{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T08:49:16Z","timestamp":1649062156814},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,12,6]],"date-time":"2012-12-06T00:00:00Z","timestamp":1354752000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1007\/s11277-012-0956-0","type":"journal-article","created":{"date-parts":[[2012,12,5]],"date-time":"2012-12-05T19:59:42Z","timestamp":1354737582000},"page":"2587-2603","source":"Crossref","is-referenced-by-count":3,"title":["Maximum Likelihood Approach for RFID Tag Set Cardinality Estimation with Detection Errors"],"prefix":"10.1007","volume":"71","author":[{"given":"Chuyen T.","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Kazunori","family":"Hayashi","sequence":"additional","affiliation":[]},{"given":"Megumi","family":"Kaneko","sequence":"additional","affiliation":[]},{"given":"Petar","family":"Popovski","sequence":"additional","affiliation":[]},{"given":"Hideaki","family":"Sakai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,12,6]]},"reference":[{"key":"956_CR1","doi-asserted-by":"crossref","DOI":"10.1002\/0470868023","volume-title":"RFID handbook: Fundamentals and applications in contactless smart cards and identification","author":"K Finkenzeller","year":"2003","unstructured":"Finkenzeller, K. (2003). RFID handbook: Fundamentals and applications in contactless smart cards and identification. London: Wiley."},{"issue":"1","key":"956_CR2","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1201\/1078\/44912.22.1.20051201\/85739.7","volume":"22","author":"R Angeles","year":"2005","unstructured":"Angeles, R. (2005). RFID technologies: Supply-chain applications and implementations issues. Information Systems Management, 22(1), 51\u201365.","journal-title":"Information Systems Management"},{"key":"956_CR3","doi-asserted-by":"crossref","unstructured":"Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In: Proceedings of the 11th ACM conference on computer and communication, security, pp. 210\u2013219.","DOI":"10.1145\/1030083.1030112"},{"issue":"2","key":"956_CR4","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/MWC.2011.5751295","volume":"18","author":"LM Ni","year":"2011","unstructured":"Ni, L. M., Zhang, D., & Souryal, M. R. (2011). RFID-based localization and tracking technologies. IEEE Wireless Communications Magazine, 18(2), 45\u201351.","journal-title":"IEEE Wireless Communications Magazine"},{"key":"956_CR5","doi-asserted-by":"crossref","unstructured":"Sav\u00edc, V., Athalye, A., Bol\u00edc, M., & Djuric, P. M. (2011). Particle filtering for indoor RFID tag tracking. In: Proceedings of the IEEE statistical signal processing, workshop, pp. 193\u2013196.","DOI":"10.1109\/SSP.2011.5967656"},{"key":"956_CR6","doi-asserted-by":"crossref","DOI":"10.1002\/9780470665251","volume-title":"RFID systems: Research trends and challenges","author":"M Bol\u00edc","year":"2010","unstructured":"Bol\u00edc, M., Simplot-Ryl, D., & Stojmenov\u00edc, I. (2010). RFID systems: Research trends and challenges. London: Wiley."},{"key":"956_CR7","doi-asserted-by":"crossref","unstructured":"Ali, K., & Hassanein, H. (Jan 2009). Passive RFID for intelligent transportation systems. In: Proceedings of the 6th IEEE consumer communications and networking conference, pp. 1\u20132.","DOI":"10.1109\/CCNC.2009.4784903"},{"issue":"9","key":"956_CR8","doi-asserted-by":"crossref","first-page":"1441","DOI":"10.1109\/TPDS.2011.36","volume":"22","author":"C Qian","year":"2011","unstructured":"Qian, C., Ngan, H., Liu, Y., & Ni, L. M. (2011). Cardinality estimation for large-scale RFID systems. IEEE Transactions on Parallel and Distributed Systems, 22(9), 1441\u20131454.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"956_CR9","doi-asserted-by":"crossref","unstructured":"Lu, L., Han, J., Hu, L., Liu, Y., & Ni, L. M. (2007). Dynamic key-updating: Privacy-preserving authentication for RFID systems. In: Proceedings of the annual IEEE international conference on pervasive computing and communications, pp. 13\u201322.","DOI":"10.1109\/PERCOM.2007.13"},{"key":"956_CR10","unstructured":"Sheng, B., Tan, C. C., Li, Q., & Mao, W. (2008). Finding popular categories for RFID tags. In: Proceedings of the ACM mobihoc."},{"key":"956_CR11","doi-asserted-by":"crossref","unstructured":"Vogt, H. (Apr 2002). Efficient object identification with passive RFID tags. In: Proceedings of international conference on pervasive computing, pp. 98\u2013113.","DOI":"10.1007\/3-540-45866-2_9"},{"issue":"4","key":"956_CR12","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1109\/TCOM.1983.1095854","volume":"31","author":"FC Schoute","year":"1983","unstructured":"Schoute, F. C. (1983). Dynamic frame length ALOHA. IEEE Transactions on Communications, 31(4), 565\u2013568.","journal-title":"IEEE Transactions on Communications"},{"issue":"1","key":"956_CR13","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/TASE.2008.917093","volume":"6","author":"W-T Chen","year":"2009","unstructured":"Chen, W.-T. (2009). An accurate tag estimate method for improving the performance of an RFID anticollision algorithm based on dynamic frame length ALOHA. IEEE Transaction on Automation Science and Engineering, 6(1), 9\u201315.","journal-title":"IEEE Transaction on Automation Science and Engineering"},{"key":"956_CR14","unstructured":"Chaves, L. W. F., Buchmann, E., & B\u00f6hm, K. (2008). Tagmark: Reliable estimations of RFID tags for business processes. In: Proceedings of the 14th ACM SIGKDD international conference on knowledge discovery and data mining, pp. 999\u20131007."