Abstract:
Methods, systems, and devices for mobility management for wireless communications systems that utilize a flexible bandwidth carrier are provided. Some embodiments include determining and transmitting assistance information to one or more user equipment (UEs) to facilitate mobility management with respect to the flexible bandwidth carrier. Some embodiments include signaling flexible bandwidth carrier information to UEs including, but not limited to: UE-centric approaches, network-centric approaches, network-centric approaches with PLMN, SIB creation approaches, and/or application layer approaches. A flexible bandwidth carrier may involve a wireless communications system that may utilize portions of spectrum that may not fit a normal bandwidth. A flexible bandwidth carrier may be generated with respect to a normal bandwidth carrier through dilating, or scaling down, the time or the chip rate of the flexible bandwidth carrier with respect to the normal bandwidth carrier. Some embodiments may expand a bandwidth for a flexible bandwidth carrier.
Abstract:
Disclosed are techniques for wireless communication. In an aspect, a vehicle-to-everything (V2X)-capable vehicle receives, from a second V2X-capable vehicle, one or more V2X messages indicating an intended driving maneuver of the second V2X-capable vehicle, and determines a viable driving trajectory for the first V2X-capable vehicle from a plurality of potential driving trajectories of the first V2X-capable vehicle based, at least in part, on the intended driving maneuver of the second V2X-capable vehicle.
Abstract:
Disclosed are techniques for wireless communication. In an aspect, a first vehicle-to-everything (V2X)-capable vehicle receives, from a second V2X-capable vehicle, one or more V2X messages indicating a driving state of the second V2X-capable vehicle, wherein the driving state comprises a location of the second V2X-capable vehicle, a speed of the second V2X-capable vehicle, a heading of the second V2X vehicle, or any combination thereof, and determines a viable driving trajectory for the first V2X-capable vehicle from a plurality of potential driving trajectories of the first V2X-capable vehicle based, at least in part, on the driving state of the second V2X-capable vehicle.
Abstract:
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE) may transmit, based at least in part on a thermal-resource-constrained state of the UE or a power-resource-constrained state of the UE, a request to deactivate one or more quality of experience (QoE) measurement and collection (QMC) configurations for one or more applications. The UE may receive an indication to deactivate the one or more QMC configurations. In some aspects, the UE may enter the thermal-resource-constrained state or the power-resource-constrained state. The UE may transmit, in a QoE report container, an indication that the UE is in the thermal-resource-constrained state or the power-resource-constrained state. Numerous other aspects are described.
Abstract:
Techniques are provided for filtering object detection information provided via V2X communication links. An example method for partially filtering a sensor data sharing message includes receiving the sensor data sharing message from a vehicle, decoding a first portion of the sensor data sharing message to determine an area of interest associated with the vehicle, determine a relative position of the area of interest, and decoding or discarding a second portion of the sensor data sharing message based on the relative position of the area of interest.
Abstract:
Techniques are provided for filtering object detection information provided via V2X communication links. An example method for filtering detected object data includes receiving a sensor data sharing message associated with a first vehicle including host data and detected object data, wherein the detected object data is organized into one or more data groups and the host data includes indexing information associated with the one or more data groups, determining an operating context for a second vehicle, and filtering the one or more of data groups based at least in part on the operating context for the second vehicle and the indexing information associated with the one or more data groups.
Abstract:
Techniques are provided for utilizing vehicle nudge information with V2X communication links. An example method for providing nudge information includes detecting a roadway gap proximate to a first vehicle in an area containing a plurality of vehicles, generating a nudge message based at least in part on the roadway gap, and transmitting the nudge message.
Abstract:
Systems and techniques are described for identifying and/or classifying capabilities associated with a wireless device. In some aspects, a process of the disclosed technology can include steps for receiving a first message comprising V2X capability information associated with a first wireless device, and transmitting via the at least one transceiver, a second message to the first wireless device, wherein the second message is associated with a periodicity based on the V2X capability information associated with the first wireless device.
Abstract:
A configuration for virtual sensing via sensor sharing for C-V2X scheduling. The apparatus receives, from a first wireless device, a message indicating a threat entity within a threat zone. The threat entity transmits data that interferes with transmission of BSMs. The apparatus determines a candidate resource of a set of candidate resources on which to transmit a BSM based at least in part on the message indicating information related to the threat entity from the first wireless device. The apparatus transmits, to at least a third wireless device, the BSM on a determined candidate resource.
Abstract:
Apparatus, methods, and computer program products for cache building for cryptographic verification that may be used in connection with a V2X communication system are provided. An example method includes receiving, from a second wireless device, at least one V2X message of a plurality of V2X messages, the at least one V2X message being associated with a verification key. The example method further includes determining whether the verification key for the at least one V2X message is a target verification key. The example method further includes determining, if the verification key is the target verification key, to generate an entry in a cache for the verification key. The example method further includes generating, upon determining to generate the entry in the cache, the entry in the cache for the verification key.