Database Reference
In-Depth Information
[19] N. Dindhar, B. Guc, P. Lau, A. Ozal, M. Soner, N. Tatbul. DejaVu:
Declarative Pattern Matching over Live and Archived Streams of
Events,
ACM SIGMOD Conference
, 2009.
[20] M. Feldhofer, S. Dominikus, J. Wolkerstorfer. Strong authentication
for RFID systems using AES algorithm,
Proceedings of Workshop on
Cryptographic Hardware and Embedded Systems
, 2004.
[21] K. Fishkin, S. Roy. Enhancing RFID Privacy via Antenna En-
ergy Analysis,
Tech. Memo IRS-TR-03-012
, Intel Research, Seattle,
2003.
[22] C. Floerkemeier, M. Lampe. RFID Middleware Design - Addressing
Application Requirements and and RFID Constraints,
Joint Confer-
ence on Smart Objects and Ambient Intelligence
, 2005.
[23] M. J. Franklin, S. R. Jeffrey, S. Krishnamurthy, F. Reiss, E. Wu,
O. Cooper, A. Edakkunni, W. Hong. Design Considerations of High
Fan-In Systems,
CIDR Conference
, 2005.
[24] S. L. Garfinkel, A. Juels, R. Pappu. RFID Privacy: An Overview of
Problems and Proposed Solutions,
IEEE Security and Privacy
, 3(3),
2005.
[25] M. Garofalakis, K. Brown, M. Franklin, J. Hellerstein, D. Wang, E.
Michelakis, L. Tancau, E. Wu, S. Jeffery, R. Aipperspach. Probabilis-
tic Data Management for Pervasive Computing: The Data Furnace
Project.
IEEE Data Engineering Bulletin
, 29(1): pp 57-63, 2006.
[26] N. H. Gehani, H. V. Jagadish, O. Shmueli. Composite Event Spec-
ification in Active Databases: Model and Implementation,
VLDB
Conference
, 1992.
[27] H. Gonzalez, J. Han, X. Shen. Cost-Conscious Cleaning of Massive
RFID Data Sets.
ICDE Conference
, 2007.
[28] H. Gonzalez, J. Han, X. Li. Mining compressed commodity work-
flows from massive RFID data sets.
CIKM Conference
, 2006.
[29] H. Gonzalez, J. Han, X. Li, D. Klabjan. Warehousing and Analyzing
Massive RFID Data Sets.
ICDE Conference
, 2006.
[30] H. Gonzalez, J. Han, X. Li. FlowCube: Constructing RFID
FlowCubes for Multi-Dimensional Analysis of Commodity Flows.
VLDB Conference
, 2006.
[31] T. J. Green, V. Tannen. Models for incomplete and probabilistic in-
formation.
IEEE Data Engineering Bulletin
, 29(1), pp. 17-24, March
2006.
[32] S. Guiasu, A. Shenitzer. The principle of maximum entropy.
Math-
ematical Intelligence
, 7(1), 1985.