An empirical study of the anticipated consumer response to RFID product item tagging, Industrial Management & Data Systems, vol.107, issue.4, pp.461-583, 2007. ,
DOI : 10.1111/1540-4560.00067
Constructing Intelligent software agents with Java ? A Programmers Guide to Smarter Applications, pp.0-471, 1998. ,
Profile-Based Object Matching for Information Integration, IEEE Intelligent Systems Magazine, pp.54-59, 2003. ,
Role Based Access Control, 15th National Computer Security Conference, pp.554-563, 1992. ,
RFID vs WiFi for Hospital Inventory Tracking Systems. http://blog.tmcnet.com/wireless-mobility/rfid-vs-wifi-for-hospital-inventory-trackingsystems, p.asp, 2006. ,
Intelligent Agent Framework for Secure Patient-Doctor Profilling and Profile Matching, International Journal of Healthcare Information Systems and Informatics, vol.1, pp.1-10, 2008. ,
DOI : 10.4018/978-1-60566-960-1.ch047
RFID: A Technical Overview and Its Application to the Enterprise. IT Professional Magazine, MIT = RFID + Rx. Information Week, pp.27-33, 2004. ,
Fuzzy sets, Information and Control, vol.8, issue.3, pp.338-352, 1965. ,
DOI : 10.1016/S0019-9958(65)90241-X
Opportunistic routing for enhanced source-location privacy in wireless sensor networks, 2010 25th Biennial Symposium on Communications, 2010. ,
DOI : 10.1109/BSC.2010.5472946
Improving source-location privacy through opportunistic routing in wireless sensor networks, 2011 IEEE Symposium on Computers and Communications (ISCC), 2011. ,
DOI : 10.1109/ISCC.2011.5983942
Performance Comparison of Opportunistic Routing Schemes in Wireless Sensor Networks, 2011 Ninth Annual Communication Networks and Services Research Conference, 2011. ,
DOI : 10.1109/CNSR.2011.46