{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T23:26:14Z","timestamp":1705188374945},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,2,3]],"date-time":"2011-02-03T00:00:00Z","timestamp":1296691200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Technol Manag"],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1007\/s10799-011-0085-6","type":"journal-article","created":{"date-parts":[[2011,2,2]],"date-time":"2011-02-02T05:59:26Z","timestamp":1296626366000},"page":"253-272","source":"Crossref","is-referenced-by-count":3,"title":["Managing RFID events in large-scale distributed RFID infrastructures"],"prefix":"10.1007","volume":"12","author":[{"given":"Kaushik","family":"Dutta","sequence":"first","affiliation":[]},{"given":"Debra","family":"VanderMeer","sequence":"additional","affiliation":[]},{"given":"Krithi","family":"Ramamritham","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,2,3]]},"reference":[{"key":"85_CR1","doi-asserted-by":"crossref","unstructured":"Babu S, Widom J (2001) Continuous queries over data streams. SIGMOD Record 30(3):109\u2013120. doi: 10.1145\/603867.603884","DOI":"10.1145\/603867.603884"},{"key":"85_CR2","doi-asserted-by":"crossref","unstructured":"Bai Y, Wang F, Liu P, Zaniolo C, Liu S (2007) Rfid data processing with a data stream query language. In: Proceedings of the 23rd international conference on data engineering, pp 1184\u20131193. doi: 10.1109\/ICDE.2007.368977","DOI":"10.1109\/ICDE.2007.368977"},{"key":"85_CR3","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1109\/TC.1986.1676819","volume":"35","author":"R Bryant","year":"1986","unstructured":"Bryant R (1986) Graph-based algorithms for boolean function manipulation. IEEE Trans Comput 35:677\u2013691","journal-title":"IEEE Trans Comput"},{"issue":"3","key":"85_CR4","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1016\/0377-2217(92)90077-M","volume":"60","author":"DG Cattrysse","year":"1992","unstructured":"Cattrysse DG, Van Wassenhove LN (1992) A survey of algorithms for the generalized assignment problem. Eur J Oper Res 60(3):260\u2013272","journal-title":"Eur J Oper Res"},{"key":"85_CR5","doi-asserted-by":"crossref","unstructured":"Chakravarthy S (1997) Sentinel: an object-oriented dbms with event-based rules. In: SIGMOD \u201997: proceedings of the 1997 ACM SIGMOD international conference on management of data, ACM Press, New York, NY, USA, pp 572\u2013575. doi: 10.1145\/253260.253409","DOI":"10.1145\/253260.253409"},{"key":"85_CR6","doi-asserted-by":"crossref","unstructured":"Chakravarthy S, Le R, Dasari R (1999) Eca rule processing in distributed and heterogeneous environments. In: Proceedings of the international symposium on distributed objects and applications. Edinburgh, UK, pp 330\u2013339","DOI":"10.1109\/DOA.1999.794056"},{"key":"85_CR7","doi-asserted-by":"crossref","unstructured":"Chawathe S, Krishnamurthy V, Ramachandrany S, Sarma S (2004) Managing rfid data. In: Proceedings of the 30th VLDB conference, Toronto, Canada, pp 1189\u20131195","DOI":"10.1016\/B978-012088469-8.50104-2"},{"key":"85_CR8","doi-asserted-by":"crossref","unstructured":"Cheong T, Kim Y (2005) Rfid data management and rfid information value chain support with rfid middleware platform implementation. In: Proceedings of on the move to meaningful internet systems 2005: CoopIS, DOA, and ODBASE, Agia Napa, Cyprus, pp 557\u2013575","DOI":"10.1007\/11575771_35"},{"issue":"2","key":"85_CR9","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/s10799-007-0010-1","volume":"8","author":"J Curtin","year":"2007","unstructured":"Curtin J, Kauffman R, Riggins F (2007) Making the \u2018most\u2019 out of rfid technology: a research agenda for the study of the adoption, usage and impact of rfid. Inf Technol Manage 8(2):87\u2013110","journal-title":"Inf Technol Manage"},{"issue":"5","key":"85_CR10","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1111\/j.1937-5956.2007.tb00284.x","volume":"16","author":"D Delen","year":"2007","unstructured":"Delen D, Hardgrave B, Sharda R (2007) Rfid for better