Ad-hoc, Mobile and Wireless Networks : 7th International Conference, ADHOC-NOW 2008, Sophia Antipolis, France, September 10-12, 2008, Proceedings / / edited by David Coudert, David Simplot-Ryl, Ivan Stojmenovic
| Ad-hoc, Mobile and Wireless Networks : 7th International Conference, ADHOC-NOW 2008, Sophia Antipolis, France, September 10-12, 2008, Proceedings / / edited by David Coudert, David Simplot-Ryl, Ivan Stojmenovic |
| Edizione | [1st ed. 2008.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
| Descrizione fisica | 1 online resource (XII, 498 p.) |
| Disciplina | 621.382 |
| Collana | Computer Communication Networks and Telecommunications |
| Soggetto topico |
Computer networks
Software engineering Application software Information storage and retrieval systems Computers and civilization Telecommunication Computer Communication Networks Software Engineering Computer and Information Systems Applications Information Storage and Retrieval Computers and Society Communications Engineering, Networks |
| ISBN | 3-540-85209-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Local Maximal Matching and Local 2-Approximation for Vertex Cover in UDGs -- Opportunistic Clock Synchronization in a Beacon Enabled Wireless Sensor Network -- Mitigating Reply Implosions in Query-Based Service Discovery Protocols for Mobile Wireless Ad Hoc Networks -- Adaptive MANET Routing: A Case Study -- Self-interference in Multi-hop Wireless Chains: Geometric Analysis and Performance Study -- Energy-Efficient Multi-path Routing in Wireless Sensor Networks -- Approximating Minimum-Power k-Connectivity -- A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks -- Communication in Random Geometric Radio Networks with Positively Correlated Random Faults -- The Mathematics of Routing in Massively Dense Ad-Hoc Networks -- Localized Spanner Construction for Ad Hoc Networks with Variable Transmission Range -- Geographic Routing with Early Obstacles Detection and Avoidance in Dense Wireless Sensor Networks -- DIN: An Ad-Hoc Algorithm to Estimate Distances in Wireless Sensor Networks -- Cheating on the CW and RTS/CTS Mechanisms in Single-Hop IEEE 802.11e Networks -- Adapting BitTorrent to Wireless Ad Hoc Networks -- Optimal Gathering Algorithms in Multi-hop Radio Tree-Networks ith Interferences -- Distributed Qualitative Localization for Wireless Sensor Networks -- A Lower Bound on the Capacity of Wireless Ad Hoc Networks with Cooperating Nodes -- Attacks on CKK Family of RFID Authentication Protocols -- On Backoff in Fading Wireless Channels -- TSLA: A QoS-Aware On-Demand Routing Protocol for Mobile Ad Hoc Networks -- Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks -- A Prediction Based Cross-Layer MAC/PHY Interface for CDMA Ad Hoc Networks -- Utility-Based Uplink Power Control in CDMA Wireless Networks with Real-Time Services -- AdaptivePriority Based Distributed Dynamic Channel Assignment for Multi-radio Wireless Mesh Networks -- Ranking and Sorting in Unreliable Single Hop Radio Network -- Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking -- Improved Distributed Dynamic Power Control for Wireless Mesh Networks -- Identifying the Boundary of a Wireless Sensor Network with a Mobile Sink -- Analysis of IEEE 802.11e Line Topology Scenarios in the Presence of Hidden Nodes -- Interference and Congestion Aware Reservations in Wireless Multi-hop Networks -- Low-Cost and Accurate Intra-flow Contention-Based Admission Control for IEEE 802.11 Ad Hoc Networks -- An Energy-Efficient Query Aggregation Scheme for Wireless Sensor Networks -- Novel Algorithms for the Network Lifetime Problem in Wireless Settings -- Message Quality for Ambient System Security -- Request Satisfaction Problem in Synchronous Radio Networks -- A Novel Mobility Model from a Heterogeneous Military MANET Trace -- Measuring Energy-Time Efficiency of Protocol Performance in Mobile Ad Hoc Networks -- A Framework for Joint Cross-Layer and Node Location Optimization in Mobile Sensor Networks. |
