|
[1] Shailesh M. Birari and Sridhar Iyer, “Mitigating The Reader Collision Problem in RFID Networks”, International Conference on Networking (ICON), 2005. [2] Bogdan C˘arbunar, Murali Krishna Ramanathan, Mehmet Koyut¨urk, Christoph Hoffmann and Ananth Grama, “Redundant Reader Elimination in RFID Systems”, Proceedings of IEEE SECON, pp. 176-184, 2005. [3] Bogdan C˘arbunar, “Coverage problems in wireless sensor and RFID system,” Technical Report 2005-40 Purdue University 2005. [4] M. Cardei and J. Wu. “Coverage in Wireless Sensor Networks. Handbook of Sensor Networks,” CRC Press, 2004 [5] J. R. Cha and J. H. Kim, “Novel Anti-collision Algorithms for Fast Object Identification in RFID system,” in Proc. ICPADS2005, Fukuoka, Japan, Jul. 20-22, 2005, pp. 63-67 [6] J. R. Cha and J. H. Kim, “Dynamic Framed Slotted ALOHA Algorithm using Fast Tag Estimation method for RFID System,” in Proc. CCNC2006, Las Vegas, USA, Jan. 8-10, 2006. [7] D. W. Engels and S. E. Sarma, “The reader collision problem,” Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 2002. [8] Ching-Hsien Hsu, Yi-Min Chen and Chao-Tung Yang, “A Layered Optimization Approach for Redundant Reader Elimination in Wireless RFID Networks”, Proceedings of the IEEE APSCC, pp. 138–145, 2007. [9] Junius Ho, Daniel W. Engels and Sanjay E. Sarma, “HiQ: A Hierarchical Q-Learning Algorithm to Solve the Reader Collision Problem,” Proceedings of the International Symposium on Applications and the Internet Workshops (SAINTW'06), pp. 88-91, 2006. [10] Nazish Irfan and Mustapha C.E. Yagoub, “Efficient Approach for Redundant Reader Elimination in Large-Scale RFID Networks”, Proceedings of the IEEE ICIIC, pp. 102, 2010. [11] Ari Juels, Ronald L. Rivest, and Michael Szydlo, “The blocker tag: selective blocking of RFID tags for consumer privacy,” Proceedings of the 10th ACM Conference on Computer and communications security, pp. 103–111, 2003. [12] Joongheon Kim, Sunhyoung Kim, Dongshin Kim, Wonjun Lee and Eunkyo Kim, “Low-Energy Localized Clustering: An Adaptive Cluster Radius Configuration Scheme for Topology Control in Wireless Sensor Networks,” Proceedings of the IEEE Vehicular Technology Conference (VTC), pp. 2546-2550, 2005. [13] Sanjay E. Sarma, Stephen A. Weis, and Daniel W. Engels, “RFID systems and security and privacy implications,” Proceedings of the 4th international workshop on Cryptographic Hardware and Embedded Systems, LNCS 2523, pp. 454–469. [14] Sasa Slijepcevic and Miodrag Potkonjak, “Power efficient organization of wireless sensor networks,” Proceedings of IEEE ICC, pp. 472-476, 2001. [15] Joao Luıs Sobrinho, Roland de Haan and Jose Manuel Brazio, “Why RTS-CTS is not your ideal wireless LAN multiple access protocol,” Proceedings of the IEEE Wireless Communications and Networking Conference, pp. 81-87, 2005. [16] Di Tian and Nicolas D. Georganas, “A coverage-preserving node scheduling scheme for large wireless sensor networks,” Proceedings of the 1st ACM WSNA’02, pp. 32–41, 2002. [17] James Waldrop, Daniel W. Engels and Sanjay E. Sarma, “Colorwave: an anticollision algorithm for the reader collision problem,” Proceedings of the IEEE International Conference on Communications, pp. 1206-1210, 2003. [18] Xin Wang and Koushik Kar, “Throughput modelling and fairness issues in CSMA/CA based ad-hoc networks,” Proceedings of the 24th Annual Joint Conference on IEEE Computer and Communications Societies (INFOCOM 2005), pp. 23 – 34, 2005. [19] Stephen Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels, ”Security and privacy aspects of low-cost radio frequency identification systems,” Security in Pervasive Computing, LNCS 2803, pp. 201-212, 2004. [20] Fun Ye, Shiann-Tsong Sheu, Tobias Chen and Jenhui Chen, “The Impact of RTS Threshold on IEEE 802.11 MAC Protocol,” Tamkang Journal of Science and Engineering, Vol. 6, No. 1, pp. 57-63 2003. [21] Fan Ye, Gary Zhong, Songwu Lu and Lixia Zhang, “Peas: a robust energy conserving protocol for long-lived sensor networks,” Proceedings of the 23rd IEEE ICDCS, pp.28-37, 2003. [22] Kun-Ming Yu, Chang Wu Yu and Zheng-Yi Lin, “A Density-Based Algorithm for Redundant Reader Elimination in a RFID Network”, Proceedings of the IEEE FGCN, pp. 89, 2008. [23] Zhi-Ying Yang and Jun-Liang Chen, “The Simulation and Analysis of Algorithms for Redundant Reader Elimination in RFID System”, Proceedings of the IEEE EMS, pp. 494, 2009. [24] Honghai Zhang and Jennifer C. Hou, “Maintaining sensing coverage and connectivity in large sensor networks,” Wireless Ad Hoc and Sensor Networks: An International Journal, Vol. 1, No. 1-2, pp. 89-123, January 2005.
|