Filters








49 Hits in 2.4 sec

Pervasive pheromone-based interaction with RFID tags

Marco Mamei, Franco Zambonelli
2007 ACM Transactions on Autonomous and Adaptive Systems  
In this paper, we present a simple, low-cost and generalpurpose implementation of a pheromone-based interaction mechanism for pervasive environments.  ...  This is realized by making use of RFID tags to store digital pheromones, and by having humans or robots spread/sense pheromones by properly writing/reading RFID tags populating the surrounding physical  ...  Inspired by these challenges, we propose a novel approach exploiting RFID technology [29, 30] to enforce pheromone-based interaction in pervasive computing scenarios.  ... 
doi:10.1145/1242060.1242061 fatcat:xhwx3gajqzggnjhx6okp2mqu7i

Field-Based Coordination for Pervasive Computing Applications [chapter]

Marco Mamei, Franco Zambonelli
2008 Lecture Notes in Computer Science  
In particular, biologically inspired field-based data structures such as gradients and pheromones are suitable to represent information in a variety of pervasive computing applications.  ...  Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of information.  ...  Conclusion and Future Work This paper presented the role of sensor network and RFID-based infrastructures to support environment abstraction and field-based coordination in pervasive computing scenarios  ... 
doi:10.1007/978-3-540-92191-2_33 fatcat:qlifjynjjbdyhc4dczlimrnqxi

Augmenting the Physical Environment Through Embedded Wireless Technologies [chapter]

Marco Mamei, Franco Zambonelli
2006 Lecture Notes in Computer Science  
Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of information about the surrounding  ...  This paper discusses how both sensor networks and RFID tags can be used to that purpose, outlining the respective advantages and drawbacks of these technologies.  ...  The application relies on pheromone-based interaction, and exploit RFID tags as a physically distributed memory infrastructure in which agents can deploy pheromones and that agents can access for reading  ... 
doi:10.1007/11678809_11 fatcat:kbyfjlkvare5bgpnr6j4gjvhom

Making tuple spaces physical with RFID tags

Marco Mamei, Renzo Quaglieri, Franco Zambonelli
2006 Proceedings of the 2006 ACM symposium on Applied computing - SAC '06  
By accessing in a wireless way the re-writable memory of such RFID tags according to a tuple-based access model, it is possible to enforce mobile and pervasive coordination and improve our interactions  ...  In this paper, we describe the design and implementation of a tuple-based distributed memory realized with the use of RFID technology.  ...  In a previous work [8] , we have exploited RFID tags distributed in an indoor environment as a memory infrastructure in which to store pheromone paths for the sake of enforcing pervasive stigmergic (ant-like  ... 
doi:10.1145/1141277.1141378 dblp:conf/sac/MameiQZ06 fatcat:br67ysj6lbeqphdmsercmv62om

Bioinspired Environmental Coordination in Spatial Computing Systems

Justin Werfel, Yaneer Bar-Yam, Donald Ingber
2008 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops  
In one framework, pervasive RFID tags act as a substrate on which the electronic equivalent of pheromones can be laid by humans or robots carrying RFID transceivers as they move around.  ...  If RFID tags become pervasive in human environments, as some foresee, then soldiers could make use of existing tags located in their new environment to encode signals helpful to them without even needing  ... 
doi:10.1109/sasow.2008.15 dblp:conf/saso/WerfelBI08 fatcat:vsyxnirypjdgzl4aod5je7jvuq

Choosing the Right RFID-Based Architectural Pattern [chapter]

Michel Simatic
2013 Radio Frequency Identification from System to Applications  
Architecture attributes and RFID technology Relying on the experience gained by analyzing existing RFID-based applications and by developing RFID-based applications, we outline three architecture attributes  ...  In other words, is there a staleness issue of avatar of a read tag? Radio Frequency Identification from System to Applications 28 Choosing the Right RFID-Based Architectural Pattern  ...  [22] proposes an academic system based on digital pheromones to find objects lost in a house. To do so, floor of the house is covered with RFID tags.  ... 
doi:10.5772/54069 fatcat:pmha73l675fcvlggawjjmgar4a

Prominent Causal Paths in a Simple Self-Organizing System

Nicholas C. Georgantzas, Evangelos Katsamakas
2012 International Journal of Information Technologies and Systems Approach  
(2006) (2007) propose a system exploiting digital pheromones to coordinate autonomous agents in pervasive environments making use of RFID tags.  ...  Below is a brief overview of the SD modeling method, with SD model analysis.  ... 
doi:10.4018/jitsa.2012070102 fatcat:lzexzlgftbhdnf47j6r4ntikf4

Engineering Human Stigmergy

Ioan Susnea
2015 International Journal of Computers Communications & Control  
This paper proposes the concept of virtual pheromones, defined as engrams created by the agents not in the environment, but in a representation thereof -a map, and outlines several use cases, wherein pheromones  ...  Discovered in the context of a research about insects, stigmergy -the indirect coordination mechanism that allows ant colonies to achieve intelligent behavior -has been extensively studied with the aim  ...  chemicals in the environment [16] , storing special data structures in RFID tags [19] , exchanging short range messages between agents [15] , or by creating dedicated software entities [10] .  ... 
doi:10.15837/ijccc.2015.3.87 fatcat:73b6dcugo5d6xhyxnjzt6bs3lu

