{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T06:45:28Z","timestamp":1759041928432,"version":"3.40.4"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,1,9]],"date-time":"2013-01-09T00:00:00Z","timestamp":1357689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1007\/s11277-012-0981-z","type":"journal-article","created":{"date-parts":[[2013,1,8]],"date-time":"2013-01-08T20:41:03Z","timestamp":1357677663000},"page":"2947-2963","source":"Crossref","is-referenced-by-count":11,"title":["Probabilistic Dynamic Framed Slotted ALOHA for RFID Tag Identification"],"prefix":"10.1007","volume":"71","author":[{"given":"Chuyen T.","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Kazunori","family":"Hayashi","sequence":"additional","affiliation":[]},{"given":"Megumi","family":"Kaneko","sequence":"additional","affiliation":[]},{"given":"Petar","family":"Popovski","sequence":"additional","affiliation":[]},{"given":"Hideaki","family":"Sakai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,1,9]]},"reference":[{"key":"981_CR1","doi-asserted-by":"crossref","DOI":"10.1002\/0470868023","volume-title":"RFID Handbook: Fundamentals and applications in contactless smart cards and identification","author":"K Finkenzeller","year":"2003","unstructured":"Finkenzeller, K. (2003). RFID Handbook: Fundamentals and applications in contactless smart cards and identification. New York: Wiley."},{"issue":"1","key":"981_CR2","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1201\/1078\/44912.22.1.20051201\/85739.7","volume":"22","author":"R Angeles","year":"2005","unstructured":"Angeles, R. (2005). RFID technologies: Supply-chain applications and implementations issues. Information Systems Management, 22(1), 51\u201365.","journal-title":"Information Systems Management"},{"key":"981_CR3","doi-asserted-by":"crossref","unstructured":"Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. Proceedings of the 11th ACM conference on computer and communication, security, pp. 210\u2013219.","DOI":"10.1145\/1030083.1030112"},{"key":"981_CR4","unstructured":"Hush, D., & Wood, C. (1998, August). Analysis of tree algorithm for RFID arbitration. Proceedings of the IEEE international symposium on information theory p. 107."},{"key":"981_CR5","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/1024916.1024920","volume":"5","author":"LG Roberts","year":"1975","unstructured":"Roberts, L. G. (1975). ALOHA packet system with and without slots and capture. ACM SIGCOMM Computer Communication Review, 5, 28\u201342.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"981_CR6","unstructured":"EPC global radio frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860MHz-960MHz version 1.2.0, Technical, Report, (2008). http:\/\/www.gsl.org\/gsmp\/kc\/epcglobal\/uhfc1g2\/uhfc1g2_1_2_0-standard-20080511.pdf"},{"key":"981_CR7","doi-asserted-by":"crossref","unstructured":"Cui, Y., & Zhao, Y. (2008, May). Mathematical analysis for binary tree algorithm in RFID. Proceedings of the IEEE vehicular technology conference VTC, pp. 2725\u20132729.","DOI":"10.1109\/VETECS.2008.596"},{"key":"981_CR8","doi-asserted-by":"crossref","unstructured":"Law, C., Lee, K., & Siu, K.-Y. (2000, August). Efficient memoryless protocol for tag identification. Proceedings of the 4th international workshop on discrete algorithms and methods for mobile computing and communications (p. 7584) ACM.","DOI":"10.1145\/345848.345865"},{"key":"981_CR9","unstructured":"Auto-ID Center. (2003). Draft protocol specification for a 900MHz class 0 radio frequency identification tag."},{"issue":"4","key":"981_CR10","doi-asserted-by":"crossref","first-page":"1168","DOI":"10.1093\/ietcom\/e91-b.4.1168","volume":"E91\u2013B","author":"W-T Chen","year":"2008","unstructured":"Chen, W.-T. (2008). Performance comparison of binary search tree and framed aloha algorithms for RFID anti-collision. IEICE Transactions on Communications, E91\u2013B(4), 1168\u20131171.","journal-title":"IEICE Transactions on Communications"},{"issue":"9","key":"981_CR11","doi-asserted-by":"crossref","first-page":"2725","DOI":"10.1109\/TCOMM.2010.080310.090421","volume":"58","author":"L Zhu","year":"2010","unstructured":"Zhu, L., & Yum, T.