Sciweavers

42 search results - page 7 / 9
» The Practicality of Multi-Tag RFID Systems
Sort
View
PERCOM
2007
ACM
14 years 7 months ago
Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays
Activity monitoring, a crucial task in many applications, is often conducted expensively using video cameras. Also, effectively monitoring a large field by analyzing images from m...
Yunhao Liu, Lei Chen 0002, Jian Pei, Qiuxia Chen, ...
USS
2008
13 years 9 months ago
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security
We explore the problem of secret-key distribution in unidirectional channels, those in which a sender transmits information blindly to a receiver. We consider two approaches: (1) ...
Ari Juels, Ravikanth Pappu, Bryan Parno
WISA
2009
Springer
14 years 2 months ago
When Compromised Readers Meet RFID
RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events, commonly rely on readers that are not continuously connected to the back-end s...
Gildas Avoine, Cédric Lauradoux, Tania Mart...
HICSS
2006
IEEE
125views Biometrics» more  HICSS 2006»
14 years 1 months ago
The Role of Collective Mental Models in IOS Adoption: Opening the Black Box of Rationality in RFID Deployment
ABSTRACT. Risks associated with change in technology standards and uncertainty over the sharing of costs and benefits among trading partners impede interorganizational information ...
Frederick J. Riggins, Kelly T. Slaughter
GRAPHICSINTERFACE
2008
13 years 9 months ago
SurfaceFusion: unobtrusive tracking of everyday objects in tangible user interfaces
Interactive surfaces and related tangible user interfaces often involve everyday objects that are identified, tracked, and augmented with digital information. Traditional approach...
Alex Olwal, Andrew D. Wilson