|
[1]D. Shih, P. L. Sun, D. C. Yen and S. M. Huang, “Taxonomy and Survey of RFID Anti-Collision Protocols,” Computer and Communications, 2006, vol. 29, pp. 2150-2166. [2]T. Zhijun and H. Yigang, “Research of Multi-Access and Anti-Collision Protocols in RFID Systems,” Anti-counterfeiting, Security, Identification, IEEE International Workshop on 16-18, Apr. 2007, pp. 377-380. [3]J. H. Chio, D. Lee and H. Lee, “Query Tree-based Reservation for Efficient RFID Tag Anti-Collision,” IEEE Communications Letter, Apr. 2006, vol. 10, no. 4, pp. 236-238. [4]J. H. Chio, D. Lee and H. Lee, “Bi-Slotted Tree based Anti-Collision Protocols for Fast Tag Identification in RFID Systems,” IEEE Communications Letter, Dec. 2006, vol. 10, pp. 861-863. [5]J. Myung, W. Lee, and J. Srivastava, “Adaptive Binary Splitting for Efficient RFID Tag Anti-Collision,” IEEE Communications Letter, Mar. 2006, vol. 10, no. 3, pp. 144-146. [6]J. Myung and W. Lee, “Adaptive Splitting Protocols for RFID Tag Collision Arbitration,” MobiHoc, May. 2006, Florence, Italy, pp. 202-213. [7]S. H. Kim and P. Park, “An Efficient Tree-Based Tag Anti-Collision Protocol for RFID Systems,” IEEE Communications Letters, May. 2007, vol. 11, pp. 449-451. [8]T. Wang, “Enhanced Binary Search with Cut-through Operation for Anti-Collision in RFID Systems,” IEEE Communications Letter, Apr. 2006, vol. 10, no. 4, pp. 236-238. [9]C. S. Kim, K. L. Park, H. C. Kim and S. D. Kim, “An Efficient Stochastic Anti-Collision Algorithm using Bit-Slot Mechanism,” PDPTA04, 2004, pp.652-656. [10]J. Cha and J. Kim, “Novel Anti-Collision Algorithms for Fast Object Identification in RFID System,” in Proc. of Parallel and Distributed System, Jul. 2005, vol. 2, pp. 63-67. [11]J. Park, M. Chung and T. J. Lee, “Identification of RFID Tags in Framed-Slotted ALOHA with Robust Estimation and Binary Selection,” IEEE Communications Letter, 2007, vol. 11, no. 5, pp. 452-454. [12]S. Lee, S. Joo and C. Lee, “An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification,” in Proc. MobiQuitous, Jul. 2005, vol.2, pp. 166-172. [13]C. P. Wong and Q. Feng, “Grouping based Bit-Slot ALOHA Protocol for Tag Anti-Collision in RFID Systems,” IEEE Communications Letter, Dec. 2007, vol. 11, pp. 946-948. [14]J. Kim, W. Lee, J. Yu, J. Myung, E. Kim and C. Lee, “Effect of Localized Optimal Clustering for Reader Anti-Collision in RFID Networks: Fairness Aspects to the Readers,” Proceedings 14th International Conference on Computer Communications and Networks, Oct. 2005, vol.1, pp. 497-502. [15]J. Ho, D. W. Engels and S. E. Sarma, “HiQ: A Hierarchical Q-Learning Algorithm to Solve the Reader Collision Problem,” SAINTW, Jan. 2006, pp. 1-4. [16]J. Waldrop, D. W. Engels and S. E. Sarma, “Colorwave: An Anti-Collision Algorithm for the Reader Collision Problem,” in IEEE Wireless Communications and Networking Conference, Mar. 2003, vol. 2, pp. 1206-1210. [17]S. M. Birari and S. Iyer, “Mitigating the Reader Collision Problem in RFID Networks with Mobile Readers” Dissertation for Master of Technology, Indian Institute of Technology, 2005, India. [18]A. M. Bonuccelli, F. Lonetti and F. Martelli, “Instant Collision Resolution for Tag Identification in RFID Networks,” Ad Hoc Networks, Nov. 2007, vol. 5, issue. 8, pp. 1220-1232. [19]A. M. Bonuccelli, F. Lonetti and F. Martelli, “Tree Slotted ALOHA: A New Protocol for Tag Identification in RFID Networks, World of Wireless, Mobile and Multimedia Networks, WoWMoM, Aug. 2006, vol. 1, pp. 608-614. [20]W. C. Chen, S. J. Horng and F. Pingzhi, “An Enhanced Anti-Collision Algorithm in RFID Based on Counter and Stack,” Systems and Networks Communications, ICSNC 2007. Second International Conference on 25-31 Aug. 2007, vol. 1, pp. 21-21. [21]S. W. Jin and K. J. Geun, “Partitioning of Tags for Near-Optimum RFID Anti-Collision Performance,” Wireless Communications and Networking Conference, WCNC 2007 IEEE 11-15 Mar. 2007, vol. 1, pp. 1673-1678. [22]C. Tao and L. Jin, “Analysis and Simulation of RFID Anti-Collision Algorithms,” Advanced Communication Technology, the 9th International Conference on 12-16, Feb. 2007, vol. 1, pp. 697-701. [23]C. Yinghua and Y. Zhao, “Mathematical Analysis for Binary Tree Algorithm in RFID,” Vehicular Technology Conference, VTC Spring on 11-14, May. 2008, vol. 1, pp. 2725-2729. [24]K. Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification(2003), 2nd ed, New York: Wiley. [25]A. S. Tanenbaum, Computer networks, 2003, 2nd. ed, New Jersey, U.S.A. [26]EPCglobal, TW http://www.epcglobal.org.tw/epcg/jsp/a11.htm. [27]日經BP RFID技術編輯部,RFID 技術與應用,旗標出版社,台北,2004。 [28]李建斌、張復閔,RFID室內定位挑戰重重,新通訊元件雜誌,台北,2006。 [29]陳宏宇,RFID系統入門-無線射頻辨識系統,文魁資訊,台北,2004。
|