Back to Results
First PageMeta Content
Human–computer interaction / Electronic engineering / Ubiquitous computing / Wireless / Mobile RFID / Electronic Product Code / Bulk reading / RuBee / Radio-frequency identification / Automatic identification and data capture / Technology


Negotiate Power and Performance in the Reality of RFID Systems Xunteng Xu∗ , Lin Gu† , Jianping Wang∗ and Guoliang Xing‡ of Computer Science, City University of Hong Kong † Department of Computer Science and En
Add to Reading List

Document Date: 2014-11-17 13:32:24


Open Document

File Size: 1,26 MB

Share Result on Facebook

City

New York / Washington / DC / Secure Hash / /

Company

Large RFID Systems / TM Radio / John Wiley & Sons Ltd. / Samsung / Convergence Systems Limited / Nokia / Wireless Sensor Networks / EMC Technologies / /

Country

United States / /

/

Event

FDA Phase / /

Facility

Hong Kong University of Science / City University of Hong Kong / Michigan State University / /

IndustryTerm

constant-power inventory algorithm / battery energy / undesirable energy waste / tag technology / energy-constrained systems / energy waste / public transportation / Wireless Communications / transmission energy / energy-efficient inventory algorithm / transportation checkpoints / energy consumptions / energy / pervasive computing environments / estimation algorithms / energy-efficient algorithm / energy consumption / sensor networks / ad hoc networking / power management / tag estimation algorithm / insufficient energy store / sufficient energy / communication protocols / energy efficiency / computing / tag hardware / wireless communication / average energy consumption / non-stop carrier wave / Wireless Dynamics SDiD / selection algorithm / energy efficient techniques / rfid anticollision algorithm / Wireless Dynamics / collision protocols / energy efficient algorithm / tag number estimation algorithm / power-oblivious systems / reader chips / inventory algorithm / energy saving / estimation algorithm / reader chip / energy consumption data / /

MusicAlbum

Pi / Ti / /

Organization

City University of Hong Kong / Department of Computer Science and Engineering / Michigan State University / Hong Kong University of Science & Technology / EPC / HKUST RFID Lab / IEEE Computer Society / /

Person

Carol Lo / Ke Chen / Peter Ng / Li Li / Shing-Chi Cheung / Lin Gu / /

Position

guard / Major / /

Product

Cbound / Nokia 3220 Cellular Phone / RFIDenabled mobile phones / Generation-2 / RFIDenabled / C1G2 / /

ProgrammingLanguage

php / DC / LabVIEW / /

RadioStation

WCMC / /

Technology

Class-1 Generation-2 UHF RFID Protocol / C1G2 protocol / ALOHA-based protocol / Provably Secure Hash-Based RFID Protocol / APS algorithm / rfid generation-2 protocol / existing tag technology / reader chips / mobile phones / PS algorithm / html / Adaptive splitting protocols / tree-based protocols / two algorithms / collision protocols / rfid anticollision algorithm / RFID inventory algorithm / ISO 18000-6C RFID Protocol / RFID protocols / tag estimation algorithm / cell phones / C1G2 algorithm / PDA / inventory algorithm / RFID reader chip / 2 protocol / selection algorithm / three algorithms / proposed RFID inventory algorithm / tag number estimation algorithm / Wireless Communications / C1G2 RFID protocol / Generation-2 RFID Protocol / constant-power inventory algorithm / RFID algorithm / Microwave / Energy Tag Arbitration Protocol / estimation algorithms / Anti-collision Algorithms / RFID algorithms / existing protocols / cellular telephone / flash memory / Automatic Power Stepping Algorithm / A. The C1G2 RFID protocol The C1G2 RFID protocol / frequency hopping / RFID protocol / Mobile Computing / http / ALOHA-based protocols / MAC protocol / ELATED WORK The RFID communication protocols / Simulation / RFID technology / estimation algorithm / /

URL

www.convergence.com.hk/products / http /

SocialTag