Search

Search Funnelback University

Search powered by Funnelback
1 - 6 of 6 search results for `RFID Tags`
  1. Fully-matching results

  2. Planes ready for take-off in fraction of the time | University of…

    https://www.cam.ac.uk/research/news/planes-ready-for-take-off-in-fraction-of-the-time
    Thumbnail for Planes ready for take-off in fraction of the time | University of Cambridge 6 Jun 2008: Professor Duncan McFarlane. The initiative will trial the latest automated identification technology - such as tiny electronic tags that feed information back to computers - to examine how it could be used to ... This will be the focus of the Cambridge
  3. ReconfigurableComponent-based Middleware for Networked Embedded…

    https://www.cl.cam.ac.uk/~cm542/papers/jwin.pdf
    29 Feb 2008: ous’ vehices—e.g. those carrying dangerous chemicals—carry RFID tags and are detected and.
  4. ReconfigurableComponent-based Middleware for Networked Embedded…

    https://mobile-systems.cl.cam.ac.uk/papers/jwin.pdf
    29 Feb 2008: ous’ vehices—e.g. those carrying dangerous chemicals—carry RFID tags and are detected and.
  5. Energy-Efficient Sentient Computing

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-722.pdf
    9 Jul 2008: Apart from directed-diffusion, there is another negotiation-based protocol which favours. data aggregation by involving data tags.
  6. Technical ReportNumber 709 Computer Laboratory UCAM-CL-TR-709ISSN…

    https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-709.pdf
    5 Feb 2008: RFID) tags, Wireless LAN hotspots; widespread adoption of wireless-equipped Personal Digital As-. ... Manyresearchers in pervasive. computing privacy have concentrated on RFID devices, which are processing- and memory-constrained.
  7. Technical ReportNumber 709 Computer Laboratory UCAM-CL-TR-709ISSN…

    https://www.cl.cam.ac.uk/research/dtg/archived/files/publications/public/fw242/UCAM-CL-TR-709.pdf
    16 Jul 2008: RFID) tags, Wireless LAN hotspots; widespread adoption of wireless-equipped Personal Digital As-. ... Manyresearchers in pervasive. computing privacy have concentrated on RFID devices, which are processing- and memory-constrained.

Refine your results

Related searches for `RFID Tags`

Search history

Recently clicked results

Recently clicked results

Your click history is empty.

Recent searches

Recent searches

Your search history is empty.