1 |
P. J. Daugherty, T. P. Stank, and D. S. Rogers, 'Third-Party Logistics Service Providers: Purchasers' Perceptions,' The Journal of Supply Chain Management, Vol. 32, No.2, pp. 23-29, 1996
DOI
|
2 |
ISO/IEC JTC I, 'ISO/IEC 11179- 1-6,' 2003
|
3 |
Association for Automatic Identification and Mobility (AIM), http:/ /www.aimglobal.org/
|
4 |
S. Yau, Y. Wang, and F. karim,'Developing Situation-Awareness in Middleware for Ubicomp Environments,' Proc. 26th Int'1 Computer Software and Applications Conference, pp.233-238,2002
|
5 |
H. Wang, M. K. O. Lee, and C. Wang, 'Consumer Privacy Concerns about Internet Marketing', Communication of the ACM, Vol.41, No.3, 1998, pp63-70
DOI
ScienceOn
|
6 |
K. Finkenzeller, 'RFID Handbook: Radio-Frequency Identification Fundamentals and Applications,' John Wiley & Sons, 2000
|
7 |
S. E. Sarma, S. A. Weis, D. W. Engels, 'RFID Systems and Security and Privacy Implications,' Lecture Notes in Computer Science, In Workshop on Cryptographic Hardware and Embedded Systems, LNCS 2523, pp. 454-470, February 2002
|
8 |
S. Yau, F. Karim, Y. Wang, B. Wang, and S. Gupata, 'Reconfigurable ContextSensitive Middleware for Pervasive Computing,' IEEE Pervasive Computing, Vol. I, No.3, pp. 33-40, September 2002
DOI
ScienceOn
|
9 |
S. S. Yau and F. Karim, 'Adaptive Middleware for Ubiquitous Computing Environments,' Proc. IFIP 17th WCe, August 2002
|