},{"key":"956_CR15","unstructured":"RFID for Logistic Applications - Test Results, in EPCglobal Inc., 2005."},{"key":"956_CR16","doi-asserted-by":"crossref","unstructured":"Sze, W.-K., Lau, W.-C., & Yue, O.-C. (June 2009). Fast RFID counting under unreliable radio channel. In: Proceedings of the IEEE internation conference in communications, pp. 1\u20135.","DOI":"10.1109\/ICC.2009.5199030"},{"issue":"5","key":"956_CR17","first-page":"1458","volume":"10","author":"VS Mansouri","year":"2011","unstructured":"Mansouri, V. S., & Wong, V. W. S. (2011). Cardinality estimation in RFID systems with multiple readers. IEEE Transactions on Communications, 10(5), 1458\u20131469.","journal-title":"IEEE Transactions on Communications"},{"issue":"7","key":"956_CR18","first-page":"2337","volume":"57","author":"D-Y Kim","year":"2009","unstructured":"Kim, D.-Y., Yoon, H.-G., Jang, B.-J., & Yook, J.-G. (2009). Effects of reader-to-reader interference on the UHF RFID interrogation range. IEEE Transactions on Communications, 57(7), 2337\u20132346.","journal-title":"IEEE Transactions on Communications"},{"key":"956_CR19","doi-asserted-by":"crossref","unstructured":"Jacobsen, R., Nielsen, K. F., Popovski, P., & Larsen, T. (Apr 2009). Reliable identification of RFID tags using multiple independent reader sessions. In: Proceedings of the IEEE international conference on RFID, pp. 64\u201371.","DOI":"10.1109\/RFID.2009.4911187"},{"issue":"4","key":"956_CR20","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MWC.2011.5999767","volume":"18","author":"P Popovski","year":"2011","unstructured":"Popovski, P., Fyhn, K., Jacobsen, R., & Larsen, T. (2011). Robust statistical methods for detection of missing RFID tags. IEEE Wireless Communications, 18(4), 74\u201380.","journal-title":"IEEE Wireless Communications"},{"issue":"3","key":"956_CR21","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1109\/TMC.2011.62","volume":"11","author":"K Fyhn","year":"2012","unstructured":"Fyhn, K., Jacobsen, R. M., Popovski, P., & Larsen, T. (2012). Fast capture-recapture approach for mitigating the problem of missing RFID tags. IEEE Transactions on Mobile Computing, 11(3), 518\u2013528.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"6","key":"956_CR22","doi-asserted-by":"crossref","first-page":"348","DOI":"10.2307\/2304025","volume":"45","author":"ZE Schnabel","year":"1938","unstructured":"Schnabel, Z. E. (1938). The estimation of total fish population of a lake. The American Mathematical Monthly, 45(6), 348\u2013352.","journal-title":"The American Mathematical Monthly"},{"issue":"3","key":"956_CR23","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.2307\/2532660","volume":"47","author":"P Yip","year":"1991","unstructured":"Yip, P. (1991). A martingale estimating equation for a capture-recapture experiment in discrete time. Biometrics, 47(3), 1081\u20131088.","journal-title":"Biometrics"},{"key":"956_CR24","doi-asserted-by":"crossref","unstructured":"Anderson, G. D., & Qiu, S.-L. (Nov 1997) A monotoneity property of the gamma function. In: Proceedings of the American Mathematical Society 125(11), pp. 3355\u20133362.","DOI":"10.1090\/S0002-9939-97-04152-X"},{"key":"956_CR25","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511623707","volume-title":"An introduction to the theory of the Riemann Zeta-function","author":"SJ Patterson","year":"1988","unstructured":"Patterson, S. J. (1988). An introduction to the theory of the Riemann Zeta-function. Cambridge: Cambridge University Press."},{"key":"956_CR26","unstructured":"Abramowitz, M., & Stegun, I. A. (1972) Handbook of mathematical functions: With formulas, graphs, and mathematical tables, New York."},{"key":"956_CR27","doi-asserted-by":"crossref","unstructured":"Islam, M., Samad, S. A., Hannan, M. A., & Hussain, A. ( Oct 2010). Software defined radio for RFID signal in rayleigh fading channel. In: Proceedings of the IEEE region 10 conference TENCON, pp. 1368\u20131372.","DOI":"10.1109\/TENCON.2010.5686056"},{"issue":"8","key":"956_CR28","doi-asserted-by":"crossref","first-page":"848","DOI":"10.1109\/LCOMM.2011.061011.110276","volume":"15","author":"C He","year":"2011","unstructured":"He, C., & Wang, Z. J. (2011). Closed-form BER analysis of non-coherent FSK in MISO double rayleigh fading\/RFID channel. IEEE Communications Letters, 15(8), 848\u2013850.","journal-title":"IEEE Communications Letters"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-012-0956-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-012-0956-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-012-0956-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,6]],"date-time":"2019-07-06T17:08:08Z","timestamp":1562432888000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-012-0956-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,6]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,8]]}},"alternative-id":["956"],"URL":"https:\/\/doi.org\/10.1007\/s11277-012-0956-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,12,6]]}}}