{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:21:54Z","timestamp":1742379714426},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,2,3]],"date-time":"2010-02-03T00:00:00Z","timestamp":1265155200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2011,2]]},"DOI":"10.1007\/s11036-010-0226-x","type":"journal-article","created":{"date-parts":[[2010,2,2]],"date-time":"2010-02-02T13:00:03Z","timestamp":1265115603000},"page":"71-80","source":"Crossref","is-referenced-by-count":9,"title":["On Object Identification Reliability Using RFID"],"prefix":"10.1007","volume":"16","author":[{"given":"Chonggang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Mahmoud","family":"Daneshmand","sequence":"additional","affiliation":[]},{"given":"Kazem","family":"Sohraby","sequence":"additional","affiliation":[]},{"given":"Rittwik","family":"Jana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,2,3]]},"reference":[{"key":"226_CR1","doi-asserted-by":"crossref","DOI":"10.1002\/0470868023","volume-title":"RFID-handbook","author":"K Finkenzeller","year":"2003","unstructured":"Finkenzeller K (2003) RFID-handbook, 2nd edn. Wiley, New York","edition":"2"},{"key":"226_CR2","unstructured":"Zhou Z, Gupta H, Das S, Zhu X (2006) Fast reading of RFID tags in multi-reader systems, under submission. http:\/\/www.cs.sunysb.edu\/~hgupta\/ps\/rfid.pdf"},{"key":"226_CR3","unstructured":"Engels DW, Sarma SE (2002) The reader collision problem. In: Proc of IEEE international conference on systems, man and cybernetics (SMC\u201902)"},{"issue":"4","key":"226_CR4","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MP.2005.1549751","volume":"24","author":"J Landt","year":"2005","unstructured":"Landt J (2005) The history of RFID. IEEE Potentials 24(4):8\u201311","journal-title":"IEEE Potentials"},{"key":"226_CR5","volume-title":"Proc of the 1st international conference on availability, reliability and security (ARES\u201906)","author":"S Inoue","year":"2006","unstructured":"Inoue S, Hagiwara D, Yasuura H (2006) Systematic error detection for RFID reliability. In: Proc of the 1st international conference on availability, reliability and security (ARES\u201906). Vienna University of Technology, Austria"},{"key":"226_CR6","unstructured":"Gonzalez H, Han J, Li X (2006) FlowCube: constructing RFID flowCubes for multi-dimensional analysis of commodity flows. In: Proc of the 32th international conference on very large data bases (VLDB\u201906). Seoul, Korea"},{"key":"226_CR7","unstructured":"Ukkonen L, Engels D, Sydanheimo L, Kivikoski M (2005) Reliability of passive RFID of multiple objects using folded microstrip patch-type tag antenna. In: Proc of IEEE antennas and propagation society international symposium. Washington, DC, USA"},{"key":"226_CR8","unstructured":"EPCglobal Specification for RFID Air Interface (2005) EPCTM\u00a0radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz\u2013960 MHz, ver\u00a01.0.9. http:\/\/www.epcglobalinc.org"},{"key":"226_CR9","doi-asserted-by":"crossref","unstructured":"Jeffery SR, Alonso G, Franklin MJ, Hong W, Widom J (2006) A pipelined framework for online cleansing of sensor data streams. In: Proc of the 22nd IEEE international conference on data engineering (ICDE\u201906) (Poster Paper). Atlanta, Georgia, USA","DOI":"10.1109\/ICDE.2006.8"},{"issue":"6","key":"226_CR10","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1023\/B:WINE.0000044029.06344.dd","volume":"10","author":"LM Ni","year":"2004","unstructured":"Ni LM, Liu Y, Lau YC, Patil A (2004) LANDMARC: indoor location sensing using active RFID. Wirel Netw 10(6):701\u2013710","journal-title":"Wirel