Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1401 - 1425 of 2294

Interference Avoidance in Rapidly Deployed Wireless Ad hoc Incident Area Networks

April 18, 2008
Author(s)
Mohamed T. Refaei, Nader Moayeri, Michael R. Souryal
A common strategy for responding to indoor emergency scenarios is to rapidly deploy a group of first responders inside the incident area and an incident command center outside of the incident area. First responders are equipped with radios that allow them

On Maximizing Provider Revenue in Market-based Compute Grids

April 17, 2008
Author(s)
Vladimir V. Marbukh, Kevin L. Mills
Market-based compute grids encompass service providers offering limited resources to potential users with varying demands and willingness to pay. Providers face difficult decisions about which jobs to admit and when to schedule admitted jobs. For this

Spatial Interpolation Algorithm for Error Concealment

April 9, 2008
Author(s)
Hamid Gharavi, Shaoshuai Gao
In this paper, we propose a new spatial interpolation algorithm for Intra-Frame error concealment. The method aims at interpolating areas in the image, which have been affected by packet loss. We have proposed an edge detection technique to aid the

Clustering Characteristics of Millimeter Wave Indoor Channels

April 8, 2008
Author(s)
Kamran Sayrafian, Behnam Neekzad, John Baras
Temporal-Angular channel sounding measurements of an indoor millimeter wave channel (60 GHz) is analyzed to determine whether ray arrivals at the receiver form clusters in the two-dimensional time-angle space. The channel behavior for directional antennas

Quantize-and-Forward Relaying with M-ary Phase Shift Keying

March 31, 2008
Author(s)
Michael R. Souryal, Huiqing You
Using cooperative transmission, two or more single-antenna users can share their antennas to achieve spatial diversity in a slow fading channel. One relaying protocol that achieves diversity, amplify-and-forward (AF), is striking in its simplicity, but

The CLEAR 2007 Evaluation

March 31, 2008
Author(s)
Rainer Stiefelhagen, Keni Bernardin, R Bowers, Richard T. Rose, Martial Michel, John S. Garofolo
This paper is a summary of the 2007 CLEAR Evaluation on the Classification of Events, Activities, and Relationships which took place in early 2007 and culminated with a two-day workshop held in May 2007. CLEAR is an international effort to evaluate systems

On Test Collections for Adaptive Information Retrieval

March 17, 2008
Author(s)
Ellen M. Voorhees
Traditional Cranfield test collections represent an abstraction of a retrieval task that Sparck Jones calls the core competency of retrieval: a task that is necessary, but not sufficient, for user retrieval tasks. The abstraction facilitates research by

Minimizing Information Leakage in the DNS

March 1, 2008
Author(s)
Scott W. Rose, Anastase Nakassis
The Domain Name System (DNS) is the global lookup service for network resources. To protect DNS information, the DNS Security Extensions (DNSSEC) has been developed and deployed on branches of the DNS to provide authentication and integrity protection

MINEX II Performance of Fingerprint Match-on-Card Algorithms - Phase II Report

February 29, 2008
Author(s)
Patrick J. Grother, Wayne J. Salamon, Michael D. Indovina, Craig I. Watson
The MINEX II trial was conducted to evaluate the accuracy and speed of Match-on-Card verification algorithms. These run on ISO/IEC 7816 smart cards. They compare conformant reference and verification instances of the ISO/IEC 19794-2 COMPACT CARD

A Quantum Network Manager That Supports A One-Time Pad Stream

February 11, 2008
Author(s)
Alan Mink, Lijun Ma, Anastase Nakassis, Haolang Xu, Oliver T. Slattery, Barry J. Hershman, Xiao Tang
We have begun to expand the NIST quantum key distribution (QKD) system into a quantum network to support secure cryptography. We are starting with a simple three-node network, one Alice switched between Bob1 and Bob2. To support such a quantum network, we

Soft-Decision Metrics for Coded Orthogonal Signaling in Symmetric Alpha-Stable Noise

January 1, 2008
Author(s)
Michael R. Souryal, E G. Larsson, B M. Peric, B R. Vojcic
This paper derives new soft decision metrics for coded orthogonal signaling in impulsive noise, more specifically symmetric alpha-stable noise. For the case of a known channel amplitude and known noise dispersion, exact metrics are derived both for Cauchy

Multi-Channel Mobile Ad-Hoc Links for Multimedia Communications

December 31, 2007
Author(s)
Hamid Gharavi
This paper is mainly concerned with multi-channel transmission of real-time information such as video over multi-hop ad-hoc links. We propose two multi-channel routing protocols. The first is based on single-path routing and aims at suppressing the intra

Indoor Localization: Technology That Can Save First Responder Lives

December 1, 2007
Author(s)
Nader Moayeri, Camillo A. Gentile, Kamran Sayrafian, Michael R. Souryal
Every year a number of first responders lose their lives while battling fires or rescuing civilians during such emergencies. Indoor localization or location tracking roughly provides the same capability inside buildings that GPS does outdoors. It allows a

DSR-Based Directional Routing Protocol for Ad Hoc Networks

November 14, 2007
Author(s)
Bin Hu, Hamid Gharavi
In this paper, a Dynamic Source Routing (DSR)-based directional routing protocol is invoked for wireless ad hoc networks using directional antennas. This is designed to balance the trade-off between co-channel interferences from nodes hops away, and the

Information Technology Laboratory Brochure

October 24, 2007
Author(s)
Elizabeth B. Lennon
This brochure describes the programs of the Information Technology Laboratory (ITL). Following a letter from the ITL Director, ITL's nine programs are described, and ITL's mission, core competencies, resources, products, and customers are given, followed
Was this page helpful?