User Tools

Site Tools


people

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revisionBoth sides next revision
people [2010/07/27 11:26] kpintepeople [2010/07/27 11:28] kpinte
Line 36: Line 36:
 == Kevin Pinte == == Kevin Pinte ==
  
-Our everyday environment will soon be pervaded with RFID tags, tiny chips that can be integrated into any physical object. The tags can store and disperse information about the object or its environment. RFID technology is a key technology in developing pervasive context-aware applications.+Our everyday environment will soon be pervaded with RFID tags, tiny chips that can be integrated into any physical object. The tags can store and distribute information about the object or its environment. RFID technology is a key technology in developing pervasive context-aware applications.
  
-I am investigating new programming abstractions to develop //mobile RFID-enabled applications//. These are applications running on mobile devices such as smartphones or PDAs that spontaneously interact with the [objects in the] user's environment using RFID technology. Mobile RFID-enabled applications both disperse application-specific data to and process contextual data from tagged physical objects. The programmer must dispose of adequate tools to deal with RFID hardware characteristics.+I am investigating new programming abstractions to develop //mobile RFID-enabled applications//. These are applications running on mobile devices such as smartphones or PDAs that spontaneously interact with the [objects in the] user's environment using by communicating with tagged objects. Mobile RFID-enabled applications both disperse application-specific data to and process contextual data from tagged physical objects. The programmer must dispose of adequate tools to deal with RFID hardware characteristics.
  
 Currently programming such applications is problematic. Communicating with RFID tags is prone to many failures as the connections with tags are extremely volatile and RFID tags have a small range of operation. State-of-the-art RFID applications heavily rely on infrastructure and merely employ RFID tags as digital barcodes, not exploiting the writable memory on the tags. As a consequence mobile RFID-enabled applications have to be developed in an ad hoc way, building upon low-level hardware abstractions leaving the developer to deal with RFID hardware characteristics manually.  Currently programming such applications is problematic. Communicating with RFID tags is prone to many failures as the connections with tags are extremely volatile and RFID tags have a small range of operation. State-of-the-art RFID applications heavily rely on infrastructure and merely employ RFID tags as digital barcodes, not exploiting the writable memory on the tags. As a consequence mobile RFID-enabled applications have to be developed in an ad hoc way, building upon low-level hardware abstractions leaving the developer to deal with RFID hardware characteristics manually. 
people.txt · Last modified: 2018/04/12 22:07 by elisag