Proceedings of the 4th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications 2000
DOI: 10.1145/345848.345865
|View full text |Cite
|
Sign up to set email alerts
|

Efficient memoryless protocol for tag identification (extended abstract)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
243
0
11

Year Published

2006
2006
2015
2015

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 309 publications
(255 citation statements)
references
References 5 publications
1
243
0
11
Order By: Relevance
“…Generally, the existing RFID tag identification protocols can be classified into two categories [10,11]: ALOHA-based protocols [27][28][29][30] and tree-based protocols [19,31]. In ALOHA-based protocols, on average a tag needs to transmit its ID e times to the reader before being successfully identified [10,27], where e is the base of natural logarithm whose value is approximately equal to 2.72.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Generally, the existing RFID tag identification protocols can be classified into two categories [10,11]: ALOHA-based protocols [27][28][29][30] and tree-based protocols [19,31]. In ALOHA-based protocols, on average a tag needs to transmit its ID e times to the reader before being successfully identified [10,27], where e is the base of natural logarithm whose value is approximately equal to 2.72.…”
Section: Related Workmentioning
confidence: 99%
“…[18] [19] [17], because the reader has no simple way to distinguish the tags that are not enrolled yet from those that have already been enrolled, it has to collect all the tags in its interrogation region. In fact, how to efficiently read only the tags that have not been enrolled into the system is an interesting problem called unknown tag identification [20][21][22] that has not been thoroughly solved.…”
Section: Introductionmentioning
confidence: 99%
“…If there is a collision the reader will divide the tags into two groups and then query one group again. The reader continues splitting and probing until each individual tag is identified (Law et al, 2000;Micic et al, 2005;Myung and Lee, 2005). The second category is based on the ALOHA protocol and the Slotted ALOHA protocol (Madden et al, 2002a;Cha and Kim, 2005;Bonuccelli et al, 2006;Sheng et al, 2008;Tan et al, 2008;Sheng et al, 2010;Xie et al, 2010).…”
Section: Related Workmentioning
confidence: 99%
“…Among tree search methods, Binary Tree Search [6] and Query Tree [7] have been suggested specifically for collision resolution in RFID systems. In Binary Tree Search protocol [6], tags continue to transmit the remainder of their Electronic Product Code (EPC) strings if their last transmitted bit matches with the one transmitted by the reader in the current bit interval, otherwise the tags get muted.…”
Section: Introductionmentioning
confidence: 99%