Open Access
Issue
MATEC Web Conf.
Volume 125, 2017
21st International Conference on Circuits, Systems, Communications and Computers (CSCC 2017)
Article Number 02009
Number of page(s) 7
Section Systems
DOI https://doi.org/10.1051/matecconf/201712502009
Published online 04 October 2017
  1. E.M. Abu-Taieh, A.A.R. El Sheikh, Handbook of research on discrete event simulation environments: Technologies and applications, IGI Global, Hershey, New York (2010) [CrossRef]
  2. F.W.C. Araújo Filho, X.L. Travassos, P.S. Figueiredo, Use of the RFID technology to overcome inefficiencies in the production process: an analysis of a microcomputer company in Ilhéus – Bahia, Journal of Information Systems and Technology Management, Vol. 11, No. 1, pp. 65–84 (2014)
  3. R.E. Barlow, F. Proschan, Mathematical Theory of Reliability, John Wiley & Sons, New York, London, Sydney (1965)
  4. R.E. Barlow, F. Proschan, Statistical Theory of Reliability and Life Testing Probability Models, Holt, Rinehart and Winston Inc. (1975)
  5. D. Bobrowski, Modele i metody matematyczne teorii niezawodności, WNT, Warszawa (1985)
  6. I. Bose, E.W.T. Ngai, T.S.H. Teo, S. Spiekermann, Managing RFID projects in organizations, European Journal of Information Systems, 18, pp. 534–540 (2009) [CrossRef]
  7. B. Dodson, B. Nolan, Reliability Engineering Handbook, Marcel Dekker Inc. (1999)
  8. G.S. Fishman, Discrete event simulation. Modeling, programming and analysis, Springer, New York (2001) [CrossRef]
  9. F. Grabowski, J. Jaźwiński, Metody bayesowskie w niezawodności i diagnostyce, WKŁ, Warszawa (2001)
  10. C. Heinrich, RFID and Beyond: Growing Your Business Through Real World Awareness Wiley Publishing, Indianapolis (2005)
  11. J. Kannry, S. Emro, M. Blount, M. Ebling, Small-scale Testing of RFID in a Hospital Setting: RFID as Bed Trigger, AMIA 2007 Symposium Proceedings Archive, pp. 384–388 (2007) [EDP Sciences]
  12. M. Kiedrowicz (ed.), Zarządzanie informacjami wrażliwymi. Bezpieczeństwo dokumentów, wykorzystanie technologii RFID, WAT, Warszawa (2016)
  13. M. Kiedrowicz (ed.), Zarządzanie informacjami wrażliwymi. Wybrane aspekty organizacyjne, prawne i techniczne ochrony informacji niejawnych RFID, WAT, Warszawa (2015)
  14. B. Kopociński, Zarys teorii odnowy i niezawodności, PWN, Warszawa (1973)
  15. M.R. Lyu (ed.), Handbook of Software Reliability Engineering, McGraw-Hill (1996)
  16. Y.K. Malaiya, M.N. Li, J.M. Bieman, R. Karcich, Software reliability growth with test coverage, IEEE Transactions on Reliability, Vol.51, No.4, 420–426 (2002)
  17. T. Maniva, H. Sugano, M. Kato, Mass Data Read/Write Technology for UHF-Band RFID Tags, Fujitsu Sci. Tech. J., 43(4), 464–468 (2007)
  18. J. Musa, Software Reliability Engineering: More Reliable Software, Faster and Cheaper, AuthorHouse, Bloomington (2004)
  19. Pfefferman J.D., Cernuschi-Frias B., A no-parametric non-stationary procedure for failure prediction, IEEE Transactions on Reliability, Vol.51, No.4, 434–442 (2002) [CrossRef]
  20. H. Perros, Computer simulation techniques – the definitive introduction, North Carolina State University, Raleigh (2009)
  21. H. Pham, System Software Reliability, Springer (2006) [CrossRef]
  22. M. Rausand, A. Hoyland, System Reliability Theory: Models, Statistical Methods, and Applications, Wiley Series in Probability and Statistics, Wiley-Interscience (2003)
  23. S. M. Ross, Simulation, Elsevier Inc. (2006)
  24. B. Sinclair, Simulation of Computer Systems and Computer Networks: A Process-Oriented Approach, University Press, Cambridge UK (2004)
  25. Sołowjew A.D., Analityczne metody w teorii niezawodności, WNT, Warszawa 1983
  26. C.T. Stambaugh, F.W. Carpenter, Wireless innovation in inventory monitoring and accounting, Strategic Finance, Vol. 91(6), 35–40 (2009)
  27. S. Whang, Timing of RFID Adoption in a Supply Chain, Management Science, Vol. 56, No. 2, 343–355 (2010) [CrossRef]
  28. M. Kiedrowicz, T. Nowicki, R. Waszkowski, Z. Wesołowski, K. Worwa, Optimization of the Document Placement in the RFID Cabinet, EDP Science, MATEC Web of Conferences 76 02001, (2016), DOI:10.1051/matecconf/20167602001
  29. M. Kiedrowicz, T. Nowicki, R. Waszkowski, Z. Wesołowski, K. Worwa, Method for assessing software reliability of the document management system using the RFID technology, MATEC Web Conf., 76 (2016) 04009, DOI:https://doi.org/10.1051/matecconf/20167604009 [CrossRef] [EDP Sciences]
  30. M. Kiedrowicz, T. Nowicki, R. Waszkowski, Z. Wesołowski, K. Worwa, Software simulator for property investigation of document management system with RFID tags, MATEC Web Conf., 76 (2016) 04012, DOI: https://doi.org/10.1051/matecconf/20167604012 [CrossRef] [EDP Sciences]
  31. R. Waszkowski, A. Chodowska, M. Kiedrowicz, T. Nowicki, Z. Wesołowski, K. Worwa, Data flow between RFID devices in a modern restricted access administrative office, MATEC Web Conf., 76 (2016) 04004, DOI: https://doi.org/10.1051/matecconf/20167604004 [CrossRef] [EDP Sciences]
  32. M. Kiedrowicz, T. Nowicki, R. Waszkowski, Z. Wesolowski, and K. Worwa, Business processes in the RFID-equipped restricted access administrative office, MATEC Web Conf., 76 (2016) 04003, DOI: https://doi.org/10.1051/matecconf/20167604003. [CrossRef] [EDP Sciences]
  33. M. Kiedrowicz, Location with the use of the RFID and GPS technologies - opportunities and threats, GIS ODYSSEY 2016, pp. 122–128, (2016).
  34. M. Kiedrowicz, T. Nowicki, R. Waszkowski, Business process data flow between automated and human tasks, 3rd International Conference on Social Science (ICSS 2016) December 9–11 2016, pp. 471–477, (2016).

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.