Exploiting integrity constraints for cleaning trajectories of RFID-monitored objects