skip to main content
10.1145/1141277.1141378acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Making tuple spaces physical with RFID tags

Authors Info & Claims
Published:23 April 2006Publication History

ABSTRACT

In this paper, we describe the design and implementation of a tuple-based distributed memory realized with the use of RFID technology. The key idea - rooted in a more general scenario of pervasive and mobile computing - is that our everyday environments will be soon pervaded by RFID-tagged objects. By accessing in a wireless way the re-writable memory of such RFID tags according to a tuple-based access model, it is possible to enforce mobile and pervasive coordination and improve our interactions with the physical world. An application example is presented to outline the potential of the approach.

References

  1. S. Ahuja, N. Carriero, D. Gelernter, "LINDA and Friends", IEEE Computer, 19(8):26--34, Aug. 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. C. Bornhovd, T. Lin, S. Haller, J. Schaper, "Integrating Automatic Data Acquisition with Business Processes: Experiences with SAP's Auto-ID Infrastructure", 30th International Conference on Very Large Databases, IEEE CS Press, pp. 1182--1188, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Curino, M. Giani, M. Giorgetta, A. Giusti, A. L. Murphy, and G. P. Picco, "TinyLime: Bridging Mobile and Sensor Networks through Middleware", 3rd IEEE International Conference on Pervasive Computing and Communications, IEEE CS Press, pp. 61--72, March 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. K. P. Fishkin, B. Jiang, M. Philipose, S. Roy, "I Sense a Disturbance in the Field: Unobstrusive Detection of Interactions with RFID Tagged Object", UBICOMP 2004 Conference, pp. 268--282, LNCS, Sept. 2004.Google ScholarGoogle ScholarCross RefCross Ref
  5. C. Floerkemeier, M. Lampe, "RFID middleware design - addressing application requirements and RFID", Technical Report ETH Zurich, Pervasive Computing Group, 2005.Google ScholarGoogle Scholar
  6. D. Gelernter and N. Carriero, "Coordination Languages and Their Significance", Communications of the ACM, 35(2):96--107 (1992). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. V. Kulyukin, C. Gharpure, J. Nicholson, S. Pavithran, "RFID in Robot-Assisted Indoor Navigation for Visually Impaired", 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems, IEEE Press, 2004.Google ScholarGoogle Scholar
  8. M. Mamei, F. Zambonelli, "Spreading Pheromones in Everyday Environments Through RFID Technology", 2ndIEEE Symposium on Swarm Intelligence, IEEE Press, pp. 281--288, June 2005.Google ScholarGoogle Scholar
  9. A. Omicini, F. Zambonelli, "Coordination for Internet Application Development", Journal of Autonomous Agents and Multi-Agent Systems, 2(3):251--269, Sept. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Philipose, K. P. Fishkin, M. Perkwitz, D. J. Patterson, D. Fox, H. Kautz, D. Hahnel, "Inferring Activities from Interactions with Objects", IEEE Pervasive Computing, 3(4):10--17, Oct.-Dec. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. I. Satoh, "A Location Model for Pervasive Computing Environments", 3rd International Conference on Pervasive Computing and Communications, IEEE CS Press, pp. 215--224, March 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. V. Stanford, "Pervasive Computing goes the Last Hundred Feet with RFID Systems", IEEE Pervasive Computing, 2(2):9--14, April-June 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Making tuple spaces physical with RFID tags

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              SAC '06: Proceedings of the 2006 ACM symposium on Applied computing
              April 2006
              1967 pages
              ISBN:1595931082
              DOI:10.1145/1141277

              Copyright © 2006 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 23 April 2006

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              Overall Acceptance Rate1,650of6,669submissions,25%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader