72 papers:
- CHI-2015-LiYS #detection #interactive #named
- IDSense: A Human Object Interaction Detection System Based on Passive UHF RFID (HL, CY, APS), pp. 2555–2564.
- DHM-EH-2015-NakamuraKKMK #development #self #student #using
- Development of a Self-learning System for Chest Auscultation Skills Using an RFID Reader for Nursing Students (MN, KK, YK, JM, MKP), pp. 474–481.
- DUXU-ELAS-2014-GeabelJHABA #identification #using
- Pilgrim Smart Identification Using RFID Technology (PSI) (AG, KJ, RAH, RA, MB, MA), pp. 273–280.
- DUXU-ELAS-2014-TribeWB
- Aesthetically Enhanced RFID Inkjet Antenna Logos on Skin (AERIALS) (JT, WW, JCB), pp. 719–730.
- CIKM-2014-YaoRSLF #locality #probability
- Exploring Tag-Free RFID-Based Passive Localization and Tracking via Learning-Based Probabilistic Approaches (LY, WR, QZS, XL, NJGF), pp. 1799–1802.
- HCI-III-2013-FernandesFMPB #framework #network
- RFID Mesh Network as an Infrastructure for Location Based Services for the Blind (HF, JF, PM, HP, JB), pp. 39–45.
- HIMI-HSM-2013-LiuskaMS #library #named
- BookAidee: Managing Evacuees from Natural Disaster by RFID Tagged Library Books (ML, EM, IS), pp. 124–130.
- OCSC-2013-VillanuevaMTGHP #distributed #interactive
- Context Management for RFID-Based Distributed Interaction Spaces (PGV, FAM, RT, JAG, AH, VMRP), pp. 355–364.
- DATE-2012-FritzBAH #approach #evaluation #monitoring #performance
- Evaluation of a new RFID system performance monitoring approach (GF, VB, OEKA, DH), pp. 1439–1442.
- CIKM-2012-YanZN #realtime
- Leveraging read rates of passive RFID tags for real-time indoor location tracking (DY, ZZ, WN), pp. 375–384.
- CIKM-2012-ZhaoN #approach #data type #modelling
- A model-based approach for RFID data stream cleansing (ZZ, WN), pp. 862–871.
- SAC-2012-RahmanA #authentication #named #network #protocol #robust
- DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networks (FR, SIA), pp. 498–503.
- ICST-2012-KheddamAP
- An Extended LLRP Model for RFID System Test and Diagnosis (RK, OEKA, IP), pp. 529–538.
- VLDB-2011-CaoSDS #distributed #monitoring #query
- Distributed inference and query processing for RFID tracking and monitoring (ZC, CAS, YD, PJS), pp. 326–337.
- ICEIS-v4-2011-Xin #case study #internet
- Study on Application of Internet of Things based on RFID Technology (CX), pp. 518–521.
- CIKM-2011-LiaoLCW #named #performance
- KLEAP: an efficient cleaning method to remove cross-reads in RFID streams (GL, JL, LC, CW), pp. 2209–2212.
- CIKM-2011-VirgilioM #calculus #data analysis #using
- RFID data analysis using tensor calculus for supply chain management (RDV, FM), pp. 1743–1748.
- KDD-2011-McCloskeyKIKB #behaviour #data mining #mining #using
- From market baskets to mole rats: using data mining techniques to analyze RFID data describing laboratory animal behavior (DPM, MEK, SPI, IK, SBM), pp. 301–306.
- SEKE-2011-SunHGZWY #detection #novel #petri net #using
- A Novel Method for Formally Detecting RFID Event Using Petri Nets (JS, YH, XG, SZ, LW, CYY), pp. 122–125.
- SAC-2011-LiOZ #approach #collaboration #modelling #process
- An integrated approach for modeling and facilitating RFID-based collaborative logistics processes (YL, AO, HZ), pp. 301–307.
- ASPLOS-2011-RansfordSF #named
- Mementos: system support for long-running computation on RFID-scale devices (BR, JS, KF), pp. 159–170.
- DATE-2010-VenutoSCP #power management
- Ultra low-power 12-bit SAR ADC for RFID applications (DDV, ES, DTC, YP), pp. 1071–1075.
- SIGMOD-2010-ChenKWS
- Leveraging spatio-temporal redundancy for RFID data cleansing (HC, WSK, HW, MTS), pp. 51–62.
- CHI-2010-MarquardtTVG #interactive
- Rethinking RFID: awareness and control for interaction with RFID systems (NM, AST, NV, SG), pp. 2307–2316.
