Mobile Media: Making It a Reality
Queue - Mobile Computing
Temporal management of RFID data
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Leveraging the subtleties of location
Proceedings of the 2005 joint conference on Smart objects and ambient intelligence: innovative context-aware services: usages and technologies
Computer
Adaptive cleaning for RFID data streams
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
CRUSE: a context reactive natural language mobile interface
WICON '06 Proceedings of the 2nd annual international workshop on Wireless internet
RFID, privacy and the perception of risk: A strategic framework
The Journal of Strategic Information Systems
A 915 MHz UHF low power RFID tag
Proceedings of the 20th annual conference on Integrated circuits and systems design
The future of radio frequency identification
Journal of Theoretical and Applied Electronic Commerce Research
Exploring the inherent benefits of RFID and automated self-serve checkouts in a B2C environment
International Journal of Business Information Systems
RFID as enabler for the boundless real-time organisation: empirical insights from Germany
International Journal of Networking and Virtual Organisations
A design automation and power estimation flow for RFID systems
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Designing for participation in public knowledge institutions
Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges
Efficient RFID Data Imputation by Analyzing the Correlations of Monitored Objects
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
Information Security Tech. Report
Enhanced monitoring of tuberculosis patients by using RFID technologies
International Journal of Mobile Communications
Rethinking RFID: awareness and control for interaction with RFID systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Visible and controllable RFID tags
CHI '10 Extended Abstracts on Human Factors in Computing Systems
Fast track article: A temporal RFID data model for querying physical objects
Pervasive and Mobile Computing
Leveraging spatio-temporal redundancy for RFID data cleansing
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Load-balancing mechanism for the RFID middleware applications over grid networking
Journal of Network and Computer Applications
The optimal k-covering tag deployment for RFID-based localization
Journal of Network and Computer Applications
Soft computing techniques for issues in existing RFID systems
ICCC'11 Proceedings of the 2011 international conference on Computers and computing
A cross-national comparison of perceived strategic importance of RFID for CIOs in Germany and Italy
International Journal of Information Management: The Journal for Information Professionals
Data management in RFID applications
DEXA'07 Proceedings of the 18th international conference on Database and Expert Systems Applications
An RFID and particle filter-based indoor spatial query evaluation system
Proceedings of the 16th International Conference on Extending Database Technology
MagnetiCode: physical mobile interaction through time-encoded magnetic identification tags
Proceedings of the 8th International Conference on Tangible, Embedded and Embodied Interaction
Designing an Anti-swindle Mahjong Leisure Prototype System using RFID and ontology theory
Journal of Network and Computer Applications
Hi-index | 0.00 |
Many modern technologies give the impression they work by magic, particularly when they operate automatically and their mechanisms are invisible. A technology called RFID (radio frequency identification), which is relatively new to the mass market, has exactly this characteristic and for many people seems a lot like magic. RFID is an electronic tagging technology that allows an object, place, or person to be automatically identified at a distance without a direct line-of-sight, using an electromagnetic challenge/response exchange. Typical applications include labeling products for rapid checkout at a point-of-sale terminal, inventory tracking, animal tagging, timing marathon runners, secure automobile keys, and access control for secure facilities.