|
[1]S. Anusha, “RFIDcover: A Coverage Planning Tool for RFID Networks with Mobile Readers,” Master Thesis, Graduate Institute of Information Technology, Indian Institute of Technology Bombay, 2005. [2]M. Bhuptani and S. Moradpour, RFID Field Guild, 1st Edition, New York: Prentice-Hall, Inc., pp.35-50, 2005. [3]S. M. Birari, “Mitigating the Reader Collision Problem in RFID Networks with Mobile Readers,” Master Thesis, Graduate Institute of Information Technology, Indian Institute of Technology Bombay, 2005. [4]L. Bolotnyy, G. Robins, “Multi-Tag Radio Frequency Identification Systems,” Proceedings of Automatic Identification Advanced Technologies, pp.83- 88, October, 2005. [5]J. C. Burges, “A Tutorial on Support Vector Machines for Pattern Recognition,” Proceedings of Data Mining and Knowledge Discovery, vol. 2, pp. 121-167, 1998. [6]B. Carbunar, M. K. Ramanathan, M. Koyuturk, C. Hoffmann, and A. Grama, “Redundant Reader Elimination in RFID Systems,” Proceedings of Sensor and Ad Hoc Communications and Networks, IEEE SECON 2005, pp. 176- 184, September. 2005. [7]C. M. Chang, “An Active Network-Based Intrusion Detection and Response System,” Master Thesis, Department of Mechanical Engineering, National Taiwan University, 2002. [8]Y. T. Chang, “Robust Design for RFID System Testing and Applications,” Master Thesis, Graduate Institute of Industrial Engineering, National Taiwan University, 2006. [9]C. H. Chen, “Development of a e-Diagnostics System Based on Web-Services,” Master Thesis, Department of Mechanical Engineering, National Taiwan University, 2004. [10]C. S. Chen, “Development of an Intelligent Diagnosis and Maintenance System,” Master Thesis, Department of Mechanical Engineering, National Taiwan University, 2005. [11]W. C. Chang, “Modular Cell Controller Design and Development for RFID Based Flexible Manufacturing System,” Master Thesis, Institute of Industrial Engineering and Management, National Taipei University of Technology, 2006. [12]T. Cheong, Y. Kim and Y. Lee, “REMS and RBPTS: ALE-compliant RFID Middleware Software Platform,” Proceedings of the International Conference on Advanced Communication Technology, Vol. 1, pp.699-704, February 2006. [13]C. Corts and V. N. Vapnik, “Support vector networks,” Machine Learning, vol. 20, pp. 273-297, 1995. [14]V. Deolalikar, M. Mesarina, J. Recker, and S. Pradhan, Perturbative Time and Frequency Allocations for RFID Reader Networks, HP Tech Report, HPL-2005-162, September. 2005. [15]V. Deolalikar, M. Mesarina, J. Recker, and S. Pradhan, Simplified Clustering Algorithms for RFID Networks, HP Tech Report, HPL-2005-163, September. 2005 [16]D. Engels and S. Sarma, “The Reader Collision Problem,” Proceedings of IEEE International Conference on Systems, Man and Cybernetics, Vol. 3, pp. 6, 2002 [17]K. Finkenzeller, RFID-Handbook, 2nd Edition, New York: Wiley & Sons Ltd., 2003. [18]K. P. Fishkin, S. Roy, and B. Jiang, “Some methods for privacy in RFID communication,” Proceeding of 1st Eur. Workshop on Security in Ad-Hoc and Sensor Networks, 2004. [19]J. K. Ho, “Solving the Reader Collision Problem with a Hierarchical Q Learning Algorithm,” Master Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 2003. [20]S. Inoue and H. Yasuura, “RFID privacy using user-controllable uniqueness,” Proceedings of RFID Privacy Workshop, November 2003. [21]M. M. Iqbal, I. Gondal, and L. S. Dooley, “Dynamic Symmetrical Topology Models for Pervasive Sensor Networks,” Multitopic Conference, 2004. Proceedings of INMIC 2004, pp. 466 - 472, December. 