Efficient memoryless protocol for tag identification (extended abstract)
DIALM '00 Proceedings of the 4th international workshop on Discrete algorithms and methods for mobile computing and communications
IEEE/ACM Transactions on Networking (TON)
Efficient Object Identification with Passive RFID Tags
Pervasive '02 Proceedings of the First International Conference on Pervasive Computing
LANDMARC: Indoor Location Sensing Using Active RFID
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
The Bloomier filter: an efficient data structure for static support lookup tables
SODA '04 Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms
Proceedings of the 2004 international symposium on Low power electronics and design
Steady-state analysis of a slotted and controlled Aloha system with blocking
ACM SIGCOMM Computer Communication Review
An optimal Bloom filter replacement
SODA '05 Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms
Novel Anti-collision Algorithms for Fast Object Identification in RFID System
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Workshops - Volume 02
An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Comparison of Transmission Schemes for Framed ALOHA based RFID Protocols
SAINT-W '06 Proceedings of the International Symposium on Applications on Internet Workshops
Adaptive splitting protocols for RFID tag collision arbitration
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Tree Slotted Aloha: a New Protocol for Tag Identification in RFID Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Beyond bloom filters: from approximate membership checks to approximate state machines
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Fast and reliable estimation schemes in RFID systems
Proceedings of the 12th annual international conference on Mobile computing and networking
Building high accuracy bloom filters using partitioned hashing
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Cardinality Estimation for Large-scale RFID Systems
PERCOM '08 Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
Efficient storage scheme and query processing for supply chain management using RFID
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Sherlock: automatically locating objects for humans
Proceedings of the 6th international conference on Mobile systems, applications, and services
SixthSense: RFID-based Enterprise Intelligence
Proceedings of the 6th international conference on Mobile systems, applications, and services
An anti-collision algorithm using two-functioned estimation for RFID tags
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
Interference cancellation-based RFID tags identification
Proceedings of the 14th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Energy-efficient polling protocols in RFID systems
MobiHoc '11 Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing
Probabilistic missing-tag detection and energy-time tradeoff in large-scale RFID systems
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
Efficient median estimation for large-scale sensor RFID systems
International Journal of Sensor Networks
Continuous scanning with mobile reader in RFID systems: an experimental study
Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing
Informative counting: fine-grained batch authentication for large-scale RFID systems
Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing
Efficient protocols for identifying the missing tags in a large RFID system
IEEE/ACM Transactions on Networking (TON)
Personal and Ubiquitous Computing
Hi-index | 0.00 |
RFID is an emerging technology with many potential applications such as inventory management for supply chain. In practice, these applications often need a series of continuous scanning operations to accomplish a task. For example, if one wants to scan all the products with RFID tags in a large warehouse, given a limited reading range of an RFID reader, multiple scanning operations have to be launched at different locations to cover the whole warehouse. Usually, this series of scanning operations are not completely independent as some RFID tags can be read by multiple processes. Simply scanning all the tags in the reading range during each process is inefficient because it collects a lot of redundant data and consumes a long time. In this paper, we develop efficient schemes for continuous scanning operations defined in both spatial and temporal domains. Our basic idea is to fully utilize the information gathered in the previous scanning operations to reduce the scanning time of the succeeding ones. We illustrate in the evaluation that our algorithms dramatically reduce the total scanning time when compared with other solutions.