2007
DOI: 10.1007/s11241-007-9015-4
|View full text |Cite
|
Sign up to set email alerts
|

An integrated architecture for future car generations

Abstract: The DECOS architecture is an integrated architecture that builds upon the validated services of a time-triggered network, which serves as a shared resource for the communication activities of more than one application subsystem. In addition, encapsulated partitions are used to share the computational resources of Electronic Control Units (ECUs) among software modules of multiple application subsystems. This paper investigates the benefits of the DECOS architecture as an electronic infrastructure for future car… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…Fortunately, there are also several description methods available for this purpose. Examples are SysML or a modelling language presented by Huber to describe execution platforms in DECOS .…”
Section: Discussionmentioning
confidence: 99%
“…Fortunately, there are also several description methods available for this purpose. Examples are SysML or a modelling language presented by Huber to describe execution platforms in DECOS .…”
Section: Discussionmentioning
confidence: 99%
“…For instance, modern cars rely on microcontrollers, interconnected by a Controller Area Network (CAN), for a variety of functions from controlling the brakes and engine to on-board entertainment. Driven by the increasing complexity of microcontrollers, and in an effort to simplify architecture design and save cost, manufacturers are integrating functionality onto a smaller number of those microcontrollers [28]. This means that sensitive applications now run alongside non-critical ones, increasing the need for security mechanisms to protect confidentiality and integrity.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, despite hardware limitations, the applicability of low-end devices may still coincide with scenarios of non-trivial complexity and impose challenges on software design. Moreover, certain use cases may involve long-lived battery operations [122,200,57,5] or integration into physically confined areas [136,48,56].…”
Section: Constraintsmentioning
confidence: 99%