Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07) 2007
DOI: 10.1109/percom.2007.23
|View full text |Cite
|
Sign up to set email alerts
|

Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
86
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
4
3
2

Relationship

3
6

Authors

Journals

citations
Cited by 125 publications
(86 citation statements)
references
References 10 publications
0
86
0
Order By: Relevance
“…VI. RELATED WORK Two major types of localization approaches are applied in RFID-based localization systems: tagged approaches [16]- [19] and tag-free approaches [20], [21]. In tagged approaches, the object which requires a localization service is attached with an RFID tag.…”
Section: Performance Of User Navigation Servicementioning
confidence: 99%
“…VI. RELATED WORK Two major types of localization approaches are applied in RFID-based localization systems: tagged approaches [16]- [19] and tag-free approaches [20], [21]. In tagged approaches, the object which requires a localization service is attached with an RFID tag.…”
Section: Performance Of User Navigation Servicementioning
confidence: 99%
“…When the target is present in one grid, it would affect several links between the reference nodes near the grid, and the degree of signal variations on different links is used to estimate the position of the object. In Liu's work [17][18][19], the authors proposed an approach that does not require the tracked objects to carry any devices as well, and the distance between two tags is set to be 1 meter. Hence, when the monitoring region is large, the cost and communication overhead would be high.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, we propose the LSA-POL scheme that locates a target in an LAU that does not require any training process as opposed to [17,18]. Compared with the work in [15,16], the proposed LSA-POL method covers a larger monitoring area and is more suitable for practical applications.…”
Section: Related Workmentioning
confidence: 99%
“…One typical application is intrusion detection, in which it is impossible and unreasonable to equip intruders with locating devices. To tackle this issue, recently a novel concept of Device-Free Localization, also called Transceiver-Free Localization, is proposed [57][58] . Device-free localization is envisioned to be able to detect, localize, track, and identify entities free of devices, and works by processing the environment changes collected at scattering monitoring points.…”
Section: D) Costmentioning
confidence: 99%