User Tools

Site Tools


people

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revisionBoth sides next revision
people [2015/02/04 18:48] elisagpeople [2015/02/04 18:49] elisag
Line 22: Line 22:
  
 This research identified a number of criteria for a leasing model specially designed for MANETs and proposes the //leased object references// model which exhibits such criteria. Leased object references combine leasing with asynchronous communication into one coherent language abstraction that deals with both transient and permanent disconnections. We explored a language approach where dedicated language support is provided such that low-level leasing management concerns (e.g. lease renewal) can be abstracted away, and enables both lease holders (clients) and lease grantors (services) to deal with permanent failures.  This research identified a number of criteria for a leasing model specially designed for MANETs and proposes the //leased object references// model which exhibits such criteria. Leased object references combine leasing with asynchronous communication into one coherent language abstraction that deals with both transient and permanent disconnections. We explored a language approach where dedicated language support is provided such that low-level leasing management concerns (e.g. lease renewal) can be abstracted away, and enables both lease holders (clients) and lease grantors (services) to deal with permanent failures. 
 +
  
  
 ===== =====
-== Andoni Lombide Carreton ==+== dr. Andoni Lombide Carreton ==
 [[http://soft.vub.ac.be/~alombide|Homepage]] [[http://soft.vub.ac.be/~alombide|Homepage]]
  
Line 32: Line 33:
 This poses a problem when we look at the new generation of disposable processing hardware, such as RFID tags. Ubiquitous applications will not only consist of peer-to-peer interactions, but will have to deal with clouds of volatile information disseminated in the network by omnipresent devices such as RFID tags or sensors. This poses a problem when we look at the new generation of disposable processing hardware, such as RFID tags. Ubiquitous applications will not only consist of peer-to-peer interactions, but will have to deal with clouds of volatile information disseminated in the network by omnipresent devices such as RFID tags or sensors.
  
-am currently looking into programming abstractions that allow to specify which events to capture by distributed application components in a mobile ad hoc network. Furthermore, I am trying to come up with mechanisms that allow reacting to these events without relying on event handlers or other callback mechanisms. Finally, low level events should be processed (e.g. by combining them) such that they are on the semantic level of the application.+In my Phd, investigated programming abstractions that allow to specify which events to capture by distributed application components in a mobile ad hoc network. Furthermore, I am trying to come up with mechanisms that allow reacting to these events without relying on event handlers or other callback mechanisms. Finally, low level events should be processed (e.g. by combining them) such that they are on the semantic level of the application.
  
 ===== =====
people.txt · Last modified: 2018/04/12 22:07 by elisag