Approaches to fast sequential inventory and path following in RFID-enriched environments

Arne Bosien, Volker Turau, Franco Zambonelli
2012 International Journal of Radio Frequency Identification Technology and Applications  
There it can be applied to leave a virtual trace on writeable RFID tags.  ...  Although RFID is mostly used for ticketing, e-passports and supply chain management applications, the technology is also suitable for transponder based navigation systems.  ...  RFID tags can be used to emulate this principle. Mamei and Zambonelli (2007) suggested a pheromone-based approach for relocating lost objects.  ... 
doi:10.1504/ijrfita.2012.044649 fatcat:rg3k3bvdkvh65ga5o2bv7itt6a

Mechanisms for environments in multi-agent systems: Survey and opportunities

Eric Platon, Marco Mamei, Nicolas Sabouret, Shinichi Honiden, H. Van Dyke Parunak
2006 Autonomous Agents and Multi-Agent Systems  
Mechanisms are expected to provide agent-based software designers with a set of design elements to build MAS that take advantage of the environment.  ...  It can be assigned a number of responsibilities that would be more difficult to design with the sole notion of agents.  ...  They are coupled tightly with the real-world dynamics by mean of intermediate actuators and sensors, such as automated robot-arms (e.g., Mars rover's) or RFID tags (RFID standard, 2006) .  ... 
doi:10.1007/s10458-006-9000-7 fatcat:35ik2rbpsffzfbrrfrcepcqasy

Developing pervasive multi-agent systems with nature-inspired coordination

Franco Zambonelli, Andrea Omicini, Bernhard Anzengruber, Gabriella Castelli, Francesco L. De Angelis, Giovanna Di Marzo Serugendo, Simon Dobson, Jose Luis Fernandez-Marquez, Alois Ferscha, Marco Mamei, Stefano Mariani, Ambra Molesini (+8 others)
2015 Pervasive and Mobile Computing  
Pervasive computing systems can be modeled effectively as populations of interacting autonomous components.  ...  The key challenge to realizing such models is in getting separately-specified and -developed sub-systems to discover and interoperate with each other in an open and extensible way, supported by appropriate  ...  In the case of pervasive systems, stigmergic coordination has also been supported by exploiting pervasive devices such as sensor networks [56] or RFID tags [53, 57] .  ... 
doi:10.1016/j.pmcj.2014.12.002 fatcat:yn4qhj2m2fejbbxwqnxdlooxzm

Research Directions for Service-Oriented Multiagent Systems

M.N. Huhns, M.P. Singh, M. Burstein, K. Decker, E. Durfee, T. Finin, L. Gasser, H. Goradia, N. Jennings, K. Lakkaraju, H. Nakashima, V. Parunak (+8 others)
2005 IEEE Internet Computing  
Most of the world's objects with distinct identities and exhibiting state or behavior will likely soon have processors or RFID tags.  ...  such as how ants communicate with each other by depositing pheromones along their paths.  ... 
doi:10.1109/mic.2005.132 fatcat:c7dn3m4korhfhgoeqse536hdje

Empathic Computing [chapter]

Yang Cai
2006 Lecture Notes in Computer Science  
With the growing need for home health care, empathic computing attracts attention from many fields. Recent studies include designing a home for elderly people or people with disabilities [17] .  ...  Empathic computing is a combination of Artificial Intelligence (AI), network communication and human-computer interaction (HCI) within a practical context such as healthcare.  ...  With mobile sensors such as RFID (Radio Frequency Identification) tags and multiple readers, a positioning system can also be configured in addition to the WiFi (Wireless Fidelity) system.  ... 
doi:10.1007/11825890_3 fatcat:s3e5kti6rffx5kxtm6a4wtbngm

Collective Awareness for Human-ICT Collaboration in Smart Cities

Nicola Bicocchi, Alket Cecaj, Damiano Fontana, Marco Mamei, Andrea Sassi, Franco Zambonelli
2013 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises  
Citizens using their own capabilities integrated with ICT technologies could collaboratively constitute a large-scale socio-technical superorganism to support collective urban awareness and activities.  ...  This position paper, with the help of a representative case study in the area of intelligent transportation systems, identifies the key challenges for future urban superorganisms and proposes a two-tier  ...  near field communication technologies (NFC, RFID and Bluetooth).  ... 
doi:10.1109/wetice.2013.34 dblp:conf/wetice/BicocchiCFMSZ13 fatcat:vf42m4tz4zb7tovi3b2xgfoilq

The economics of the Internet of Things in the Global South

Nir Kshetri
2016 Third World Quarterly  
A maker of hot sauce has deployed RFID tags, which enable customers to use a store's RFID reader to authenticate its products.  ...  A large liquor company uses RFID to tag and track its high-value products. A store receiving the liquor company's products uses a RFID interrogator to capture the ID number encoded to a bottle's tag.  ... 
doi:10.1080/01436597.2016.1191942 fatcat:bpaoxtfa35aifg6mrszgzm7chu
« Previous Showing results 1 — 15 out of 49 results