2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06)
DOI: 10.1109/wowmom.2006.112
|View full text |Cite
|
Sign up to set email alerts
|

Tree Slotted Aloha: a New Protocol for Tag Identification in RFID Networks

Abstract: In this paper, we approach the problem of identifying a set of objects in an RFID network.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
82
0

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 90 publications
(83 citation statements)
references
References 9 publications
(21 reference statements)
1
82
0
Order By: Relevance
“…Similar to ALOHA throughput improvement, different approaches have been proposed to improve the energy efficiency of (framed) slotted ALOHA [11][12][13][14]. For instance, optimizing the frame size [11] and nodes' access (transmission) probabilities [12] are ways to improve the energy efficiency of slotted ALOHA.…”
Section: State Of the Art On Aloha Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…Similar to ALOHA throughput improvement, different approaches have been proposed to improve the energy efficiency of (framed) slotted ALOHA [11][12][13][14]. For instance, optimizing the frame size [11] and nodes' access (transmission) probabilities [12] are ways to improve the energy efficiency of slotted ALOHA.…”
Section: State Of the Art On Aloha Protocolmentioning
confidence: 99%
“…For instance, optimizing the frame size [11] and nodes' access (transmission) probabilities [12] are ways to improve the energy efficiency of slotted ALOHA. The work reported in [13] also suggests a probabilistic approach, called tree slotted ALOHA, to lower the number of transmissions in the system which consequently results in energy saving. In this work, we attempt to improve the energy efficiency of ALOHA protocol via exploiting adaptive access probabilities at the users.…”
Section: State Of the Art On Aloha Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…The reader continues splitting and probing until each individual tag is identified (Law et al, 2000;Micic et al, 2005;Myung and Lee, 2005). The second category is based on the ALOHA protocol and the Slotted ALOHA protocol (Madden et al, 2002a;Cha and Kim, 2005;Bonuccelli et al, 2006;Sheng et al, 2008;Tan et al, 2008;Sheng et al, 2010;Xie et al, 2010). Probabilistic estimation algorithms which efficiently estimate the cardinality of RFID tags have been proposed in numerous works (Cha and Kim, 2006;Kodialam and Nandagopal, 2006;Qian et al, 2008;Han et al, 2010).…”
Section: Related Workmentioning
confidence: 99%
“…Each tag ID in the probabilistic schemes will have a chance to be retrieved successfully; however, there is a possibility that some tags may not be accessed due to recurrent collisions. Other than the above two categories, some hybrid schemes are also proposed; for instance, Bonuccelli et al proposed a tree slotted ALOHA (TSA) is proposed in (Bonuccelli et al 2006), and Shin et al also proposed another hybrid tag anti-collision scheme (Shin et al 2007). Because the fundamental binary tree-search scheme interrogates one branch completely to obtain a tag ID, it is naturally slow.…”
Section: Time Division Multiple Access (Tdma) Based Schemesmentioning
confidence: 99%