| Record Nr. | UNINA-9910483233903321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Ad-hoc, mobile, and wireless networks : 7th international conference, ADHOC-NOW 2008, Sophia-Antipolis, France, September 10-12, 2008 : proceedings / / David Coudert, David Simplot-Ryl, Ivan Stojmenovic, editors
| Ad-hoc, mobile, and wireless networks : 7th international conference, ADHOC-NOW 2008, Sophia-Antipolis, France, September 10-12, 2008 : proceedings / / David Coudert, David Simplot-Ryl, Ivan Stojmenovic, editors |
| Edizione | [1st ed. 2008.] |
| Pubbl/distr/stampa | Berlin : , : Springer, , [2008] |
| Descrizione fisica | 1 online resource (XII, 498 p.) |
| Disciplina | 621.382 |
| Collana | Lecture notes in computer science |
| Soggetto topico |
Wireless communication systems
Ad hoc networks (Computer networks) Mobile communication systems |
| ISBN | 3-540-85209-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Local Maximal Matching and Local 2-Approximation for Vertex Cover in UDGs -- Opportunistic Clock Synchronization in a Beacon Enabled Wireless Sensor Network -- Mitigating Reply Implosions in Query-Based Service Discovery Protocols for Mobile Wireless Ad Hoc Networks -- Adaptive MANET Routing: A Case Study -- Self-interference in Multi-hop Wireless Chains: Geometric Analysis and Performance Study -- Energy-Efficient Multi-path Routing in Wireless Sensor Networks -- Approximating Minimum-Power k-Connectivity -- A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks -- Communication in Random Geometric Radio Networks with Positively Correlated Random Faults -- The Mathematics of Routing in Massively Dense Ad-Hoc Networks -- Localized Spanner Construction for Ad Hoc Networks with Variable Transmission Range -- Geographic Routing with Early Obstacles Detection and Avoidance in Dense Wireless Sensor Networks -- DIN: An Ad-Hoc Algorithm to Estimate Distances in Wireless Sensor Networks -- Cheating on the CW and RTS/CTS Mechanisms in Single-Hop IEEE 802.11e Networks -- Adapting BitTorrent to Wireless Ad Hoc Networks -- Optimal Gathering Algorithms in Multi-hop Radio Tree-Networks ith Interferences -- Distributed Qualitative Localization for Wireless Sensor Networks -- A Lower Bound on the Capacity of Wireless Ad Hoc Networks with Cooperating Nodes -- Attacks on CKK Family of RFID Authentication Protocols -- On Backoff in Fading Wireless Channels -- TSLA: A QoS-Aware On-Demand Routing Protocol for Mobile Ad Hoc Networks -- Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks -- A Prediction Based Cross-Layer MAC/PHY Interface for CDMA Ad Hoc Networks -- Utility-Based Uplink Power Control in CDMA Wireless Networks with Real-Time Services -- Adaptive Priority Based Distributed Dynamic Channel Assignment for Multi-radio Wireless Mesh Networks -- Ranking and Sorting in Unreliable Single Hop Radio Network -- Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking -- Improved Distributed Dynamic Power Control for Wireless Mesh Networks -- Identifying the Boundary of a Wireless Sensor Network with a Mobile Sink -- Analysis of IEEE 802.11e Line Topology Scenarios in the Presence of Hidden Nodes -- Interference and Congestion Aware Reservations in Wireless Multi-hop Networks -- Low-Cost and Accurate Intra-flow Contention-Based Admission Control for IEEE 802.11 Ad Hoc Networks -- An Energy-Efficient Query Aggregation Scheme for Wireless Sensor Networks -- Novel Algorithms for the Network Lifetime Problem in Wireless Settings -- Message Quality for Ambient System Security -- Request Satisfaction Problem in Synchronous Radio Networks -- A Novel Mobility Model from a Heterogeneous Military MANET Trace -- Measuring Energy-Time Efficiency of Protocol Performance in Mobile Ad Hoc Networks -- A Framework for Joint Cross-Layer and Node Location Optimization in Mobile Sensor Networks. |
