2010
DOI: 10.1007/978-3-642-12607-9_12
|View full text |Cite
|
Sign up to set email alerts
|

RFID-based Distributed Memory for Mobile Applications

Abstract: Abstract. The goal of our work is to give a user equipped with an RFID-enabled mobile handset (mobile phone, PDA, laptop. . . ) the ability to know the contents of distant passive RFID tags, without physically moving to them and without using a Wireless Area Network. The existing architectural patterns involving passive tags do not meet simultaneously all of these requirements. Our RFID-based distributed memory does. By associating vector clocks to tags, we replicate a view of this memory on each tag and each … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0
2

Year Published

2010
2010
2013
2013

Publication Types

Select...
2
1
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 9 publications
(8 reference statements)
0
6
0
2
Order By: Relevance
“…RFID-based distributed shared memory (RFID-based DSM) mixes the qualities of semi-distributed architectural pattern and distributed architectural pattern [7]. The avatar of an RFID tag is stored in the RAM of the tag.…”
Section: Rfid-based Distributed Shared Memory Architectural Patternmentioning
confidence: 99%
See 1 more Smart Citation
“…RFID-based distributed shared memory (RFID-based DSM) mixes the qualities of semi-distributed architectural pattern and distributed architectural pattern [7]. The avatar of an RFID tag is stored in the RAM of the tag.…”
Section: Rfid-based Distributed Shared Memory Architectural Patternmentioning
confidence: 99%
“…In the distributed architectural pattern, each RFID tag holds the avatar [6]. With the RFID-based Distributed Shared Memory, RFID tags hold the avatar and a replica of the avatar of other tags [7]. Sections 3 to 6 detail all of these architectural patterns: they present application examples and analyze the architectural pattern with the attributes identified in section 2.…”
Section: Introductionmentioning
confidence: 99%
“…To do so, whenever a mobile handset comes in contact with a tag (or another handset), these two elements compare vector clock values and update their own replica of DM (see [7] for algorithms). Thus, each element takes advantage of the knowledge of the other one to get more recent information concerning DM evolutions.…”
Section: Description Of Rdsmmentioning
confidence: 99%
“…Our goal is to provide an architecture where a mobile handset can get the value of data stored in distant RFID/NFC tag. Classical solutions are based on the use of a server [7]. But a Wireless Area Network is required to communicate with a server.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation