Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1376 - 1400 of 2282

Low Signal-to-noise Ratio Underwater Acoustic Communications

May 31, 2008
Author(s)
Wen-Bin Yang, T.C. Yang
Communications with low input signal-to-noise ratio (SNR) is often called covert communications as the probability of detection and interception decreases with decreasing SNR . Direct-sequence spread-spectrum signaling works at low SNR because of the

Internet Protocol Version 6 (IPv6)

May 30, 2008
Author(s)
Sheila E. Frankel, David Green
Recognizing that the 32-bit addresses used by the current version of the Internet Protocol (IPv4) would soon be depleted, the Internet Engineering Task Force (IETF) has been developing its successor, Internet Protocol version 6 (IPv6). This has been a more

Capacity of Random Wireless Networks: Impact of Cooperative Network Coding

May 19, 2008
Author(s)
Yi Qian, Kejie Lu, Shengli Fu
The throughput capacity of random wireless networks has been studied extensively in the literature. Nevertheless, most existing studies are based on the assumption that each transmission has one sender and one receiver. In our recent study, we have

Subspace Approximation of Face Recognition Algorithms: An Empirical Study

May 12, 2008
Author(s)
P J. Phillips, Pranab Mohanty, Sudeep Sarkar, Rangachar Kasturi
We present a theory for constructing linear subspace approximations to face recognition algorithms and empirically demonstrate that a surprisingly diverse set of face recognition approaches can be approximated well using a linear model. A linear model

Design Secure and Application-Oriented VANET

May 11, 2008
Author(s)
Yi Qian, Nader Moayeri
Vehicular ad hoc network (VANET) is recognized as an important component of Intelligent Transportation Systems. The main benefit of VANET communication is seen in active safety systems, which target to increase safety of passengers by exchanging warning

Impact of Signaling Load on the UMTS Call Blocking/Dropping

May 11, 2008
Author(s)
Yi Qian, David Tipper, Saowaphak Sasanus
Radio resources in the third generation (3G) wireless cellular networks (WCNs) such as the universal mobile telecommunications system (UMTS) network is limited in term of soft capacity. The quality of a signaling service transmission depends on various

Detection-time-bin-shift Polarization Encoding Quantum Key Distribution System

May 6, 2008
Author(s)
Lijun Ma, Tiejun Chang, Xiao Tang
A detection-time-bin-shift scheme for polarization encoding QKD is proposed. This scheme can reduce cost and overcome the security loss caused by dead-time and the unbalanced characteristics of detectors. This scheme is experimentally demonstrated with the

Directional Routing Protocols for Ad Hoc Networks

May 6, 2008
Author(s)
Hamid Gharavi, Bin Hu
This paper presents a directional routing approach for multihop ad-hoc networks, which has been applied to two on-demand routing protocols: namely Dynamic Source Routing (DRS) and Ad Hoc On-Demand Distance Vector Routing (AODV). Both DSR-based and AODV

On The TREC Blog Track

April 30, 2008
Author(s)
Iadh Ounis, Craig Macdonald, Ian Soboroff
The rise of blogging as a new grassroots publishing medium and the many interesting peculiarities that characterize blogs compared to other genres of documents opened up several new interesting research areas in the information retrieval field. The Blog

Codes for the Identification of Federal and Federally-Assisted Organization

April 25, 2008
Author(s)
William C. Barker, Hildegard Ferraiolo
The Homeland Security Presidential Directive HSPD-12 called for new standards to be adopted governing the interoperable use of identity credentials to allow physical and logical access to Federal government locations and systems. The Personal Identity

Interference Avoidance in Rapidly Deployed Wireless Ad hoc Incident Area Networks

April 18, 2008
Author(s)
Mohamed T. Refaei, Nader Moayeri, Michael R. Souryal
A common strategy for responding to indoor emergency scenarios is to rapidly deploy a group of first responders inside the incident area and an incident command center outside of the incident area. First responders are equipped with radios that allow them

On Maximizing Provider Revenue in Market-based Compute Grids

April 17, 2008
Author(s)
Vladimir V. Marbukh, Kevin L. Mills
Market-based compute grids encompass service providers offering limited resources to potential users with varying demands and willingness to pay. Providers face difficult decisions about which jobs to admit and when to schedule admitted jobs. For this

Spatial Interpolation Algorithm for Error Concealment

April 9, 2008
Author(s)
Hamid Gharavi, Shaoshuai Gao
In this paper, we propose a new spatial interpolation algorithm for Intra-Frame error concealment. The method aims at interpolating areas in the image, which have been affected by packet loss. We have proposed an edge detection technique to aid the

Clustering Characteristics of Millimeter Wave Indoor Channels

April 8, 2008
Author(s)
Kamran Sayrafian, Behnam Neekzad, John Baras
Temporal-Angular channel sounding measurements of an indoor millimeter wave channel (60 GHz) is analyzed to determine whether ray arrivals at the receiver form clusters in the two-dimensional time-angle space. The channel behavior for directional antennas

Quantize-and-Forward Relaying with M-ary Phase Shift Keying

March 31, 2008
Author(s)
Michael R. Souryal, Huiqing You
Using cooperative transmission, two or more single-antenna users can share their antennas to achieve spatial diversity in a slow fading channel. One relaying protocol that achieves diversity, amplify-and-forward (AF), is striking in its simplicity, but

The CLEAR 2007 Evaluation

March 31, 2008
Author(s)
Rainer Stiefelhagen, Keni Bernardin, R Bowers, Richard T. Rose, Martial Michel, John S. Garofolo
This paper is a summary of the 2007 CLEAR Evaluation on the Classification of Events, Activities, and Relationships which took place in early 2007 and culminated with a two-day workshop held in May 2007. CLEAR is an international effort to evaluate systems

On Test Collections for Adaptive Information Retrieval

March 17, 2008
Author(s)
Ellen M. Voorhees
Traditional Cranfield test collections represent an abstraction of a retrieval task that Sparck Jones calls the core competency of retrieval: a task that is necessary, but not sufficient, for user retrieval tasks. The abstraction facilitates research by

Minimizing Information Leakage in the DNS

March 1, 2008
Author(s)
Scott W. Rose, Anastase Nakassis
The Domain Name System (DNS) is the global lookup service for network resources. To protect DNS information, the DNS Security Extensions (DNSSEC) has been developed and deployed on branches of the DNS to provide authentication and integrity protection

MINEX II Performance of Fingerprint Match-on-Card Algorithms - Phase II Report

February 29, 2008
Author(s)
Patrick J. Grother, Wayne J. Salamon, Michael D. Indovina, Craig I. Watson
The MINEX II trial was conducted to evaluate the accuracy and speed of Match-on-Card verification algorithms. These run on ISO/IEC 7816 smart cards. They compare conformant reference and verification instances of the ISO/IEC 19794-2 COMPACT CARD

A Quantum Network Manager That Supports A One-Time Pad Stream

February 11, 2008
Author(s)
Alan Mink, Lijun Ma, Anastase Nakassis, Haolang Xu, Oliver T. Slattery, Barry J. Hershman, Xiao Tang
We have begun to expand the NIST quantum key distribution (QKD) system into a quantum network to support secure cryptography. We are starting with a simple three-node network, one Alice switched between Bob1 and Bob2. To support such a quantum network, we
Was this page helpful?