Physical Access Control for Captured RFID Data
IEEE Pervasive Computing
Management of data with uncertainties
Proceedings of the sixteenth ACM conference on Conference on information and knowledge management
Event queries on correlated probabilistic streams
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Sherlock: automatically locating objects for humans
Proceedings of the 6th international conference on Mobile systems, applications, and services
SixthSense: RFID-based Enterprise Intelligence
Proceedings of the 6th international conference on Mobile systems, applications, and services
Cascadia: A System for Specifying, Detecting, and Managing RFID Events
Proceedings of the 6th international conference on Mobile systems, applications, and services
RFID: An Ideal Technology for Ubiquitous Computing?
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Longitudinal study of a building-scale RFID ecosystem
Proceedings of the 7th international conference on Mobile systems, applications, and services
Specification and verification of complex location events with panoramic
Pervasive'10 Proceedings of the 8th international conference on Pervasive Computing
RFID-based patient tracking for regional collaborative healthcare
International Journal of Computer Applications in Technology
Generation of RFID test datasets using RSN tool
Personal and Ubiquitous Computing
Hi-index | 0.00 |
The success of RFID in supply chain management is leading many to consider more personal and pervasive deployments of this technology. Unlike industrial settings, however, deployments that involve humans raise new and critical problems related to privacy, security, uncertainty, and a more diverse and evolving set of applications. At the University of Washington, we are deploying a building-wide RFID-based infrastructure with hundreds of antennas and thousands of tags. Our goal is to uncover the issues of pervasive RFID deployments and devise techniques for addressing these issues before such deployments become common place. In this paper, we present the challenges encountered and lessons learned during a smaller-scale pilot deployment of the system. We show some preliminary results and, for each challenge, discuss how we addressed it or how we are planning on addressing it.