Skip to main content

Collaborative Sensing in a Retail Store Using Synchronous Distributed Jam Signalling

  • Conference paper
Book cover Pervasive Computing (Pervasive 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3468))

Included in the following conference series:

Abstract

The retail store environment is a challenging application area for Pervasive Computing technologies. It has demanding base conditions due to the number and complexity of the interdependent processes involved. We present first results of an ongoing study with dm-drogerie markt, a large chemist’s retailer, that indicate that supporting product monitoring tasks with novel pervasive technology is useful but still needs technical advances. Based on this study, we uncover problems that occur when using identification technology (such as RFID) for product monitoring. The individual identification struggles with data overload and inefficient channel access due to the high number of tags involved. We address these problems with the concept of Radio Channel Computing, combining approaches from information theory, such as the method of types and multiple access adder channels. We realise data pre-processing on the physical layer and significantly improve response time and scalability. With mathematical formulation, simulations and a real world implementation, we evaluate and prove the usefulness of the proposed system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Metro group - future store initiative (Website, accessed: October 2004), http://www.future-store.org

  2. Decker, C., Kubach, U., Beigl, M.: Revealing the retail black box by interaction sensing. In: Proceedings of the ICDCS /IWSAWC, Providence, USA (2003)

    Google Scholar 

  3. Infratab Inc. (Website accessed: October 2004), http://www.infratab.com/

  4. RFID Journal. Rfid tags for monitoring shelf life (Website accessed, October 2004), http://www.rfidjournal.com/article/articleview/428/1/1/

  5. ISO/IEC/JTC 1/SC 17. Identification cards - contactless integrated circuit(s) cards - vicinity cards (2001)

    Google Scholar 

  6. ISO/IEC/JTC 1/ SC 31/WG 4. Automatic identification - radio frequency identification for item management communications and interfaces part 3: Physical layer, anti collision system and protocol values at 13.56 mhz mode 2 (2001)

    Google Scholar 

  7. Epcglobal Inc. (Website, accessed: September 2004), http://www.epcglobalinc.org/

  8. Murdoch, G., Frost, T.: A comparison of the iso15693 and iso18000-3 mode 5 magellan protocol (2001)

    Google Scholar 

  9. RFID Journal. Magellan unveils tunnel reader (Website, accessed September 2004), http://breakwww.rfidjournal.com/article/articleview/445/1/1/

  10. Magellan Technology Pty. Ltd. (Website, accessed: September 2004), http://www.magtech.com.au/

  11. Vogt, H.: Multiple object identification with passive rfid tags. In: IEEE International Conference on Systems, Man and Cybernetics (SMC 2002) (October 2002)

    Google Scholar 

  12. Finkenzeller, K.: RFID-Handbuch. Carl Hanser Verlag München Wien (2000)

    Google Scholar 

  13. Csiszár, I.: The method of types. IEEE Transactions on Informatio theory 44(6) (1988)

    Google Scholar 

  14. Shannon, C.E., Weaver, W.: The mathematical theory of communication. University of Illinois Press, US (1949)

    MATH  Google Scholar 

  15. de Laval, P., Abdul-Jabbar, S.: Decoding of superimposed codes in multiaccess communication. In: 8th European Conference on Area Communication, EUROCON (1988)

    Google Scholar 

  16. Kautz, W.H., Singleton, R.C.: Nonrandom binary superimposed codes. IEEE Transaction on Information theory (1964)

    Google Scholar 

  17. Bar-David, I., Plotnik, E., Rom, R.: Limitations of the capacity of the m-user binary adder channel due to physical considerations. IEEE Transaction on Information Theory 40(3), 662–673 (1994)

    Article  MATH  Google Scholar 

  18. Liu, K., Sayeed, A.: Optimal distributed detection strategies for wireless sensor networks. In: 42nd Annual Allerton Conference on Communications, Control and Computing (2004)

    Google Scholar 

  19. Krohn, A., Beigl, M., Wendhack, S.: SDJS: Efficient statistics for wireless networks. In: Proceedings of the 12th IEEE International Conference on Network Protocols, Berlin, Germany (2004)

    Google Scholar 

  20. Decker, C., Krohn, A., Beigl, M., Zimmer, T.: The Particle Computer System. In: IPSN Track on Sensor Platform, Tools and Design Methods for Networked Embedded Systems (SPOTS). Proceedings of the ACM/IEEE Fourth International Conference on Information Processing in Sensor Networks, Los Angeles, USA (2005) (to appear)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Krohn, A., Zimmer, T., Beigl, M., Decker, C. (2005). Collaborative Sensing in a Retail Store Using Synchronous Distributed Jam Signalling. In: Gellersen, H.W., Want, R., Schmidt, A. (eds) Pervasive Computing. Pervasive 2005. Lecture Notes in Computer Science, vol 3468. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11428572_15

Download citation

  • DOI: https://doi.org/10.1007/11428572_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26008-0

  • Online ISBN: 978-3-540-32034-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics