Skip to main content

and
  1. No Access

    Article

    A Reprocessing Model for Complete Execution of RFID Access Operations on Tag Memory

    This paper investigates the problem of inconsistent states of radio frequency identification (RFID) tag data caused by incomplete execution of read/write operations during access to RFID tag memory. Passive RF...

    Wooseok Ryu, Bonghee Hong, Joonho Kwon, Ge Yu in Journal of Computer Science and Technology (2012)

  2. No Access

    Article

    Aggressive Complex Event Processing with Confidence over Out-of-Order Streams

    In recent years, there has been a growing need for complex event processing (CEP), ranging from supply chain management to security monitoring. In many scenarios events are generated in different sources but a...

    Chuan-Wen Li, Yu Gu, Ge Yu, Bonghee Hong in Journal of Computer Science and Technology (2011)