2004. [22]M. Johansson, “Identification of the Main Factors Influencing an RFID Implementation in the Automotive and Pharmaceutical Industries”, Master Thesis, Department of Science and Technology, Linkopings University, 2005. [23]A. Juels, “RFID Security and Privacy: A Research Survey,” IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp. 381-394, February. 2006. [24]A. Juels, C. Blundo and S. Cimato “Minimalist cryptography for low-cost RFID tags,” Proceedings of 4th International Conference Security Communication. Vol. 3352, pp. 149-164, 2004 [25]A. Juels and J. Brainard, “Soft blocking: Flexible blocker tags on the cheap,” Proceedings of Workshop on Privacy in the Electronic Society, pp.1-7, 2004 [26]A. Juels and R. Pappu, “Squealing Euros: Privacy protection in RFID-enabled banknotes,” Proceddings of Fincancial Cryptography, Vol. 2742, pp.103-121, 2003 [27]A. Juels, R. L. Rivest, and M. Szydlo, “The blocker tag: Selective blocking of RFID tags for consumer privacy,” Proceeding of 8th ACM Conference, pp.103-111, 2003. [28]R. Kershner, “The number of circles covering a set,” Journal of Mathematics, Vol. 61, pp. 665, July 1939. [29]M. Keskilammi, L. Sydanheimo, and M. Kivikoski, “Radio Frequency Technology for Automated Manufacturing and Logistics Control. Part 1: Passive RFID Systems and the Effects of Antenna Parameters on Operational Distance.” Journal of Advanced Manufacturing Technology, Vol. 21, No. 10-11, pp. 769-774, April. 2002. [30]J. Kim, W. Lee, K. Yu, J. Myung, E. Kim and C. Lee, “Effect of Localized Optimal Clustering for Reader Anti-Collision in RFID Networks:Fairness Aspects to the Readers,” Proceedings of Computer Communications and Networks, pp. 497-502, 2005. [31]J. Lee and N. Kim, “Performance Test Tool for RFID Middleware: Parameters, Design, Implementation, and Features,” Proceedings of the International Conference on Advanced Communication Technology, Vol. 1, pp. 149-152, February 2006. [32]H. Mallinson, “Enhancing Identity with Location,” Master Thesis, Graduate Institute of Manufacturing, Cambridge University, 2003. [33]D. Molnar, A. Soppera, and D. Wagner, “Privacy for RFID through Trusted Computing,” Proceedings of Workshop on Orivacy in the Electron, 2005. [34]V. Prabakar, B. V. Kumar, and S. V. Subrahmanya, “Management of RFID-centric business networks using Web Services,” Proceedings of the AICT and ICIW, pp.133-140, February 2006. [35]K. V. S. Rao, D. W. Duan and H. Heinrich, “On the Read Zone Analysis of Radio Frequency Identification Systems with Transponders Oriented in Arbitrary Directions,” Proceedings of Asia-Pacific Microwave Conference, pp.758-761, November 1999. [36]S. E. Sarma, S. A. Weis, and D. W. Engels, RFID Systems, Security and Privacy Implications, AutoID Center, MIT, Cambridge, MA, Tech., 2002. [37]S. Shephard, RFID Radio Frequency Identification, 1st Edition, New York: McGraw-Hill Company Inc., pp.131-154, 2005. [38]J. Song and H. Kim, “The RFID Middleware System Supporting Context-Aware Access Control Service,” Proceedings of the International Conference on Advanced Communication Technology, Vol. 1, pp.863-866, February 2006. [39]V. Vapnik, Statistical Learning Theory, 1st Edition, New York: Wiley, 1998. [40]S. Viaene, B. Baesens, T. Van Gestel, J. A. K. Suykens, D. Van den Poel, J. Vanthienen, B. De Moor, and G. Dedene, “Knowledge Discovery in A Direct Marketing Case Using Least Squares Support Vector Machines”, International Journal of Intelligent Systems, Vol. 16, No. 2, pp.1023-1036, September 2001. [41]H. Vogt, “Efficient Object Identification with Passive RFID