{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T12:08:22Z","timestamp":1773144502630,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,5,31]],"date-time":"2011-05-31T00:00:00Z","timestamp":1306800000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1007\/s00779-011-0397-x","type":"journal-article","created":{"date-parts":[[2011,5,30]],"date-time":"2011-05-30T06:19:09Z","timestamp":1306736349000},"page":"259-269","source":"Crossref","is-referenced-by-count":1,"title":["X-CleLo: intelligent deterministic RFID data and event transformer"],"prefix":"10.1007","volume":"16","author":[{"given":"Peter","family":"Darcy","sequence":"first","affiliation":[]},{"given":"Bela","family":"Stantic","sequence":"additional","affiliation":[]},{"given":"Abdul","family":"Sattar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,5,31]]},"reference":[{"key":"397_CR1","doi-asserted-by":"crossref","unstructured":"Derakhshan R, Orlowska ME, Li X (2007) RFID data management: challenges and opportunities. In: RFID 2007. pp 175 \u2013182","DOI":"10.1109\/RFID.2007.346166"},{"key":"397_CR2","unstructured":"Swedberg C (2005) Hospital uses RFID for surgical patients. RFID J. http:\/\/www.rfidjournal.com\/article\/articleview\/1714\/1\/1\/"},{"key":"397_CR3","doi-asserted-by":"crossref","unstructured":"Darcy P, Stantic B, Sattar A (2009) A fusion of data analysis and non-monotonic reasoning to restore missed RFID readings. In: Intelligent sensors, sensor networks and information processing (ISSNIP). pp 313\u2013318","DOI":"10.1109\/ISSNIP.2009.5416745"},{"key":"397_CR4","doi-asserted-by":"crossref","unstructured":"Darcy P, Stantic B, Sattar A (2010) Correcting missing data anomalies with clausal defeasible logic. In: advances in databases and information systems (ADBIS 2010). pp 149\u2013163","DOI":"10.1007\/978-3-642-15576-5_13"},{"key":"397_CR5","doi-asserted-by":"crossref","unstructured":"Cocci R, Tran T, Diao Y, Shenoy PJ (2008) Efficient data interpretation and compression over RFID streams. In: ICDE. pp 1445\u20131447. IEEE","DOI":"10.1109\/ICDE.2008.4497584"},{"key":"397_CR6","unstructured":"Wang F, Liu P (2005) Temporal management of RFID data. In: VLDB. pp 1128\u20131139"},{"key":"397_CR7","doi-asserted-by":"crossref","unstructured":"Darcy P, Stantic B, Mitrokotsa A, Sattar A (2010) Detecting intrusions within RFID systems through non-monotonic reasoning cleaning. In: Intelligent sensors, sensor networks and information processing (ISSNIP). pp 257\u2013262","DOI":"10.1109\/ISSNIP.2010.5706753"},{"key":"397_CR8","doi-asserted-by":"crossref","unstructured":"Floerkemeier C, Lampe M (2004) Issues with RFID usage in ubiquitous computing applications. In: Ferscha A, Mattern F (eds) Pervasive computing: second international conference, PERVASIVE 2004, 3001. Springer-Verlag, Linz\/Vienna, Austria, pp 188\u2013193","DOI":"10.1007\/978-3-540-24646-6_13"},{"key":"397_CR9","unstructured":"Jeffery SR, Garofalakis MN, Franklin MJ (2006) Adaptive cleaning for RFID data streams. In: VLDB. pp 163\u2013174"},{"key":"397_CR10","doi-asserted-by":"crossref","unstructured":"Billington D (2008) Propositional clausal defeasible logic. In: European conference on logics in artificial intelligence (JELIA). pp 34\u201347","DOI":"10.1007\/978-3-540-87803-2_5"},{"key":"397_CR11","unstructured":"Billington D (2007) An introduction to clausal defeasible logic [online]. David Billington\u2019s Home Page. http:\/\/www.cit.gu.edu.au\/\u223cdb\/research.pdf"},{"issue":"1","key":"397_CR12","doi-asserted-by":"crossref","first-page":"376","DOI":"10.14778\/1453856.1453900","volume":"1","author":"L