{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:29:31Z","timestamp":1761611371343},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,5,1]],"date-time":"2015-05-01T00:00:00Z","timestamp":1430438400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s11036-015-0597-0","type":"journal-article","created":{"date-parts":[[2015,4,30]],"date-time":"2015-04-30T06:08:03Z","timestamp":1430374083000},"page":"356-362","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["An Efficient RFID Search Protocol Based On Clouds"],"prefix":"10.1007","volume":"20","author":[{"given":"Daqiang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yuming","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Jiafu","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Shengjie","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,1]]},"reference":[{"issue":"5","key":"597_CR1","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1002\/wcm.972","volume":"12","author":"W Yoon","year":"2012","unstructured":"Yoon W, Vaidya N (2012) RFID reader collision problem: performance analysis and medium access. Wirel Commun Mob Comput 12(5):420\u2013430","journal-title":"Wirel Commun Mob Comput"},{"key":"597_CR2","doi-asserted-by":"crossref","unstructured":"Xia F, Asabere N, Liu H, Chen Z, Wang W (2014) Socially-aware conference participant recommendation with personality traits. IEEE Syst J. doi: 10.1109\/JSYST.2014.2342375","DOI":"10.1109\/JSYST.2014.2342375"},{"issue":"1","key":"597_CR3","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1109\/JSYST.2013.2265162","volume":"8","author":"X Wang","year":"2014","unstructured":"Wang X, Chen M (2014) PreFeed: cloud-based content prefetching of feed subscriptions for mobile users. IEEE Syst J 8(1):202\u2013207","journal-title":"IEEE Syst J"},{"issue":"5","key":"597_CR4","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MNET.2013.6616110","volume":"27","author":"T Taleb","year":"2013","unstructured":"Taleb T, Ksentini A (2013) Follow me cloud: interworking federated clouds & distributed mobile networks. IEEE Network Magazine 27(5):12\u201319","journal-title":"IEEE Network Magazine"},{"issue":"5","key":"597_CR5","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MNET.2013.6485088","volume":"27","author":"M Chen","year":"2013","unstructured":"Chen M, Wen Y, Jin H, Leung V (2013) Cloud-assisted mobile computing and pervasive services. IEEE Netw 27(5):4\u20135","journal-title":"IEEE Netw"},{"issue":"2","key":"597_CR6","first-page":"547","volume":"6","author":"D Zhang","year":"2012","unstructured":"Zhang D, Wan J, Liu Q, Guan X, Liang X (2012) A taxonomy of agent technologies for ubiquitous computing environments. KSII Transactions on Internet and Information Systems 6(2):547\u2013565","journal-title":"KSII Transactions on Internet and Information Systems"},{"issue":"4","key":"597_CR7","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MNET.2013.6574659","volume":"27","author":"M Chen","year":"2013","unstructured":"Chen M, Wen Y, Jin H, Leung V (2013) Enabling technologies for future data center networking: a primer. IEEE Netw 27(4):8\u201315","journal-title":"IEEE Netw"},{"issue":"5","key":"597_CR8","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.jnca.2014.03.007","volume":"42","author":"P Pirozmand","year":"2014","unstructured":"Pirozmand P, Wu G, Jedari B, Xia F (2014) Human mobility in opportunistic networks: characteristics, models and prediction methods. J Netw Comput Appl 42(5):45\u201358","journal-title":"J Netw Comput Appl"},{"issue":"4","key":"597_CR9","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1109\/JSYST.2012.2192755","volume":"6","author":"M Anastasopoulos","year":"2012","unstructured":"Anastasopoulos M, Taleb T, Obaidat M, Cottis P (2012) Feedback suppression in multicast satellite networks using game theory. IEEE Syst J 6(4):657\u2013666","journal-title":"IEEE Syst J"},{"issue":"8","key":"597_CR10","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MCOM.2014.6871677","volume":"52","author":"J Wan","year":"2014","unstructured":"Wan J, Zhang D, Zhao S, Yang L, Lloret J (2014) Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutionsy. IEEE Commun Mag 52(8):106\u2013113","journal-title":"IEEE Commun Mag"},{"key":"597_CR11","doi-asserted-by":"crossref","unstructured":"Mell P, Grance T (2011). The NIST definition of cloud computing. U.S. Department of Commerce","DOI":"10.6028\/NIST.SP.800-145"},{"issue":"1","key":"597_CR12","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s13174-010-0007-6","volume":"1","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. Journal of internet services and applications 1(1):7\u201318","journal-title":"Journal of internet services and applications"},{"issue":"4","key":"597_CR13","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, et al. (2010) A view of cloud computing. Commun ACM 53(4):50\u201358","journal-title":"Commun ACM"},{"issue":"1","key":"597_CR14","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MNET.2014.6724100","volume":"28","author":"D Zhang","year":"2014","unstructured":"Zhang D, Xiong H, Hsu C, Vasilakos A (2014) BASA: building mobile ad-hoc social networks on top of android. IEEE Netw 28(1):4\u20139","journal-title":"IEEE Netw"},{"issue":"4","key":"597_CR15","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1109\/TPDS.2010.118","volume":"22","author":"D