skip to main content
10.1145/1655925.1656147acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicisConference Proceedingsconference-collections
research-article

Complex event processing model for distributed RFID network

Authors Info & Claims
Published:24 November 2009Publication History

ABSTRACT

RFID complex event processing technology, which is proved to be a powerful tool in describing relationship between different events, such as timing, causality, and membership in RFID data streams or events, is a key point of RFID researching in these years. For the trend of great network application of RFID, to manage the tremendous and potentially infinite volumes of raw data generated by RFID systems poses new challenges. This paper presents an RFID complex event processing model in the context of distributed RFID network according to the characteristics of RFID data. Besides, some key methods to realize the modules and the application in real scenario are also discussed.

References

  1. Ishikawa T., Yumoto, Y., Kurata, M., Endo, M., Kinoshita, S., Hoshino, F., Yagi, S., Nomachi, M. "Applying Auto-ID to the Japanese Publication Business to Deliver Advanced Supply Chain Management, Innovative Retail Applications, and Convenient and Safe Reader Services," Auto-ID Center, Keio University, Oct. 2003.Google ScholarGoogle Scholar
  2. Roozbeh Derakhshan, Maria E. Orlowska and Xue Li, "RFID Data Management: Challenges and Opportunities", IEEE International Conference on RFID, March 26--28, 2007, pp. 175--182.Google ScholarGoogle Scholar
  3. Mo Liu, Ming Li, Denis Golovnya, etc. Sequence Pattern Query Processing over Out-of-Order Event Streams{C}//Proc of ICDE, 2009, 784--795. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Palmer. Seven Principles of Effective RFID Data Management. www.objectstore.com/docs/articles/7principlesrfidmgmnt.pdf, Aug. 2004.Google ScholarGoogle Scholar
  5. S. Polniak, The RFID Case Study Book: RFID Application Stories from Around the Globe. Abhisam Software, 2007.Google ScholarGoogle Scholar
  6. F. Wang and P. Liu. Temporal Management of RFID Data. In VLDB, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Floerkemeier and M. Lampe, "Issues with RFID usage in ubiquitous computing applications" Pervasive Computing: Second International Conference, PERVASIVE, 2004.Google ScholarGoogle Scholar
  8. F. Wang, S. Liu, P. Liu, and Y. Bai. Bridging physical and virtual worlds complex event processing for RFID data streams. International Conference on Extending Database Technology (EDBT), LNCS 3896, pages 588--607, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Babu and et. al., "Exploiting k-constraints to reduce memory overhead in continuous queries over data streams." ACM Trans. Database Syst., vol. 29, no. 3, pp. 545--580, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Shawn R. Jeffery, Minos Garofalakis, Michael J. Franklin. Adaptive cleaning for RFID data streams{C}//Proc of VLDB, 2006:163--174. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Shawn R. Jeffery, Gustavo Alonso, Michael J. Franklin, et al. A pipelined framework for online cleaning of sensor data streams{C}//Proc of ICDE, 2006, 773--778. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Jeffery, M. Garofalakis and M. Franklin, "Adaptive cleaning for RFID data streams", Proceedings of the 32nd international conference on Very large data bases (VLDB), 2006, pp. 63--174. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Complex event processing model for distributed RFID network

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICIS '09: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
          November 2009
          1479 pages
          ISBN:9781605587103
          DOI:10.1145/1655925

          Copyright © 2009 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 24 November 2009

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader