Skip to main content

2013 | OriginalPaper | Buchkapitel

7. RFID: Opportunities and Challenges

verfasst von : Yanbo Wu, Quan Z. Sheng, Sherali Zeadally

Erschienen in: Next-Generation Wireless Technologies

Verlag: Springer London

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Radio Frequency Identification (RFID) creates a seamless link between individual objects and their digital natives. It allows objects to be uniquely, automatically and individually identified using wireless communications. With more than a half century’s development, RFID is becoming the mainstream driving force and has been able to provide various benefits in many different industries. In this chapter, we introduce the basic concepts in RFID technologies and its applications. We discuss the characteristics of RFID data and overview the state-of-the-art research on RFID data management. We also highlight some technical challenges in the management and use of RFID data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
2
IETF RFC 2915.
 
6
Researchers from IBM Almaden Research Center have also developed prototype DS [34]. However, the BRIDGE project has particularly demonstrated the use of DS along with the EPCglobal architecture in various industrial projects.
 
7
In a small environment, a tag may be read by more than one reader at the same time; as a result, its location is uncertain because of inconsistency derived from the readers.
 
8
The authors did not give a name to the model. For convenience, we call it “KAIST Trace Model”.
 
Literatur
1.
Zurück zum Zitat Agrawal, J., Diao, Y., Gyllstrom, D., & Immerman, N. (2008). Efficient pattern matching over event streams. In Proceedings of the 2008 ACM SIGMOD international conference on management of data (SIGMOD’08), Vancouver, Canada. Agrawal, J., Diao, Y., Gyllstrom, D., & Immerman, N. (2008). Efficient pattern matching over event streams. In Proceedings of the 2008 ACM SIGMOD international conference on management of data (SIGMOD’08), Vancouver, Canada.
2.
Zurück zum Zitat Agrawal, P., Benjelloun, O., Das Sarma, A., Hayworth, C., Nabar, S., Sugihara, T., & Widom, J. (2006). Trio: a system for data, uncertainty, and lineage. In Proceedings of the 32nd international conference on very large data bases (VLDB’06), Seoul, Korea. Agrawal, P., Benjelloun, O., Das Sarma, A., Hayworth, C., Nabar, S., Sugihara, T., & Widom, J. (2006). Trio: a system for data, uncertainty, and lineage. In Proceedings of the 32nd international conference on very large data bases (VLDB’06), Seoul, Korea.
3.
Zurück zum Zitat Agrawal, R., Cheung, A., Kailing, K., & Schonauer, S. (2006). Towards traceability across sovereign, distributed RFID databases. In Proceedings of the 10th international database engineering and applications symposium (IDEAS’06), Delhi, India. Agrawal, R., Cheung, A., Kailing, K., & Schonauer, S. (2006). Towards traceability across sovereign, distributed RFID databases. In Proceedings of the 10th international database engineering and applications symposium (IDEAS’06), Delhi, India.
4.
Zurück zum Zitat Agrawal, R., Kiernan, J., Srikant, R., & Xu, Y. (2002). Hippocratic databases. In Proceedings of the 28th international conference on very large data bases (VLDB’02). Agrawal, R., Kiernan, J., Srikant, R., & Xu, Y. (2002). Hippocratic databases. In Proceedings of the 28th international conference on very large data bases (VLDB’02).
5.
Zurück zum Zitat Aigner, M., & Feldhofer, M. (2005). Secure symmetric authentication for RFID tags. In Proceedings of the telecommunication and mobile computing (TCMC’05), Graz, Austria. Aigner, M., & Feldhofer, M. (2005). Secure symmetric authentication for RFID tags. In Proceedings of the telecommunication and mobile computing (TCMC’05), Graz, Austria.
6.
Zurück zum Zitat Cheng, R., Singh, S., & Prabhakar, S. (2005). U-DBMS: a database system for managing constantly-evolving data. In Proceedings of the 31st international conference on very large data bases (VLDB’05). Cheng, R., Singh, S., & Prabhakar, S. (2005). U-DBMS: a database system for managing constantly-evolving data. In Proceedings of the 31st international conference on very large data bases (VLDB’05).
7.
Zurück zum Zitat Cheung, A., Kailing, K., & Schönauer, S. (2007). Theseos: a query engine for traceability across sovereign, distributed RFID databases. In Proceedings of the 23rd international conference on data engineering (ICDE’07), Istanbul, Turkey. Cheung, A., Kailing, K., & Schönauer, S. (2007). Theseos: a query engine for traceability across sovereign, distributed RFID databases. In Proceedings of the 23rd international conference on data engineering (ICDE’07), Istanbul, Turkey.
8.
Zurück zum Zitat Cocci, R. (2007). SPIRE: Scalable processing of RFID event streams. In Proceedings of the 5th RFID academic convocation, Brussels, Belgium. Cocci, R. (2007). SPIRE: Scalable processing of RFID event streams. In Proceedings of the 5th RFID academic convocation, Brussels, Belgium.
9.
Zurück zum Zitat Cocci, R., Tran, T., Diao, Y., & Shenoy, P. (2008). Efficient data interpretation and compression over RFID streams. In Proceedings of the 24th international conference on data engineering (ICDE’08), Cancun, Mexico. Cocci, R., Tran, T., Diao, Y., & Shenoy, P. (2008). Efficient data interpretation and compression over RFID streams. In Proceedings of the 24th international conference on data engineering (ICDE’08), Cancun, Mexico.
10.
Zurück zum Zitat Dimitriou, T. (2005). A lightweight RFID protocol to protect against traceability and cloning attacks. In Proceedings of the 1st international conference on security and privacy for emerging areas in communications networks (SECURECOMM’05), Athens, Greece. Dimitriou, T. (2005). A lightweight RFID protocol to protect against traceability and cloning attacks. In Proceedings of the 1st international conference on security and privacy for emerging areas in communications networks (SECURECOMM’05), Athens, Greece.
12.
Zurück zum Zitat Johnson, R., Gamma, E., Helm, R., & Vlissides, J. (1995). Design patterns—elements of reusable object-oriented software. Reading: Addison-Wesley. Johnson, R., Gamma, E., Helm, R., & Vlissides, J. (1995). Design patterns—elements of reusable object-oriented software. Reading: Addison-Wesley.
13.
Zurück zum Zitat Feldhofer, M., Dominikus, S., & Wolkerstorfer, J. (2004). Strong authentication for RFID systems using the AES algorithm. In Proceedings of the 6th international workshop on cryptographic hardware and embedded systems (CHES’04), Cambridge, USA. Feldhofer, M., Dominikus, S., & Wolkerstorfer, J. (2004). Strong authentication for RFID systems using the AES algorithm. In Proceedings of the 6th international workshop on cryptographic hardware and embedded systems (CHES’04), Cambridge, USA.
14.
Zurück zum Zitat Finkenzeller, K. (2003). RFID handbook: fundamentals and applications in contactless smart cards and identification. New York: Wiley. Finkenzeller, K. (2003). RFID handbook: fundamentals and applications in contactless smart cards and identification. New York: Wiley.
15.
Zurück zum Zitat Gonzalez, H., Han, J., Cheng, H., Li, X., Klabjan, D., & Wu, T. (2010). Modeling massive RFID data sets: a gateway-based movement graph approach. IEEE Transactions on Knowledge and Data Engineering, 22, 90–104. CrossRef Gonzalez, H., Han, J., Cheng, H., Li, X., Klabjan, D., & Wu, T. (2010). Modeling massive RFID data sets: a gateway-based movement graph approach. IEEE Transactions on Knowledge and Data Engineering, 22, 90–104. CrossRef
16.
Zurück zum Zitat Gonzalez, H., Han, J., Li, X., & Klabjan, D. (2006). Warehousing and analyzing massive RFID data sets. In Proceedings of the 22nd international conference on data engineering (ICDE’06), Atlanta, USA. Gonzalez, H., Han, J., Li, X., & Klabjan, D. (2006). Warehousing and analyzing massive RFID data sets. In Proceedings of the 22nd international conference on data engineering (ICDE’06), Atlanta, USA.