supply-chain management through enhanced visibility. Product Oper Manag 16(5):613\u2013624","journal-title":"Product Oper Manag"},{"key":"85_CR11","doi-asserted-by":"crossref","unstructured":"Derakhshan R, Orlowska M, Li X (2007) Rfid data management: challenges and opportunities. In: Proceedings of the 2007 international conference on RFID, Grapevine, TX, pp 175\u2013182","DOI":"10.1109\/RFID.2007.346166"},{"issue":"5","key":"85_CR12","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1111\/j.1937-5956.2007.tb00286.x","volume":"16","author":"A Dutta","year":"2007","unstructured":"Dutta A, Lee H, Whang S (2007) Rfid and operations management: technology, value, and incentives. Product Oper Manag 16(5):646\u2013655","journal-title":"Product Oper Manag"},{"key":"85_CR13","unstructured":"Dutta K, Ramamritham K, Karthik B, Laddhad K (2007b) Real-time event handling in an rfid middleware system. In: Proceedings of 5th international workshop in databases in networked information systems, Springer, Lecture Notes in Computer Science, vol 4777"},{"key":"85_CR14","doi-asserted-by":"crossref","first-page":"1095","DOI":"10.1287\/mnsc.32.9.1095","volume":"32","author":"M Fisher","year":"1986","unstructured":"Fisher M, Jaikumar R, Wassenhove LV (1986) A multiple adjustment method for the generalized assignment problem. Manage Sci 32:1095\u20131103","journal-title":"Manage Sci"},{"key":"85_CR15","doi-asserted-by":"crossref","unstructured":"Floerkemeier C, Lampe M (2005) Rfid middleware design: addressing application requirements and rfid constraints. In: sOc-EUSAI \u201905: proceedings of the 2005 joint conference on Smart objects and ambient intelligence, ACM, New York, NY, USA, pp 219\u2013224. doi: 10.1145\/1107548.1107603","DOI":"10.1145\/1107548.1107603"},{"issue":"1","key":"85_CR16","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1111\/j.1937-5956.2007.tb00166.x","volume":"16","author":"G Gaukle","year":"2007","unstructured":"Gaukle G, Seifert R, Hausman W (2007) Item-level rfid in the retail supply chain. Product Oper Manag 16(1):65\u201376","journal-title":"Product Oper Manag"},{"key":"85_CR17","volume-title":"RFID essentials","author":"B Glover","year":"2006","unstructured":"Glover B, Bhatt H (2006) RFID essentials. O\u2019Reilly Media, Inc, Sebastopol"},{"key":"85_CR18","doi-asserted-by":"crossref","unstructured":"Gonzalez H, Han J, Li X, Klabjan D (2006) Warehousing and analyzing massive rfid data sets. In: Proceedings of the 22nd international conference on data engineering (ICDE\u201906), p 85","DOI":"10.1109\/ICDE.2006.171"},{"issue":"4","key":"85_CR19","doi-asserted-by":"crossref","first-page":"658","DOI":"10.1287\/opre.37.4.658","volume":"37","author":"M Guignard","year":"1989","unstructured":"Guignard M, Rosenwein M (1989) An improved dual based algorithm for the generalized assignment problem. Oper Res 37(4):658\u2013663","journal-title":"Oper Res"},{"key":"85_CR20","unstructured":"IBM (2007) Websphere rfid premises server. http:\/\/www-306.ibm.com\/software\/integration\/ws_rfid_premises_server\/ , last accessed: November 2007"},{"key":"85_CR21","unstructured":"ILOG Inc (2009) Ilog cplex: a high performance software for mathematical programming and optimization. http:\/\/www.ilog.com\/products\/cplex"},{"key":"85_CR22","unstructured":"Jeffery S, Garofalakis M, Franklin M (2006) Adaptive cleaning for rfid data streams. In: Proceedings of the 32nd international conference on very large data bases, Seoul, Korea, pp 175\u2013186"},{"key":"85_CR23","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/s00778-007-0084-8","volume":"17","author":"S Jeffrey","year":"2008","unstructured":"Jeffrey S, Franklin M, Garofalakis M (2008) An adaptive rfid middleware for supporting metaphysical data independence. VLDB J 17:265\u2013289","journal-title":"VLDB J"},{"key":"85_CR24","doi-asserted-by":"crossref","unstructured":"Jelasity M, Preuss M (2002) On obtaining global information in a peer-to-peer fully distributed environment. In: Proceedings of the 8th international euro-par