An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
In mobile ad-hoc network environments where the network topology is expected to change considerably, providing reliable video communications is a challenging task. This paper is mainly concerned with developing a packet control mechanism to reduce bursts
Since typically network performance is characterized by multiple competing criteria, the network management requires resolving the corresponding trade-offs. The problems include finding the Pareto optimal frontier in space of these criteria and selecting
We investigate the inherent scalability problem of ad hoc networks originated from the nature of multi-hop networks. First, the expected packet traffic at the center of a network is analyzed. The result shows that the expected packet traffic at the center
As network transmission speeds increase, packet streams increasingly uncover fine details of the interior behavior of router hardware and software. This behavior reveals itself as a set of harmonic effects, as interior clocks periodically interrupt packet
Analyzing spatial-temporal characteristics of traffic in large-scale networks requires both suitable analysis method and a means to reduce the amount of data that must be collected. Of particular interest would be techniques that reduce the amount of data
Tracking an object in a sequence of images can fail due to partial occlusion or clutter. Robustness to occlusion can be increased by tracking the object as a set of parts such that not all of these are occluded at the same time. However, successful
This ITL Bulletin summarizes NIST Special Publication 800-42, Guideline on Network Security Testing, by John Wack, Miles Tracy, and Murugiah Souppaya, which assists organizations in testing their Internet-connected and operational systems. The guide
Service-discovery systems aim to provide consistent views of distributed components under varying network conditions. To achieve this aim, designers rely upon a variety of self-healing strategies, including: architecture and topology, failure-detection and
David W. Griffith, Richard A. Rouil, Stephan Klink, Ram D. Sriram
The amount of resource provisioning prior to failure events to support optical path recovery has a significant impact on network performance, and so designing recovery mechanisms for any large network necessitates balancing multiple (in some cases
Kotikalapudi Sriram, David W. Griffith, San-Nan K. Lee, Nada T. Golmie
In resilient optical networks, there is a tradeoff between the amount of resources allocated for protection versus the probability that a failed working path cannot be covered, known as protection blocking probability. Often the network topology permits
This paper presents the design and implementation of a simulation model for the cdma2000 reverse link. The model includes all the radio configurations and their corresponding data rates in accordance with the IS-2000 specifications. The paper first