[1] Zhen B, Kobayashi M, Shimizu M. Framed ALOHA for multiple RFID objects identification [J]. IEICE Transactions on Communications, 2005, E88-B(3): 991-999.[2] Zhu L, Yum T S P. The optimal reading strategy for EPC gen-2 RFID anti-collision systems [J]. IEEE Transactions on Communications, 2010, 58(9): 2725-2733.[3] Zhou F, Jin D, Huang C, et al. Optimize the power consumption of passive electronic tags for anti-collision schemes [C]//Proceedings of 5th International Conference on ASIC. Piscataway, NJ, USA: IEEE, 2003: 1212-1217[4] Zhou F, Chen C, Jin D, et al. Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems [C]//Proceedings of International Symposium on Low Power Electronics and Design. New York, NY, USA: ACM, 2004: 357-362.[5] Law C, Lee K, Siu K Y. Efficient memoryless protocol for tag identification [C]//Proceedings of 4th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications. New York, NY, USA: ACM, 2000: 75-84.[6] Jia X, Feng Q, Ma C. An efficient anti-collision protocol for RFID tag identification [J]. IEEE Communications Letters, 2010, 14(11): 1014-1016.[7] Yang C N, He J Y. An effective 16-bit random number aided query tree algorithm for RFID tag anti-collision [J]. IEEE Communications Letters, 2011, 15(5): 539-541.[8] Choi J H, Lee D, Lee H. Bi-slotted tree based anti-collision protocols for fast tag identification in RFID systems [J]. IEEE Communications Letters, 2006, 10(12): 861-863.[9] Zhu L, Yum T S P. A critical survey and analysis of RFID anti-collision mechanisms [J]. IEEE Communications Magazine, 2011, 59(5): 214-221.[10] Klair D K, Chin K W, Raad R. A survey and tutorial of RFID anti-collision protocols [J]. IEEE Communications Surveys & Tutorials, 2010, 12(3): 400-421.[11] Choi S Y, Lee J, Kim S H, et al. Hybrid anti-collision method based on maximum throughput for RFID system [J]. Electronics Letters, 2010, 46(19): 1346-1348. |