Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 226 - 250 of 833

Information Leakage Through the Domain Name System

March 31, 2011
Author(s)
Scott W. Rose, Anastase Nakassis, Ramaswamy Chandramouli
The Domain Name System (DNS) is the global lookup service for network resources. It is often the first step in an Internet transaction as well as a network attack. An attacker can query an organization's DNS as reconnaissance before attacking hosts on a

Efficient Motion Vector Interpolation for Error Concealment of H.264/AVC

March 1, 2011
Author(s)
Hamid Gharavi
In video communications the compressed video stream is very likely to be corrupted by channel errors. In order to combat these channel errors, many methods have been proposed. In this paper, a new method for motion vectors (MVs) interpolation with the help

Minimum-Risk Layer 2 Trigger Levels for Proactive Media-Independent Handovers

February 1, 2011
Author(s)
David W. Griffith, Alexandre Delye, Nada T. Golmie
Anticipated handovers that use Link Going Down (LGD) and Link Down (LD) trigger events require the network operator to set the LGD trigger high enough that the handover completes before the LD trigger event. However, setting the LGD trigger too high can

Guidelines for the Secure Deployment of IPv6

December 29, 2010
Author(s)
Sheila E. Frankel, Richard Graveman, John Pearce, Mark Rooks
Due to the exhaustion of IPv4 address space, and the Office of Management and Budget (OMB) mandate that U.S. federal agencies begin to use the IPv6 protocol, NIST undertook the development of a guide to help educate federal agencies about the possible

Mobile Applications: the Fifth Cycle

December 13, 2010
Author(s)
George Hurlburt, Jeff Voas, Keith Miller
Using the analogy of an existing smart car, this paper explores Power to the Edge , where the edge is commercial mobile computing. The world is poised for a 5th Cycle of computer capability, this time focused on the burgeoning phenomena of mobile computing

AN EFFICIENT SENSITIVITY ANALYSIS METHOD FOR NETWORK SIMULATION MODELS

December 7, 2010
Author(s)
Kevin L. Mills, James J. Filliben
Simulation models for data communications networks encompass numerous parameters that can each take on millions of values, presenting experimenters with a vast space of potential parameter combinations. To apply such simulation models experimenters face a

How to Model a TCP/IP Network Using Only 20 Parameters

December 5, 2010
Author(s)
Kevin L. Mills, Edward J. Schwartz, Jian Yuan
Most simulation models for data communication networks encompass hundreds of parameters that can each take on millions of values. Such models are difficult to understand, parameterize and investigate. This paper explains how to model a modern data

An Integrated PHY and MAC Layer Model for Half-Duplex IEEE 802.11 Networks

November 2, 2010
Author(s)
David W. Griffith, Michael R. Souryal, Camillo A. Gentile, Nada T. Golmie
This paper introduces an IEEE 802.11 analytical model that examines uplink and downlink communications between non-saturated stations and a non-saturated access point. The model integrates channel effects and collisions into a single expression for the

A New Call Admission Control Scheme for Heterogeneous Wireless Networks

October 31, 2010
Author(s)
Duk Kyung Kim, David W. Griffith, Nada T. Golmie
Call admission control between heterogeneous networks,such as an integrated 3GPP LTE and WLAN network, plays an important role to utilize the system resources in a more efficient way. In this paper, we propose that the preference to the WLAN is determined

Security Assurance Levels: A Vector Approach to Describing Security Requirements

October 20, 2010
Author(s)
James D. Gilsinn, Ragnar Schierholz
Safety systems have used the concept of safety integrity levels (SILs) for almost two decades. This allows the safety of a component or system to be represented by a single number that defines a protection factor required to ensure the health and safety of

Modeling Smart Grid Applications with Co-Simulation

October 5, 2010
Author(s)
Timothy Godfrey, Mullen Sara, Roger C. Dugan, Craig Rodine, David W. Griffith, Nada T. Golmie
Analysis of complex Smart Grid applications require simulation of communications networks and the power system. Analytical models of the communication systems provide a tool for examining the aggregate behavior of the system. An event level analysis in the

A Methodology to Evaluate Wireless Technologies for the Smart Grid

October 4, 2010
Author(s)
Michael R. Souryal, Camillo A. Gentile, David W. Griffith, David E. Cypher, Nada T. Golmie
This paper presents a methodology for assessing the suitability of various wireless technologies for meeting the communication requirements of Smart Grid applications. It describes an approach for translating application requirements to link traffic

Simulation of a Medium Frequency Mesh Network for Communications in Underground Mines

October 3, 2010
Author(s)
Michael R. Souryal, Fabien A. Valoit, Hui Guo, Nader Moayeri, Nicholas W. Damiano, David P. Snyder
Signals at the lower end of the medium frequency range (300 kHz to 3000 kHz) propagate with relatively low attenuation along existing metallic infrastructure in an underground mine, such as cables, pipes and rails. Exploiting this capability, low-bandwidth

Guide to Securing WiMAX Wireless Communications

September 30, 2010
Author(s)
Karen A. Scarfone, Cyrus Tibbs, Matt Sexton
The purpose of this document is to provide information to organizations regarding the security capabilities of wireless communications using WiMAX networks and to provide recommendations on using these capabilities. WiMAX technology is a wireless

A DS-CDMA Interference Cancellation Technique for Body Area Networks

September 27, 2010
Author(s)
Wen-Bin Yang, Kamran Sayrafian
A low complexity Parallel Interference Cancellation (PIC) technique that is applicable to body area networks is presented. Using Direct-Sequence Code Division Multiple Access (DS-CDMA), the technique aims at suppressing interference caused by rapid changes

Simulation Model for the IEEE 802.15.3/3b WPAN Standard

September 15, 2010
Author(s)
Kamran Sayrafian
The1IEEE 802.15.3 is an emerging technology for high data rate wireless multimedia applications in Wireless Personal Area Networks (WPAN). In this paper, a discrete event simulation model has been implemented using OPNET2 Modeler to simulate the essential

PYRAMID MODEL BASED DOWN-SAMPLING FOR IMAGE INPAINTING

September 2, 2010
Author(s)
Hamid Gharavi
Image inpainting is a useful and powerful technique for automatically restoring or removing objects in films and damaged pictures. In the last ten years, many excellent inpainting algorithms have been proposed after Bertalmio et al. [1]. However, no paper

A Channel Propagation Model for the 700 MHz Band

September 1, 2010
Author(s)
Camillo A. Gentile, Nada T. Golmie, Catherine A. Remley, Christopher L. Holloway, William F. Young
Conversion from analog television in the United States combined with the appeal for broadband public safety communications is generating a lot of interest in the so-called 700 MHz band between 698-806 MHz. To our knowledge, no channel propagation model for
Was this page helpful?