Sciweavers

30 search results - page 5 / 6
» Efficient techniques for monitoring missing RFID tags
Sort
View
PERCOM
2005
ACM
14 years 5 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
ICDE
2007
IEEE
117views Database» more  ICDE 2007»
14 years 7 months ago
Cost-Conscious Cleaning of Massive RFID Data Sets
Efficient and accurate data cleaning is an essential task for the successful deployment of RFID systems. Although important advances have been made in tag detection rates, it is s...
Hector Gonzalez, Jiawei Han, Xuehua Shen
DATE
2008
IEEE
165views Hardware» more  DATE 2008»
14 years 3 days ago
Dynamic Round-Robin Task Scheduling to Reduce Cache Misses for Embedded Systems
Modern embedded CPU systems rely on a growing number of software features, but this growth increases the memory footprint and increases the need for efficient instruction and data...
Ken W. Batcher, Robert A. Walker
GIS
2008
ACM
14 years 6 months ago
Autonomous navigation of mobile agents using RFID-enabled space partitions
Existing techniques for autonomous indoor navigation are often environment-specific and thus limited in terms of their applicability. In this paper, we take a fundamentally differ...
Muhammad Atif Mehmood, Lars Kulik, Egemen Tanin
SIGMOD
2006
ACM
232views Database» more  SIGMOD 2006»
14 years 5 months ago
High-performance complex event processing over streams
In this paper, we present the design, implementation, and evaluation of a system that executes complex event queries over real-time streams of RFID readings encoded as events. The...
Eugene Wu 0002, Yanlei Diao, Shariq Rizvi