Sciweavers

3474 search results - page 14 / 695
» Data Management in RFID Applications
Sort
View
106
Voted
IJNSEC
2008
88views more  IJNSEC 2008»
15 years 3 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
ICDE
2008
IEEE
112views Database» more  ICDE 2008»
16 years 4 months ago
Probabilistic Event Extraction from RFID Data
Abstract-- We present PEEX, a system that enables applications to define and extract meaningful probabilistic high-level events from RFID data. PEEX effectively copes with errors i...
Nodira Khoussainova, Magdalena Balazinska, Dan Suc...
WPES
2005
ACM
15 years 9 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
146
Voted
MOBISYS
2008
ACM
16 years 3 months ago
Sherlock: automatically locating objects for humans
Over the course of a day a human interacts with tens or hundreds of individual objects. Many of these articles are nomadic, relying on human memory to manually index, inventory, o...
Aditya Nemmaluri, Mark D. Corner, Prashant J. Shen...
134
Voted
IH
2005
Springer
15 years 9 months ago
ID Modulation: Embedding Sensor Data in an RFID Timeseries
This paper reports the first use of ID Modulation to embed a bitstream representing sensor information in a standards-compliant Radio Frequency Identification (RFID) channel. Like ...
Joshua R. Smith, Bing Jiang, Sumit Roy, Matthai Ph...