Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z] California State Assembly cameras readers capabilities of tags capacitive-coupled systems capacity advantages of RFID over bar codes data (9.2.2 tags) carrier frequency CASPIAN (Consumers Against Supermarket Privacy Invasion and Numbering) 2nd categories of privacy business community 2nd political and legal resolutions 2nd 3rd 4th technical community 2nd 3rd 4th CCD (charged coupled device) readers CEN (European Committee for Standardization) channels input/output readers 2nd character density (bar codes) characterization of RFID systems 2nd 3rd charged coupled device (CCD) readers checkpoints multiple tags CID (consumer identification data) class tags (EPC) 2nd clock extractors close-coupled systems clusters HA cold (operating conditions) collaboration standards collisions anti-collision algorithms readers commands kill 2nd commisioning tags commissioning tags communication infrastructure comparable accuracy rates (bar codes over RFID) comparing cost of buying/building software complexity objections for not using RFID complexity of RFID systems compliance (regulations) components enterprise back-end 2nd microchips 2nd RFID systems 2nd actuators annunciators characterization of 2nd 3rd communication infrastructure controllers 2nd host/software systems 2nd 3rd reader antennas 2nd 3rd 4th readers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th references 2nd 3rd 4th sensors tags 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th composition relationships concepts of RFID 2nd 3rd conferences constructive interference consumer identification data (CID) consumer packaged goods (CPG) Consumers Against Supermarket Privacy Invasion and Numbering (CASPIAN) 2nd contact wands contactless smart cards contactless tags 2nd Container Security Initiative (CSI) containers, smart shipping contingency (plan for vendors) continuous learning cycles continuous wave (CW) 2nd controllers 2nd readers controlling access 2nd 3rd 4th controlling inventory 2nd 3rd converting inlets corrective measures 2nd cost of RFID systems 2nd costs as objection for using RFID bar codes objections for not using RFID 2nd ROI tags counterfeiting anti-counterfeiting applications 2nd 3rd 4th 5th 6th 7th CPG (consumer packaged goods) creating business justification goals 2nd building business cases 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th creating roadmaps 2nd determining potential application areas forming teams setting priorities 2nd slap-and-ship type applications 2nd creep (scope), avoiding crests cross-functional support CSI (Container Security Initiative) currency anti-counterfeit applications 2nd 3rd 4th 5th 6th 7th current state of RFID exclusive in the short run high degree of confusion about 2nd inclusive in the medium to long run customization slap-and-ship type applications CW (carrier wave) CW (continuous wave) cycles |