Proceedings of the Eighth EAI International Conference on Simulation Tools and Techniques 2015
DOI: 10.4108/eai.24-8-2015.2261038
|View full text |Cite
|
Sign up to set email alerts
|

A V2X Message Evaluation Methodology and Cross-Domain Modelling of Safety Applications in V2X-enabled E/E-Architectures

Abstract: The introduction of Vehicular Ad-Hoc Networks (VANETs) enables great potential for improving road traffic flow and especially active safety applications such as cooperative adaptive cruise control (CACC). Such applications not only rely on continuous broadcast of vehicle state information (beacons) of all vehicles, but also have strict real-time requirements.Regarding automotive E/E architectures this continuous broadcasting adds heavy internal E/E data traffic that needs to be processed in real-time by Electr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Moreover, the encapsulation of aspects in composite aspects allows an arbitrary refinement of the composites down to possible co-simulation of the abstract model with detailed domain-specific tools. This is done by exploiting HlaComposites in PtII developed and used within our previous works [30] [31] [32]. The used IDM model in the case study, for instance, was verified within [30] by means of a co-simulation of PtII with a traffic simulator and an implementation of the IDM running on a SystemC multi-core model.…”
Section: Discussionmentioning
confidence: 99%
“…Moreover, the encapsulation of aspects in composite aspects allows an arbitrary refinement of the composites down to possible co-simulation of the abstract model with detailed domain-specific tools. This is done by exploiting HlaComposites in PtII developed and used within our previous works [30] [31] [32]. The used IDM model in the case study, for instance, was verified within [30] by means of a co-simulation of PtII with a traffic simulator and an implementation of the IDM running on a SystemC multi-core model.…”
Section: Discussionmentioning
confidence: 99%
“…Especially on the receiving path of V2X messages this can be accomplished by only accepting messages currently relevant to the vehicle. Therefore, in [29] we propose a V2X message evaluation methodology based on vehicle clustering and monitoring capabilities of both vehicle and internal/wireless network utilization. The approach has special focus an safety applications.…”
Section: V2x Message Evaluationmentioning
confidence: 99%
“…The V2X message evaluation methodology presented in [29] is realized as an intelligent gateway in a dedicated V2X ECU responsible for V2X related data processing. It is modeled within an abstract ECU model as illustrated in Fig.…”
Section: A Baseline Designmentioning
confidence: 99%