An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Nicolas Chevrollier, David W. Griffith, Nada T. Golmie, SuKyoung Lee, Kyungsoo Kim, Hong Kunho, YoonHyuk Kim
In an integrated WLAN and cellular network, if all mobile users whose connections originate in the cellular network migrate to the WLAN whenever they enter the double coverage area, the WLAN will be severely congested and its users will suffer from
Alan Mink, Joshua C. Bienfang, Robert J. Carpenter, Lijun Ma, Barry J. Hershman, Alessandro Restelli, Xiao Tang
We discussed custom instrumentation for high-speed single photon metrology. We focus on the difficulty of GHz data sampling and provide some techniques on how to accomplish it. We also discuss the benefits of field programmable gate arrays as the basis for
Supporting seamless handovers between different wireless networks is a challenging issue. One of the most important aspects of a seamless handover is finding a target network and point of attachment (PoA). This is achieved by performing a so-called channel
High-resolution imaging through walls and other materials using microwave signals serves amongst other applications in the rapid detection of human maneuvering, rescue missions in collapsed buildings, and target feature extraction. While narrowband Doppler
The EtherNet/IP interoperability recommendations are a result of work generated by the ongoing series of EtherNet/IP Implementors Workshops. The recommendations were created to promote EtherNet/IP device interoperability through product functionality
Constantine K. Christakos, Antonio Izquierdo Manzanares, Richard A. Rouil, Nada T. Golmie
We explore the use of the Media Independent Information Service (MIIS) in the IEEE 802.21 Media Independent Handover (MIH) framework to improve handover performance for Fast Mobile IPv6 by providing Authentication information. We explore the tradeoffs of
David W. Griffith, Richard A. Rouil, Nada T. Golmie
The IEEE 802.21 Media Independent Handover (MIH) working group is developing a set of mechanisms to facilitate migration of mobile users between access networks that use different link-layer technologies. Among these are mobility managers that create and
SuKyoung Lee, Kotikalapudi Sriram, Kyungsoo Kim, JongHyup Lee, YoonHyuk Kim, Nada T. Golmie
There are currently a large variety of wireless access networks, including the emerging Vehicular Adhoc Networks (VANETs). A large variety of applications utilizing these networks will demand features such as real-time, high-availability and even
Kotikalapudi Sriram, Oliver Borchert, Patrick Gleichmann, Douglas C. Montgomery
We present an evaluation methodology for comparison of existing and proposed new algorithms for Border Gateway Protocol (BGP) anomaly detection and robustness. A variety of algorithms and alert tools have been proposed and/or prototyped recently. They
Lijun Ma, Oliver T. Slattery, Xiao Tang, Tiejun Chang
We demonstrated non-degenerate sequential time-bin entanglement using periodically poled KTP waveguide at a repetition rate of 1 GHz. The wavelengths of signal and idler are 895 and 1310 nm. The two-photon-interference-fringe visibility is 79%.
Physical-layer network coding (PLNC) is a novel wireless communication technology, in which multiple transmitters can send signals on the same channel to the same receiver at the same time. Our previous studies have revealed that PLNC can substantially
A compact scheme for high-speed frequency doubling and down-conversion on a single dual-element PPKTP waveguide is investigated. Optimal temperature is achieved and photon pair coincidence is observed at over GHz repetition rate with pulsed pump input
Fine time resolution enables Ultra-Wideband (UWB) ranging systems to reliably extract the first multipath arrival corresponding to the range between a transmitter and receiver, even when attenuated in strength compared to later arrivals. Bearing systems
Direct-sequence spread-spectrum underwater acoustic communications are analyzed in this paper between communication nodes, at least one of which is moving. At-sea data are analyzed which show that the phase change due to source motion is significant. The
In this paper, we address the topology control issue for future wireless mesh networks (WMNs) based on the principle of service-oriented design. In particular, we propose a novel topology control scheme that attempts to maximize the overall throughput in
Vehicular ad hoc networking is an important component of Intelligent Transportation Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in active safety systems that increase passenger safety by exchanging warning messages
We propose a non-coherent receiver for the fixed detect-and-forward relay channel and derive a closed-form tight upper bound on its bit error probability in Rayleigh fading channels. Using this upper bound, we show that the receiver achieves nearly full
This paper proposes a simple non-coherent amplify-and-forward receiver for the relay channel and evaluates its diversity performance for Rayleigh fading channels. We use the generalized likelihood ratio test to obtain the decision rule in closed form
Wireless mesh network (WMN) has emerged recently as a promising technology for next-generation wireless networking. In WMN, it is important to provide an efficient handoff scheme, due to the frequent user mobility. To address this issue, we propose a
The main benefit of vehicular communication is seen in active safety systems that increase passenger safety by exchanging warning messages between vehicles. Other applications and private services are also permitted in order to lower the cost and to
Yi Qian, Kejie Lu, Tao Zhang, Shengli Fu, Ayat Jafari
In this paper, we address the topology control issues for future wireless mesh networks (WMNs). In particular, we propose a novel topology control scheme that attempts to maximize the overall throughput in the network and that takes into account traffic
In most conventional layer 2 triggering approaches, a pre-defined threshold for a specific perspective such as the received signal strength is used. This may cause too late or too early handover executions. In this paper we propose a new predictive
Antonio Izquierdo Manzanares, Nada T. Golmie, Katrin Hoeper, Lidong Chen
In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover, namely, re-authentication and pre-authentication. We provide a detailed analysis of each mechanism, and