17.
Zurück zum Zitat Gonzalez, H., Han, J., & Shen, X. (2007). Cost-conscious cleaning of massive RFID data sets. In Proceedings of the 23rd international conference on data engineering (ICDE’07), Istanbul, Turkey, April 2007. Gonzalez, H., Han, J., & Shen, X. (2007). Cost-conscious cleaning of massive RFID data sets. In Proceedings of the 23rd international conference on data engineering (ICDE’07), Istanbul, Turkey, April 2007.
18.
Zurück zum Zitat Gu, T., Wu, Z., Tao, X., Pung, H. K., & Lu, J. (2009). EpSICAR: an emerging patterns based approach to sequential, interleaved and concurrent activity recognition. In IEEE international conference on pervasive computing and communications, Los Alamitos, CA, USA. Gu, T., Wu, Z., Tao, X., Pung, H. K., & Lu, J. (2009). EpSICAR: an emerging patterns based approach to sequential, interleaved and concurrent activity recognition. In IEEE international conference on pervasive computing and communications, Los Alamitos, CA, USA.
19.
Zurück zum Zitat Huynh, T., Fritz, M., & Schiele, B. (2008). Discovery of activity patterns using topic models. In Proceedings of the 10th international conference on ubiquitous computing (Ubicomp ’08), Seoul, South Korea. Huynh, T., Fritz, M., & Schiele, B. (2008). Discovery of activity patterns using topic models. In Proceedings of the 10th international conference on ubiquitous computing (Ubicomp ’08), Seoul, South Korea.
20.
Zurück zum Zitat Jeffery, S., Alonso, G., Franklin, M., Hong, W., & Widom, J. (2006). Declarative support for sensor data cleaning. IEEE Pervasive Computing, 3968, 83–100. CrossRef Jeffery, S., Alonso, G., Franklin, M., Hong, W., & Widom, J. (2006). Declarative support for sensor data cleaning. IEEE Pervasive Computing, 3968, 83–100. CrossRef
21.
Zurück zum Zitat Jeffery, S., Franklin, M., & Garofalakis, M. (2008). An adaptive RFID middleware for supporting metaphysical data independence. The VLDB Journal, 17, 265–289. CrossRef Jeffery, S., Franklin, M., & Garofalakis, M. (2008). An adaptive RFID middleware for supporting metaphysical data independence. The VLDB Journal, 17, 265–289. CrossRef
22.
Zurück zum Zitat Jeffery, S., Garofalakis, M., & Franklin, M. (2006). Adaptive cleaning for RFID data streams. In Proceedings of the 32nd international conference on very large data bases (VLDB’06), Seoul, Korea, September 2006. Jeffery, S., Garofalakis, M., & Franklin, M. (2006). Adaptive cleaning for RFID data streams. In Proceedings of the 32nd international conference on very large data bases (VLDB’06), Seoul, Korea, September 2006.
23.
Zurück zum Zitat Juels, A. (2006). RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications, 24(2), 381–394. MathSciNetCrossRef Juels, A. (2006). RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications, 24(2), 381–394. MathSciNetCrossRef
24.
Zurück zum Zitat Juels, A., & Pappu, R. (2002). Squealing euros: privacy protection in RFID-enabled banknotes. In Financial cryptography (pp. 103–121). Berlin: Springer. Juels, A., & Pappu, R. (2002). Squealing euros: privacy protection in RFID-enabled banknotes. In Financial cryptography (pp. 103–121). Berlin: Springer.
25.
Zurück zum Zitat Khoussainova, N., Balazinska, M., & Suciu, D. (2008). Probabilistic event extraction from RFID data. Cancun, Mexico, April 2008. Khoussainova, N., Balazinska, M., & Suciu, D. (2008). Probabilistic event extraction from RFID data. Cancun, Mexico, April 2008.
26.
Zurück zum Zitat Ku, W.-S., Chen, H., Wang, H., & Sun, M.-T. (2012). A Bayesian inference-based framework for RFID data cleansing. IEEE Transactions on Knowledge and Data Engineering. doi:10.1109/TKDE.2012.116. Ku, W.-S., Chen, H., Wang, H., & Sun, M.-T. (2012). A Bayesian inference-based framework for RFID data cleansing. IEEE Transactions on Knowledge and Data Engineering. doi:10.​1109/​TKDE.​2012.​116.
