Open Access
Issue
MATEC Web Conf.
Volume 105, 2017
International Workshop on Transportation and Supply Chain Engineering (IWTSCE’16)
Article Number 00008
Number of page(s) 9
DOI https://doi.org/10.1051/matecconf/201710500008
Published online 14 April 2017
  1. Ajana, M. E., Boulmalf, M., Harroud, H. & Hamam, H. (2009). A Policy Based Event Management Middleware for Implementing RFID Applications, Proceedings of WiMOB 2009 5th International Conference on Wireless and Mobile Computing, Networking and Communications, ISBN 978-0-7695-3841-9, Marrakesh, Morocco, October 12-14, 2009. [Google Scholar]
  2. Al-Mousawi, H. (2004). Performance and Reliability of Radio Frequency Identification (RFID). [Google Scholar]
  3. Burnell, J. (2008). What Is RFID Middleware and Where Is It Needed?, In: RFID Update. [Google Scholar]
  4. Floerkemeier, C., Roduner, C.& Lampe, M. (2007). RFID Application Development with the Accada middleware Platform. IEEE Systems Journal, Vol.1 No.2, pp. 82–94, ISSN 1932-8184. [CrossRef] [Google Scholar]
  5. Floerkemeier, C. & Lampe, M. (2005). RFID Middleware Design: Addressing Application Requirements and RFID Constraints, Proceedings of SOC‘2005 Smart Objects Conference, pp. 219–224, ISBN 1-59593-304-2, Grenoble, France, October, 2005. [Google Scholar]
  6. Glasser, D.J. Goodman, K. W. –Einspruch, N. G. (2007). Chips, Tags and Scanners: Ethical Challenges for Radio Frequency Identification. Ethics and Information Technology, Vol.9, No.2, pp. 101–109, ISSN 1388-1957. [CrossRef] [Google Scholar]
  7. Molnar, D. – Wagner, D. (2004). Privacy and Security in Library RFID: Issues, Practices, and Architectures, Proceedings of ACM CCS 2004 11th Conference on Computer and Communication Security, ISBN 1-58113-961-6, Washington, DC, USA, October, 2004. [Google Scholar]
  8. Prabhu, B. S., Su, X., Ramamurthy, H., Chu, C. & Gadh, R. (2005 a). WinRFID: A Middleware for the Enablement of Radio Frequency Identification (RFID) Based Applications, In: Wireless Internet for the Mobile Enterprise Consortium (WINMEC). [Google Scholar]
  9. Prabhu, B. S., Su, X., Ramamurthy, H., Chu, P., Qiu, C. & Gadh, R. (2005 b).WinRFID: Middleware for Distributed RFID Infrastructure, In: Wireless Internet for the Mobile Enterprise Consortium (WINMEC). [Google Scholar]
  10. Sheng, Q.Z., Li, X., Zeadally, S. (2008). Enabling Next-Generation RFID Applications: Solutions and Challenges. IEEE Computer, Vol.41, No.9, pp. 21–28, ISSN 0018-9162. [Google Scholar]
  11. United States Government Accountability Office (2005). Information Security Radio Frequency Identification Technology in the Federal Government. [Google Scholar]
  12. A.Raghib, B.Abou El Majd (2014).”Multi-level optimal deployment of RFID readers by using particle swarm optimization”, Proceedings of META’14 5th International Conference on Metaheuristics and Nature Inspired Computing, Marrakesh, Morocco, October 27-31, 2014. [Google Scholar]
  13. Indrajit Bhattacharya, Uttam Kumar Roy, “Optimal Placement of Readers in an RFID Network Using Particle Swarm Optimization,” International Journal of Computer Networks & Communications– IJCNS, vol.2, no.6, November 2010. [Google Scholar]
  14. E. Jaselskis, T. El-Misalami, Implementing radio frequency identification in the construction process, Journal of Construction Engineering and Management (ASCE) 129 (6) (2003) 680–688. [CrossRef] [Google Scholar]
  15. S. Chae, T. Yoshida, Application of RFID Technology to prevention of collision accident with heavy equipment, Journal of Automation in Construction 19 (2010) 368–374. [CrossRef] [Google Scholar]
  16. C. Legner, F. Thiesse, RFID-Based maintenance at Frankfurt airport, IEEE Pervasive Computing 5 (1) (2006) 34–39. [Google Scholar]
  17. R. Want. An introduction to RFID technology. IEEE Pervasive Computing, 5(1): 25–33, Jan.-March 2006. [CrossRef] [Google Scholar]
  18. G. M. Gaukler, Item-level RFID in a retail supply chain with stock-out based substitution, IEEE Transactions on Industrial Informatics, vol.7, no.2, pp.362–370, 2011. [CrossRef] [Google Scholar]
  19. T.-M. Choi, “Coordination and risk analysis of VMI supply chains with RFID technology,” IEEE Transactions on Industrial Informatics, vol. 7, no. 3, pp. 497–504, 2011. [CrossRef] [Google Scholar]
  20. J. Vales-Alonso, V. Bueno-Delgado, E. Egea-Lopez, F. J. Gonzalez Castano, and J. Alcaraz, “Multiframe maximum-likelihood tag estimation for RFID anticollision protocols,” IEEE Transactions on Industrial Informatics, vol. 7, no. 3, pp. 487–496, 2011. [CrossRef] [Google Scholar]
  21. Y.-H. Chen, S.-J. Horng, R.-S. Run, J.-L. Lai, R.-J. Chen, W.-C. Chen, Y. Pan, and T. Takao, “A novel anti-collision algorithm in RFID systems for identifying passive tags,” IEEE Transactions on Industrial Informatics, vol. 6, no. 1, pp.105–121, 2010. [CrossRef] [Google Scholar]
  22. Roy W., Daniel M.R., “Ubiquitous Electronic Tagging,” IEEE Distributed Systems Online, Vol. 1, No 2, Jan. 2004. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.