SlideShare a Scribd company logo
Real-Time Coordination of Autonomous Vehicles
Mélanie Bouroche, Barbara Hughes, Vinny Cahill

Made by: André Contente
Autonomous Vehicles
• Reducing accidents and alleviating traffic congestion by
improving road usage.
• Drive autonomously, using sensors to follow the road and to
detect other vehicles and possible obstacles.
• Communicate, using real-time communication, with each
other to cooperate by sharing information and to coordinate
their actions.
Communication between vehicles
• Requires real-time communication over a wireless network.
– Problems:
• Less reliable than wired networks
• Message collisions
• Unpredictable latency

• Real-time communication is harder to provide over wireless
networks, and cannot be guaranteed under realistic
assumptions about the network
• Therefore providing real-time communication in wireless and
ad hoc networks is particularly challenging.
Space-Elastic Model
• Real-time communication only within a geographical proximity.
– Absolute (GPS)
– Relative (Anchor point and area size)

• The sender specifies:
– Desired coverage
– Maximum latency
– Period
Space-Elastic Model
• Actual coverage
– When its impossible to deliver the
message to the entire desired coverage

• adaptNotif
– Notifies the sender in real time about
the changes of the actual coverage
– After (msgLatency + adaptNotif) the
sender knows the delivery area

• Critical coverage
– The actual coverage becomes smaller than one or more thresholds
– If the sender cannot communicate in a area wide-enough to maintain safe
operation, and might need to adapt its behavior.
Space-Elastic Model
• Guarantees about real-time communication can be provided to
both message senders and entities interested in the type of
messages it sends.
• Senders are guaranteed to be able to communicate with a given
latency in the actual coverage, and to be notified within a given
time delay if this coverage changes.
• Entities present within the actual coverage at the delivery time of a
message of a type in which they have expressed interest, are
guaranteed to receive it.

• We define an entity as present within the actual coverage once its is
able to receive messages after arriving in the communication
coverage.
Coordination Model
• Scenario
– Set of entities
– A goal
– Safety Constraints

• Entity
– Set of modes
– State

• A set of states is compatible if the safety constraints are not
violated when some entities are simultaneously in these states.

• The safety constraints can be expressed as a set of incompatibilities
between states.
Coordination Model
• Responsibility
– For every possible incompatibility between the states of two entities, at least one
of them needs to ensure that it will not occur. This entity is responsible for the
incompatibility.

• A responsible entity has to ensure, at any time, that
incompatibilities will not happen. To this effect, the responsible
entity can use three different mechanisms:
– Adapt: Perform another action than the one planned
– Delay: Perform a planned action later than initially planned
– Transfer responsibility: Communicate with other entities

• An entity sending a message is notified about the delivery area, but
not whether there was any entity within this area.
• Entities that receive the message become responsible to ensure
that no incompatibility arises.
Coordination Model
• Contracts between Entities
– Contract without transfer:
• the responsible entity will not transfer its responsibility, and must always ensure, by
adapting its behavior if necessary, that the safety constraints are not violated.

– Contract without feedback:
• The responsible entity must warn other entities at least a predefined twarning
duration in advance when the safety constraints are liable to be violated. Other
entities must be able, at any time, to react within twarning to a message from a
responsible entity.

– Contract with feedback:
• The responsible entity must also warn other entities at least twarning in advance
when the safety constraints are liable to be violated. Entities can provide feedback
when they cannot adapt their behavior.
Coordination Model
•

Safety zone: The states of all the entities of a scenario must be compatible at all times.

•

Consistency zone: If a responsible entity foresees that an entity could be in a state that is not
compatible with its own state when that entity enters its safety zone, the responsible entity can
choose to transfer its responsibility, so that the incoming entity will have to adapt its behavior.

•

Critical coverage: If the responsible entity chooses to transfer its responsibility, to ensure that all
incoming entities will have an accurate view of the state of the responsible entity when entering ,
timely communication must be guaranteed in a zone around.
Coordination Model
• Constraints on Entity’s Behaviours:
– Contract without transfer:
• In this case, the responsible entity has to ensure that it adapts its
behavior so that no entity will enter its (application-specific) safety
zone or that when they do, their states will be compatible.

– Contract without feedback:
• In the case where entities obey a contract without feedback, other
entities must be warned on time for them to adapt to the message
before the possible incompatibility.

– Contract with feedback:
• If, the entities are obeying a contract with feedback, other entities
must be warned of a possible inconsistency by a responsible entity
early enough for them to have the time to either adapt their
behavior or send a message before the incompatibility arises.
Coordination Model
1.

A responsible entity must be assigned for each possible incompatibility.

2.

A contract type must be assigned to its interaction with other entities.

3.

The responsible entities must at any time obey the contract(s) and
either adapt their behavior to ensure that incompatibilities will not
happen or warn entities when incompatibilities are liable to happen.

4.

To warn entities they must send periodic messages in a coverage whose
size depends on the value of the period and their contract type.

5.

