BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
use (16)
data (15)
base (15)
system (15)
manag (11)

Stem rfid$ (all stems)

72 papers:

CHICHI-2015-LiYS #detection #interactive #named
IDSense: A Human Object Interaction Detection System Based on Passive UHF RFID (HL, CY, APS), pp. 2555–2564.
HCIDHM-EH-2015-NakamuraKKMK #development #self #student #using
Development of a Self-learning System for Chest Auscultation Skills Using an RFID Reader for Nursing Students (MN, KK, YK, JM, MKP), pp. 474–481.
HCIDUXU-ELAS-2014-GeabelJHABA #identification #using
Pilgrim Smart Identification Using RFID Technology (PSI) (AG, KJ, RAH, RA, MB, MA), pp. 273–280.
HCIDUXU-ELAS-2014-TribeWB
Aesthetically Enhanced RFID Inkjet Antenna Logos on Skin (AERIALS) (JT, WW, JCB), pp. 719–730.
CIKMCIKM-2014-YaoRSLF #locality #probability
Exploring Tag-Free RFID-Based Passive Localization and Tracking via Learning-Based Probabilistic Approaches (LY, WR, QZS, XL, NJGF), pp. 1799–1802.
HCIHCI-III-2013-FernandesFMPB #framework #network
RFID Mesh Network as an Infrastructure for Location Based Services for the Blind (HF, JF, PM, HP, JB), pp. 39–45.
HCIHIMI-HSM-2013-LiuskaMS #library #named
BookAidee: Managing Evacuees from Natural Disaster by RFID Tagged Library Books (ML, EM, IS), pp. 124–130.
HCIOCSC-2013-VillanuevaMTGHP #distributed #interactive
Context Management for RFID-Based Distributed Interaction Spaces (PGV, FAM, RT, JAG, AH, VMRP), pp. 355–364.
DATEDATE-2012-FritzBAH #approach #evaluation #monitoring #performance
Evaluation of a new RFID system performance monitoring approach (GF, VB, OEKA, DH), pp. 1439–1442.
CIKMCIKM-2012-YanZN #realtime
Leveraging read rates of passive RFID tags for real-time indoor location tracking (DY, ZZ, WN), pp. 375–384.
CIKMCIKM-2012-ZhaoN #approach #data type #modelling
A model-based approach for RFID data stream cleansing (ZZ, WN), pp. 862–871.
SACSAC-2012-RahmanA #authentication #named #network #protocol #robust
DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networks (FR, SIA), pp. 498–503.
ICSTICST-2012-KheddamAP
An Extended LLRP Model for RFID System Test and Diagnosis (RK, OEKA, IP), pp. 529–538.
VLDBVLDB-2011-CaoSDS #distributed #monitoring #query
Distributed inference and query processing for RFID tracking and monitoring (ZC, CAS, YD, PJS), pp. 326–337.
ICEISICEIS-v4-2011-Xin #case study #internet
Study on Application of Internet of Things based on RFID Technology (CX), pp. 518–521.
CIKMCIKM-2011-LiaoLCW #named #performance
KLEAP: an efficient cleaning method to remove cross-reads in RFID streams (GL, JL, LC, CW), pp. 2209–2212.
CIKMCIKM-2011-VirgilioM #calculus #data analysis #using
RFID data analysis using tensor calculus for supply chain management (RDV, FM), pp. 1743–1748.
KDDKDD-2011-McCloskeyKIKB #behaviour #data mining #mining #using
From market baskets to mole rats: using data mining techniques to analyze RFID data describing laboratory animal behavior (DPM, MEK, SPI, IK, SBM), pp. 301–306.
SEKESEKE-2011-SunHGZWY #detection #novel #petri net #using
A Novel Method for Formally Detecting RFID Event Using Petri Nets (JS, YH, XG, SZ, LW, CYY), pp. 122–125.
SACSAC-2011-LiOZ #approach #collaboration #modelling #process
An integrated approach for modeling and facilitating RFID-based collaborative logistics processes (YL, AO, HZ), pp. 301–307.
ASPLOSASPLOS-2011-RansfordSF #named
Mementos: system support for long-running computation on RFID-scale devices (BR, JS, KF), pp. 159–170.
DATEDATE-2010-VenutoSCP #power management
Ultra low-power 12-bit SAR ADC for RFID applications (DDV, ES, DTC, YP), pp. 1071–1075.
SIGMODSIGMOD-2010-ChenKWS
Leveraging spatio-temporal redundancy for RFID data cleansing (HC, WSK, HW, MTS), pp. 51–62.