27.
Zurück zum Zitat Lee, C.-H., & Chung, C.-W. (2008). Efficient storage scheme and query processing for supply chain management using RFID. In Proceedings of the 28th ACM SIGMOD international conference on management of data (SIGMOD’08), Vancouver, Canada. Lee, C.-H., & Chung, C.-W. (2008). Efficient storage scheme and query processing for supply chain management using RFID. In Proceedings of the 28th ACM SIGMOD international conference on management of data (SIGMOD’08), Vancouver, Canada.
28.
Zurück zum Zitat Liao, G., Li, J., Chen, L., & Wan, C. (2011). KLEAP: an efficient cleaning method to remove cross-reads in RFID streams. In Proceedings of the 20th ACM international conference on information and knowledge management (CIKM’11), Glasgow, Scotland, UK. Liao, G., Li, J., Chen, L., & Wan, C. (2011). KLEAP: an efficient cleaning method to remove cross-reads in RFID streams. In Proceedings of the 20th ACM international conference on information and knowledge management (CIKM’11), Glasgow, Scotland, UK.
29.
Zurück zum Zitat Liu, M., Li, M., Golovnya, D., Rundensteiner, E. A., & Claypool, K. (2009). Sequence pattern query processing over out-of-order event streams. In Proceedings of the 2009 IEEE international conference on data engineering (ICDE’09), Shanghai, China. Liu, M., Li, M., Golovnya, D., Rundensteiner, E. A., & Claypool, K. (2009). Sequence pattern query processing over out-of-order event streams. In Proceedings of the 2009 IEEE international conference on data engineering (ICDE’09), Shanghai, China.
30.
Zurück zum Zitat Massawe, L. V., Vermaak, H., & Kinyua, J. D. M. (2012). An adaptive data cleaning scheme for reducing false negative reads in RFID data streams. In Proceedings of the 2012 IEEE international conference on RFID (RFID’12), Orlando, USA, April 2012. Massawe, L. V., Vermaak, H., & Kinyua, J. D. M. (2012). An adaptive data cleaning scheme for reducing false negative reads in RFID data streams. In Proceedings of the 2012 IEEE international conference on RFID (RFID’12), Orlando, USA, April 2012.
31.
Zurück zum Zitat Nie, Y., Li, Z., & Chen, Q. (2011). Complex event processing over unreliable RFID data streams. In Proceedings of the 13th Asia-Pacific web conference on web technologies and applications (APWeb’11), Beijing, China. Nie, Y., Li, Z., & Chen, Q. (2011). Complex event processing over unreliable RFID data streams. In Proceedings of the 13th Asia-Pacific web conference on web technologies and applications (APWeb’11), Beijing, China.
32.
Zurück zum Zitat Ondrus, J., & Pigneur, Y. (2007). An assessment of NFC for future mobile payment systems. In Proceedings of the international conference on the management of mobile business, Toronto, Canada. Ondrus, J., & Pigneur, Y. (2007). An assessment of NFC for future mobile payment systems. In Proceedings of the international conference on the management of mobile business, Toronto, Canada.
33.
Zurück zum Zitat Osaka, K., Takagi, T., Yamazaki, K., & Takahashi, O. (2009). An efficient and secure RFID security method with ownership transfer. In RFID security (pp. 147–176). New York: Springer. Osaka, K., Takagi, T., Yamazaki, K., & Takahashi, O. (2009). An efficient and secure RFID security method with ownership transfer. In RFID security (pp. 147–176). New York: Springer.
34.
Zurück zum Zitat Rantzau, R., Kailing, K., Beier, S., & Grandison, T. (2006). Discovery services—enabling RFID traceability in EPCglobal networks. In 13th international conference on management of data (COMAD’06), Delhi, India. Rantzau, R., Kailing, K., Beier, S., & Grandison, T. (2006). Discovery services—enabling RFID traceability in EPCglobal networks. In 13th international conference on management of data (COMAD’06), Delhi, India.
35.