When timely communication is not available in this coverage,
responsible entities cannot transfer their responsibility and have to
alter their behavior to ensure that incompatibilities will not happen.
Example: Unsignaled Junction
1. Specifying Safety Constraints:
– Modes: “waiting”, “crossing”, “not interested”
– Vehicle State: mode, position, waiting time

2. Translating Safety Constraints:
– As long as no vehicle enters the junction, the
states of the vehicles will remain compatible.
– Any vehicle entering the junction is responsible
to prevent incompatibilities.
Example: Unsignaled Junction
3. Responsibility:
•

Before it starts crossing, a vehicle will transfer the
responsibility to other, by sending them a message

4. Contracts
– Contract without feedback.
– Vehicles that receive a message from another vehicle that
it will cross, should ensure that the safety constraints will
not be violated by not entering the junction until the other
vehicle has crossed.
Example: Unsignaled Junction
CONCLUSION
• Real-time coordination model for autonomous mobile entities.

• This coordination model is built over a real-time communication
model for wireless networks, in which entities are informed about
the area in which the messages they have sent have been delivered.
• Depending on the size of the coverage, vehicles can adapt their
behavior,
• This coordination model can be used to derive constraints on the
behavior of autonomous vehicles around an unsignalised junction
to ensure that they will cross the junction safely.

More Related Content

Similar to real-time coordination of autonomous vehicles

trust,bargain,negotiate in artificail intelligence
trust,bargain,negotiate in artificail intelligencetrust,bargain,negotiate in artificail intelligence
trust,bargain,negotiate in artificail intelligence
PriyadharshiniG41
 
universal sompo a detailed overview of the insurance firm
universal sompo a detailed overview of the insurance firmuniversal sompo a detailed overview of the insurance firm
universal sompo a detailed overview of the insurance firm
Sumeetvirhe1
 
2017 Financial & Risk Management Forum: Bottom Up Risk Transfer
2017 Financial & Risk Management Forum: Bottom Up Risk Transfer2017 Financial & Risk Management Forum: Bottom Up Risk Transfer
2017 Financial & Risk Management Forum: Bottom Up Risk Transfer
Specialized Carriers & Rigging Association
 
1. Consensus and agreement algorithms - Introduction.pdf
1. Consensus and agreement algorithms - Introduction.pdf1. Consensus and agreement algorithms - Introduction.pdf
1. Consensus and agreement algorithms - Introduction.pdf
AzmiNizar1
 
The Basics of Self-Funding
The Basics of Self-FundingThe Basics of Self-Funding
The Basics of Self-Funding
The Starr Group
 
TV2 - OOAD Case Study- Flight Systems.pdf
TV2 - OOAD Case Study- Flight Systems.pdfTV2 - OOAD Case Study- Flight Systems.pdf
TV2 - OOAD Case Study- Flight Systems.pdf
Gerard Alba
 

Similar to real-time coordination of autonomous vehicles (7)

trust,bargain,negotiate in artificail intelligence
trust,bargain,negotiate in artificail intelligencetrust,bargain,negotiate in artificail intelligence
trust,bargain,negotiate in artificail intelligence
 
universal sompo a detailed overview of the insurance firm
universal sompo a detailed overview of the insurance firmuniversal sompo a detailed overview of the insurance firm
universal sompo a detailed overview of the insurance firm
 
2017 Financial & Risk Management Forum: Bottom Up Risk Transfer
2017 Financial & Risk Management Forum: Bottom Up Risk Transfer2017 Financial & Risk Management Forum: Bottom Up Risk Transfer
2017 Financial & Risk Management Forum: Bottom Up Risk Transfer
 
1. Consensus and agreement algorithms - Introduction.pdf
1. Consensus and agreement algorithms - Introduction.pdf1. Consensus and agreement algorithms - Introduction.pdf
1. Consensus and agreement algorithms - Introduction.pdf
 
Alm and hp
Alm and hpAlm and hp
Alm and hp
 
The Basics of Self-Funding
The Basics of Self-FundingThe Basics of Self-Funding
The Basics of Self-Funding
 
TV2 - OOAD Case Study- Flight Systems.pdf
TV2 - OOAD Case Study- Flight Systems.pdfTV2 - OOAD Case Study- Flight Systems.pdf
TV2 - OOAD Case Study- Flight Systems.pdf
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

