research:doforreal
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
research:doforreal [2010/08/04 14:25] – edited stijnm | research:doforreal [2010/08/04 17:34] (current) – shortened tvcutsem | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Distributed Objects for Real ====== | ====== Distributed Objects for Real ====== | ||
- | Over the past year, a number of researchers at the Software Languages Lab have been involved in experiments designed to uncover | + | Over the past year, the Software Languages Lab has been experimenting with new programming |
- | + | ||
- | During these experiments, | + | |
===== Volatile Data Clouds ===== | ===== Volatile Data Clouds ===== | ||
Line 17: | Line 15: | ||
occurrences, | occurrences, | ||
- | ===== Tags Objects ===== | + | ===== Proxy Objects ===== |
< | < | ||
- | The tag objects model represents RFID tags as full-blown objects, which introduces a natural mechanism to deal with **mutable tag data**. | + | The proxy objects model represents RFID-tagged physical objects |
</ | </ | ||
- | While the //volatile data clouds// model considers RFID tags to be containers of data which is to be filtered and interpreted by the application, | + | While the //volatile data clouds// model considers RFID tags to be containers of data which is to be filtered and interpreted by the application, |
- | When interacting with these tag objects, one has to deal with the ephemeral nature of the connection between the mobile RFID-enabled application and any particular tag. The concerns to be addressed when interacting with tag objects closely mimic those that govern | + | When interacting with these proxy objects, one has to deal with the ephemeral nature of the connection between the mobile RFID-enabled application and any particular tag denoted by a proxy object. The concerns to be addressed when interacting with RFID-tagged physical |
the interaction with classic remote objects: | the interaction with classic remote objects: | ||
- | First of all, mobile RFID-enabled applications need a means to detect when a particular | + | First of all, mobile RFID-enabled applications need a means to detect when a particular |
mechanism to achieve this is to use the default [[at: | mechanism to achieve this is to use the default [[at: | ||
- | Once a tag object has been discovered, the application can start to interact with it. However, if either the user of the application or the tagged object is roaming, it is extremely likely that the tag will (temporarily) go out of range. | + | Once a proxy object has been discovered, the application can start to interact with it. However, if either the user of the application or the tagged object is roaming, it is extremely likely that the tag will (temporarily) go out of range. |
- | By aligning | + | By aligning |
- | A particularly interesting abstraction when developing mobile RFID-enabled applications are [[research: | + | A particularly interesting abstraction when developing mobile RFID-enabled applications are [[research: |
===== Comparison ===== | ===== Comparison ===== | ||
- | Having implemented both models, | + | Having implemented both models, |
- | The volatile data clouds model treats RFID tags as simple containers of data and aims at providing applications with expressive means to represent a collection of nearby tags which is constantly in flux. Consequently, | + | The volatile data clouds model treats RFID tags as simple containers of data and aims at providing applications with expressive means to represent a collection of nearby tags which is constantly in flux. Consequently, |
- | The tag objects model on the other hand treats the contents of an RFID tag as a full-fledged object. | + | The tag objects model on the other hand treats the contents of an RFID tag as a full-fledged object. |
In all likelihood, a programming model that fully leverages the advantages of a world teeming with tagged objects will incorporate elements of both models presented here. | In all likelihood, a programming model that fully leverages the advantages of a world teeming with tagged objects will incorporate elements of both models presented here. |
research/doforreal.1280924726.txt.gz · Last modified: 2010/08/04 14:36 (external edit)