Netw"},{"issue":"5","key":"226_CR11","doi-asserted-by":"crossref","first-page":"1096","DOI":"10.1109\/TMM.2006.879817","volume":"8","author":"J Myung","year":"2006","unstructured":"Myung J, Lee W, Shih TK (2006) An adaptive memoryless protocol for RFID tag collision arbitration. IEEE Trans Multimedia 8(5):1096\u20131101","journal-title":"IEEE Trans Multimedia"},{"key":"226_CR12","doi-asserted-by":"crossref","unstructured":"Law C, Lee K, Siu K-Y (2000) Efficient memoryless protocol for tag identification. In: Proc of the 4th international workshop on discrete algorithms and methods for mobile computing and communications (DIALM\u201900). Boston, Massachusetts, USA, pp 75\u201384","DOI":"10.1145\/345848.345865"},{"key":"226_CR13","doi-asserted-by":"crossref","unstructured":"Kodialam M, Nandagopal T (2006) Fast and reliable estimation schemes in RFID systems. In: Proc of ACM mobiCom\u201906. Los Angeles, California, USA, 23\u201326 Sept 2006","DOI":"10.1145\/1161089.1161126"},{"key":"226_CR14","unstructured":"Cha J-R, Kim J-H (2006) Dynamic framed slotted ALOHA algorithms using fast tag estimation methods for RFID system. In: Proc of the 3rd IEEE consumer communications and networking conference (CCNC\u201906). Las Vegas, Nevada, USA"},{"key":"226_CR15","unstructured":"Lee S-R, Joo S-D, Lee C-W (2005) An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification. In: Proc of the 2nd annual international conference on mobile and ubiquitous systems: networking and services (MobiQuitous\u201905). San Diego, California, USA"},{"key":"226_CR16","doi-asserted-by":"crossref","unstructured":"Khandelwal G, Yener A, Lee K, Serbetli S (2006) ASAP: a MAC protocol for dense and time constrained RFID systems. In: Proc of IEEE ICC 2006. Istanbul, Turkey","DOI":"10.1109\/ICC.2006.255711"},{"key":"226_CR17","doi-asserted-by":"crossref","unstructured":"Vogt H (2002) Efficient object identification with passive RFID tags. In: Proc of international conference on pervasive computing. Zurich, Switzerland","DOI":"10.1007\/3-540-45866-2_9"},{"key":"226_CR18","unstructured":"Bonuccelli MA, Lonetti F, Martelli F (2006) Tree slotted ALOHA: a new protocol for tag identification in RFID networks. In: Proc of the 2006 international symposium on a world of wireless, mobile and multimedia networks (WoWMoM\u201906). Buffalo, New York, USA"},{"key":"226_CR19","unstructured":"Harting Mitronics Inc (2009) http:\/\/www.harting-mitronics.ch\/"},{"key":"226_CR20","unstructured":"Draft Protocol Specification for a 900 MHz Class 0 Radio Frequency Identification Tag (2003) MIT auto-ID center. http:\/\/www.epcglobalinc.org"},{"key":"226_CR21","doi-asserted-by":"crossref","unstructured":"Law C, Lee K, Siu K-Y (2000) Efficient memoryless protocol for tag identification. In: Proc of the 4th international workshop on discrete algorithms and methods for mobile computing and communications (DIALM). Boston, Massachusetts, USA, pp\u00a075\u201384","DOI":"10.1145\/345848.345865"},{"key":"226_CR22","unstructured":"Vaidya N, Das SR (2006) RFID-based networks - exploiting diversity and redundancy, WINGS lab technical report. http:\/\/www.cs.sunysb.edu\/~samir\/Pubs\/rfid-vision.pdf"},{"key":"226_CR23","doi-asserted-by":"crossref","unstructured":"Rahmati A, Zhong L, Hiltunen MA, Jana R (2007) Reliability techniques for RFID-based object tracking applications. In: Proc of DSN 2007. Edinburgh, UK, pp\u00a0113\u2013118","DOI":"10.1109\/DSN.2007.81"},{"key":"226_CR24","unstructured":"Kim J, et al (2005) Effect of localized optimal clustering for reader anti-collision in RFID networks: fairness aspects to the readers. In: Proc of the 14th international conference on computer