Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 201 - 225 of 833

Guidelines for Securing Wireless Local Area Networks (WLANs)

February 21, 2012
Author(s)
Murugiah P. Souppaya, Karen Scarfone
A wireless local area network (WLAN) is a group of wireless networking devices within a limited geographic area, such as an office building, that exchange data through radio communications. The security of each WLAN is heavily dependent on how well each

Comparing VM-Placement Algorithms for On-Demand Clouds

November 29, 2011
Author(s)
Kevin L. Mills, James J. Filliben, Christopher E. Dabrowski
Much recent research has been devoted to investigating algorithms for allocating virtual machines (VMs) to physical machines (PMs) in infrastructure clouds. Many such algorithms address distinct problems, such as initial placement, consolidation, or

VM Leakage and Orphan Control in Open-Source Clouds

November 29, 2011
Author(s)
Christopher E. Dabrowski, Kevin L. Mills
Computer systems often exhibit degraded performance due to resource leakage caused by erroneous programming or malicious attacks, and computers can even crash in extreme cases of resource exhaustion. The advent of cloud computing provides increased

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks

October 27, 2011
Author(s)
Tony V. Cheneau, Maryline Laurent, Andrei V. Sambra
This paper presents a new public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication and Key Exchange Scheme. Its originality lies in performing authentication and key distribution with no need for a trusted

Analysis of Advanced Metering over a Wide Area Cellular Network

October 17, 2011
Author(s)
Michael R. Souryal, Nada T. Golmie
This paper presents a framework for analysis of the coverage and capacity of advanced metering over a wide area cellular network. The coverage analysis predicts the maximum cell size subject to an outage criterion, and the capacity analysis predicts the

COMPARISON OF TWO DIMENSION-REDUCTION METHODS FOR NETWORK SIMULATION MODELS

October 5, 2011
Author(s)
Kevin L. Mills, James J. Filliben
Experimenters characterize the behavior of simulation models for data communications networks by measuring multiple responses under selected parameter combinations. The resulting multivariate data may include redundant responses reflecting aspects of a

Interference Mitigation for Body Area Networks

September 12, 2011
Author(s)
Wen-Bin Yang, Kamran Sayrafian
Due to ultra-low power communication, BAN is most likely a victim system. Interference from other BANs or other coexisting wireless communication systems may be significant. Power control is usually inefficient and may even cause more interference in an

Cost-Efficient Routing with Controlled Node Mobility in Sensor Networks

September 1, 2011
Author(s)
Kamran Sayrafian
In this paper, an energy-efficient strategy is proposed for tracking a moving target in a mobile sensor network. The energy expenditure of the sensors in the network is assumed to be due to communication, sensing and movement. First, the target area is

Predicting Failure in Complex Systems by Perturbing Markov Chain Models

July 21, 2011
Author(s)
Christopher E. Dabrowski, Fern Y. Hunt
In recent years, substantial research has been devoted to monitoring and predicting performance degradations in real-world complex systems within large entities such as nuclear power plants, electrical grids, and distributed computing systems. Special

Predicting Macroscopic Dynamics in Large Distributed Systems

July 18, 2011
Author(s)
Kevin L. Mills, James J. Filliben
In this paper, we outline an approach that can be used to predict macroscopic dynamics when new components are deployed in a large distributed system. Our approach combines two main methods: scale reduction and multidimensional data analysis techniques

An Efficient Sensitivity Analysis Method for Large Cloud Simulations

July 4, 2011
Author(s)
Kevin L. Mills
We describe Koala, an infrastructure Cloud simulator inspired by the Amazon Elastic Compute Cloud (EC2). We conduct a sensitivity analysis of Koala, revealing eight behavioral dimensions, which are influenced significantly by six parameters. Our findings

Throughput and Delay Analysis of Half-Duplex IEEE 802.11 Mesh Networks

June 6, 2011
Author(s)
Camillo A. Gentile
Emerging technologies for mesh networks can provide users with last-mile service to an access point by forwarding data through wireless relays instead of through expensive wireline infrastructure. While an extensive amount of literature on mesh networks

Linear Dispersion Codes for Asynchronous Cooperative MIMO Systems

June 1, 2011
Author(s)
Hamid Gharavi
In this treatise, we propose a novel family of Asynchronous Cooperative Linear Dispersion Codes (ACLDCs), which is capable of maintaining full diversity in cooperative scenarios even at the presence of asynchronous reception. The linear dispersion

Multigate Communication Network For Smart Grid

June 1, 2011
Author(s)
Hamid Gharavi
It is envisioned that one of the most important issues in Smart Grid will be to design a network architecture that is capable of providing secure and reliable two-way communication from meters to other Smart Grid domains. While networking technologies and

Scanning the Issue Smart Grid: The Electric Energy System of the Future

June 1, 2011
Author(s)
Hamid Gharavi
This is an editorial article for a special issue on smart grid. The main objective is to report on some, if not all, of smart grid future technical challenges. While acknowledging its limited coverage, this issue offers a wide range of interesting

Selective Pixel Interpolation for Spatial Error Concealment

June 1, 2011
Author(s)
Hamid Gharavi, Yi Ge, Bo Yan, Kairan Sun
This paper proposes an effective algorithm for spatial error concealment with accurate edge detection and partitioning interpolation. Firstly, a new method is used for detecting possible edge pixels and their matching pixels around the lost block. Then

Modeling queuing dynamics of TCP: a simple model and its empirical validation.

May 6, 2011
Author(s)
Daniel I. Genin, Anastase Nakassis
Understanding queuing dynamics of TCP is important for correct router buffer sizing as well as for optimizing the performance of the TCP protocol itself. However, modeling of buffer content dynamics under TCP has received relatively little attention given

Multigate Mesh Routing for Smart Grid Last Mile Communications

May 1, 2011
Author(s)
Hamid Gharavi, Bin Hu
One of the most important issues in Smart Grid is to provide consumers with the knowledge of their energy usage, as well as allowing the utility to monitor and control the electric system components with real time status. This would require the design of a

RFID-based Localization and Tracking Technologies

April 1, 2011
Author(s)
Michael R. Souryal, Lionel M. Ni, Dian Zhang
Radio Frequency Identification (RFID) usually incorporates a tag into an object for the purpose of identification or localization using radio signals. It has gained a lot of attention recently due to its advantages in terms of low cost and easy deployment
Was this page helpful?