RFID-based Distributed Shared Memory for Pervasive Games

نویسندگان

  • Michel Simatic
  • Annie Gentes
چکیده

The goal of our work is to give a user equipped with an RFID-enabled mobile handset (mobile phone, PDA, laptop. . . ) the ability to access contents of distant elements of the system (tags or handsets), without physically moving to them and without using a Wireless Area Network. Our solution consists in an RFID-based Distributed Shared Memory (RDSM). After describing RDSM, we present its demonstration: a pervasive game which relies on RDSM to analyze data stored in distant elements (without any Wireless Area Network). We conclude by presenting the analysis of the players’ feed back.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RFID-based Distributed Memory for Mobile Applications

The goal of our work is to give a user equipped with an RFID-enabled mobile handset (mobile phone, PDA, laptop. . . ) the ability to know the contents of distant passive RFID tags, without physically moving to them and without using a Wireless Area Network. The existing architectural patterns involving passive tags do not meet simultaneously all of these requirements. Our RFID-based distributed...

متن کامل

Investigating the effectiveness of memory-based computer cognitive games in improving working memory and sustained attention of students with learning disability

Abstract Background and aim: Nowadays, exploring strategies to help students with learning disabilities is one of the areas of interest for many psychologists and researchers. The aim of this study was to evaluate the effectiveness of memory-based computer cognitive games in improving working memory and sustained attention of students with learning disabilities in Arak. Method: The method ...

متن کامل

Tampering in RFID: A Survey on Risks and Defenses

RFID is a well-known pervasive technology, which provides promising opportunities for the implementation of new services and for the improvement of traditional ones. However, pervasive environments require strong efforts on all the aspects of information security. Notably, RFID passive tags are exposed to attacks, since strict limitations affect the security techniques for this technology. A cr...

متن کامل

Distributed Technology-Sustained Pervasive Applications

Technology-sustained pervasive games, contrary to technology-supported pervasive games, can be understood as computer games interfacing with the physical world. Pervasive games are known to make use of 'non-standard input devices' and with the rise of the Internet of Things (IoT), pervasive applications can be expected to move beyond games. This dissertation is requirements-and development-focu...

متن کامل

rfid in pervasive computing: State-of-the-art and outlook

rfid has already found its way into a variety of large scale applications and arguably it is already one of themost successful technologies in the history of computing. Beyond doubt, rfid is an effective automatic identification technology for a variety of objects including natural, manufactured and handmade artifacts; humans and other species; locations; and increasingly media content and mobi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009