| Record Nr. | UNISA-996465324403316 |
| Berlin : , : Springer, , [2008] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Proceedings of the first ACM Workshop on Sensor and Actor Networks
| Proceedings of the first ACM Workshop on Sensor and Actor Networks |
| Autore | Giordano Silvia |
| Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2007 |
| Descrizione fisica | 1 online resource (64 pages) |
| Collana | ACM Conferences |
| Soggetto topico |
Electrical & Computer Engineering
Engineering & Applied Sciences Electrical Engineering |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
Proceedings of the first Association for Computing Machinery Workshop on Sensor and Actor Networks
SANET '07 |
| Record Nr. | UNINA-9910376412803321 |
Giordano Silvia
|
||
| [Place of publication not identified], : ACM, 2007 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
RFID systems : research trends and challenges / / edited by Miodrag Bolic, David Simplot-Ryl, Ivan Stojmenovic
| RFID systems : research trends and challenges / / edited by Miodrag Bolic, David Simplot-Ryl, Ivan Stojmenovic |
| Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , 2010 |
| Descrizione fisica | 1 online resource (576 p.) |
| Disciplina | 658.7/87 |
| Altri autori (Persone) |
BolicMiodrag
Simplot-RylDavid StojmenoviâcIvan |
| Soggetto topico |
Radio frequency identification systems
Radio telemetry |
| ISBN |
0-470-97566-0
1-282-70787-6 9786612707872 1-61344-504-0 0-470-66525-4 0-470-66527-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
About the Editors -- Preface -- Acknowledgements -- Part I COMPONENTS OF RFID SYSTEMS AND PERFORMANCE METRICS -- 1 Performance of Passive UHF RFID Systems in Practice (Miodrag Bolic, Akshay Athalye, and Tzu Hao Li) -- 1.1 Introduction -- 1.2 Ideal RFID System -- 1.3 Practical RFID Systems -- 1.4 Overview of the Book -- 1.5 Conclusion -- References -- 2 Performance Metrics and Operational Parameters of RFID Systems (Raj Bridelall and Abhiman Hande) -- 2.1 Overview -- 2.2 Key Operational Parameters -- 2.3 Classification of Commercially Available Products -- 2.4 Conclusion -- Problems -- References -- 3 UHF RFID Antennas (Daniel Deavours) -- 3.1 Dipoles and Relatives -- 3.2 T-Match and Relatives -- 3.3 Putting it Together: Building an RFID Tag -- 3.4 The Environment -- 3.5 Conclusions, Trends, and Challenges -- References -- 4 RFID Tag Chip Design (Na Yan, Wenyi Che, Yuqing Yang, and Qiang Li) -- 4.1 Tag Architecture Systems -- 4.2 Memory in Standard CMOS Processes -- 4.3 Baseband of RFID Tag -- 4.4 RFID Tag Performance Optimization -- 4.5 Conclusion -- Problems -- References -- 5 Design of Passive Tag RFID Readers (Scott Chiu) -- 5.1 Overview -- 5.2 Basics of Passive RFID Operation -- 5.3 Passive RFID Reader Designs -- 5.4 Advanced Topics on RFID Reader Design -- 5.5 Conclusion -- Problems -- References -- 6 RFID Middleware: Concepts and Architecture (Nathalie Mitton, Loic Schmidt, and David Simplot-Ryl) -- 6.1 Introduction -- 6.2 Overview of an RFID Middleware Architecture -- 6.3 Readers Management -- 6.4 Data Management and Application-Level Events -- 6.5 Store and Share Data -- 6.6 Example -- 6.7 Conclusion -- Problems -- References -- Part II TAG IDENTIFICATION PROTOCOLS -- 7 Aloha-Based Protocols (Kwan-Wu Chin and Dheeraj Klair) -- 7.1 Pure Aloha -- 7.2 Slotted Aloha -- 7.3 Framed Slotted Aloha -- 7.4 Conclusion -- Problems -- References -- 8 Tree-Based Anti-Collision Protocols for RFID Tags (Petar Popovski) -- 8.1 Introduction -- 8.2 Principles of Tree-Based Anti-Collision Protocols.
8.3 Tree Protocols in the Existing RFID Specifications -- 8.4 Practical Issues and Transmission Errors -- 8.5 Cooperative Readers and Generalized Arbitration Spaces -- 8.6 Conclusion -- Problems -- References -- 9 A Comparison of TTF and RTF UHF RFID Protocols (Alwyn Hoffman, Johann Holm, and Henri-Jean Marais) -- 9.1 Introduction -- 9.2 Requirements for RFID Protocols -- 9.3 Different Approaches Used in UHF Protocols -- 9.4 Description of Stochastic TTF Protocols -- 9.5 Comparison between ISO18000-6C and TTF Protocols -- 9.6 Conclusion -- Problems -- References -- Part III READER INFRASTRUCTURE NETWORKING -- 10 Integrating RFID Readers in Enterprise IT (Christian Floerkemeier and Sanjay Sarma) -- 10.1 Related Work -- 10.2 RFID System Services -- 10.3 Reader Capabilities -- 10.4 RFID System Architecture Taxonomy -- 10.5 EPCglobal Standards -- 10.6 Adoption of High-Level Reader Protocols -- 10.7 Potential Future Standardization Activities -- 10.8 Conclusion -- Problems -- References -- 11 Reducing Interference in RFID Reader Networks (Sung Won Kim and Gyanendra Prasad Joshi) -- 11.1 Introduction -- 11.2 Interference Problem in RFID Reader Networks -- 11.3 Access Mechanism, Regulations, Standards and Algorithms -- 11.4 Comparison -- 11.5 Conclusion -- Problems -- References -- 12 Optimal Tag Coverage and Tag Report Elimination (Bogdan Carbunar, Murali Krishna Ramanathan, Mehmet Koyuturk, Suresh Jagannathan, and Ananth Grama) -- 12.1 Introduction -- 12.2 Overview of RFID Systems -- 12.3 Tree Walking: An Algorithm for Detecting Tags in the Presence of Collisions -- 12.4 Reader Collision Avoidance -- 12.5 Coverage Redundancy in RFID Systems: Comparison with Sensor Networks -- 12.6 Network Model -- 12.7 Optimal Tag Coverage and Tag Reporting -- 12.8 Redundant Reader Elimination Algorithms: A Centralized Heuristic -- 12.9 RRE: A Distributed Solution -- 12.10 Adapting to Topological Changes -- 12.11 The Layered Elimination Optimization (LEO) -- 12.12 Related Work -- 12.13 Conclusion. Problems -- References -- 13 Delay/Disruption-Tolerant Mobile RFID Networks: Challenges and Opportunities (Hongyi Wu and Zhipeng Yang) -- 13.1 Motivation -- 13.2 Overview of FINDERS -- 13.3 General Feasibility Study -- 13.4 Unique Challenges and Tactics -- 13.5 Related Work -- 13.6 Conclusion -- Problems -- References -- Part IV ADDRESSING OTHER CHALLENGES IN RFID SYSTEMS -- 14 Improving Read Ranges and Read Rates for Passive RFID Systems (Zhiguang Fan, Fazhong Shen, Jianhua Shen, and Lixin Ran) -- 14.1 Introduction -- 14.2 Signal Descriptions and Formulations for Passive Backscatter RFID Systems -- 14.3 Improving the Read Range of a Passive RFID System -- 14.4 Improving the Read Rate of a Passive RFID System -- 14.5 Two Design Examples for RFID System -- 14.6 Conclusion -- Problems -- References -- 15 Principles and Techniques of RFID Positioning (Yimin Zhang, Xin Li, and Moeness Amin) -- 15.1 Introduction -- 15.2 Tag Range Estimation Techniques -- 15.3 DOA Estimation Techniques -- 15.4 RFID Positioning Techniques -- 15.5 Improving Positioning Accuracy -- 15.6 Conclusion -- Problems -- References -- 16 Towards Secure and Privacy-Enhanced