2019
DOI: 10.1109/tnet.2019.2936977
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Range Queries for Large-Scale Sensor-Augmented RFID Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(22 citation statements)
references
References 31 publications
0
22
0
Order By: Relevance
“…Such problem has been studied in the previous work [39][40] and is outside the scope of this paper. Moreover, the authors in the literature [41] recently verified that bitwise synchronization is feasible in the UHF RFID system by carrying out the practical experiments with USRP and WISP tags. Also, we make similar assumption that a communication channel between the reader and tags is error-free and with no capture-effect [13][14] [17][18][19] [23][24][25][26][27][28][29][30][31][32][33][34][35][36].…”
Section: Preliminaries: Bit Tracking and Id Querymentioning
confidence: 99%
“…Such problem has been studied in the previous work [39][40] and is outside the scope of this paper. Moreover, the authors in the literature [41] recently verified that bitwise synchronization is feasible in the UHF RFID system by carrying out the practical experiments with USRP and WISP tags. Also, we make similar assumption that a communication channel between the reader and tags is error-free and with no capture-effect [13][14] [17][18][19] [23][24][25][26][27][28][29][30][31][32][33][34][35][36].…”
Section: Preliminaries: Bit Tracking and Id Querymentioning
confidence: 99%
“…1 The protocols for the group writing problem require a time-consuming preprocess that writes an additional bit-vector into the user memory of each tag. 2 Therefore, they can not be applied to an RFID system that contains read-only tags (read-only tags do not have any user memory into which the userspecific data can be stored).…”
Section: A Prior Arts and Limitationsmentioning
confidence: 99%
“…(2) Randomly choose N different EPCs from U to form set S and then randomly choose n EPCs from S to form set P; (3) Do exhaustive enumeration to find all the 1-filter-strings for the sets: S and P which are determined in step (2), and record this number; (4) Repeat step (2) and (3) for 10 5 times to compute the average number of 1-filter-strings for the number n. Please note that the average number we get in the above procedure provides a simulated upper bound of the probability of existence of 1-filter-string solution for a given parameter n. Fig. 2 shows the average number of 1-filterstring solutions for the two settings.…”
Section: Select Commandmentioning
confidence: 99%
“…Passive RFID tags are small and sufficiently cheap to be widely used in applications such as logistics and warehousing [11,12]. Moreover, researchers have found that RFID tags can be used to detect the object usage by attaching them on objects used every day [13]. Fazzzinga et al even utilized RFID tags to trace the objects both online and offline [14,15,16].…”
Section: Design Of the Rf-arp Frameworkmentioning
confidence: 99%