CHICHI-2010-MarquardtTVG #interactive
Rethinking RFID: awareness and control for interaction with RFID systems (NM, AST, NV, SG), pp. 2307–2316.
SACSAC-2010-HoqueRA #named #protocol #scalability #using
S-search: finding RFID tags using scalable and secure search protocol (MEH, FR, SIA), pp. 439–443.
CASECASE-2009-ChavanZK #authentication #protocol
A server centric authentication protocol for a RFID system (KPC, AZ, SK), pp. 227–232.
CASECASE-2009-ChengP09a
Experimental investigation of EMI on RFID in manufacturing facilities (CYC, VP), pp. 241–245.
CASECASE-2009-HariharanB #markov #process #using
Misplaced item search in a warehouse using an RFID-based Partially Observable Markov Decision Process (POMDP) model (SH, STSB), pp. 443–448.
CASECASE-2009-MysoreNUMR #algorithm #performance
An efficient algorithm for RFID reader positioning for coverage of irregularly-shaped areas (NM, PN, RSU, RM, SR), pp. 233–240.
HCIDHM-2009-JunLS #approach #fault #simulation
A Simulation Approach to Understand the Viability of RFID Technology in Reducing Medication Dispensing Errors (EJ, JL, XS), pp. 531–539.
HCIHCD-2009-AnastassovaM #case study #elicitation #interactive #mobile #prototype #requirements #visual notation
Elicitation of User Requirements for Mobile Interaction with Visual and RFID Tags: A Prototype-Based Exploratory Study (MA, OMI), pp. 159–166.
HCIHCI-AUII-2009-KubickiLLSKC #human-computer #interactive #using
New Human-Computer Interactions Using Tangible Objects: Application on a Digital Tabletop with RFID Technology (SK, SL, YL, PDS, CK, JC), pp. 446–455.
HCIHCI-VAD-2009-KashiwagiXSKO #learning #physics #process
A Language Learning System Utilizing RFID Technology for Total Physical Response Activities (HK, YX, YS, MK, KO), pp. 119–128.
HCIHCI-VAD-2009-Nam #development #user interface
Development of an Expert System as a User Interface for an RFID Application (DHN), pp. 751–759.
ICEISICEIS-ISAS-2009-GoebelTGTN #how
RFID in the Supply Chain: How to Obtain a Positive ROI — The Case of Gerry Weber (CG, CT, OG, RT, RN), pp. 95–102.
CIKMCIKM-2009-GuYGC #data type #probability #query
Probabilistic moving range query over RFID spatio-temporal data streams (YG, GY, NG, YC), pp. 1413–1416.
CIKMCIKM-2009-WangRKH #middleware
Demonstration of an RFID middleware: LIT ALE manager (QW, WR, SK, BH), pp. 2071–2072.
SACSAC-2009-FungCDX #privacy
Privacy protection for RFID data (BCMF, MC, BCD, HX), pp. 1528–1535.
SACSAC-2009-HoqueRA #authentication #privacy #protocol #robust #security #using
Supporting recovery, privacy and security in RFID systems using a robust authentication protocol (MEH, FR, SIA), pp. 1062–1066.
CASECASE-2008-KimCY #mobile
Fusion of direction sensing RFID and sonar for mobile robot docking (MK, NYC, WY), pp. 709–714.
CASECASE-2008-Mazurek #design
Design of RFID system with DS-CDMA transmission (GM), pp. 703–708.
CASECASE-2008-NummelaUSK #case study #industrial
Exploiting passive UHF RFID in paper industry — Case study: End user (JN, LU, LS, MK), pp. 436–441.
DACDAC-2008-LeeJCHKKK #power management
Applying passive RFID system to wireless headphones for extreme low power consumption (JGL, DJ, JC, SH, JKK, JK, SWK), pp. 486–491.
SIGMODSIGMOD-2008-LeeC #performance #query #using
Efficient storage scheme and query processing for supply chain management using RFID (CHL, CWC), pp. 291–302.
ICEISICEIS-SAIC-2008-AtkinsZYN
Application of Knowledge Hub and RFID Technology in Auditing and Tracking of Plasterboard for Environment Recycling and Waste Disposal (ASA, LZ, HY, BPN), pp. 190–195.
ICPRICPR-2008-Tanaka #metric #multi
Multiscan-based map optimizer for RFID map-building with low-accuracy measurements (KT), pp. 1–4.
KDDKDD-2008-ChavesBB #named #process #reliability
Tagmark: reliable estimations of RFID tags for business processes (LWFC, EB, KB), pp. 999–1007.
