Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 476 - 500 of 833

Performance Analysis of Low Rate Wireless Technologies for Medical Applications

October 1, 2005
Author(s)
Nada T. Golmie, David E. Cypher, O Rebala
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Protection Switching for Optical Bursts Using Segmentation and Deflection Routing

October 1, 2005
Author(s)
David W. Griffith, Kotikalapudi Sriram, Nada T. Golmie
Burst segmentation in OBS networks can significantly reduce the amount of data that is lost due to contention events by dropping or deflecting only the portion of a burst that overlaps another contending burst. In this letter, we demonstrate how

Public Safety Wireless Technology Links

October 1, 2005
Author(s)
Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Resource Planning and Bandwidth Allocation in Hybrid Fiber-Coax Residential Networks

October 1, 2005
Author(s)
David W. Griffith, Kotikalapudi Sriram, L Krivulina, Nada T. Golmie
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Results of Some Applications using IEEE 802.15.4

October 1, 2005
Author(s)
David E. Cypher
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

RFID-Assisted Localization and Communications for First Responders

October 1, 2005
Author(s)
Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Soft Decision Metrics for Turbo-Coded FH M-FSK Ad Hoc Packet Radio Networks

October 1, 2005
Author(s)
B M. Peric, Michael R. Souryal, E G. Larsson, B R. Vojcic
This paper addresses turbo-coded non-coherent FH M-FSK ad hoc networks with a Poisson distribution of interferers where multiple access interference can be modeled as symmetric a-stable (SaS) noise and a is inversely proportional to the path loss exponent

Strategic Directions in Information and Knowledge Management

October 1, 2005
Author(s)
Stephen Quirolgico
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal

The Mobicents Open SLEE Platform: Architecture, Implementation, and Programming

October 1, 2005
Author(s)
Mudumbai Ranganathan, I Ivanov, Francesco Moggia
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal

Unsupervised Anomaly Detection System Using Next-Generation Router Architecture

October 1, 2005
Author(s)
Richard A. Rouil, Nicolas Chevrollier, Nada T. Golmie
Unlike many intrusion detection systems that rely mostly on labeled training data, we propose a novel technique for anomaly detection based on unsupervised learning and we apply it to counter denial-of-service attacks. Initial simulation results suggest

Wireless Enhancements for Storage Area Networks

October 1, 2005
Author(s)
David W. Griffith, Kotikalapudi Sriram, J Gao, Nada T. Golmie
We propose the creation of a wireless storage area network (SAN) and analyze its benefits. The proposed wireless SAN (WSAN) consists of a SAN switch that is connected to multiple wireless access points (APs) that communicate with the storage devices. This

A Solution for Wireless Privacy and Payments based on E-cash

September 9, 2005
Author(s)
A Karygiannis, Y. Tsiounis, A. Kayias
With wireless capable devices becoming more and more accessible, there is an increasing need for standardization of wireless networking. One of the most utilized standards that is deployed by many current devices (including theWindows XP OS) for building

Indoor Positioning Using Spatial Spectrum

September 7, 2005
Author(s)
Kamran Sayrafian
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Analysis of EIED Backoff Algorithm for the 802.11 DCF

September 1, 2005
Author(s)
N-O Song, B-J Kwak, Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Enhanced Schemes for L2 Handover in IEEE 802.11 Networks and their Evaluations

September 1, 2005
Author(s)
Nicolas Montavont, Nicolas Montavont, T Noel
Given the relatively limited coverage area of 802.11 access points, stations moving inside WLAN are often required to perform a handover. The time needed for a STA to switch from one AP to another is too long for real-time applications to continue

A Review of Current Research Work on BGP Security

July 1, 2005
Author(s)
Kotikalapudi Sriram
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal

Application of Beamforming in Wireless Location Estimation

July 1, 2005
Author(s)
Kamran Sayrafian
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Comments on IEEE 802.21, IEEE 802.21-05-0289, San Francisco, CA

July 1, 2005
Author(s)
Nicolas Montavont, Richard A. Rouil, Nada T. Golmie
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal
Was this page helpful?