2011
DOI: 10.4271/2011-01-0586
|View full text |Cite
|
Sign up to set email alerts
|

Vehicle Safety Communications - Applications: Multiple On-Board Equipment Testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 1 publication
0
10
0
Order By: Relevance
“…Figure 1 presents a CVS system architecture [13, 14]. The modules include the services modules, WSU software API, sensors and wireless data handler, the TC, and safety applications.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Figure 1 presents a CVS system architecture [13, 14]. The modules include the services modules, WSU software API, sensors and wireless data handler, the TC, and safety applications.…”
Section: Literature Reviewmentioning
confidence: 99%
“…CVS architectures separate the design of applications from the communication system allowing flexibility and simpler adoption of different communication technologies. Figure 1 shows a CVS system that consists of a communication and sensor layer, a Target Classification (TC) layer, and a safety application layer [13, 14]. TC classifies the neighboring RVs based on their relative locations with respect to the HV.…”
Section: Introductionmentioning
confidence: 99%
“…Based on the time-to-collision (TTC) estimate, four different collision warning messages are provided. Following the collision warning stages discussed in [ 69 ], the warning messages provided by the proposed system include “no threat” for no possible collision, “threat detected” for , “inform driver” for , and “warn driver” for . The description for each warning message is described in Table 5 .…”
Section: State Estimation and Predictionmentioning
confidence: 99%
“…In [ 26 ], the VSC-A project evaluated the IEEE 1609.2 standard in a testbed implemented on a PC platform and showed that the signature generation time and verification time based on ECC-256 is 6.6 ms and 28.5 ms, respectively. Their experimental analysis indicates that the IEEE 1609.2 standard based on ECDSA is highly demanding in the resource.…”
Section: Related Workmentioning
confidence: 99%