communications and networks (ICCCN\u201905), San Diego, California, USA, 17\u201319, Oct 2005"},{"key":"226_CR25","unstructured":"Carbunar B, et al (2005) Redundant reader elimination in RFID systems. In: Proc of IEEE SECON 2005. Santa Clara, California, USA"},{"key":"226_CR26","unstructured":"ETSI EN 302 208-1 v1.1.1 (2004) September 2004. CTAN: http:\/\/www.etsi.org"},{"key":"226_CR27","unstructured":"ETSI EN 302 208-2 v1.1.1 (2004) September 2004. CTAN: http:\/\/www.etsi.org"},{"key":"226_CR28","unstructured":"Leong KS, Ng ML, Grasso AR, Cole PH (2006) Synchronization of RFID readers for dense RFID reader environments. In: Proc of the international symposium on applications and the internet workshops (SAINTW\u201906). Phoenix, Arizona, USA"},{"key":"226_CR29","doi-asserted-by":"crossref","unstructured":"Jain S, Das SR (2006) Collision avoidance in a dense RFID network. In: Proc of ACM WiNTECH\u201906. Los Angeles, California, USA","DOI":"10.1145\/1160987.1160997"},{"key":"226_CR30","doi-asserted-by":"crossref","unstructured":"Kim S, Lee S, An S (2006) Reader collision avoidance mechanism in ubiquitous sensor and RFID networks. In: Proc of ACM WiNTECH\u201906. Los Angeles, California, USA","DOI":"10.1145\/1160987.1161011"},{"key":"226_CR31","unstructured":"Ho J, Engels DW, Sarma SE (2006) HiQ: a hierarchical Q-learning algorithm to solve the reader collision problem. In: Proc of the international symposium on applications and the internet workshops (SAINTW\u201906). Phoenix, Arizona, USA"},{"key":"226_CR32","doi-asserted-by":"crossref","unstructured":"Birari SM, Iyer S (2005) PULSE: a MAC protocol for RFID networks. In: Proc of the 1st international workshop on RFID and ubiquitous sensor networks (USN\u20192005). Nagasaki, Japan","DOI":"10.1007\/11596042_106"},{"key":"226_CR33","unstructured":"Waldrop J, Engels DW, Sarma SE (2003) Colorwave: a MAC for RFID reader networks. In: Proc of IEEE wireless communications and networking conference (WCNC\u201903). New Orleans, Louisiana, USA"},{"key":"226_CR34","doi-asserted-by":"crossref","unstructured":"Jeffery SR, Alonso G, Franklin MJ, Hong W, Widom J (2006) A pipelined framework for online cleansing of sensor data streams. In: Proc of the 22nd IEEE international conference on data engineering (ICDE\u201906) (Poster Paper). Atlanta, Georgia, USA","DOI":"10.1109\/ICDE.2006.8"},{"key":"226_CR35","unstructured":"Jeffery SR, Garofalakis M, Franklin MJ (2006) Adaptive cleansing for RFID data streams. In: Proc of the 32th international conference on very large data bases (VLDB\u201906). Seoul, Korea"},{"key":"226_CR36","unstructured":"Bai Y, Wang F, Liu P (2006) Efficiently filtering RFID data streams. In: Proc of the 1st international VLDB workshop on clean databases (CleanDB\u201906). Seoul, Korea"},{"key":"226_CR37","doi-asserted-by":"crossref","unstructured":"Rahmati A, Hiltunen M, Zhong L, Jana R (2007) Reliability techniques for RFID-based object tracking applications. In: Proc of the IEEE dependable systems and networks","DOI":"10.1109\/DSN.2007.81"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-010-0226-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-010-0226-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-010-0226-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T22:13:13Z","timestamp":1685398393000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-010-0226-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2,3]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,2]]}},"alternative-id":["226"],"URL":"https:\/\/doi.org\/10.1007\/s11036-010-0226-x","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,2,3]]}}}