Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 576 - 600 of 833

A Link-Level Simulator of the cdma2000 Reverse-Link Physical Layer

August 1, 2003
Author(s)
Hamid Gharavi, F Chin, K Ban, R Wyatt-Millington
The cdma2000 system is an evolutionary enhancement of the IS-95 standards which support 3G services defined by the International Telecommunications Union(ITU). cdma2000 comes in two phases: 1XRTT and 3XRTT (1X and 3X indicatesthe number of 1.25 MHz wide

Multihop Sensor Network Design for Wideband Communications

August 1, 2003
Author(s)
Hamid Gharavi, K Ban
This paper presents a master/slave cellular based mobile ad-hoc network architecture for multihop multimedia communications. The proposed network is based on a new paradigm for solving the problem of cluster-based ad-hoc routing when utilizing existing

On the Stability of Exponential Backoff

August 1, 2003
Author(s)
N-O Song, B-J Kwak, Leonard E. Miller
New analytical results are given for the stability and performance of the exponential backoff (EB) algorithm. Previous studies on the stability of the (binary) EB have produced contradictory results instead of a consensus: some proved instability, others

Hierarachical Restoration Scheme for Multiple Failures in GMPLS Networks

May 12, 2003
Author(s)
Sanghun Lee, C Kim, David W. Griffith
It is expected that GMPLS-based recovery could become a viable option for obtaining faster restoration than layer 3 rerouting. Even though dedicated restoration ensures restorability of connections, exclusive use of dedicated scheme would result in wasting

Adaptive Jitter Control for UPnP M-Search

May 1, 2003
Author(s)
Kevin L. Mills, Christopher E. Dabrowski
Selected service-discovery systems allow clients to issue multicast queries to locate network devices and services. Qualifying devices and services respond directly to clients; thus, in a large network, potential exists for responses to implode on a client

Bluetooth Dynamic Scheduling and Interference Mitigation

May 1, 2003
Author(s)
Nada T. Golmie
Bluetooth is a cable replacement technology for Wireless Personal Area Networks. It is designed to support a wide variety of applications such as voice, streamed audio and video, web browsing, printing, and file sharing, each imposing a number of quality

Hierarchical Restoration Scheme for Multiple Failures in GMPLS Networks

May 1, 2003
Author(s)
San-Nan K. Lee, C Kim, David W. Griffith
It is expected that GMPLS-based recovery could become a viable option for obtaining faster restoration than layer 3 rerouting. Even though dedicated restoration ensures restorability of connections, exclusive use of dedicated scheme would result in wasting

Network Provisioning as a Game Against Nature

May 1, 2003
Author(s)
Vladimir V. Marbukh
Traditional approaches to network provisioning assume availability of the reliable estimates for the expected demands. This assumption, however, oversimplifies many practical situations when some incomplete information on the expected demands is available

On Shortest Random Walks under Adversarial Uncertainty

May 1, 2003
Author(s)
Vladimir V. Marbukh
Finding shortest feasible paths in a weighted graph has numerous applications including admission and routing in communication networks. This paper discusses a game theoretic framework intended to incorporate a concept of path stability into the process of

The Effect of Delay Mismatch in MPLS Networks Using 1+1 Protection

May 1, 2003
Author(s)
David W. Griffith, Sanghun Lee, L Krivulina
High-capacity optical-fiber backbone networks protect information flows belonging to their premium customers by routing two copies of the customer's data over disjoint paths. This scheme, known as 1+1 protection, ensures that the customer will experience

Expected Multi-Hop Power Consumption in Mobile Ad-Hoc Networks

March 1, 2003
Author(s)
Camillo A. Gentile
Mobile Ad-Hoc Networks provide the means to reduce significantly the power required for routing from source to destination through multi-hops between other nodes in the network. In the presence of mobility, only continuous updating can guarantee routes

Joint Distribution of Link Distances

March 1, 2003
Author(s)
Leonard E. Miller
The calculation of two-hop connectivity between two terminals for randomly deployed wireless networks requires the joint probability distribution of the distances between these terminals and the terminal that is acting as a relay. In general the distances

Self-Adaptive Leasing for Jini

March 1, 2003
Author(s)
K Bowers, Kevin L. Mills, Scott W. Rose
Distributed computing environments require strategies by which components can detect and recover from failures in remote, collaborating components. Many protocols for distributed systems employ a strategy based on leases, which grant a leaseholder with

Understanding the Correlation Structure of Network Traffic

December 24, 2002
Author(s)
Kevin L. Mills, J Yuan
This paper aims to improve current understanding of the correlation structure of traffic carried over large networks, such as the Internet. To achieve this aim we use simulation, adopting a methodology of homogenization to achieve a sufficiently large

Master-Slave Cluster Based Multihop Ad-hoc Networking

December 1, 2002
Author(s)
Hamid Gharavi, K Ban
This paper presents a master-slave cluster based mobile ad-hoc network architecture for multihop communications using the IEEE 802.11 system. The proposed architecture is a mixture of two different types of networks: managed (master-and-slave) and ad-hoc

An Analytical Approach to Shared Backup Path Provisioning in GMPLS Networks

October 1, 2002
Author(s)
Sanghun Lee, David W. Griffith, N-O Song
As GMPLS and its supporting set of protocols develop into a viable control plane for optical networks, an important function that they will need to support will be the restoration and protection function that has been a major feature of legacy optical

Kinetic Minimum-Power Routing and Clustering in Mobile Ad-Hoc Networks

September 1, 2002
Author(s)
Camillo Gentile, R E. Van Dyck, J Haerri
We have previously developed a distributed routing algorithm which minimizes the number of overhead messages necessary to maintain the minimum-power multi-hop routes in a mobile ad-hoc network, assuming a piece-wise linear model for the motion of the nodes

Situated Computing: The Next Frontier for HCI Research

August 20, 2002
Author(s)
Kevin L. Mills, Jean C. Scholtz
Today, much of our information-intensive work is carried out at desktop computer workstations; however, increasingly people work and live on the move. Very soon, scads of small information processing appliances will be carried along from place to place as
Was this page helpful?