- SAC-2010-HoqueRA #named #protocol #scalability #using
- S-search: finding RFID tags using scalable and secure search protocol (MEH, FR, SIA), pp. 439–443.
- CASE-2009-ChavanZK #authentication #protocol
- A server centric authentication protocol for a RFID system (KPC, AZ, SK), pp. 227–232.
- CASE-2009-ChengP09a
- Experimental investigation of EMI on RFID in manufacturing facilities (CYC, VP), pp. 241–245.
- CASE-2009-HariharanB #markov #process #using
- Misplaced item search in a warehouse using an RFID-based Partially Observable Markov Decision Process (POMDP) model (SH, STSB), pp. 443–448.
- CASE-2009-MysoreNUMR #algorithm #performance
- An efficient algorithm for RFID reader positioning for coverage of irregularly-shaped areas (NM, PN, RSU, RM, SR), pp. 233–240.
- DHM-2009-JunLS #approach #fault #simulation
- A Simulation Approach to Understand the Viability of RFID Technology in Reducing Medication Dispensing Errors (EJ, JL, XS), pp. 531–539.
- HCD-2009-AnastassovaM #case study #elicitation #interactive #mobile #prototype #requirements #visual notation
- Elicitation of User Requirements for Mobile Interaction with Visual and RFID Tags: A Prototype-Based Exploratory Study (MA, OMI), pp. 159–166.
- HCI-AUII-2009-KubickiLLSKC #human-computer #interactive #using
- New Human-Computer Interactions Using Tangible Objects: Application on a Digital Tabletop with RFID Technology (SK, SL, YL, PDS, CK, JC), pp. 446–455.
- HCI-VAD-2009-KashiwagiXSKO #learning #physics #process
- A Language Learning System Utilizing RFID Technology for Total Physical Response Activities (HK, YX, YS, MK, KO), pp. 119–128.
- HCI-VAD-2009-Nam #development #user interface
- Development of an Expert System as a User Interface for an RFID Application (DHN), pp. 751–759.
- ICEIS-ISAS-2009-GoebelTGTN #how
- RFID in the Supply Chain: How to Obtain a Positive ROI — The Case of Gerry Weber (CG, CT, OG, RT, RN), pp. 95–102.
- CIKM-2009-GuYGC #data type #probability #query
- Probabilistic moving range query over RFID spatio-temporal data streams (YG, GY, NG, YC), pp. 1413–1416.
- CIKM-2009-WangRKH #middleware
- Demonstration of an RFID middleware: LIT ALE manager (QW, WR, SK, BH), pp. 2071–2072.
- SAC-2009-FungCDX #privacy
- Privacy protection for RFID data (BCMF, MC, BCD, HX), pp. 1528–1535.
- SAC-2009-HoqueRA #authentication #privacy #protocol #robust #security #using
- Supporting recovery, privacy and security in RFID systems using a robust authentication protocol (MEH, FR, SIA), pp. 1062–1066.
- CASE-2008-KimCY #mobile
- Fusion of direction sensing RFID and sonar for mobile robot docking (MK, NYC, WY), pp. 709–714.
- CASE-2008-Mazurek #design
- Design of RFID system with DS-CDMA transmission (GM), pp. 703–708.
- CASE-2008-NummelaUSK #case study #industrial
- Exploiting passive UHF RFID in paper industry — Case study: End user (JN, LU, LS, MK), pp. 436–441.
- DAC-2008-LeeJCHKKK #power management
- Applying passive RFID system to wireless headphones for extreme low power consumption (JGL, DJ, JC, SH, JKK, JK, SWK), pp. 486–491.
- SIGMOD-2008-LeeC #performance #query #using
- Efficient storage scheme and query processing for supply chain management using RFID (CHL, CWC), pp. 291–302.
- ICEIS-SAIC-2008-AtkinsZYN
- Application of Knowledge Hub and RFID Technology in Auditing and Tracking of Plasterboard for Environment Recycling and Waste Disposal (ASA, LZ, HY, BPN), pp. 190–195.
- ICPR-2008-Tanaka #metric #multi
- Multiscan-based map optimizer for RFID map-building with low-accuracy measurements (KT), pp. 1–4.
- KDD-2008-ChavesBB #named #process #reliability
- Tagmark: reliable estimations of RFID tags for business processes (LWFC, EB, KB), pp. 999–1007.