-S. P. (2010). The optimal reading strategy for EPC Gen-2 RFID anti-collision systems. IEEE Transactions on Communications, 58(9), 2725\u20132733.","journal-title":"IEEE Transactions on Communications"},{"issue":"3","key":"981_CR12","doi-asserted-by":"crossref","first-page":"1023","DOI":"10.1587\/transcom.E92.B.1023","volume":"E92\u2013B","author":"SS Choi","year":"2009","unstructured":"Choi, S. S., & Kim, S. (2009). A dynamic framed slotted ALOHA algorithm using collision factor for RFID identification. IEICE Transactions on Communications, E92\u2013B(3), 1023\u20131026.","journal-title":"IEICE Transactions on Communications"},{"issue":"1","key":"981_CR13","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s11277-010-0193-3","volume":"59","author":"D-Z Deng","year":"2010","unstructured":"Deng, D.-Z., & Tsao, H.-W. (2010). Optimal dynamic framed slotted ALOHA based anti-collision algorithm for RFID systems. Wireless Personal Communications, 59(1), 109\u2013122.","journal-title":"Wireless Personal Communications"},{"key":"981_CR14","doi-asserted-by":"crossref","unstructured":"Fan, X., Song, I., & Chang, K. (2008, December). Gen2-based hybrid tag anti-collision Q algorithm using Chebyshev\u2019s inequality for passivie RFID systems. Proceedings of the 19th IEEE international symposium on personal, indoor and mobile radio communications, PIMRC, pp. 1\u20135.","DOI":"10.1109\/PIMRC.2008.4699508"},{"key":"981_CR15","doi-asserted-by":"crossref","unstructured":"Floerkemeier, C. (2007, March). Bayesian transmission strategy for framed ALOHA based RFID protocols. Proceedings of IEEE international conference on RFID, pp. 228\u2013235.","DOI":"10.1109\/RFID.2007.346173"},{"issue":"1","key":"981_CR16","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/TASE.2008.917093","volume":"6","author":"W-T Chen","year":"2009","unstructured":"Chen, W.-T. (2009). An accurate tag estimate method for improving the performance of an RFID anticollision algorithm based on dynamic frame length ALOHA. IEEE Transactions on Automation Science and Engineering, 6(1), 9\u201315.","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"key":"981_CR17","unstructured":"Cha, J-R, & Kim, J-H (2006). Dynamic framed slotted ALOHA algorithms using fast tag estimation method for RFID system. Proceedings of the 3rd IEEE conference on consumer communications and networking vol. 2, pp. 768\u2013772."},{"key":"981_CR18","doi-asserted-by":"crossref","unstructured":"Vogt, H. (2002, April). Efficient object identification with passive RFID tags. Proceedings of international conference on, pervasive computing pp. 98\u2013113.","DOI":"10.1007\/3-540-45866-2_9"},{"key":"981_CR19","doi-asserted-by":"crossref","DOI":"10.1002\/9780470665251","volume-title":"RFID systems: Research trends and challenges","author":"M Bol\u00edc","year":"2010","unstructured":"Bol\u00edc, M., Simplot-Ryl, D., & Stojmenov\u00edc, I. (2010). RFID systems: Research trends and challenges. New York: Wiley."},{"issue":"9","key":"981_CR20","doi-asserted-by":"crossref","first-page":"1441","DOI":"10.1109\/TPDS.2011.36","volume":"22","author":"C Qian","year":"2011","unstructured":"Qian, C., Ngan, H., Liu, Y., & Ni, L. M. (2011). Cardinality estimation for large-scale RFID systems. IEEE Transactions on Parallel and Distributed Systems, 22(9), 1441\u20131454.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"981_CR21","unstructured":"Auto-ID Center. (2003). 13.56 MHz ISM band class 1 radio frequence identification tag interface specification, version 1.0. HF RFID standard. http:\/\/www.epcglobalinc.org\/standards\/specs\/ ."},{"key":"981_CR22","doi-asserted-by":"crossref","unstructured":"Ali, K., Hassanein, H., & Taha, A.