8. Summary and Conclusions
A summary of the algorithms introduced in this paper is given in Table 3. We introduced in this paper two sets of algorithms that solve the RFID coverage problem using writeable tags. The first set consists of randomized algorithms, called RANDOM and RANDOM+. It also consists of a variant of these algorithms, called MAX-MIN. The second set of algorithms consists of deterministic algorithms, called GDE and LIMITED-GDE. Our algorithms were shown to outperform major existing algorithms in different scenarios. There are still more variations of this problem (e.g., adding load balancing constraints, or others). A promising direction is fault tolerance. That is, how to solve the RFID coverage problem if it is assumed that the links between readers and tags may fail (e.g., a reader is not able to write in a tag in its proximity). Another direction is the problem of optimizing write/read rounds. Lastly, we see that the reader-tag RFID coverage problem still requires future research for two main reasons; the novelty of the reader-tag communication model, and the various and promising applications of the problem.