Ieee Infocom 2009 2009
DOI: 10.1109/infcom.2009.5062189
|View full text |Cite
|
Sign up to set email alerts
|

Smart Trend-Traversal: A Low Delay and Energy Tag Arbitration Protocol for Large RFID Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 59 publications
(29 citation statements)
references
References 9 publications
0
29
0
Order By: Relevance
“…The key limitation of TW based protocols is that they visit a large number of collision nodes in the binary tree. Although several heuristics have been proposed to reduce the number of visits to collision nodes [15,19], all these heuristics based methods are not guaranteed to minimize such futile visits. Prior Aloha-TW hybrid protocols also have this limitation.…”
Section: Summary and Limitations Of Prior Artmentioning
confidence: 99%
See 1 more Smart Citation
“…The key limitation of TW based protocols is that they visit a large number of collision nodes in the binary tree. Although several heuristics have been proposed to reduce the number of visits to collision nodes [15,19], all these heuristics based methods are not guaranteed to minimize such futile visits. Prior Aloha-TW hybrid protocols also have this limitation.…”
Section: Summary and Limitations Of Prior Artmentioning
confidence: 99%
“…There are 3 such protocols: (1) the basic TW protocol [12], (2) the Adaptive Tree Walking (ATW) protocol [24], and (3) the TW-based Smart Trend Traversal (STT) protocol [19]. ATW is an optimized version of TW that always starts DFTs from the level of log z, where z is the size of tag population.…”
Section: Deterministic Identification Protocolsmentioning
confidence: 99%
“…The QT splits a tag set by tag IDs [9][10][11][12][13][14]. The reader owns a queue Q, which stores bit strings of the queries and is initialized with two 1-bit strings, 0 and 1, at the beginning of each frame.…”
Section: Qtmentioning
confidence: 99%
“…Tree-based protocols, which continuously split a set of tags into two subsets until all tags are identified, can be classified as query tree (QT) protocols [9][10][11][12][13][14] and binary tree (BT) protocols [15][16][17][18]. The former uses tag IDs while the latter adopts random binary numbers to split the set of collided tags.…”
Section: Introductionmentioning
confidence: 99%
“…Tree-based protocols resolve collisions by muting subsets of tags that are involved in a collision [7]. Pan et al propose a Smart Trend-Traversal protocol [8], a Query Tree-based scheme, to conduct RFID tag arbitration. The ALOHA protocol was first developed for random access in packet radio networks.…”
Section: Related Workmentioning
confidence: 99%