conference, Paderborn, Germany, pp 205\u2013220","DOI":"10.1007\/3-540-45706-2_78"},{"key":"85_CR25","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1109\/TPDS.2003.1189583","volume":"14","author":"AM Kermarrec","year":"2003","unstructured":"Kermarrec AM, Massouli L, Ganesh AJ (2003) Probabilistic reliable dissemination in large-scale systems. IEEE Trans Parallel Distrib Syst 14:248\u2013258","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"4","key":"85_CR26","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1109\/69.790816","volume":"11","author":"L Liu","year":"1999","unstructured":"Liu L, Pu C, Tang W (1999) Continual queries for internet scale event-driven information delivery. IEEE Trans Knowl Data Eng 11(4):610\u2013628","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"85_CR27","doi-asserted-by":"crossref","unstructured":"Nagargadde A, Varadarajan S, Ramamritham K (2005) Semantic characterization of real world events. In: DASFAA, pp 675\u2013687","DOI":"10.1007\/11408079_62"},{"issue":"5","key":"85_CR28","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1111\/j.1937-5956.2007.tb00280.x","volume":"16","author":"E Ngai","year":"2007","unstructured":"Ngai E, Cheng T, Lai KH, Chai P, Choi Y, Lin R (2007) Development of an rfid-based traceability system: experiences and lessons learned from an aircraft engineering company. Product Oper Manag 16(5):554\u2013568","journal-title":"Product Oper Manag"},{"key":"85_CR29","unstructured":"Papamarkos G, Poulovassilis R, Wood P (2003) Event-condition-action rule languages for the semantic web. In: Proceedings of the workshop on semantic web and databases, pp 309\u2013327"},{"issue":"1","key":"85_CR30","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/311531.311623","volume":"31","author":"N Paton","year":"1999","unstructured":"Paton N, Diaz O (1999) Active database systems. ACM Comput Surv 31(1):63\u2013103","journal-title":"ACM Comput Surv"},{"key":"85_CR31","unstructured":"Rao J, Doraiswamy S, Thakkar H, Colby L (2006) A deferred cleansing method for rfid data analytics. In: Proceedings of the 32nd international conference on very large data bases, Seoul, Korea, pp 175\u2013186"},{"key":"85_CR32","doi-asserted-by":"crossref","unstructured":"Saygin C, Sarangapani J, Grasman S (2007) Trends in supply chain design and management, Springer, London, chap A systems approach to viable RFID implementation in the supply chain, pp 3\u201327","DOI":"10.1007\/978-1-84628-607-0_1"},{"key":"85_CR33","unstructured":"TIBCO Software Inc (2009) Tibco rendezvous. http:\/\/www.tibco.com\/software\/messaging\/rendezvous\/default.jsp"},{"key":"85_CR34","doi-asserted-by":"crossref","unstructured":"Wang F, Liu S, Liu P, Bai Y (2006) Bridging physical and virtual worlds: complex event processing for rfid data streams. In: Proceedings of advances in database technology\u2014EDBT 2006, Munich, Germany, pp 588\u2013607","DOI":"10.1007\/11687238_36"},{"key":"85_CR35","doi-asserted-by":"crossref","unstructured":"Zhao X, Jin B, Yu S, Long Z (2008) Composite subscription and matching algorithm for rfid applications. In: Advanced information networking and applications, 2008 AINA 2008 22nd international conference on pp 122\u2013129. doi: 10.1109\/AINA.2008.49","DOI":"10.1109\/AINA.2008.49"}],"container-title":["Information Technology and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-011-0085-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10799-011-0085-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10799-011-0085-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T08:23:52Z","timestamp":1559982232000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10799-011-0085-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2,3]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,9]]}},"alternative-id":["85"],"URL":"https:\/\/doi.org\/10.1007\/s10799-011-0085-6","relation":{},"ISSN":["1385-951X","1573-7667"],"issn-type":[{"value":"1385-951X","type":"print"},{"value":"1573-7667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,2,3]]}}}