- SEKE-2008-KimBBSA #behaviour #named #using #visualisation
- VisRFID: Visualizing Customer Behavior in Geotemporal Space Using RFID Technology (BK, KB, MB, RS, BA), pp. 422–427.
- CASE-2007-EhrenbergFS #mobile
- Inventory Management with an RFID-equipped Mobile Robot (IE, CF, SES), pp. 1020–1026.
- CASE-2007-KimCAY #mobile #using
- RFID-enabled Target Tracking and Following with a Mobile Robot Using Direction Finding Antennas (MK, NYC, HSA, WY), pp. 1014–1019.
- DATE-2007-DerbekSWWPP #framework #simulation
- Simulation platform for UHF RFID (VD, CS, RW, DW, JPP, MP), pp. 918–923.
- CHI-2007-MakelaBGH #case study #interactive #mobile #visual notation
- Mobile interaction with visual and RFID tags: a field study on user perceptions (KM, SB, DG, JH), pp. 991–994.
- HCI-AS-2007-KojimaIN #documentation #using
- Document Management and Information Organizing Method Using RFID Tags (HK, KI, NN), pp. 601–610.
- HCI-IPT-2007-ParkJ07a #framework #novel
- A Novel Infrastructure of Digital Storytelling Theme Museums Based on RFID Systems (MP, KJ), pp. 893–900.
- SAC-2007-KoralalageRMGC #approach #lifecycle #privacy #security
- POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism (KHSSK, MRS, JM, YG, JC), pp. 270–275.
- SAC-2007-Masciari #data transformation #effectiveness
- RFID data management for effective objects tracking (EM), pp. 457–461.
- CASE-2006-HuangCC #mobile #safety
- Mobile Diagnosis based on RFID for Food Safety (HPH, CSC, TYC), pp. 357–362.
- CASE-2006-ViswanadhamPG #exception #process
- Decision Support System for Exception Management in RFID Enabled Airline Baggage Handling Process (NV, AP, RSG), pp. 351–356.
- DAC-2006-JonesHDTSFCM #automation #configuration management #power management
- An automated, reconfigurable, low-power RFID tag (AKJ, RRH, SRD, SCT, RS, JF, JTC, MHM), pp. 131–136.
- VLDB-2006-GonzalezHL #analysis #multi #named
- FlowCube: Constructuing RFID FlowCubes for Multi-Dimensional Analysis of Commodity Flows (HG, JH, XL), pp. 834–845.
- VLDB-2006-JefferyGF #adaptation #data type
- Adaptive Cleaning for RFID Data Streams (SRJ, MNG, MJF), pp. 163–174.
- VLDB-2006-RaoDTC #data analysis
- A Deferred Cleansing Method for RFID Data Analytics (JR, SD, HT, LSC), pp. 175–186.
- ICEIS-DISI-2006-ModrakM #dependence
- Elimination of Time Dependence of Information Validity by Application of RFID Technology (VM, VM), pp. 130–135.
- ICEIS-DISI-2006-Vemuri #agile
- The Benefits of Accurate, and Timely Data in Lean Production Environments — RFID in Supply Chain Management (VKV), pp. 221–225.
- CIKM-2006-GonzalezHL #mining #set #workflow
- Mining compressed commodity workflows from massive RFID data sets (HG, JH, XL), pp. 162–171.
- CIKM-2006-LiuWL #approach #modelling #pervasive #physics #query
- Integrated RFID data modeling: an approach for querying physical objects in pervasive computing (SL, FW, PL), pp. 822–823.
- SAC-2006-MameiQZ #physics #tuple
- Making tuple spaces physical with RFID tags (MM, RQ, FZ), pp. 434–439.
- FSE-2006-LuCT #approach #data flow #middleware #source code #testing
- Testing context-aware middleware-centric programs: a data flow approach and an RFID-based experimentation (HL, WKC, THT), pp. 242–252.
- CASE-2005-KimKYT #identification #realtime #using
- Dynamic shipment planning in an automobile shipment yard using real-time radio frequency identification (RFID) information (JK, SRTK, STY, JDT), pp. 148–153.
- VLDB-2005-HuSCS #data type #using
- Supporting RFID-based Item Tracking Applications in Oracle DBMS Using a Bitmap Datatype (YH, SS, TC, JS), pp. 1140–1151.
- VLDB-2005-WangL
- Temporal Management of RFID Data (FW, PL), pp. 1128–1139.
- SAC-2005-StaakeTF #anti #network
- Extending the EPC network: the potential of RFID in anti-counterfeiting (TS, FT, EF), pp. 1607–1612.