An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
SuKyoung Lee, David W. Griffith, Kyungsoo Kim, Nada T. Golmie
One major challenge in the integration of wireless LAN (WLAN) and cellular networks is call admission control (CAC). Without a suitable CAC mechanism for the integrated network, the two networking systems will work independently and cannot simultaneously
Micro dynamics of large-scale communication networks is often described by a Markov process with a large number of locally interacting components. Due to astronomically high number of the Markov process states even for moderate-size networks, finding the
Michael R. Souryal, Johannes Geissbuehler, Leonard E. Miller, Nader Moayeri
When the range of single-hop wireless communication is limited by distance or harsh radio propagation conditions, relays can be used to extend the communication range through multihop relaying. This paper targets the need in certain scenarios for rapid
In this paper we present a 3-D object segmentation and motion estimation scheme of range video data for crash prevention applications. The segmentation is based on slope values of every point in the scene with which atomic regions are constructed by region
We show that the performance of a 1310-nm quantum key distribution (QKD) system with an up-conversion detector pumped at 1550 nm is comparable with or better than that of current 1550-nm QKD systems with 1310-nm pump detectors. The nonlinearly induced dark
Market-based compute grids encompass service providers offering limited resources to potential users with varying quality of service demands and willingness to pay. Providers face problems of pricing and allocating resources to maximize revenue. Previous
In this paper, we present an innovative recursive motion estimation technique that can take advantage of the in-depth resolution (range) to perform an accurate estimation of objects that have undergone 3-D translational and rotational movements. This
In previous work, we established a linear programming framework to determine sensor location from measured link distances between neighboring nodes in a network. Besides providing greater accuracy compared to other techniques, linear programs in particular
Advanced vehicle-based safety and warning systems use laser scanners to measure road geometry (position, curvature), and range to obstacles in order to warn a driver of an impending crash and/or to activate safety devices (air bags, brakes, steering). In
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to assist
This paper describes the detection of single photons, which have been transmitted through standard fiber at the telecom wavelength of 1310 nm. Following transmission, the 1310-nm photon is up-converted to 710 nm in a periodical-poled LiNbO3 (PPLN)
Sheila E. Frankel, Bernard Eydt, L Owens, Karen Kent Scarfone
This report provides readers with a detailed explanation of next generation 802.11 wireless security. It describes the inherently flawed Wired Equivalent Privacy (WEP) and explains 802.11i's two-step approach (interim and long-term)to providing effective
The progress of some of the key electrical, electronics, communications, controls and software technologies that enable in-vehicle, vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) functions is presented, in historical, current & futuristic
Ultra-wideband technology shows promise for precision ranging due to its fine time resolution to resolve multipath fading and the presence of lower frequencies in the baseband to penetrate walls. While a concerted effort has been conducted in the extensive
This paper presents a new pel recursive motion estimation algorithm for video coding applications. The derivation of the algorithm is based on Recursive Least-Squares (RLS) estimation that minimizes the mean square prediction error. A comparison with the
This paper surveys recent research on self-organizing techniques applied to design and control large wireless ad hoc and sensor networks. The survey divides that research into five functional categories: (1) resource sharing, (2) structure formation and
Consider a system of two millimeter wave transceiver nodes A and B. We assume that each node is equipped with a circular array antenna that has beamforming capability. We are interested in using the beamforming capability to find the best possible
In this article we propose an adaptive algorithm that determines the duration and frequency of channel scanning in order to facilitate the discovery of neighboring base stations and handovers across multiple IEEE 802.16 networks. The proposed algorithm
Jean Deruelle, Mudumbai Ranganathan, Douglas C. Montgomery
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled
Kotikalapudi Sriram, Douglas C. Montgomery, Oliver Borchert, Okhee Kim, David R. Kuhn
We present a detailed study of the potential impact of BGP peering session attacks and the resulting exploitation of Route Flap Damping (RFD) that cause network-wide routing disruptions. We consider canonical grid as well as down-sampled realistic
Richard A. Rouil, Nicolas Chevrollier, Nada T. Golmie
Unlike many intrusion detection systems that rely mostly on labeled training data, we propose a novel technique for anomaly detection based on unsupervised learning and we apply it to counter denial-of-service attacks. Initial simulation results suggest
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to assist
The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information security Management Act (FISMA) of 2002, Public Law 107-347. This publication seeks to assist