Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 326 - 350 of 833

Timely Effective Handover Mechanism in Heterogeneous Wireless Networks

November 13, 2008
Author(s)
Sang J. Yoo, David E. Cypher, Nada T. Golmie
Next-generation wireless networks should be able to coordinate and integrate different communication systems. It has been a challenging problem to support a seamless handover in these diverse wireless network environments. Link level triggers can provide

Directional Antenna for Multipath Ad Hoc Routing

October 15, 2008
Author(s)
Hamid Gharavi, Bin Hu
Multipath routing can be effectively used to maximize the utilization of network resources for real-time traffic. In mobile ad-hoc network environments, this approach can suffer from co-channel interference due to the simultaneous transmission of packets

Efficient Error Concealment for the Whole-frame Loss Based on H.264/AVC

October 15, 2008
Author(s)
Hamid Gharavi, Bo Yan
For low bit-rate video communications, each video frame usually fills the payload of a single network packet. In this situation, the loss of a packet may result in loosing the entire video frame. Currently, most existing error concealment algorithms can

QOS-Aware Channel Scanning for IEEE 802.11 Wireless LAN

September 15, 2008
Author(s)
Nada T. Golmie, Sang-Jo Yoo
Channel scanning is an important aspect of seamless handovers since it is required in order to find a target point of attachment (PoA). In the IEEE 802.11 WLAN, scanning of other channels causes service disruptions with the current AP so that the provided

A Robust Model-Based Approach to Indoor Positioning Using Signal Strength

September 9, 2008
Author(s)
Kamran Sayrafian, Dominik Kasper
A simple technique to estimate the position of a mobile node inside a building is based on the Received Signal Strength (RSS). In previous publications, we investigated the effectiveness of using circular array antennas and beamforming in order to enable

Architectural Considerations for Mapping Distribution Protocols

August 1, 2008
Author(s)
Kotikalapudi Sriram, Young-Tak Kim, Douglas C. Montgomery
In this paper, we present a discussion of some architectural ideas pertaining to the mapping distribution protocol. The efficiency of this protocol in terms of response time and the volume of traffic load it generates are important considerations. We

Guide to General Server Security

July 25, 2008
Author(s)
Karen A. Scarfone, Wayne Jansen, Miles C. Tracy
The purpose of this document is to assist organizations in understanding the fundamental activities performed as part of securing and maintaining the security of servers that provide services over network communications as a main function. The document

Guide to Securing Legacy IEEE 802.11 Wireless Networks

July 25, 2008
Author(s)
Karen A. Scarfone, Derrick Dicoi, Matt Sexton, Cyrus Tibbs
The purpose of this document is to provide guidance to organizations in securing their legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 wireless local area networks (WLAN) that cannot use IEEE 802.11i. The document provides an

A Profile for IPv6 in the U.S. Government - Version 1.0

July 1, 2008
Author(s)
Douglas C. Montgomery, J. S. Nightingale, Sheila E. Frankel, Mark E. Carson
This publication seeks to assist Federal agencies in formulating plans for the acquisition of IPv6 technologies. To achieve this, we define a standards profile for IPv6 in the USG that is intended to be applicable to all future uses of IPv6 in non-

Guide to SSL VPNs

July 1, 2008
Author(s)
Sheila E. Frankel, Paul Hoffman, Angela Orebaugh, Richard Park
Secure Sockets Layer (SSL) Virtual Private Networks (VPNs) provide users with secure remote access to an organization's resources. An SSL VPN consists of one or more VPN devices to which users connect using their Web browsers. The traffic between the Web

Low Signal-to-noise Ratio Underwater Acoustic Communications

May 31, 2008
Author(s)
Wen-Bin Yang, T.C. Yang
Communications with low input signal-to-noise ratio (SNR) is often called covert communications as the probability of detection and interception decreases with decreasing SNR . Direct-sequence spread-spectrum signaling works at low SNR because of the

Internet Protocol Version 6 (IPv6)

May 30, 2008
Author(s)
Sheila E. Frankel, David Green
Recognizing that the 32-bit addresses used by the current version of the Internet Protocol (IPv4) would soon be depleted, the Internet Engineering Task Force (IETF) has been developing its successor, Internet Protocol version 6 (IPv6). This has been a more

Capacity of Random Wireless Networks: Impact of Cooperative Network Coding

May 19, 2008
Author(s)
Yi Qian, Kejie Lu, Shengli Fu
The throughput capacity of random wireless networks has been studied extensively in the literature. Nevertheless, most existing studies are based on the assumption that each transmission has one sender and one receiver. In our recent study, we have

Design Secure and Application-Oriented VANET

May 11, 2008
Author(s)
Yi Qian, Nader Moayeri
Vehicular ad hoc network (VANET) is recognized as an important component of Intelligent Transportation Systems. The main benefit of VANET communication is seen in active safety systems, which target to increase safety of passengers by exchanging warning

Impact of Signaling Load on the UMTS Call Blocking/Dropping

May 11, 2008
Author(s)
Yi Qian, David Tipper, Saowaphak Sasanus
Radio resources in the third generation (3G) wireless cellular networks (WCNs) such as the universal mobile telecommunications system (UMTS) network is limited in term of soft capacity. The quality of a signaling service transmission depends on various

Detection-time-bin-shift Polarization Encoding Quantum Key Distribution System

May 6, 2008
Author(s)
Lijun Ma, Tiejun Chang, Xiao Tang
A detection-time-bin-shift scheme for polarization encoding QKD is proposed. This scheme can reduce cost and overcome the security loss caused by dead-time and the unbalanced characteristics of detectors. This scheme is experimentally demonstrated with the

Directional Routing Protocols for Ad Hoc Networks

May 6, 2008
Author(s)
Hamid Gharavi, Bin Hu
This paper presents a directional routing approach for multihop ad-hoc networks, which has been applied to two on-demand routing protocols: namely Dynamic Source Routing (DRS) and Ad Hoc On-Demand Distance Vector Routing (AODV). Both DSR-based and AODV

Interference Avoidance in Rapidly Deployed Wireless Ad hoc Incident Area Networks

April 18, 2008
Author(s)
Mohamed T. Refaei, Nader Moayeri, Michael R. Souryal
A common strategy for responding to indoor emergency scenarios is to rapidly deploy a group of first responders inside the incident area and an incident command center outside of the incident area. First responders are equipped with radios that allow them
Was this page helpful?