Author of the publication

A novel software-radio-defined passive RFID reading system with real-time collision resolution.

, , , and . Int. J. Ad Hoc Ubiquitous Comput., 8 (4): 261-270 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Modeling for Security Analytics., , , , and . CISRC, page 22:1-22:4. ACM, (2016)Anti-collision policy for RFID systems: fast predict tags in field algorithm., , , , and . Int. J. Radio Freq. Identif. Technol. Appl., 3 (3): 215-228 (2011)Automatic Identification of Critical Digital Assets., , , and . ICDIS, page 219-224. IEEE, (2019)Toward hybrid attack dependency graphs., , , and . CSIIRW, page 62. ACM, (2011)Data Privacy Issues with RFID in Healthcare., and . Medical Data Privacy Handbook, Springer, (2015)Undergraduate Educational Pathways for Developing a High-Performance Computing Workforce., , and . PEARC, page 53:1-53:4. ACM, (2017)Radio frequency identification prototyping., , , , , , , and . ACM Trans. Design Autom. Electr. Syst., 13 (2): 29:1-29:22 (2008)Using Radio Frequency Identification (RFID) Tags to Store Medical Information Needed by First Responders: Data Format, Privacy, and Security., and . Int. J. Comput. Model. Algorithms Medicine, 3 (3): 10-26 (2012)Introducing priority into hybrid attack graphs., , , and . CISRC, page 12:1-12:4. ACM, (2017)HydroSense: A self-powered wireless device for monitoring water usage in hotel showers., , , , , , , , and . GHTC, page 314-320. IEEE, (2015)