NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Faced with the scalability and reliability challenge, the DNS is increasingly operated by geographically dispersed data centers. Energy management across those distributed diverse data centers is critical to reduce revenue loss for DNS operators. This
After serving as the Editor-in-Chief for the past three years, I am very pleased to turn over the editorial torch to Dr. Yi Qian who served as the Associate Editor-in Chief during this time. Dr. Qian has been a long-time IEEE volunteer and has all the
Autonomous vehicles bring the promise of enhancing the consumers experience in terms of comfort and convenience and, in particular, the safety of the autonomous vehicle. Safety functions in autonomous vehicles such as Automatic Emergency Braking and Lane
The flexibility of wireless networks, and their cost-efficient setup and maintenance have motivated the deployment of wireless communications in industrial environments. Strict industrial requirements including the time-sensitive delivery of data have led
Future transportation systems evolve new in-vehicle network designs are required to handle the heterogeneous data generated by different Electronic Control Modules (ECUs). Enabling interaction between these data sources can trigger innovation and the
As a promising solution to DNS privacy, query name minimization limits the unnecessary leakage of query name information in DNS requests. Due to the lack of detailed measurement study, there is little understanding of the performance, compatibility, and
AbstractMobile cloud computing is an emerging area where two trends come together to compose its major pillars. On one hand, the virtualization affecting the data centers hypervisors. On the other hand, devices mobility, especially Smart Phones, which
Researchers model congestion in communication networks using a percolation process, where congestion spreads minimally before a critical load and expands rapidly afterwards. Some studies identify precursor signals arising near critical load, but none
With the growing interest in the deployment of massive multiple-input-multiple-output (MIMO) systems and millimeter wave technology for fifth generation (5G) wireless systems, the computation power to the total power consumption ratio is expected to
Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal
The administrators of a mission critical network usually have to worry about non-traditional threats, e.g., how to live with known, but unpatchable vulnerabilities,and how to improve the network's resilience against potentially unknown vulnerabilities. To
With the remarkable progress of cooperative communication technology in recent years, its transformation to vehicular networking is gaining momentum. Such a transformation has brought a new research challenge in facing the realization of cooperative
In this paper, we present an analytical approach to evaluate the performance of dual-hop, two-way, and asymmetric D2D communications with and without network coding. In our approach, we first establish a relationship between link outage probability (LOP)
This paper addresses the performance of polar codes in the context of the quantum key distribution (QKD) protocol. It introduces the notion of an interactive polar decoder and studies its performance. The results demonstrate that the interactive decoder is
Traffic Lights are used to control traffic at road intersections. Typically, the employed traffic light control mechanism on the road operates according to a periodic schedule to change the light/color (red/yellow/green). In some places, a different
Cloud Computing is emerging as a new paradigm that aims at delivering computing as a utility. For the cloud computing paradigm to be fully adopted and effectively used, it is critical that the security mechanisms are robust and resilient to malicious
With the rapid growth of the Internet, there has been increased interest in the use of computer models to study the dynamics of communication networks in the research literature. An important example of this has been the study of dramatic, but relatively
Cihan Tunc, Salim hariri, Mheni Merzouki, Charif Mahmoudi, Frederic J. de Vaulx, Jaafar Chbili, Robert B. Bohn, Abdella Battou
Cloud services have gained tremendous attention as a utility paradigm and have been deployed extensively across a wide range of fields. However, Cloud security is not catching up to the fast adoption of its services and remains one of the biggest
An Wang, Yang Guo, Songqing Chen, Fang Hao, T.V. Lakshman, Douglas C. Montgomery, Kotikalapudi Sriram
Network programmability is a salient feature of Software Defined Networking (SDN), which allows users to program network applications with the perception that the underlying network is a single device. While still at an early stage of development, SDN
Wireless connections are becoming popular in industrial environments that increasingly carry sensing and actuation data over the air. In industrial plants, activities of legacy wireless systems have shaped the channel usage in the radio spectrum bands for
Public safety organizations increasingly rely on wireless technology for their mission critical communication during disaster response operations. In such situations, a communication network could face much higher traffic demands compared to its normal
Lack of network availability or limited access to communication services are among the challenges that public safety officials and first responders could face during disasters or emergency scenarios. Networking infrastructure can partially (or sometimes
This paper focuses primarily on leveraging synchronized current/voltage amplitudes and phase angles measurements to foster new categories of applications, such as improving the effectiveness of grid protection and minimizing outage duration for distributed
The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers
Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal
The administrators of a mission critical network usually have to worry about non-traditional threats, e.g., how to live with known, but unpatchable vulnerabilities,and how to improve the network's resilience against potentially unknown vulnerabilities. To
Moneer M. Helu, Thomas D. Hedberg, Allison Barnard Feeney
The increasing growth of digital technologies in manufacturing has provided industry with opportunities to improve its productivity and operations. One such opportunity is the digital thread, which links product lifecycle systems so that shared data may be