RFID Systems (Heiko Knospe and Kerstin Lemke-Rust) -- 16.1 Introduction -- 16.2 Security and Privacy -- 16.3 Classification of RFID Systems -- 16.4 Attacks on RFID Systems and Appropriate Countermeasures -- 16.5 Lightweight Cryptography for RFID -- 16.6 Conclusion -- Problems -- References -- 17 Cryptographic Approaches for Improving Security and Privacy Issues of RFID Systems (Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita) -- 17.1 Introduction -- 17.2 Threats against the RFID System -- 17.3 Required Properties -- 17.4 Cryptographic Protocols for Identification with Privacy -- 17.5 Cryptographic Protocols for Authentication without Privacy -- 17.6 Cryptographic Protocols for Privacy and Other Requirements -- 17.7 Implementation -- 17.8 Real Systems and Attacks -- 17.9 Conclusion -- Problems -- References -- 18 Novel RFID Technologies: Energy Harvesting for Self-Powered Autonomous RFID Systems (Raj Bridelall and Abhiman Hande). 18.1 Introduction -- 18.2 Novel Low Power Architectures -- 18.3 Energy Harvesting Optimized for RFID -- 18.4 Future Trends in Energy Harvesting -- 18.5 Conclusion -- Problems -- References -- 19 Simulators and Emulators for Different Abstraction Layers of UHF RFID Systems (Christian Steger, Alex Janek, Reinhold WeiC, Vojtech Derbek, Manfred Jantscher, Josef Preishuber-Pfluegl, and Markus Pistauer) -- 19.1 Introduction -- 19.2 The Simulation/Emulation Platforms -- 19.3 UHF RFID Simulation Platform -- 19.4 Real-Time HIL-Verification and Emulation Platform -- 19.5 Higher Class Tag Architecture Based on Energy Harvesting -- 19.6 Conclusion -- Problems -- References -- Index. |
| Record Nr. | UNINA-9910140739003321 |
| Hoboken, New Jersey : , : Wiley, , 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
RFID systems : research trends and challenges / / edited by Miodrag Bolic, David Simplot-Ryl, and Ivan Stojmenovic
| RFID systems : research trends and challenges / / edited by Miodrag Bolic, David Simplot-Ryl, and Ivan Stojmenovic |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Chichester, West Sussex, : Wiley, 2010 |
| Descrizione fisica | 1 online resource (576 p.) |
| Disciplina | 658.7/87 |
| Altri autori (Persone) |
BolićMiodrag
Simplot-RylDavid StojmenovicIvan |
| Soggetto topico |
Radio frequency identification systems
Radio telemetry |
| ISBN |
9786612707872
9780470975664 0470975660 9781282707870 1282707876 9781613445044 1613445040 9780470665251 0470665254 9780470665275 0470665270 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
About the Editors -- Preface -- Acknowledgements -- Part I COMPONENTS OF RFID SYSTEMS AND PERFORMANCE METRICS -- 1 Performance of Passive UHF RFID Systems in Practice (Miodrag Bolic, Akshay Athalye, and Tzu Hao Li) -- 1.1 Introduction -- 1.2 Ideal RFID System -- 1.3 Practical RFID Systems -- 1.4 Overview of the Book -- 1.5 Conclusion -- References -- 2 Performance Metrics and Operational Parameters of RFID Systems (Raj Bridelall and Abhiman Hande) -- 2.1 Overview -- 2.2 Key Operational Parameters -- 2.3 Classification of Commercially Available Products -- 2.4 Conclusion -- Problems -- References -- 3 UHF RFID Antennas (Daniel