SEKESEKE-2008-KimBBSA #behaviour #named #using #visualisation
VisRFID: Visualizing Customer Behavior in Geotemporal Space Using RFID Technology (BK, KB, MB, RS, BA), pp. 422–427.
CASECASE-2007-EhrenbergFS #mobile
Inventory Management with an RFID-equipped Mobile Robot (IE, CF, SES), pp. 1020–1026.
CASECASE-2007-KimCAY #mobile #using
RFID-enabled Target Tracking and Following with a Mobile Robot Using Direction Finding Antennas (MK, NYC, HSA, WY), pp. 1014–1019.
DATEDATE-2007-DerbekSWWPP #framework #simulation
Simulation platform for UHF RFID (VD, CS, RW, DW, JPP, MP), pp. 918–923.
CHICHI-2007-MakelaBGH #case study #interactive #mobile #visual notation
Mobile interaction with visual and RFID tags: a field study on user perceptions (KM, SB, DG, JH), pp. 991–994.
HCIHCI-AS-2007-KojimaIN #documentation #using
Document Management and Information Organizing Method Using RFID Tags (HK, KI, NN), pp. 601–610.
HCIHCI-IPT-2007-ParkJ07a #framework #novel
A Novel Infrastructure of Digital Storytelling Theme Museums Based on RFID Systems (MP, KJ), pp. 893–900.
SACSAC-2007-KoralalageRMGC #approach #lifecycle #privacy #security
POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism (KHSSK, MRS, JM, YG, JC), pp. 270–275.
SACSAC-2007-Masciari #data transformation #effectiveness
RFID data management for effective objects tracking (EM), pp. 457–461.
CASECASE-2006-HuangCC #mobile #safety
Mobile Diagnosis based on RFID for Food Safety (HPH, CSC, TYC), pp. 357–362.
CASECASE-2006-ViswanadhamPG #exception #process
Decision Support System for Exception Management in RFID Enabled Airline Baggage Handling Process (NV, AP, RSG), pp. 351–356.
DACDAC-2006-JonesHDTSFCM #automation #configuration management #power management
An automated, reconfigurable, low-power RFID tag (AKJ, RRH, SRD, SCT, RS, JF, JTC, MHM), pp. 131–136.
VLDBVLDB-2006-GonzalezHL #analysis #multi #named
FlowCube: Constructuing RFID FlowCubes for Multi-Dimensional Analysis of Commodity Flows (HG, JH, XL), pp. 834–845.
VLDBVLDB-2006-JefferyGF #adaptation #data type
Adaptive Cleaning for RFID Data Streams (SRJ, MNG, MJF), pp. 163–174.
VLDBVLDB-2006-RaoDTC #data analysis
A Deferred Cleansing Method for RFID Data Analytics (JR, SD, HT, LSC), pp. 175–186.
ICEISICEIS-DISI-2006-ModrakM #dependence
Elimination of Time Dependence of Information Validity by Application of RFID Technology (VM, VM), pp. 130–135.
ICEISICEIS-DISI-2006-Vemuri #agile
The Benefits of Accurate, and Timely Data in Lean Production Environments — RFID in Supply Chain Management (VKV), pp. 221–225.
CIKMCIKM-2006-GonzalezHL #mining #set #workflow
Mining compressed commodity workflows from massive RFID data sets (HG, JH, XL), pp. 162–171.
CIKMCIKM-2006-LiuWL #approach #modelling #pervasive #physics #query
Integrated RFID data modeling: an approach for querying physical objects in pervasive computing (SL, FW, PL), pp. 822–823.
SACSAC-2006-MameiQZ #physics #tuple
Making tuple spaces physical with RFID tags (MM, RQ, FZ), pp. 434–439.
FSEFSE-2006-LuCT #approach #data flow #middleware #source code #testing
Testing context-aware middleware-centric programs: a data flow approach and an RFID-based experimentation (HL, WKC, THT), pp. 242–252.
CASECASE-2005-KimKYT #identification #realtime #using
Dynamic shipment planning in an automobile shipment yard using real-time radio frequency identification (RFID) information (JK, SRTK, STY, JDT), pp. 148–153.
VLDBVLDB-2005-HuSCS #data type #using
Supporting RFID-based Item Tracking Applications in Oracle DBMS Using a Bitmap Datatype (YH, SS, TC, JS), pp. 1140–1151.
VLDBVLDB-2005-WangL
Temporal Management of RFID Data (FW, PL), pp. 1128–1139.
SACSAC-2005-StaakeTF #anti #network
Extending the EPC network: the potential of RFID in anti-counterfeiting (TS, FT, EF), pp. 1607–1612.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.