Database Reference
In-Depth Information
[19] N. Dindhar, B. Guc, P. Lau, A. Ozal, M. Soner, N. Tatbul. DejaVu:
Declarative Pattern Matching over Live and Archived Streams of
Events, ACM SIGMOD Conference , 2009.
[20] M. Feldhofer, S. Dominikus, J. Wolkerstorfer. Strong authentication
for RFID systems using AES algorithm, Proceedings of Workshop on
Cryptographic Hardware and Embedded Systems , 2004.
[21] K. Fishkin, S. Roy. Enhancing RFID Privacy via Antenna En-
ergy Analysis, Tech. Memo IRS-TR-03-012 , Intel Research, Seattle,
2003.
[22] C. Floerkemeier, M. Lampe. RFID Middleware Design - Addressing
Application Requirements and and RFID Constraints, Joint Confer-
ence on Smart Objects and Ambient Intelligence , 2005.
[23] M. J. Franklin, S. R. Jeffrey, S. Krishnamurthy, F. Reiss, E. Wu,
O. Cooper, A. Edakkunni, W. Hong. Design Considerations of High
Fan-In Systems, CIDR Conference , 2005.
[24] S. L. Garfinkel, A. Juels, R. Pappu. RFID Privacy: An Overview of
Problems and Proposed Solutions, IEEE Security and Privacy , 3(3),
2005.
[25] M. Garofalakis, K. Brown, M. Franklin, J. Hellerstein, D. Wang, E.
Michelakis, L. Tancau, E. Wu, S. Jeffery, R. Aipperspach. Probabilis-
tic Data Management for Pervasive Computing: The Data Furnace
Project. IEEE Data Engineering Bulletin , 29(1): pp 57-63, 2006.
[26] N. H. Gehani, H. V. Jagadish, O. Shmueli. Composite Event Spec-
ification in Active Databases: Model and Implementation, VLDB
Conference , 1992.
[27] H. Gonzalez, J. Han, X. Shen. Cost-Conscious Cleaning of Massive
RFID Data Sets. ICDE Conference , 2007.
[28] H. Gonzalez, J. Han, X. Li. Mining compressed commodity work-
flows from massive RFID data sets. CIKM Conference , 2006.
[29] H. Gonzalez, J. Han, X. Li, D. Klabjan. Warehousing and Analyzing
Massive RFID Data Sets. ICDE Conference , 2006.
[30] H. Gonzalez, J. Han, X. Li. FlowCube: Constructing RFID
FlowCubes for Multi-Dimensional Analysis of Commodity Flows.
VLDB Conference , 2006.
[31] T. J. Green, V. Tannen. Models for incomplete and probabilistic in-
formation. IEEE Data Engineering Bulletin , 29(1), pp. 17-24, March
2006.
[32] S. Guiasu, A. Shenitzer. The principle of maximum entropy. Math-
ematical Intelligence , 7(1), 1985.
Search WWH ::




Custom Search