CR8","unstructured":"European Telecommunications Standards Institute (2004) ETSI EN 302 208-1 v1.1.1. http:\/\/www.RFIDc.com\/pdfs_downloads\/ETSI%20Standard%202.pdf"},{"key":"224_CR9","unstructured":"Ho J, Engels DW, Sarma SE (2006) HiQ: a hierarchical Q-learning algorithm to solve the reader collision problem. In: Proceedings of the international symposium on applications and the internet workshops (SAINTW\u201906), pp 88\u201391"},{"key":"224_CR10","doi-asserted-by":"crossref","unstructured":"Hsu C-H, Chen Y-M, Kang HJ (2008) Performance-effective and low-complexity redundant reader detection in wireless RFID networks. EURASIP J Wirel Commun Netw 2008, Article ID 604747, 9 pp. doi: 10.1155\/2008\/604747","DOI":"10.1155\/2008\/604747"},{"key":"224_CR11","unstructured":"Hwang L-J, Sheu S-T, Shih Y-Y, Cheng Y-C (2005) Grouping strategy for solving hidden node problem in IEEE 802.15.4 LR-WPAN. In: Proceedings of the 1st international conference on wireless internet, pp 26\u201332"},{"key":"224_CR12","doi-asserted-by":"crossref","unstructured":"Jain N, Das SR, Nasipuri A (2001) A multichannel CSMA MAC protocol with receiver-based channel selection for multihop wireless networks. In: Proceedings of the 10th IEEE international conference on computer communications and networks, pp 432\u2013439","DOI":"10.1109\/ICCCN.2001.956301"},{"key":"224_CR13","unstructured":"Kim J, Kim S, Kim D, Lee W, Kim E (2005) Low-energy localized clustering: an adaptive cluster radius configuration scheme for topology control in wireless sensor networks. In: Proceedings of the IEEE vehicular technology conference (VTC), pp 2546\u20132550"},{"key":"224_CR14","unstructured":"Konorski J, (2005) Solvability of a Markovian model of an IEEE 802.11 LAN under a backoff attack. In: Proceedings of the 13th IEEE international symposium on modeling, analysis, and simulation of computer and telecommunication systems (MASCOYS\u201905), pp 491\u2013498"},{"key":"224_CR15","unstructured":"Kuo W-K, Jay Kuo C-C (2003) Enhanced backoff scheme in CSMA\/CA for IEEE 802.11. In: Proceedings of the 58th IEEE vehicular technology conference, pp 2809\u20132813"},{"key":"224_CR16","doi-asserted-by":"crossref","unstructured":"Sandoval-Reyes S, Soberanes Perez JL (2005) Mobile RFID reader with database wireless synchronization. In: Proceedings of the 2nd IEEE international conference on electrical and electronics engineering, pp 5\u20138","DOI":"10.1109\/ICEEE.2005.1529560"},{"key":"224_CR17","doi-asserted-by":"crossref","unstructured":"Sobrinho JL, de Haan R, Brazio JM (2005) Why RTS-CTS is not your ideal wireless LAN multiple access protocol. In: Proceedings of the IEEE wireless communications and networking conference, pp 81\u201387","DOI":"10.1109\/WCNC.2005.1424480"},{"key":"224_CR18","doi-asserted-by":"crossref","unstructured":"Tanaka Y, Sasase I (2007) Interference avoidance algorithms for passive RFID systems using contention-based transmit abortion. IEICE Trans Commun E90-B(11):3170\u20133180","DOI":"10.1093\/ietcom\/e90-b.11.3170"},{"key":"224_CR19","doi-asserted-by":"crossref","unstructured":"Waldrop J, Engels DW, Sarma SE (2003) Colorwave: an anticollision algorithm for the reader collision problem. In: Proceedings of the IEEE international conference on communications, pp 1206\u20131210","DOI":"10.1109\/ICC.2003.1204562"},{"key":"224_CR20","unstructured":"Wang X,Kar K (2005) Throughput modeling and fairness issues in CSMA\/CA based ad-hoc networks. In: Proceedings of the 24th annual joint conference on IEEE computer and communications societies (INFOCOM 2005), pp 23\u201334, 002E"},{"key":"224_CR21","unstructured":"You T, Hassanein H, Yeh C-H (2005) PIDC\u2014towards an ideal MAC protocol for multi-hop wireless LANs. In: Proceedings of the IEEE international conference on wireless networks, communications and mobile computing, pp 655\u2013660"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-009-0224-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-009-0224-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-009-0224-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T06:28:53Z","timestamp":1559111333000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-009-0224-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4,17]]},"references-count":21,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2009,10]]}},"alternative-id":["224"],"URL":"https:\/\/doi.org\/10.1007\/s00779-009-0224-9","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,4,17]]}}}