Zhang","year":"2011","unstructured":"Zhang D, Zhou J, Guo M, Cao J, Li T (2011) TASA: tag-free activity sensing using RFID tag arrays. IEEE Transactions on Parallel and Distributed Systems 22(4):558\u2013570","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"9\u201310","key":"597_CR16","doi-asserted-by":"crossref","first-page":"1045","DOI":"10.1007\/s00170-006-0405-x","volume":"32","author":"C Saygin","year":"2007","unstructured":"Saygin C (2007) Adaptive inventory management using RFID data. Int J Adv Manuf Technol 32(9\u201310):1045\u20131051","journal-title":"Int J Adv Manuf Technol"},{"key":"597_CR17","doi-asserted-by":"crossref","unstructured":"Zhang D, Yang L, Chen M, Zhao S, Guo M, Zhang Y (2014) Real-time locating systems using active RFID for internet of things. IEEE Syst J. doi: 10.1109\/JSYST.2014.2346625","DOI":"10.1109\/JSYST.2014.2346625"},{"issue":"2","key":"597_CR18","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.ejor.2007.12.015","volume":"194","author":"H Kim","year":"2009","unstructured":"Kim H, Sohn S (2009) Cost of ownership model for the RFID logistics system applicable to u-city. Eur J Oper Res 194(2):406\u2013417","journal-title":"Eur J Oper Res"},{"key":"597_CR19","unstructured":"Ryumduck O, Park J (2008) A development of active monitoring system for intelligent RFID logistics processing environment. ALPIT\u201908 2008 International Conference on Advanced Language Processing and Web Information Technology, pp 358\u2013361"},{"key":"597_CR20","doi-asserted-by":"crossref","unstructured":"Kim S, Kim D, Park H (2010) Animal situation tracking service using RFID, GPS, and sensors. 2010 Second International Conference on Computer and Network Technology (ICCNT), pp 153\u2013156","DOI":"10.1109\/ICCNT.2010.40"},{"issue":"3","key":"597_CR21","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MITP.2005.69","volume":"7","author":"R Weinstein","year":"2005","unstructured":"Weinstein R (2005) RFID: a technical overview and its application to the enterprise. IT Prof 7(3):27\u201333","journal-title":"IT Prof"},{"key":"597_CR22","doi-asserted-by":"crossref","unstructured":"Michael K, McCathie L (2005) The pros and cons of RFID in supply chain management. ICMB 2005 International Conference on Mobile Business, pp 623\u2013629","DOI":"10.1109\/ICMB.2005.103"},{"issue":"5967","key":"597_CR23","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1126\/science.1183899","volume":"327","author":"R Gebbers","year":"2010","unstructured":"Gebbers R, Adamchuk V (2010) Precision agriculture and food security. Science 327(5967):828\u2013831","journal-title":"Science"},{"issue":"1","key":"597_CR24","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1108\/02640470710729119","volume":"25","author":"S Yu","year":"2007","unstructured":"Yu S (2007) RFID implementation and benefits in libraries. Electron Libr 25(1):54\u201364","journal-title":"Electron Libr"},{"issue":"3","key":"597_CR25","doi-asserted-by":"crossref","first-page":"924","DOI":"10.1109\/TNET.2012.2212454","volume":"21","author":"Y Zheng","year":"2013","unstructured":"Zheng Y, Li M (2013) Fast tag searching protocol for large-scale RFID systems. IEEE\/ACM Trans Networking 21(3):924\u2013934","journal-title":"IEEE\/ACM Trans Networking"},{"key":"597_CR26","doi-asserted-by":"crossref","unstructured":"Chen M, Luo W, Mo Z, Chen S, Fang Y (2013) An efficient tag search protocol in large-scale RFID systems. Proceedings of the 2013 IEEE INFOCOM:899\u2013907","DOI":"10.1109\/INFCOM.2013.6566878"},{"key":"597_CR27","doi-asserted-by":"crossref","unstructured":"Zhou Z, Gupta H, Das S, Zhu X (2007) Slotted scheduled tag access in multi-reader RFID systems. ICNP 2007 IEEE International Conference on Network Protocols, pp 61\u201370","DOI":"10.1109\/ICNP.2007.4375837"},{"key":"597_CR28","doi-asserted-by":"crossref","unstructured":"Tang S, Wang C, Li M, Jiang C (2011) Reader activation scheduling in multi-reader RFID systems: a study of general case. 2011 IEEE International on Parallel & Distributed Processing Symposium (IPDPS), pp 1147\u20131155","DOI":"10.1109\/IPDPS.2011.109"},{"key":"597_CR29","unstructured":"Chun J, Hwang J, Lee D (2011) Privacy-enhanced RFID tag search system. INTECH Open Access Publisher"},{"issue":"2","key":"597_CR30","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels A (2006) RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 24(2):381\u2013394","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"4","key":"597_CR31","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1080\/15427951.2004.10129096","volume":"1","author":"A Broder","year":"2004","unstructured":"Broder A, Mitzenmacher M (2004) Network applications of bloom filters: a survey. Internet Math 1(4):485\u2013509","journal-title":"Internet Math"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-015-0597-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-015-0597-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-015-0597-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T23:17:49Z","timestamp":1559344669000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-015-0597-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,1]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["597"],"URL":"https:\/\/doi.org\/10.1007\/s11036-015-0597-0","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,1]]}}}