C


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

case studies
     Inventory Tracking Pilot 2nd 3rd
     Michigan Department of Agriculture 2nd 3rd 4th
     Operation Enduring Freedom/Operation Iraqi Freedom (OEF/OIF) 2nd 3rd 4th 5th
     Smart and Secure Tradelanes (SST) 2nd 3rd 4th 5th
     Woolworths (reducing theft and shrinkage) 2nd 3rd
case studies;Woolworths (reducing theft and shrinkage)
categories
     of vendors 2nd 3rd
certification
     service vendors
characterization of applications, cost-benefit analysis 2nd
China
     standardization initiatives
Chip Multi-Threading (CMT)
chipless tags
chipless tags. [See also tags]
circular reader antennae
Client Runtime
CMT (Chip Multi-Threading)
Code Division Multiplex Access (CDMA)
colleciton
collisions
     anti-collision applications
commands
     Kill 2nd
commuication
     security solutions 2nd 3rd 4th 5th
communication
     antennae 2nd
     limitation of 2nd
     organizational mobilization 2nd
         institutionlization of results and lessons 2nd
         leadership focus 2nd
         project adoption curves 2nd 3rd
         shared visions 2nd 3rd
     readers
     solutions
     vulnerabilties
comparison criteria (vendor selection) 2nd
competitive assessment, business problem identification
components 2nd
     applications
         hosts 2nd
         middleware 2nd
         systems 2nd
     cost-benefit analysis. [See also cost-benefit analysis]
     costs
     Electronic Animal Identification (EID)
     EPCglobal networks 2nd 3rd
     frequencies
     hardware
         antennae 2nd
         host computers
         linitations of communication 2nd
         readers 2nd 3rd 4th 5th 6th
         tags 2nd 3rd 4th 5th 6th
     operational description of 2nd 3rd
     Sun EPC Event Manager
     Sun EPC Information Server
     vulnerabilities of
componentsJava Enterprise System
computer systems
     vendors
confidential data, protection of. [See also security]
configuration
     access vulnerabilties
ConnectionFactory objects
connections
     EDI
     EPCglobal networks 2nd 3rd
         development
         EPC implementation 2nd
         functions 2nd
         ISO standards 2nd
         standardization initiatives 2nd
         standards 2nd 3rd 4th 5th
     host computers
    readers
         defining operating frequencies
consent (privacy)
consumer applications
     innovations 2nd
     privacy
     risk assessment of
consumer applications, [See also applications]
consumer packaged goods (CPG)
convenience applications
     payment and loyalty cards 2nd 3rd
corrrection
     error
cost-benefit analysis 2nd 3rd
     determinants of benefits 2nd
     elements of cost
         antennae
         business process reengineering
         characterization of applications 2nd
         host applications
         host computers
         installation
         integration
         maintenance
         middleware
         readers 2nd
         support
         tags
         tuning
     types of benefits 2nd
costs
     tags
counterfeiting
     electronic drug pedigrees
coupling devices. [See also antennae]
CPG (consumer packaged goods)
crwod control
currency
     document authentication
customer references (vendor comparison criteria)



RFID Field Guide(c) Deploying Radio Frequency Identification Systems
RFID Field Guide: Deploying Radio Frequency Identification Systems
ISBN: 0131853554
EAN: 2147483647
Year: 2006
Pages: 112

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net