2004
DOI: 10.1109/mcom.2004.1321406
|View full text |Cite
|
Sign up to set email alerts
|

Design of ultra-low-cost UHF RFID tags for supply chain applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
69
0
1

Year Published

2009
2009
2017
2017

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 216 publications
(72 citation statements)
references
References 3 publications
2
69
0
1
Order By: Relevance
“…Like many other properties for random geometric graphs, both connectivity and rigidity have transition phenomena. It can be seen that r g lies between r 3 and r 6 and is closer to r 3 . This observation reflects the theoretical conclusion that 3-connectivity is a necessary condition while 6-connectivity is a sufficient one for global rigidity [75] .…”
Section: Conditions For Network Localizabilitymentioning
confidence: 85%
See 1 more Smart Citation
“…Like many other properties for random geometric graphs, both connectivity and rigidity have transition phenomena. It can be seen that r g lies between r 3 and r 6 and is closer to r 3 . This observation reflects the theoretical conclusion that 3-connectivity is a necessary condition while 6-connectivity is a sufficient one for global rigidity [75] .…”
Section: Conditions For Network Localizabilitymentioning
confidence: 85%
“…For example, pervasive medical care is designed to accurately record and manage patient movements [1][2] ; smart space enables the interaction between physical space and human activities [3][4] ; modern logistics has major concerns on goods transportation, inventory, and warehousing [5][6] ; environmental monitoring networks sense air, water, and soil quality and detect the source of pollutants in real time [7][8][9][10][11] ; and mobile peer-to-peer computing encourages content sharing and contributing among mobile hosts in the vicinity [12][13] . In brief, location-based service (LBS) is a key enabling technology of these applications and widely exists in nowadays wireless communication networks from the short-range Bluetooth to the long-range telecommunication networks, as illustrated in Fig.1.…”
Section: Locationmentioning
confidence: 99%
“…Reading/writing process is the most significant factor for low-power RFID transponders EEPROM [5][6]. The power of the EEPROM SA must be low to increase RFID reading speed [7].…”
Section: Introductionmentioning
confidence: 99%
“…Encryption approaches (Golle, 2004;Feldhofer, 2004;Ranasinghe, 2004;Ateniese, 2005) are similar to digital signature approaches except simplified private key standard or propriertay cryptographic algorithm is used. Time stamping approaches (Glidden, 2004;Molnar ,2005;Tsudik, 2006;Ith, 2007) are the most popular approaches which provide a dynamic matching of time information that help avoiding replay attacks. Pseudonyms approaches (Juels, 2004; Juel, 2006;Molnar, 2005;Avoine, 2005) is very similar to time stamping approaches except the dynamic information is scheduled from a predefined list of pseudo-random data called pseudonynms.…”
Section: Introductionmentioning
confidence: 99%