Deavours) -- 3.1 Dipoles and Relatives -- 3.2 T-Match and Relatives -- 3.3 Putting it Together: Building an RFID Tag -- 3.4 The Environment -- 3.5 Conclusions, Trends, and Challenges -- References -- 4 RFID Tag Chip Design (Na Yan, Wenyi Che, Yuqing Yang, and Qiang Li) -- 4.1 Tag Architecture Systems -- 4.2 Memory in Standard CMOS Processes -- 4.3 Baseband of RFID Tag -- 4.4 RFID Tag Performance Optimization -- 4.5 Conclusion -- Problems -- References -- 5 Design of Passive Tag RFID Readers (Scott Chiu) -- 5.1 Overview -- 5.2 Basics of Passive RFID Operation -- 5.3 Passive RFID Reader Designs -- 5.4 Advanced Topics on RFID Reader Design -- 5.5 Conclusion -- Problems -- References -- 6 RFID Middleware: Concepts and Architecture (Nathalie Mitton, Loic Schmidt, and David Simplot-Ryl) -- 6.1 Introduction -- 6.2 Overview of an RFID Middleware Architecture -- 6.3 Readers Management -- 6.4 Data Management and Application-Level Events -- 6.5 Store and Share Data -- 6.6 Example -- 6.7 Conclusion -- Problems -- References -- Part II TAG IDENTIFICATION PROTOCOLS -- 7 Aloha-Based Protocols (Kwan-Wu Chin and Dheeraj Klair) -- 7.1 Pure Aloha -- 7.2 Slotted Aloha -- 7.3 Framed Slotted Aloha -- 7.4 Conclusion -- Problems -- References -- 8 Tree-Based Anti-Collision Protocols for RFID Tags (Petar Popovski) -- 8.1 Introduction -- 8.2 Principles of Tree-Based Anti-Collision Protocols.
8.3 Tree Protocols in the Existing RFID Specifications -- 8.4 Practical Issues and Transmission Errors -- 8.5 Cooperative Readers and Generalized Arbitration Spaces -- 8.6 Conclusion -- Problems -- References -- 9 A Comparison of TTF and RTF UHF RFID Protocols (Alwyn Hoffman, Johann Holm, and Henri-Jean Marais) -- 9.1 Introduction -- 9.2 Requirements for RFID Protocols -- 9.3 Different Approaches Used in UHF Protocols -- 9.4 Description of Stochastic TTF Protocols -- 9.5 Comparison between ISO18000-6C and TTF Protocols -- 9.6 Conclusion -- Problems -- References -- Part III READER INFRASTRUCTURE NETWORKING -- 10 Integrating RFID Readers in Enterprise IT (Christian Floerkemeier and Sanjay Sarma) -- 10.1 Related Work -- 10.2 RFID System Services -- 10.3 Reader Capabilities -- 10.4 RFID System Architecture Taxonomy -- 10.5 EPCglobal Standards -- 10.6 Adoption of High-Level Reader Protocols -- 10.7 Potential Future Standardization Activities -- 10.8 Conclusion -- Problems -- References -- 11 Reducing Interference in RFID Reader Networks (Sung Won Kim and Gyanendra Prasad Joshi) -- 11.1 Introduction -- 11.2 Interference Problem in RFID Reader Networks -- 11.3 Access Mechanism, Regulations, Standards and Algorithms -- 11.4 Comparison -- 11.5 Conclusion -- Problems -- References -- 12 Optimal Tag Coverage and Tag Report Elimination (Bogdan Carbunar, Murali Krishna Ramanathan, Mehmet Koyuturk, Suresh Jagannathan, and Ananth Grama) -- 12.1 Introduction -- 12.2 Overview of RFID Systems -- 12.3 Tree Walking: An Algorithm for Detecting Tags in the Presence of Collisions -- 12.4 Reader Collision Avoidance -- 12.5 Coverage Redundancy in RFID Systems: Comparison with Sensor Networks -- 12.6 Network Model -- 12.7 Optimal Tag Coverage and Tag Reporting -- 