A tutorial on hidden Markov models and selected applications in speech recognition
Readings in speech recognition
Bridging physical and virtual worlds with electronic tags
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Applications of context-aware computing in hospital work: examples and design principles
Proceedings of the 2004 ACM symposium on Applied computing
LANDMARC: indoor location sensing using active RFID
Wireless Networks - Special issue: Pervasive computing and communications
Inferring Activities from Interactions with Objects
IEEE Pervasive Computing
Characterizing mobility and network usage in a corporate wireless local-area network
Proceedings of the 1st international conference on Mobile systems, applications and services
RFID-based techniques for human-activity detection
Communications of the ACM - Special issue: RFID
RFID enhances visitors' museum experience at the Exploratorium
Communications of the ACM - Special issue: RFID
Temporal management of RFID data
VLDB '05 Proceedings of the 31st international conference on Very large data bases
MauveDB: supporting model-based user views in database systems
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Some sensor network elements for ubiquitous computing
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Analysis of a campus-wide wireless network
Wireless Networks
Adaptive cleaning for RFID data streams
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Challenges for Pervasive RFID-Based Infrastructures
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Event queries on correlated probabilistic streams
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Sherlock: automatically locating objects for humans
Proceedings of the 6th international conference on Mobile systems, applications, and services
SixthSense: RFID-based Enterprise Intelligence
Proceedings of the 6th international conference on Mobile systems, applications, and services
Cascadia: A System for Specifying, Detecting, and Managing RFID Events
Proceedings of the 6th international conference on Mobile systems, applications, and services
An empirical study of UHF RFID performance
Proceedings of the 14th ACM international conference on Mobile computing and networking
Challenges for Event Queries over Markovian Streams
IEEE Internet Computing
Access Methods for Markovian Streams
ICDE '09 Proceedings of the 2009 IEEE International Conference on Data Engineering
Probabilistic Inference over RFID Streams in Mobile Environments
ICDE '09 Proceedings of the 2009 IEEE International Conference on Data Engineering
Building the Internet of Things Using RFID: The RFID Ecosystem Experience
IEEE Internet Computing
Assessing and optimizing the range of UHF RFID to enable real-world pervasive computing applications
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
A long-term evaluation of sensing modalities for activity recognition
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Learning and recognizing the places we go
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
Ferret: RFID localization for pervasive multimedia
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
GSN '09 Proceedings of the 3rd International Conference on GeoSensor Networks
On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors
Proceedings of the 8th international conference on Mobile systems, applications, and services
A "Gen 2" RFID monitor based on the USRP
ACM SIGCOMM Computer Communication Review
Update propagation in a streaming warehouse
SSDBM'11 Proceedings of the 23rd international conference on Scientific and statistical database management
A 3-D indoor radio propagation model for WiFi and RFID
Proceedings of the 9th ACM international symposium on Mobility management and wireless access
Specification and verification of complex location events with panoramic
Pervasive'10 Proceedings of the 8th international conference on Pervasive Computing
Proceedings of the 11th international conference on Information Processing in Sensor Networks
Flit: a bulk transmission protocol for RFID-scale sensors
Proceedings of the 10th international conference on Mobile systems, applications, and services
An RFID and particle filter-based indoor spatial query evaluation system
Proceedings of the 16th International Conference on Extending Database Technology
Hi-index | 0.00 |
Radio Frequency IDentification (RFID) deployments are becoming increasingly popular in both industrial and consumer-oriented settings. To effectively exploit and operate such deployments, important challenges must be addressed, from managing RFID data streams to handling limitations in reader accuracy and coverage. Furthermore, deployments that support pervasive computing raise additional issues related to user acceptance and system utility. To better understand these challenges, we conducted a four-week study of a building-scale EPC Class-1 Generation-2 RFID deployment, the "RFID Ecosystem", with 47 readers (160 antennas) installed throughout an 8,000 square meter building. During the study, 67 participants having over 300 tags accessed the collected RFID data through applications including an object finder and a friend tracker and several tools for managing personal data. We found that our RFID deployment produces a very manageable amount of data overall, but with orders of magnitude difference among various participants and objects. We also find that the tag detection rates tend to be low with high variance across the type of tag, participant and object. Users need expert guidance to effectively mount their tags and are encouraged by compelling applications to wear tags more frequently. Finally, probabilistic modeling and inference techniques promise to enable more complex applications by smoothing over gaps and errors in the data, but must be applied with care as they add significant computational and storage overhead.