Zurück zum Zitat Rao, J., Doraiswamy, S., Thakkar, H., & Colby, L. S. (2006). A deferred cleansing method for RFID data analytics. In Proceedings of the 32nd international conference on very large data bases (VLDB’06), Seoul, Korea, September 2006. Rao, J., Doraiswamy, S., Thakkar, H., & Colby, L. S. (2006). A deferred cleansing method for RFID data analytics. In Proceedings of the 32nd international conference on very large data bases (VLDB’06), Seoul, Korea, September 2006.
36.
Zurück zum Zitat Ré, C., Letchner, J., Balazinksa, M., & Suciu, D. (2008). Event queries on correlated probabilistic streams. In Proceedings of the 2008 ACM international conference on management of data (SIGMOD’08), Vancouver, Canada. Ré, C., Letchner, J., Balazinksa, M., & Suciu, D. (2008). Event queries on correlated probabilistic streams. In Proceedings of the 2008 ACM international conference on management of data (SIGMOD’08), Vancouver, Canada.
37.
Zurück zum Zitat Rosen-Zvi, M., Chemudugunta, C., Griffiths, T., Smyth, P., & Steyvers, M. (2010). Learning author-topic models from text corpora. ACM Transactions on Information Systems, 28, 4:1–4:38. CrossRef Rosen-Zvi, M., Chemudugunta, C., Griffiths, T., Smyth, P., & Steyvers, M. (2010). Learning author-topic models from text corpora. ACM Transactions on Information Systems, 28, 4:1–4:38. CrossRef
38.
Zurück zum Zitat Sarma, S., Brock, D., & Engels, D. (2001). Radio frequency identification and the electronic product code. IEEE MICRO, 21(6), 50–54. 11/12. CrossRef Sarma, S., Brock, D., & Engels, D. (2001). Radio frequency identification and the electronic product code. IEEE MICRO, 21(6), 50–54. 11/12. CrossRef
39.
Zurück zum Zitat Sheng, Q. Z., Li, X., & Zeadally, S. (2008). Enabling next-generation RFID applications: solutions and challenges. Computer, 41(9), 21–28. CrossRef Sheng, Q. Z., Li, X., & Zeadally, S. (2008). Enabling next-generation RFID applications: solutions and challenges. Computer, 41(9), 21–28. CrossRef
40.
Zurück zum Zitat Sutton, C., & McCallum, A. (2007). An introduction to conditional random fields for relational learning. In L. Getoor & B. Taskar (Eds.), Introduction to statistical relational learning. Cambridge: MIT Press. Sutton, C., & McCallum, A. (2007). An introduction to conditional random fields for relational learning. In L. Getoor & B. Taskar (Eds.), Introduction to statistical relational learning. Cambridge: MIT Press.
41.
Zurück zum Zitat Tran, T., Sutton, C., Cocci, R., Yanming, N., Yanlei, D., & Shenoy, P. (2009). Probabilistic inference over RFID streams in mobile environments. In Proceedings of the 25th international conference on data engineering (ICDE’09), Shanghai, China, April 2009. Tran, T., Sutton, C., Cocci, R., Yanming, N., Yanlei, D., & Shenoy, P. (2009). Probabilistic inference over RFID streams in mobile environments. In Proceedings of the 25th international conference on data engineering (ICDE’09), Shanghai, China, April 2009.
42.
Zurück zum Zitat Wang, F., & Liu, P. (2005). Temporal management of RFID data. In Proceedings of the 31st international conference on very large data bases (VLDB’05), Trondheim, Norway. Wang, F., & Liu, P. (2005). Temporal management of RFID data. In Proceedings of the 31st international conference on very large data bases (VLDB’05), Trondheim, Norway.
43.
Zurück zum Zitat Wang, L., Cheung, D., Cheng, R., Lee, S., & Yang, X. (2012). Efficient mining of frequent itemsets on large uncertain databases. IEEE Transactions on Knowledge and Data Engineering, 24(12), 2170–2183. CrossRef Wang, L., Cheung, D., Cheng, R., Lee, S., & Yang, X. (2012). Efficient mining of frequent itemsets on large uncertain databases. IEEE Transactions on Knowledge and Data Engineering, 24(12), 2170–2183. CrossRef
44.
Zurück zum Zitat Want, R. (2006). An introduction to RFID technology. IEEE Pervasive Computing, 5(1), 25–33. CrossRef Want, R. (2006). An introduction to RFID technology. IEEE Pervasive Computing, 5(1), 25–33. CrossRef
45.
