By Topic

IEEE Systems Journal

Issue 2 • Date Dec. 2007

Filter Results

Displaying Results 1 - 19 of 19
  • [Front cover]

    Publication Year: 2007, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • IEEE Systems Journal publication information

    Publication Year: 2007, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007, Page(s): 77
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • Guest Editorial RFID Technology: Opportunities and Challenges

    Publication Year: 2007, Page(s):78 - 81
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (444 KB) | HTML iconHTML
    Freely Available from IEEE
  • RFID Application Development With the Accada Middleware Platform

    Publication Year: 2007, Page(s):82 - 94
    Cited by:  Papers (41)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2606 KB) | HTML iconHTML

    The proliferation of radio frequency identification (RFID) systems in application domains such as supply chain management requires an IT infrastructure that provides RFID device and data management and supports application development. In this paper, we discuss these application requirements in detail. We also contend that the characteristics of passive RFID technology introduce constraints that a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Identification Device Management and Data Capture via WinRFID1 Edge-Server

    Publication Year: 2007, Page(s):95 - 104
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (579 KB) | HTML iconHTML

    In this paper, we present a layered architecture and approach for creating a high performance edge server called reader coordinator (RC) for managing variety of automatic identification hardware such as radio frequency identification (RFID) reader, RFID printer, sensor, barcode scanner, or a controllable device (e.g., programmable logic controller). A unique hardware abstraction approach is used t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Models for Cost-Benefit Analysis of RFID Implementations in Retail Stores

    Publication Year: 2007, Page(s):105 - 114
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (790 KB) | HTML iconHTML

    In this paper, we focus on the models for analyzing radio frequency identification (RFID) implementations in terms of their costs and benefits. We consider the supply chain comprised of the manufacturer, distributor, retailer, and the consumer. We classify the transactions generated by different RFID tag reads and discuss implementations of the data networks connecting the tag readers at the retai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical Minimalist Cryptography for RFID Privacy

    Publication Year: 2007, Page(s):115 - 128
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1440 KB) | HTML iconHTML

    The fear of unauthorized, hidden readouts has dominated the radio frequency identification (RFID) privacy debate. Virtually all proposed privacy mechanisms so far require consumers to actively and explicitly protect read access to their tagged items-either by jamming rogue readers or by encrypting or pseudonymizing their tags. While this approach might work well for activists and highly concerned ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust and Security in RFID-Based Product Authentication Systems

    Publication Year: 2007, Page(s):129 - 144
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (962 KB) | HTML iconHTML

    Product authentication is needed to detect counterfeit products and to prevent them from entering the distribution channels of genuine products. Security is a critical property of product authentication systems. In this paper, we study trust and security in RFID-based product authentication systems. We first present a formal definition for product authentication process and then derive the general... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Power Control Protocol With Hardware Implementation for Wireless Sensor and RFID Reader Networks

    Publication Year: 2007, Page(s):145 - 159
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2150 KB) | HTML iconHTML

    The development and deployment of radio frequency identification (RFID) systems render a novel distributed sensor network which enhances visibility into manufacturing processes. In RFID systems, the detection range and read rates will suffer from interference among high-power reading devices. This problem grows severely and degrades system performance in dense RFID networks. Consequently, medium a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-Speed Collective Readout of Large Quantities of Moving Electronic Tags Using the Response Probability Control Method

    Publication Year: 2007, Page(s):160 - 167
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (523 KB) | HTML iconHTML

    When more than two electronic tags respond to a reader request, the request fails. This is referred to as the collision problem. To overcome this problem, a novel electronic tag readout method, termed the response probability control method (RPCM), is proposed in this paper. In the RPCM, the reader indicates the response probability of a request, ensuring rapid and simultaneous readout of multiple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of the State of Passive UHF RFID: An Experimental Approach

    Publication Year: 2007, Page(s):168 - 176
    Cited by:  Papers (44)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (661 KB) | HTML iconHTML

    In this paper, we identify the state of the technical capability of passive UHF RFID tags and readers using a simple, empirical, experimental approach. This paper does not focus on theoretical capabilities of RFID systems in ideal environments, but rather a pragmatic evaluation of the state of commercially available ISO 18000-6c systems and identifying areas where there are opportunities for impro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aloha from big island of Hawaii (WAC 2008)

    Publication Year: 2007, Page(s):177 - 178
    Request permission for commercial reuse | PDF file iconPDF (770 KB)
    Freely Available from IEEE
  • 2008 IEEE International Conference on System of Systems Engineering (SoSE) and 1st ICSoS Workshop

    Publication Year: 2007, Page(s): 179
    Request permission for commercial reuse | PDF file iconPDF (642 KB)
    Freely Available from IEEE
  • 2008 Workshop International Consortium on System of Systems (ICSOS)

    Publication Year: 2007, Page(s): 180
    Request permission for commercial reuse | PDF file iconPDF (489 KB)
    Freely Available from IEEE
  • 2007 Index IEEE Systems Journal Vol. 1

    Publication Year: 2007, Page(s):181 - 183
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Have you visited lately? www.ieee.org [advertisement]

    Publication Year: 2007, Page(s): 184
    Request permission for commercial reuse | PDF file iconPDF (220 KB)
    Freely Available from IEEE
  • IEEE Sensors Council Information

    Publication Year: 2007, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • IEEE Transactions on Biomedical Circuits and Systems Information for authors

    Publication Year: 2007, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Systems Journal is created to provide a systems-level focused forum for application-oriented manuscripts that address complex systems and system-of-systems of national and global significance

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Professor Vincenzo Piuri
Università degli Studi di Milano