Abstract. RFID applications usually rely on RFID deployments to manage high-level events. A fundamental relation for these purposes is the location of people and objects over time. However, the nature of RFID data streams is noisy, redundant and unreliable and thus streams of low-level tag-reads can be transformed into probabilistic data streams that can reach in practical cases the size of gigabytes in a day. In this paper, we propose a simple on-line summarization mechanism, which is able to provide small space representation for massive RFID probabilistic data streams while preserving the meaningful information. The main idea behind the proposed approach is to keep on aggregating tuples in an incremental way until a state transition is d...
In recent years, RFID technologies have been used in many applications, such as inventory checking a...
In this paper, we provide the following contributions to enhance the security of RFID based systems....
Summarization: To compensate for the inherent unreliability of RFID data streams, most RFID middlewa...
RFID applications usually rely on RFID deployments to manage high-level events such as tracking the ...
Data streams are more and more commonly generated in a large number of scenarios by audio and video ...
Estimating the number of RFID tags in the region of interest is an important task in many RFID appli...
RFID is one of the emerging technologies for a wide-range of applications, including supply chain an...
In this paper, we present the design of a scalable, distributed stream processing system for RFID tr...
ABSTRACT Radio Frequency Identification (RFID) technologies are used in many applications for data c...
Radio Frequency Identification (RFID) technology is fast becoming a prevalent tool in tracking commo...
Radio Frequency Identification (RFID) is widely used to track and trace objects in traceability supp...
In coming years, there will be billions of RFID tags living in the world tagging almost everything f...
The emergence of radio frequency identification (RFID) technology brings significant social and eco...
Summarization: This work presents the industrial RFID interrogation protocol and describes coherent ...
Counting the number of RFID tags (cardinality) is a fundamental problem for large-scale RFID systems...
In recent years, RFID technologies have been used in many applications, such as inventory checking a...
In this paper, we provide the following contributions to enhance the security of RFID based systems....
Summarization: To compensate for the inherent unreliability of RFID data streams, most RFID middlewa...
RFID applications usually rely on RFID deployments to manage high-level events such as tracking the ...
Data streams are more and more commonly generated in a large number of scenarios by audio and video ...
Estimating the number of RFID tags in the region of interest is an important task in many RFID appli...
RFID is one of the emerging technologies for a wide-range of applications, including supply chain an...
In this paper, we present the design of a scalable, distributed stream processing system for RFID tr...
ABSTRACT Radio Frequency Identification (RFID) technologies are used in many applications for data c...
Radio Frequency Identification (RFID) technology is fast becoming a prevalent tool in tracking commo...
Radio Frequency Identification (RFID) is widely used to track and trace objects in traceability supp...
In coming years, there will be billions of RFID tags living in the world tagging almost everything f...
The emergence of radio frequency identification (RFID) technology brings significant social and eco...
Summarization: This work presents the industrial RFID interrogation protocol and describes coherent ...
Counting the number of RFID tags (cardinality) is a fundamental problem for large-scale RFID systems...
In recent years, RFID technologies have been used in many applications, such as inventory checking a...
In this paper, we provide the following contributions to enhance the security of RFID based systems....
Summarization: To compensate for the inherent unreliability of RFID data streams, most RFID middlewa...