1. Want R. An introduction to RFID technology. IEEE Pervasive Computing, 2006, 5(1): 25-33
2. Kim D Y, Jang B J, Yoon H G, et al. Effects of reader-to-reader interference on the UHF RFID interrogation range. IEEE Transactions on Industrial Electronics, 2009, 56(7): 2337-2346
3. Lee S R, Joo S D, Lee C W. An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification. Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous’05). Jul 17-21, San Diego, USA. Piscataway, NJ, USA: IEEE, 2005: 166-172
4. Janssen A J, Jong M J. Analysis of contention tree algorithms. IEEE Transactions on Information Theory, 2000, 46(6): 2163-2172
5. Schoute F C. Dynamic frame length ALOHA. IEEE Transactions on Communications,1983, 31(4): 565-568
6. Su Weilian. Multiple RFID tags access algorithm. IEEE Transactions on Mobile Computing, 2010, 9(12): 174-187
7. Khandelwal G, Yener A, Lee K, et al. ASAP: A MACprotocol for dense and time constrained RFID systems. Proceedings of the IEEE International Conference on Communications (ICC’06), Vol 9, Jun 11-15, 2006, Istanbul, Turkey. Piscataway, NJ, USA: IEEE, 2006: 4028-4033
8. Vogt H. Ef?cient object identi?cation with passive RFID tags. Proceedings of the 1st International Conference on Pervasive Computing (Pervasive’02), Aug 26-28, 2002, Zürich, Switzerland. London, UK: Springer-Verlag, 2002: 98-113
9. Chen W T. An accurate tag estimate method for improving the per-formance of an RFID anticollision algorithm based on dynamic framelength ALOHA. IEEE Transactions on on automation science and engineering, 2009, 6(1): 9-15
10. Park J, Lee T J. Error resilient estimation and adaptive binary selection for fast and reliable identi?cation of RFID tags in error-prone channel. IEEE Transactions on Mobile Computing, 2012, 11( 6): 959-969
11. Ma H B, Chandra P S. On the generalised distance in statistics. Proceedings of the National Institute of Sciences of India. 1936, 2(1): 49-55 |