12.8 Redundant Reader Elimination Algorithms: A Centralized Heuristic -- 12.9 RRE: A Distributed Solution -- 12.10 Adapting to Topological Changes -- 12.11 The Layered Elimination Optimization (LEO) -- 12.12 Related Work -- 12.13 Conclusion. Problems -- References -- 13 Delay/Disruption-Tolerant Mobile RFID Networks: Challenges and Opportunities (Hongyi Wu and Zhipeng Yang) -- 13.1 Motivation -- 13.2 Overview of FINDERS -- 13.3 General Feasibility Study -- 13.4 Unique Challenges and Tactics -- 13.5 Related Work -- 13.6 Conclusion -- Problems -- References -- Part IV ADDRESSING OTHER CHALLENGES IN RFID SYSTEMS -- 14 Improving Read Ranges and Read Rates for Passive RFID Systems (Zhiguang Fan, Fazhong Shen, Jianhua Shen, and Lixin Ran) -- 14.1 Introduction -- 14.2 Signal Descriptions and Formulations for Passive Backscatter RFID Systems -- 14.3 Improving the Read Range of a Passive RFID System -- 14.4 Improving the Read Rate of a Passive RFID System -- 14.5 Two Design Examples for RFID System -- 14.6 Conclusion -- Problems -- References -- 15 Principles and Techniques of RFID Positioning (Yimin Zhang, Xin Li, and Moeness Amin) -- 15.1 Introduction -- 15.2 Tag Range Estimation Techniques -- 15.3 DOA Estimation Techniques -- 15.4 RFID Positioning Techniques -- 15.5 Improving Positioning Accuracy -- 15.6 Conclusion -- Problems -- References -- 16 Towards Secure and Privacy-Enhanced RFID Systems (Heiko Knospe and Kerstin Lemke-Rust) -- 16.1 Introduction -- 16.2 Security and Privacy -- 16.3 Classification of RFID Systems -- 16.4 Attacks on RFID Systems and Appropriate Countermeasures -- 16.5 Lightweight Cryptography for RFID -- 16.6 Conclusion -- Problems -- References -- 17 Cryptographic Approaches for Improving Security and Privacy Issues of RFID Systems (Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita) -- 17.1 Introduction -- 17.2 Threats against the RFID System -- 17.3 Required Properties -- 17.4 Cryptographic Protocols for Identification with Privacy -- 17.5 Cryptographic Protocols for Authentication without Privacy -- 17.6 Cryptographic Protocols for Privacy and Other Requirements -- 17.7 Implementation -- 17.8 Real Systems and Attacks -- 17.9 Conclusion -- Problems -- References -- 18 Novel RFID Technologies: Energy Harvesting for Self-Powered Autonomous RFID Systems (Raj Bridelall and Abhiman Hande). 18.1 Introduction -- 18.2 Novel Low Power Architectures -- 18.3 Energy Harvesting Optimized for RFID -- 18.4 Future Trends in Energy Harvesting -- 18.5 Conclusion -- Problems -- References -- 19 Simulators and Emulators for Different Abstraction Layers of UHF RFID Systems (Christian Steger, Alex Janek, Reinhold WeiC, Vojtech Derbek, Manfred Jantscher, Josef Preishuber-Pfluegl, and Markus Pistauer) -- 19.1 Introduction -- 19.2 The Simulation/Emulation Platforms -- 19.3 UHF RFID Simulation Platform -- 19.4 Real-Time HIL-Verification and Emulation Platform -- 19.5 Higher Class Tag Architecture Based on Energy Harvesting -- 19.6 Conclusion -- Problems -- References -- Index. |
| Record Nr. | UNINA-9910825472003321 |
| Chichester, West Sussex, : Wiley, 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||