Golab","year":"2008","unstructured":"Golab L, Karloff H, Korn F, Srivastava D, Yu B (2008) On generating near-optimal tableaux for conditional functional dependencies. VLDB Endow 1(1):376\u2013390","journal-title":"VLDB Endow"},{"issue":"3","key":"397_CR13","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1145\/1093382.1093385","volume":"30","author":"J Wijsen","year":"2005","unstructured":"Wijsen J (2005) Database repairing using updates. ACM Trans Database Syst 30(3):722\u2013768","journal-title":"ACM Trans Database Syst"},{"key":"397_CR14","doi-asserted-by":"crossref","unstructured":"R\u00e9 C, Letchner J, Balazinksa M, Suciu D (2008) Event queries on correlated probabilistic streams. In: SIGMOD \u201908: proceedings of the 2008 ACM SIGMOD international conference on management of data. ACM, New York, NY, USA, pp 715\u2013728","DOI":"10.1145\/1376616.1376688"},{"key":"397_CR15","doi-asserted-by":"crossref","unstructured":"Tran T, Sutton C, Cocci R, Nie Y, Diao Y, Shenoy P (2009) Probabilistic inference over RFID streams in mobile environments. In: ICDE \u201909: proceedings of the 2009 IEEE international conference on data engineering. IEEE Computer Society, Washington, DC, USA, pp 1096\u20131107","DOI":"10.1109\/ICDE.2009.33"},{"key":"397_CR16","doi-asserted-by":"crossref","unstructured":"Xie J, Yang J, Chen Y, Wang H, Yu PS (2008) A sampling-based approach to information recovery. In: ICDE \u201908: proceedings of the 2008 IEEE 24th international conference on data engineering. IEEE Computer Society, Washington, DC, USA, pp 476\u2013485","DOI":"10.1109\/ICDE.2008.4497456"},{"key":"397_CR17","unstructured":"Rao J, Doraiswamy S, Thakkar H, Colby LS (2006) A deferred cleansing method for RFID data analytics. In: VLDB. pp 175\u2013186"},{"key":"397_CR18","doi-asserted-by":"crossref","unstructured":"Patterson DJ, Liao L, Fox D, Kautz HA (2003) Inferring high-level behavior from low-level sensors. In: Ubicomp. pp 73\u201389","DOI":"10.1007\/978-3-540-39653-6_6"},{"key":"397_CR19","doi-asserted-by":"crossref","unstructured":"Philipose M, Fishkin KP, Perkawitz M, Patterson DJ, Fox D, Kautz H, Hahnel D (2004) Inferring activities from interactions with objects. Pervasive Comput 10\u201317","DOI":"10.1109\/MPRV.2004.7"},{"key":"397_CR20","doi-asserted-by":"crossref","unstructured":"Khoussainova N, Balazinska M, Suciu D (2008) PEEX: extracting probabilistic events from RFID data. In: In ICDE","DOI":"10.1109\/ICDE.2008.4497596"},{"key":"397_CR21","unstructured":"Khoussainova N, Balazinska M, Suciu D (2007) Probabilistic RFID data management. UW CSE Technical Report UW-CSE-07-03-01"},{"issue":"3","key":"397_CR22","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1016\/j.pmcj.2009.10.001","volume":"6","author":"F Wang","year":"2009","unstructured":"Wang F, Liu S, Liu P (2009) A temporal RFID data model for querying physical objects. Pervasive Mob Comput 6(3):382\u2013397","journal-title":"Pervasive Mob Comput"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0397-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-011-0397-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0397-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T08:41:20Z","timestamp":1560242480000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-011-0397-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,31]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["397"],"URL":"https:\/\/doi.org\/10.1007\/s00779-011-0397-x","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,5,31]]}}}