Temporal Entity-Relationship Models-A Survey
IEEE Transactions on Knowledge and Data Engineering
Efficient Object Identification with Passive RFID Tags
Pervasive '02 Proceedings of the First International Conference on Pervasive Computing
Smart identification frameworks for ubiquitous computing applications
Wireless Networks - Special issue: Pervasive computing and communications
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
The value of handhelds in smart environments
Personal and Ubiquitous Computing
Communications of the ACM - Special issue: RFID
RFID privacy issues and technical challenges
Communications of the ACM - Special issue: RFID
RFID and the perception of control: the consumer's view
Communications of the ACM - Special issue: RFID
What does RFID do for the consumer?
Communications of the ACM - Special issue: RFID
Temporal management of RFID data
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Supporting RFID-based item tracking applications in Oracle DBMS using a bitmap datatype
VLDB '05 Proceedings of the 31st international conference on Very large data bases
The Pros and Cons of RFID in Supply Chain Management
ICMB '05 Proceedings of the International Conference on Mobile Business
The Evolution of RFID Security
IEEE Pervasive Computing
The design and evaluation of a query processing architecture for sensor networks
The design and evaluation of a query processing architecture for sensor networks
Journal of Computing Sciences in Colleges
Using RFID in the classroom to teach information systems principles
Journal of Computing Sciences in Colleges
Adaptive cleaning for RFID data streams
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
A deferred cleansing method for RFID data analytics
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Integrated RFID data modeling: an approach for querying physical objects in pervasive computing
CIKM '06 Proceedings of the 15th ACM international conference on Information and knowledge management
Intra-organizational perspectives on IT-enabled supply chains
Communications of the ACM - The patent holder's dilemma: buy, sell, or troll?
Mobile decision support for in-store purchase decisions
Decision Support Systems
Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision
Personal and Ubiquitous Computing
Supply chain information sharing in a macro prediction market
Decision Support Systems
Protocols for RFID tag/reader authentication
Decision Support Systems
Examining RFID applications in supply chain management
Communications of the ACM - Creating a science of games
The future of radio frequency identification
Journal of Theoretical and Applied Electronic Commerce Research
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
A framework for assessing the value of RFID implementation by tier-one suppliers to major retailers
Journal of Theoretical and Applied Electronic Commerce Research
Business IT alignment and technology adoption: the case of RFID in the logistics domain
Journal of Theoretical and Applied Electronic Commerce Research
Enhancing information flow in a retail supply chain using RFID and the EPC network
Journal of Theoretical and Applied Electronic Commerce Research
Traceable air baggage handling system based on RFID tags in the airport
Journal of Theoretical and Applied Electronic Commerce Research
Bridging physical and virtual worlds: complex event processing for RFID data streams
EDBT'06 Proceedings of the 10th international conference on Advances in Database Technology
Lightweight Cryptographic Authentication in Passive RFID-Tagged Systems
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Identifying RFID-embedded objects in pervasive healthcare applications
Decision Support Systems
Finding misplaced items in retail by clustering RFID data
Proceedings of the 13th International Conference on Extending Database Technology
Spatial inference using networks of RFID receiver: a Bayesian approach
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
RFID versus bar-coding systems: Transactions errors in health care apparel inventory control
Decision Support Systems
Hi-index | 0.00 |
RFID tags are increasingly being used in supply chain applications due to their potential in engendering supply chain visibility and reducing tracking errors through instantaneous location of objects as well as the tagged object's immediate ambient conditions. During its life-time, an RFID tag is highly likely to physically pass through different organizations that have disparate information systems with varying information needs. We consider management of data in these applications with respect to volume, data and query characteristics, privacy and security, among others, and propose means to reduce false positive and false negative reads. The beneficial properties of RFID tags can be realized only when they are readable with a high degree of accuracy. The read rate accuracy in turn depends on several factors including the medium and distance between tag and reader, presence of objects that are impenetrable by RF signal, orientation of tag with respect to the reader, among others. We propose three algorithms that address read rate accuracy, and illustrate their relative performance using an example scenario.