1 |
Roy Want, "An Introduction to RFID Technology," IEEE Pervasive Computing, Vol. 5, No. 1, pp. 25-33, 2006.
DOI
ScienceOn
|
2 |
R. Weinstein, "RFID: a technical overview and its application to the enterprise," IT Professional, Vol.7, No. 3, pp. 27-33, 2005.
|
3 |
C. Floerkemeier and M. Lampe, "Issues with RFID Usage in Ubiquitous Computing Applications," Lecture Notes in Computer Science, Vol. 3001, pp.188-193, 2004.
|
4 |
K. P. Fishkin, B. Jiang, M. Philipose and S. Roy, "I sense a disturbance in the force: Long-range detection of interactions with RFID-tagged objects," Lecture Notes in Computer Science, Vol. 3205, pp. 268-282, 2004.
|
5 |
K. Domdouzis, B. Kumar and C. Anumba, "Radio-Frequency Identification (RFID) applications : A brief introduction," Advanced Engineering Informatics, Vol. 21, No. 4, pp. 350-355, 2007.
DOI
ScienceOn
|
6 |
이한영, "능동형 RFID시스템에서 태그 인식 속도 향상을 위한 고속 태그 충돌 방지 알고리즘", 한국전자통신학회논문지, 7권, 2호, pp. 235-242, 2012.
|
7 |
문헌일, 오치바드라, 홍완표, "900MHz TA(talk around)와 RFID의 주파수 대역 공유에 관한 연구", 2010년 한국전자통신학회 춘계학술대회논문지, 4권, 1호, pp.70-76, 2010.
|
8 |
Wooseok Ryu and Bonghee Hong, "A Presumed Write Protocol for Ensuring Complete Access to RFID Tag Memory," Ubiquitous Information Technologies & Applications, ICUT '09. Proceedings of the 4th International Conference on, Dec. 2009.
|
9 |
류우석, 홍봉희, 최병운, "태그 메모리 접근을 위한 RFID 미들웨어의 쓰기 프로토콜," 데이터베이스연구, 25권, 2호, pp. 49-65, 8, 2009.
|
10 |
Wooseok Ryu and Bonghee Hong, "A Reprocessing Model Based on Continuous Queries for Writing Data to RFID Tag Memory," Lecture Notes in Computer Science, Vol. 5463, pp. 201-214, 2009.
|