real-time coordination of autonomous vehicles

  • 1. Real-Time Coordination of Autonomous Vehicles Mélanie Bouroche, Barbara Hughes, Vinny Cahill Made by: André Contente
  • 2. Autonomous Vehicles • Reducing accidents and alleviating traffic congestion by improving road usage. • Drive autonomously, using sensors to follow the road and to detect other vehicles and possible obstacles. • Communicate, using real-time communication, with each other to cooperate by sharing information and to coordinate their actions.
  • 3. Communication between vehicles • Requires real-time communication over a wireless network. – Problems: • Less reliable than wired networks • Message collisions • Unpredictable latency • Real-time communication is harder to provide over wireless networks, and cannot be guaranteed under realistic assumptions about the network • Therefore providing real-time communication in wireless and ad hoc networks is particularly challenging.
  • 4. Space-Elastic Model • Real-time communication only within a geographical proximity. – Absolute (GPS) – Relative (Anchor point and area size) • The sender specifies: – Desired coverage – Maximum latency – Period
  • 5. Space-Elastic Model • Actual coverage – When its impossible to deliver the message to the entire desired coverage • adaptNotif – Notifies the sender in real time about the changes of the actual coverage – After (msgLatency + adaptNotif) the sender knows the delivery area • Critical coverage – The actual coverage becomes smaller than one or more thresholds – If the sender cannot communicate in a area wide-enough to maintain safe operation, and might need to adapt its behavior.
  • 6. Space-Elastic Model • Guarantees about real-time communication can be provided to both message senders and entities interested in the type of messages it sends. • Senders are guaranteed to be able to communicate with a given latency in the actual coverage, and to be notified within a given time delay if this coverage changes. • Entities present within the actual coverage at the delivery time of a message of a type in which they have expressed interest, are guaranteed to receive it. • We define an entity as present within the actual coverage once its is able to receive messages after arriving in the communication coverage.
  • 7. Coordination Model • Scenario – Set of entities – A goal – Safety Constraints • Entity – Set of modes – State • A set of states is compatible if the safety constraints are not violated when some entities are simultaneously in these states. • The safety constraints can be expressed as a set of incompatibilities between states.
  • 8. Coordination Model • Responsibility – For every possible incompatibility between the states of two entities, at least one of them needs to ensure that it will not occur. This entity is responsible for the incompatibility. • A responsible entity has to ensure, at any time, that incompatibilities will not happen. To this effect, the responsible entity can use three different mechanisms: – Adapt: Perform another action than the one planned – Delay: Perform a planned action later than initially planned – Transfer responsibility: Communicate with other entities • An entity sending a message is notified about the delivery area, but not whether there was any entity within this area. • Entities that receive the message become responsible to ensure that no incompatibility arises.
  • 9. Coordination Model • Contracts between Entities – Contract without transfer: • the responsible entity will not transfer its responsibility, and must always ensure, by adapting its behavior if necessary, that the safety constraints are not violated. – Contract without feedback: • The responsible entity must warn other entities at least a predefined twarning duration in advance when the safety constraints are liable to be violated. Other entities must be able, at any time, to react within twarning to a message from a responsible entity. – Contract with feedback: • The responsible entity must also warn other entities at least twarning in advance when the safety constraints are liable to be violated. Entities can provide feedback when they cannot adapt their behavior.
  • 10. Coordination Model • Safety zone: The states of all the entities of a scenario must be compatible at all times. • Consistency zone: If a responsible entity foresees that an entity could be in a state that is not compatible with its own state when that entity enters its safety zone, the responsible entity can choose to transfer its responsibility, so that the incoming entity will have to adapt its behavior. • Critical coverage: If the responsible entity chooses to transfer its responsibility, to ensure that all incoming entities will have an accurate view of the state of the responsible entity when entering , timely communication must be guaranteed in a zone around.
  • 11. Coordination Model • Constraints on Entity’s Behaviours: – Contract without transfer: • In this case, the responsible entity has to ensure that it adapts its behavior so that no entity will enter its (application-specific) safety zone or that when they do, their states will be compatible. – Contract without feedback: • In the case where entities obey a contract without feedback, other entities must be warned on time for them to adapt to the message before the possible incompatibility. – Contract with feedback: • If, the entities are obeying a contract with feedback, other entities must be warned of a possible inconsistency by a responsible entity early enough for them to have the time to either adapt their behavior or send a message before the incompatibility arises.
  • 12. Coordination Model 1. A responsible entity must be assigned for each possible incompatibility. 2. A contract type must be assigned to its interaction with other entities. 3. The responsible entities must at any time obey the contract(s) and either adapt their behavior to ensure that incompatibilities will not happen or warn entities when incompatibilities are liable to happen. 4. To warn entities they must send periodic messages in a coverage whose size depends on the value of the period and their contract type. 5. When timely communication is not available in this coverage, responsible entities cannot transfer their responsibility and have to alter their behavior to ensure that incompatibilities will not happen.
  • 13. Example: Unsignaled Junction 1. Specifying Safety Constraints: – Modes: “waiting”, “crossing”, “not interested” – Vehicle State: mode, position, waiting time 2. Translating Safety Constraints: – As long as no vehicle enters the junction, the states of the vehicles will remain compatible. – Any vehicle entering the junction is responsible to prevent incompatibilities.
  • 14. Example: Unsignaled Junction 3. Responsibility: • Before it starts crossing, a vehicle will transfer the responsibility to other, by sending them a message 4. Contracts – Contract without feedback. – Vehicles that receive a message from another vehicle that it will cross, should ensure that the safety constraints will not be violated by not entering the junction until the other vehicle has crossed.
  • 16. CONCLUSION • Real-time coordination model for autonomous mobile entities. • This coordination model is built over a real-time communication model for wireless networks, in which entities are informed about the area in which the messages they have sent have been delivered. • Depending on the size of the coverage, vehicles can adapt their behavior, • This coordination model can be used to derive constraints on the behavior of autonomous vehicles around an unsignalised junction to ensure that they will cross the junction safely.