Otedama: A Relocatable RFID Information Repository Architecture
نویسندگان
چکیده
منابع مشابه
RARep: a Reference Architecture Repository
Reference architectures are a special type of software architectures that have been proposed for supporting standardization, development, and evolution of software systems of a given domain. As these architectures could contribute for knowledge reuse and increased productivity, several companies have been creating specific reference architectures for their field of expertise. Nonetheless, there...
متن کاملRepository and Preservation Storage Architecture
While the Open Archive Information System (OAIS) model has become the de facto standard for preservation archives, the design and implementation of a repository or reliable long term archive lacks adopted technology standards and design best practices. This paper is intended to provide guidelines and recommendations for standards implementation and best practices for a viable, cost effective, a...
متن کاملRFID Middleware Design and Architecture
Radio Frequency Identification (RFID) is a form of Automatic Identification and Data Capture (AIDC) technique (Ishikawa et al., 2003). RFID is recently being used in a wide range of areas such as Supply Chain Management (SCM), health care, traffic monitoring, retail, and access control (Polniak, 2007). The ability to store large amounts of data and identify items which are not in the line of si...
متن کاملRelocatable model in MFS
Introduction Conclusions References Tables Figures Back Close Full Screen / Esc Abstract Introduction Conclusions References Tables Figures Back Close Full Screen / Esc Printer-friendly Version Interactive Discussion EGU Abstract The MFS (Mediterranean Forecasting System) project and its follower MFSTEP (Mediterranean ocean Forecasting System – Towards Environmental Prediction) are being coveri...
متن کاملLoughborough University Institutional Repository Privacy of recent RFID authentication protocols
Privacy is a major concern in RFID systems, especially with widespread deployment of wireless-enabled interconnected personal devices e.g. PDAs and mobile phones, credit cards, e-passports, even clothing and tires. An RFID authentication protocol should not only allow a legitimate reader to authenticate a tag but it should also protect the privacy of the tag against unauthorized tracing: an adv...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Information and Systems
سال: 2010
ISSN: 0916-8532,1745-1361
DOI: 10.1587/transinf.e93.d.2922