Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 601 - 625 of 833

A New Analytical Model of Shared Backup Path Provisioning in GMPLS Networks

July 1, 2002
Author(s)
Sanghun Lee, David W. Griffith, N-O Song
As GMPLS and its supporting set of protocols develop into aviable control plane for optical networks, an important function that they will need to support will be the protection and restoration function that has been a major feature of legacy optical

Modeling CPU Demand in Heterogeneous Active Networks

June 1, 2002
Author(s)
V Galtier, Kevin L. Mills, Y Carlinet
Active-network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, application-specific processing can be applied to network traffic. To use such technology safely and

Video Transmission for 3G Mobile Communication Systems

June 1, 2002
Author(s)
Hamid Gharavi, K Ban
This paper presents the design and implementation of a mobile ad-hoc network for video communications. The network architecture is based on cluster-to-cluster operation using IEEE 802.11b FHSS (Frequency Hopping Spread Spectrum). FHSS is considered to

Kinetic Spanning Trees for Minimum-Power Routing in MANETS

May 30, 2002
Author(s)
Camillo Gentile, R E. Van Dyck
A distributed kinetic spanning tree algorithm is proposed for routing in wireless mobile ad hoc networks. Assuming a piecewise linear motion model for the nodes, the sequence of shortest-path spanning trees is determined, valid until the time of the next

Dynamic Expansion of M:N Protection Groups in GMPLS Optical Networks

May 1, 2002
Author(s)
David W. Griffith, Sanghun Lee
In order to provide reliable connections across metropolitan and wide-area optical networks, the network operator must provide some degree of redundancy so that traffic can be switched from damaged working paths to backup paths that are disjoint from the

IEEE 802.11 FHSS Receiver Design for Multihop Sensor Application

May 1, 2002
Author(s)
K Ban, Hamid Gharavi
This paper presents a receiver design for IEEE 802.11 FHSS (Frequency-Hopping Spread-Spectrum) wireless local area network systems. 802.11 FHSS systems support two basic data rates. 1 Mbps and 2 Mbps systems employ 2GFSK (Gaussian Frequency Shift Keying)

Video Transmission for Multi-Hop Networks Using IEEE 802.11 FHSS

May 1, 2002
Author(s)
K Ban, Hamid Gharavi
In many applications such as construction, manufacturing, ground robotic vehicles, and rescue operations, there are many issues that necessitate the capability of transmitting digital video and that such transmissions should be performed wirelessly and in

QoS Routing Under Adversarial Binary Uncertainty

April 1, 2002
Author(s)
Vladimir V. Marbukh
A cost-based admission control and routing scheme admits an arriving request on the minimum cost route if this cost does not exceed the cost of the request, and rejects the request otherwise. Cost based strategies naturally arise as a result of

A New Analytical Model of Shared Backup Path Provisioning in GMPLS Networks

March 31, 2002
Author(s)
San-Nan K. Lee, David W. Griffith, N-O Song
As GMPLS and its supporting set of protocols develop into a viable control plane for optical networks, an important function that they will need to support will be the protection and restoration function that has been a major feature of legacy optical

Knowledge-Based Automation of a Design Method for Concurrent Systems

March 1, 2002
Author(s)
Kevin L. Mills, H Gomaa
This paper describes a knowledge-based approach to automate a software design method for concurrent and real-time systems. The approach uses multiple paradigms to represent knowledge embedded within the design method. Semantic data modeling provides the

Pilot-Assisted 16-Level QAM for Wireless Video

February 1, 2002
Author(s)
Hamid Gharavi
This paper presents a twin-class transmission system for narrowband radio access channels suitable for handheld video phone and multimedia portable PC applications. The transmission system is comprised of a hierarchical 16-QAM modulation technique and a

Modeling CPU Demand in Heterogeneous Active Networks

January 1, 2002
Author(s)
V Galtier, Kevin L. Mills, Y Carlinet
tive-network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, application-specific processing can be applied to network traffic. To use such technology safely and

Predicting and Controlling Resource Usage in a Heterogenous Active Network

January 1, 2002
Author(s)
V Galtier, Kevin L. Mills, Y Carlinet, S Bush, A Kulkarni
Active network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, inhomogeneous processing can be applied to network traffic. To use such technology safely and efficiently
Was this page helpful?