Tags,” International Conference on Pervasive Computing, Vol. 2414, pp. 98-113, 2002. [42]J. Waldrop, D. Engels, and S. Sarma, “Colorwave: An Anticollision Algorithm for the Reader Collision Problem,” Proceedings of IEEE International. Conference on Communications, Vol. 2, pp.1206-1210, 2003, [43]J. Waldrop, D. Engels, and S. Sarma, “Colorwave: A MAC for RFID Reader Networks,” Proceedings of IEEE Wireless Communications and Networking, Vol. 3, pp. 1701-1704, 2003. [44]W. Wang, DC McFarlane and JP Brusey, “Timing Analysis of Real-Time Networked RFID Systems,”17th Euromicro Conference on Real-Time Systems (ECRTS05), July. 2005. [45]J. Weston and C. Watkins, “Multi-Class Support Vector Machines,” Proceeding of ESANN99, 1999. [46]J. Yagi, E. Arai and T. Arai, “Parts and Packets Unification Radio Frequency Identification (RFID) Application for Construction,” Automation in Construction, pp.477-490, August 2005. [47]C. Y. Yu and H. P. Huang, “Development of the Order Fulfillment Process in the Foundry Fab by Applying Distributed Multi-Agents on A Generic Message-Passing Platform,” IEEE/ASME Transactions on Mechatronics, Vol. 6, No. 4, pp 387-398, December 2001. [48]M. R. Rieback, B. Crispo and A. S. Tanenbaum, “The Evolution of RFID Security,” IEEE Journal on Computation Society and Co-sponsored by the IEEE Communications Society, Vol. 5, No. 2, pp. 1536-1268, February. 2006. [49]H. Junius, D. W. Engels and S.E. Sarma, “HiQ: A Hierarchical Q-Learning Algorithm to Solve the Reader Collision Problem,” Proceedings of the International Symposium on Applications and the Internet Workshop, pp. 88-91, January 2006. [50]K. S. Leong, M. L. Ng, A. R. Grasso and P. H. Cole, “Synchronization of RFID Readers for Dense RFID Reader Environments,” Proceedings of the International Symposium on Applications and the Internet Workshop, pp. 48-51, January 2006. [51]Y. I. Kim, J. S. Park and Tea-Su Cheong, “Study of RFID Middleware Framework for Ubiquitous Computing Environment,” Proceedings of the International Conference on Advanced Communication Technology, Vol. 2, pp. 825-830, February 2005. [52]Accenture, Radio Frequency Identification (RFID) White Paper, 2001. [53]S. Leaver, Evaluating RFID Middleware, Forrester Research Inc., August 2004. [54]EPCglobal IncTM, The EPCglobal NetworkTM, September 2004 [55]EPCglobal IncTM, The EPCglobal Architecture Framework, September 2004. [56]EPCglobal IncTM, EPCTM Generation 1 Tag Data Standards Version 1.1 Rev.1.27, May 10, 2005. [57]EPCglobal IncTM, Object Naming Service (ONS), October 2005. [58]EPCglobal IncTM, The Application Level Events (ALE) Specification Version 1.0, September 2005. [59]EPCglobal IncTM, EPCTM Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860MHz -960MHz Version 1.0.9 , January 2005 [60]Federal Information, Advanced Encryption Standard (AES), November 2001 [61]e-Diagnostics and EEC Workshop, International SEMATECH, October 2001 [62]e-Diagnostics Guidebook, version 1.1, International SEMATECH, December 2001. [63]N. Singh, Computer-Integrated Design and Manufacturing, New York: Wiley, 1996. [64]D. Engels, “The Reader Collision Problem,” Technical Report, available at http://www.autoidcenter.org/research/MIT-AUTOID-WH-007.pdf [65]Syscan International Inc.http://www.syscan.com/w4/Main_Printers.htm [66]UCI Knowledge Discovery in Databases Archivehttp://kdd.ics.uci.edu [67]http://www.rfidjournal.com/ [68]http://www.morerfid.com [69]Omron http://www.omron.com.au/autoid/overview_rfid02.asp [70]http://mathworld.wolfram.com/CirclePacking.html [71]http://www.epcglobalinc.org/
|