2006
DOI: 10.1007/11807964_40
|View full text |Cite
|
Sign up to set email alerts
|

Perturbative Time and Frequency Allocations for RFID Reader Networks

Abstract: Abstract. RFID reader networks often have to operate in frequency and time constrained regimes. One approach to the allocation of frequency and time to various readers in such regimes is to perturb the network slightly so as to ease the constraints. We investigate how to perform these perturbations in a manner that is profitable from time and frequency allocation point of view.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2006
2006
2014
2014

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…If two conflicting readers pick the same color, one of them retains and the other choose a different color. In [8], the coloring method is also used but the number of colors is restricted to the number of available channels. Some works also consider both reader-tag collisions and readerreader collisions.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…If two conflicting readers pick the same color, one of them retains and the other choose a different color. In [8], the coloring method is also used but the number of colors is restricted to the number of available channels. Some works also consider both reader-tag collisions and readerreader collisions.…”
Section: Related Workmentioning
confidence: 99%
“…However, it cannot be directly used to specify the constraints during the process of data collection. Some other works [6], [7], [8], [9] investigated how to coordinate readers to alleviate their inferences. These works assume that all readers belong to a single application and the data collection task is to scan all the tags in the coverage.…”
Section: Introductionmentioning
confidence: 99%
“…If conflicts arise (i.e., two interfering readers pick the same color or time slot), only one of them wins (i.e., sticks to the chosen color), the others pick another color again randomly. In [8], the authors suggest coloring of the interference graph using k colors, where k is the number of available channels. If the graph is not k-colorable using their suggested heuristic, then the authors suggest removal of certain edges and nodes from the interference graph using other heuristics which consider the size of the common interference regions between neighboring readers.…”
Section: Reader-reader Collisionmentioning
confidence: 99%
“…The best known approximation is by a factor of O(log n) [17]. It has numerous applications, for example in VLSI design [6,24], linear programming [19], computational biology [34,31,38], register allocation [39], and RFID reader networks [9]. In a breakthrough paper, Reed et al [33] proved that the Graph Bipartization problem on a graph with n vertices and m edges is solvable in O(4 k · kmn) time, where k is the number of vertices to delete.…”
Section: Introductionmentioning
confidence: 99%