Zurück zum Zitat Wasserkrug, S., Gal, A., Etzion, O., & Turchin, Y. (2008). Complex event processing over uncertain data. In Proceedings of the second international conference on distributed event-based systems (DEBS’08), Rome, Italy. Wasserkrug, S., Gal, A., Etzion, O., & Turchin, Y. (2008). Complex event processing over uncertain data. In Proceedings of the second international conference on distributed event-based systems (DEBS’08), Rome, Italy.
46.
Zurück zum Zitat Wasserkrug, S., Gal, A., Etzion, O., & Turchin, Y. (2012). Efficient processing of uncertain events in rule-based systems. IEEE Transactions on Knowledge and Data Engineering, 24(1), 45–58. CrossRef Wasserkrug, S., Gal, A., Etzion, O., & Turchin, Y. (2012). Efficient processing of uncertain events in rule-based systems. IEEE Transactions on Knowledge and Data Engineering, 24(1), 45–58. CrossRef
47.
Zurück zum Zitat Wei, B., Fedak, G., & Cappello, F. (2005). Scheduling independent tasks sharing large data distributed with BitTorrent. In Proceedings of the 6th IEEE/ACM international workshop on grid computing (GRID’05), Seattle, USA. Wei, B., Fedak, G., & Cappello, F. (2005). Scheduling independent tasks sharing large data distributed with BitTorrent. In Proceedings of the 6th IEEE/ACM international workshop on grid computing (GRID’05), Seattle, USA.
48.
Zurück zum Zitat Welbourne, E., Khoussainova, N., Letchner, J., Li, Y., Balazinska, M., Borriello, G., & Suciu, D. (2008). Cascadia: a system for specifying, detecting, and managing RFID events. In Proceedings of the 6th international conference on mobile systems, applications, and services (MobiSys’08), Breckenridge, USA. Welbourne, E., Khoussainova, N., Letchner, J., Li, Y., Balazinska, M., Borriello, G., & Suciu, D. (2008). Cascadia: a system for specifying, detecting, and managing RFID events. In Proceedings of the 6th international conference on mobile systems, applications, and services (MobiSys’08), Breckenridge, USA.
49.
Zurück zum Zitat Wu, Y., Sheng, Q. Z., & Ranasinghe, D. (2011). Peer-to-peer objects tracking in the Internet of things. In Proceedings of the 40th international conference on parallel processing (ICPP’11), Taipei, Taiwan. Wu, Y., Sheng, Q. Z., & Ranasinghe, D. (2011). Peer-to-peer objects tracking in the Internet of things. In Proceedings of the 40th international conference on parallel processing (ICPP’11), Taipei, Taiwan.
50.
Zurück zum Zitat Wu, Y., Sheng, Q. Z., Ranasinghe, D., & Yao, L. (2012). PeerTrack: a platform for tracking and tracing objects in large-scale traceability networks. In Proceedings of the 15th international conference on extending database technology (EDBT’12), Berlin, Germany. Wu, Y., Sheng, Q. Z., Ranasinghe, D., & Yao, L. (2012). PeerTrack: a platform for tracking and tracing objects in large-scale traceability networks. In Proceedings of the 15th international conference on extending database technology (EDBT’12), Berlin, Germany.
51.
Zurück zum Zitat Zhao, Z., Yan, D., & Ng, W. (2012). Mining probabilistically frequent sequential patterns in uncertain databases. In Proceedings of the 15th international conference on extending database technology (EDBT’12), Berlin, Germany. Zhao, Z., Yan, D., & Ng, W. (2012). Mining probabilistically frequent sequential patterns in uncertain databases. In Proceedings of the 15th international conference on extending database technology (EDBT’12), Berlin, Germany.
52.
Zurück zum Zitat Ziekow, H., & Ivantysynova, L. (2008). A probabilistic approach for cleaning RFID data. In Proceedings of the 24th international conference on data engineering workshop (ICDEW’07), Istanbul, Turkey, April 2008. Ziekow, H., & Ivantysynova, L. (2008). A probabilistic approach for cleaning RFID data. In Proceedings of the 24th international conference on data engineering workshop (ICDEW’07), Istanbul, Turkey, April 2008.
Metadaten
Titel
RFID: Opportunities and Challenges
verfasst von
Yanbo Wu
Quan Z. Sheng
Sherali Zeadally
Copyright-Jahr
2013
Verlag
Springer London
DOI
https://doi.org/10.1007/978-1-4471-5164-7_7

Premium Partner