Sciweavers

286 search results - page 27 / 58
» An Introduction to RFID Technology
Sort
View
PERCOM
2007
ACM
14 years 8 months ago
Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays
Activity monitoring, a crucial task in many applications, is often conducted expensively using video cameras. Also, effectively monitoring a large field by analyzing images from m...
Yunhao Liu, Lei Chen 0002, Jian Pei, Qiuxia Chen, ...
VLDB
2008
ACM
114views Database» more  VLDB 2008»
14 years 8 months ago
An adaptive RFID middleware for supporting metaphysical data independence
Abstract Sensor devices produce data that are unreliable, low-level, and seldom able to be used directly by applications. In this paper, we propose Metaphysical Data Independence (...
Shawn R. Jeffery, Michael J. Franklin, Minos N. Ga...
WISTP
2010
Springer
13 years 6 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel
ICEIS
2009
IEEE
14 years 3 months ago
RFID in the Supply Chain: How to Obtain a Positive ROI - The Case of Gerry Weber
Christoph Goebel, Christoph Tribowski, Oliver G&uu...
EJIS
2008
98views more  EJIS 2008»
13 years 8 months ago
Interactive innovation of technology for mobile work
Despite the increasing popularity of mobile information systems, the actual processes leading to the innovation of mobile technologies remain largely unexplored. This study uses A...
Jan Kietzmann