• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 4,513
Next 10 →

Table 6. RFID System Costs. Type of RFID technology Tag Reader Antenna

in 5. Report Date
by Stephen S. Roop, Leslie Olson, Jeffery Warner, Curtis Morgan, Othon Rediniotis 1999
"... In PAGE 12: ...able 5. Freight Transportation System.......................................................................................27 Table6 .... ..."

Table 5 Power consumption results for microprocessor based RFID tag during response generation Description Average power (mW) Energy (lJ)

in An automated, FPGA-based reconfigurable, low-power RFID tag q,qq
by Alex K. Jones A, Raymond Hoare A, Swapna Dontharaju A, Shenchih Tung A, Ralph Sprang A, Joshua Fazekas A, James T. Cain A, Marlin H. Mickle A 2006
"... In PAGE 16: ... The energy consumed by the EISC was based on a static power estimate from ADChips [25], which should be within about 10% accuracy of an instruc- tion level power estimation approach [30]. Table5 shows the power consumption results of our program on the Intel StrongArm SA-110 [23] and Intel XScale 80200 [24], and the ADChips 16-bit EISC [25]. These results show the power consumption only during the active phase of the RFID transaction (e.... ..."

Table 1: Raw RFID Records

in Mining Compressed Commodity Workflows From Massive RFID Data Sets ∗
by unknown authors
"... In PAGE 2: ... COMPRESSED RFID DATA SETS Data generated from an RFID application can be seen as a stream of RFID tuples of the form (EPC; location; time), where EPC is the unique identifler read by an RFID reader, location is the place where the RFID reader scanned the item, and time is the time when the reading took place. Table1 is an example of a raw RFID database where a symbol starting with r represents an RFID tag, l a location,... ..."

Table 1. Comparison of passive and active tags

in Table of Contents
by Neeraj Chaudhry M. S, Dale R. Thompson, Ph. D, Craig W. Thompson, Ph. D 2005
"... In PAGE 8: ... 3 Tags There are two broad categories of RFID tags: active and passive. The characteristics of active and passive tags are summarized in Table1 . Each type will be described in separate sections.... ..."

Table 2 lists the continuous data streams that are processed. In order to obtain discrete events from these data streams, different approaches are carried out.

in Event-Based Activity Tracking in Work
by Environments Thomas Stiefmeier, Thomas Stiefmeier, Clemens Lombriser, Daniel Roggen, Holger Junker, Georg Ogris, Gerhard Tröster 2006
"... In PAGE 7: ... Table2 . Available continuous data streams and retrieved discrete events The RFID reader periodically scans its environment for valid RFID tags.... ..."
Cited by 7

Table 5.1: Comparison of RFID security protocols Proposal Cryptographic Authen- Privacy State update Backend primitive tication in tag efficient

in Suggested Algorithms for Light-Weight Cryptography
by Elisabeth Oswald (ed.) 2006

Table 1: On-tag vs. Off-tag Security Mechanisms

in Computer Systems Group
by Melanie R. Rieback, Bruno Crispo, Andrew S
"... In PAGE 2: ... Off-tag Security Mechanisms To understand how Selective RFID Jamming works, it is useful to understand the difference between on-tag and off-tag access control. Table1 lists some on-tag and off-tag versions of access control mechanisms. As the name im- plies, on-tag access control mechanisms are located on the RFID tags themselves.... ..."

Table 8: A Schema for the Levels of RFID in Supply Chain Applications

in unknown title
by unknown authors 2005
"... In PAGE 29: ... Thus, when we speak of units, it is important to distin- guish the category being talked about. Commonly, these are referred to as being item-, case- or carton-, or pallet-level tagging (see Table8 on page 28). Capability Organizational Impact/Benefit Transactional RFiD can transform unstructured processes into routinized transactions.... ..."

Table 2: Names used by participants to describe smells in the Tagging Study.

in Olfoto: Designing a smell-based interaction
by Stephen A. Brewster, David K. Mcgookin, Christopher A. Miller 2006
"... In PAGE 7: ... If they were happy with a chosen smell they could move it over the RFID tag reader to tag the photo. Results and Discussion Table2 shows the names participants gave to 10 of the 16 smells. The first five were less well identified; the last five were much more consistently named.... In PAGE 8: ... The study took around 90 minutes. Results and Discussion Table 3 shows the same example smells as Table2 . Choco- late was still well identified in this second phase.... ..."
Cited by 1

Table 2: Names used by participants to describe smells in the Tagging Study.

in Olfoto: Designing a smell-based interaction
by Stephen A. Brewster, David K. Mcgookin, Christopher A. Miller 2006
"... In PAGE 6: ... If they were happy with a chosen smell they could move it over the RFID tag reader to tag the photo. Results and Discussion Table2 shows the names participants gave to 10 of the 16 smells. The first five were less well identified; the last five were much more consistently named.... In PAGE 7: ... The study took around 90 minutes. Results and Discussion Table 3 shows the same example smells as Table2 . Choco- late was still well identified in this second phase.... ..."
Cited by 1
Next 10 →
Results 11 - 20 of 4,513
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University