The rapid development of RFID (Radio Frequency IDentification) technology has allowed its large adoption and led to increasing deployments of RFID solutions in diverse environments under varying scenarios and constraints. The nature of these constraints ranges from the amount to the mobility of the readers deployed, which in turn highly affects the quality of the RFID system, causing reading collisions. Although several solutions were proposed to engage the issue of reading collision, few were ever concerned with the densification and/or mobility of readers. This paper proposes two distributed TDMA (Time Division Multiple Access) approaches designed to reduce these collisions through local coordination between neighboring devices for differ...
International audienceRFID technology suffers from a recurring issue: the reader-to-reader collision...
Purpose – Internet of Things’ (IoT’s) first wave started with tracking services for better inventory...
In this work, we develop a CSMA-based MAC protocol to avoid reader-reader and reader-tag collisions ...
The rapid development of RFID (Radio Frequency IDentification) technology has allowed its large adop...
In an RFID network, readers simultaneously querying tags may interfere with each other, generating a...
International audienceThe popularization of RFID systems has conducted to large deployments of RFID ...
International audienceWhile RFID technology is gaining increased attention from industrial community...
Radio Frequency Identification (RFID) is a technology which is spreading more and more as a medium t...
With the spread of passive Radio Frequency Identification (RFID) systems, new applications will see ...
Radio-frequency identification (RFID) is one of the major technologies for auto-identification in ma...
Mobile RFID, the technology of a cellular phone equipped with a RFID reader, allows users to read RF...
Supply chain is a typical scenario of exploiting Radio Frequency Identification (RFID) technology. I...
Dense passive radio frequency identification (RFID) systems are particularly susceptible to reader c...
Abstract. Due to the dedicated short range communication feature of passive radio frequency identifi...
Radio Frequency Identification (RFID) is a well-known identification technology. Nowadays, applicati...
International audienceRFID technology suffers from a recurring issue: the reader-to-reader collision...
Purpose – Internet of Things’ (IoT’s) first wave started with tracking services for better inventory...
In this work, we develop a CSMA-based MAC protocol to avoid reader-reader and reader-tag collisions ...
The rapid development of RFID (Radio Frequency IDentification) technology has allowed its large adop...
In an RFID network, readers simultaneously querying tags may interfere with each other, generating a...
International audienceThe popularization of RFID systems has conducted to large deployments of RFID ...
International audienceWhile RFID technology is gaining increased attention from industrial community...
Radio Frequency Identification (RFID) is a technology which is spreading more and more as a medium t...
With the spread of passive Radio Frequency Identification (RFID) systems, new applications will see ...
Radio-frequency identification (RFID) is one of the major technologies for auto-identification in ma...
Mobile RFID, the technology of a cellular phone equipped with a RFID reader, allows users to read RF...
Supply chain is a typical scenario of exploiting Radio Frequency Identification (RFID) technology. I...
Dense passive radio frequency identification (RFID) systems are particularly susceptible to reader c...
Abstract. Due to the dedicated short range communication feature of passive radio frequency identifi...
Radio Frequency Identification (RFID) is a well-known identification technology. Nowadays, applicati...
International audienceRFID technology suffers from a recurring issue: the reader-to-reader collision...
Purpose – Internet of Things’ (IoT’s) first wave started with tracking services for better inventory...
In this work, we develop a CSMA-based MAC protocol to avoid reader-reader and reader-tag collisions ...