Finding popular categories for RFID tags
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Efficient processing of probabilistic reverse nearest neighbor queries over uncertain data
The VLDB Journal — The International Journal on Very Large Data Bases
Migration motif: a spatial - temporal pattern mining approach for financial markets
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
A Framework for Trajectory Clustering
GSN '09 Proceedings of the 3rd International Conference on GeoSensor Networks
Efficient and effective RFID data warehousing
IDEAS '09 Proceedings of the 2009 International Database Engineering & Applications Symposium
Myopic sensing for multiple SUs in multichannel opportunistic access
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
A coalitional game model for cooperative cognitive radio networks
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Towards mobility-based clustering
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
The impact of reader to tag collision on RFID tag identification
WASA'10 Proceedings of the 5th international conference on Wireless algorithms, systems, and applications
Two-stage target locating algorithm in three dimensional WSNs under typical deployment schemes
WASA'10 Proceedings of the 5th international conference on Wireless algorithms, systems, and applications
Effectively monitoring RFID based systems
ADBIS'10 Proceedings of the 14th east European conference on Advances in databases and information systems
Destination board system based on photographs
KES'10 Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part IV
The optimal k-covering tag deployment for RFID-based localization
Journal of Network and Computer Applications
Social interaction mining in small group discussion using a smart meeting system
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
Non-separable transforms for clustering trajectories
KES'11 Proceedings of the 15th international conference on Knowledge-based and intelligent information and engineering systems - Volume Part II
SMART: Stream Monitoring enterprise Activities by RFID Tags
Information Sciences: an International Journal
Probabilistic missing-tag detection and energy-time tradeoff in large-scale RFID systems
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
How long to wait?: predicting bus arrival time with mobile phone based participatory sensing
Proceedings of the 10th international conference on Mobile systems, applications, and services
Finding homogeneous groups in trajectory streams
Proceedings of the Third ACM SIGSPATIAL International Workshop on GeoStreaming
RFID-data compression for supporting aggregate queries
ACM Transactions on Database Systems (TODS)
Sequential pattern mining from trajectory data
Proceedings of the 17th International Database Engineering & Applications Symposium
A framework of traveling companion discovery on trajectory data streams
ACM Transactions on Intelligent Systems and Technology (TIST) - Special Section on Intelligent Mobile Knowledge Discovery and Management Systems and Special Issue on Social Web Mining
Dealing with trajectory streams by clustering and mathematical transforms
Journal of Intelligent Information Systems
Hi-index | 0.00 |
Activity monitoring, a crucial task in many applications, is often conducted expensively using video cameras. Also, effectively monitoring a large field by analyzing images from multiple cameras remains a challenging problem. In this paper, we introduce a novel application of the recently developed RFID technology: using RF tag arrays for activity monitoring, where data mining techniques play a critical role. The RFID technology provides an economically attractive solution due to the low cost of RF tags and readers. Another novelty of this design is that the tracking objects do not need to attach any transmitters or receivers, such as tags or readers. By developing a practical fault-tolerant method, we offset the noise of RF tag data and mine frequent trajectory patterns as models of regular activities. Our empirical study using real RFID systems and data sets verifies the feasibility and the effectiveness of our design.