-E. M. (2007, October). RFID anti-collision protocol for dense passive tag enviroments. Proceedings of the 32nd IEEE conference on local, computer networks, pp. 819\u2013824.","DOI":"10.1109\/LCN.2007.140"},{"key":"981_CR23","doi-asserted-by":"crossref","unstructured":"Xin-qing, Y., Zhou-ping, Y., & You-lun, X. (2008, October). QTS ALOHA: A hybrid collision resolution protocol for dense RFID networks. Proceedings of the IEEE international conference on e-business engineering pp. 557\u2013562.","DOI":"10.1109\/ICEBE.2008.11"},{"key":"981_CR24","doi-asserted-by":"crossref","unstructured":"Sze, W.-K., Lau, W.-C., & Yue, O.-C. (2009, June). Fast RFID counting under unreliable radio channel. Proceedings of the IEEE internation conference in, communications, pp. 1\u20135.","DOI":"10.1109\/ICC.2009.5199030"},{"issue":"5","key":"981_CR25","first-page":"1458","volume":"10","author":"VS Mansouri","year":"2011","unstructured":"Mansouri, V. S., & Wong, V. W. S. (2011). Cardinality estimation in RFID systems with multiple readers. IEEE Transactions on Communications, 10(5), 1458\u20131469.","journal-title":"IEEE Transactions on Communications"},{"issue":"7","key":"981_CR26","first-page":"2337","volume":"57","author":"D-Y Kim","year":"2009","unstructured":"Kim, D.-Y., Yoon, H.-G., Jang, B.-J., & Yook, J.-G. (2009). Effects of reader-to-reader interference on the UHF RFID interrogation range. IEEE Transactions on Communications, 57(7), 2337\u20132346.","journal-title":"IEEE Transactions on Communications"},{"key":"981_CR27","doi-asserted-by":"crossref","unstructured":"Pourbagheri, S., Bakhtiar, M. S., & Atarodi, M. (2008, December). Cellular design for a dense RFID reader environment. Proceedings of the IEEE Asia pacific conference on circuits and systems pp. 1124\u20131127.","DOI":"10.1109\/APCCAS.2008.4746222"},{"key":"981_CR28","doi-asserted-by":"crossref","unstructured":"Al-Fagih, A. E., Al-Turjman, F. M., Hassanein, H. S., & Alsalih, W. M. (2012, June). Coverage-based placement in RFID networks: An overview. Proceedings of the third FTRA international conference on mobile, ubiquitous and intelligent computing pp. 1124\u20131127.","DOI":"10.1109\/MUSIC.2012.45"},{"key":"981_CR29","doi-asserted-by":"crossref","unstructured":"Kodialam, M., & Nandagopal, T. (2006, September). Fast and reliable estimation schemes in RFID systems. Proceedings of the 12th annual international conference on mobile computing and networking, pp. 322\u2013333.","DOI":"10.1145\/1161089.1161126"},{"issue":"4","key":"981_CR30","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1109\/TCOM.1983.1095854","volume":"31","author":"FC Schoute","year":"1983","unstructured":"Schoute, F. C. (1983). Dynamic frame length ALOHA. IEEE Transactions on Communications, 31(4), 565\u2013568.","journal-title":"IEEE Transactions on Communications"},{"issue":"1","key":"981_CR31","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/LCOMM.2007.061322","volume":"11","author":"J Kim","year":"2007","unstructured":"Kim, J., Lee, W., Kim, E., Kim, D., & Suh, K. (2007). Optimized transmission power control of interrogators for collision arbitration in UHF RFID systems. IEEE Communications Letters, 11(1), 22\u201324.","journal-title":"IEEE Communications Letters"},{"key":"981_CR32","unstructured":"Philips Semiconductors. I-CODE smart label RFID tags. http:\/\/www.semiconductors.philips.com\/acrobat_download\/other\/identification\/SL092030.pdf ."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-012-0981-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-012-0981-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-012-0981-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T16:30:34Z","timestamp":1745944234000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-012-0981-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,9]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,8]]}},"alternative-id":["981"],"URL":"https:\/\/doi.org\/10.1007\/s11277-012-0981-z","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2013,1,9]]}}}