research:doforreal
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
research:doforreal [2010/08/04 13:16] – reworked stijnm | research:doforreal [2010/08/04 14:25] – edited stijnm | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Distributed Objects for Real ====== | ====== Distributed Objects for Real ====== | ||
- | Over the past year, a number of researchers at the Software Languages Lab have been involved in experiments designed to uncover new programming abstractions to facilitate the development of mobile RFID-enabled applications. | + | Over the past year, a number of researchers at the Software Languages Lab have been involved in experiments designed to uncover new programming abstractions to facilitate the development of mobile RFID-enabled applications. |
During these experiments, | During these experiments, | ||
- | == Volatile Data Clouds == | + | ===== Volatile Data Clouds |
< | < | ||
Line 17: | Line 17: | ||
occurrences, | occurrences, | ||
- | == Tags Objects == | + | ===== Tags Objects |
- | While the //volatile data clouds// | + | < |
+ | The tag objects | ||
+ | </ | ||
- | When treating tags as objects, it is important to deal with the ephemeral nature of the connection between the mobile application and any particular tag. A first problem to be tackled is how applications detect new tags as they come into range. | + | While the //volatile data clouds// model considers RFID tags to be containers |
- | Once a tag object | + | When interacting with these tag objects, one has to deal with the ephemeral nature |
+ | the interaction with classic remote objects: | ||
- | While messages are implicitly buffered during | + | First of all, mobile RFID-enabled applications need a means to detect when a particular RFID tag has come into range. As RFID tags are modeled as devices hosting an object, the most natural |
+ | mechanism to achieve this is to use the default [[at: | ||
- | Within the tag object | + | Once a tag object |
- | == Comparison == | + | By aligning tag objects with remote objects, one can develop mobile RFID-enabled applications without having to learn about a new concept. |
+ | |||
+ | A particularly interesting abstraction when developing mobile RFID-enabled applications are [[research: | ||
+ | |||
+ | ===== Comparison | ||
Having implemented both models, it remains unclear whether one of the models presented in this paper is to be preferred over the other. | Having implemented both models, it remains unclear whether one of the models presented in this paper is to be preferred over the other. | ||
Line 39: | Line 47: | ||
In all likelihood, a programming model that fully leverages the advantages of a world teeming with tagged objects will incorporate elements of both models presented here. | In all likelihood, a programming model that fully leverages the advantages of a world teeming with tagged objects will incorporate elements of both models presented here. | ||
- | == Further Reading == | + | ===== Further Reading |
* Distributed Objects for Real. Stijn Mostinckx, Andoni Lombide Carreton, Kevin Pinte, Wolfgang De Meuter. Technical report, 2010, Vrije Universiteit Brussel [[|pdf]] | * Distributed Objects for Real. Stijn Mostinckx, Andoni Lombide Carreton, Kevin Pinte, Wolfgang De Meuter. Technical report, 2010, Vrije Universiteit Brussel [[|pdf]] |
research/doforreal.txt · Last modified: 2010/08/04 17:34 by tvcutsem