An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The National Institute of Standards and Technology (NIST) high-speed quantum key distribution (QKD) system was designed to include custom hardware to support the generation and management of gigabit data streams. As our photonics improved our software
A simple technique to estimate the position of a mobile node inside a building is based on the Received Signal Strength (RSS). In a previous publication, we investigated the feasibility of using circular array antennas and beamforming in order to enable an
A flow-level Markov model for fair bandwidth sharing with packet retransmissions and random flow arrivals/departures is proposed. The model accounts for retransmissions by assuming that file transfer rates are determined by the end-to-end goodputs rather
Anoop Singhal, Theodore Winograd, Karen A. Scarfone
The advance of Web services technologies promises to have far-reaching effects on the Internet and enterprise networks. Web services based on the eXtensible Markup Language (XML), SOAP, and related open standards, and deployed in Service Oriented
The amount of control that an intelligent system has over their actions, whether they are able to act independently from their creator, plays a major factor in describing systems and in distinguishing them from each other. Different levels of autonomy
The problem of estimating a common intersection point from a collection of straight lines and of testing the hypothesis that such a point exists are considered. The relationship to the error-in-variables regression and to the intersection-union principle
D. Richard Kuhn, Kotikalapudi Sriram, Douglas Montgomery
This document introduces the Border Gateway Protocol (BGP), explains its importance to the internet, and provides a set of best practices that can help in protecting BGP. Best practices described here are intended to be implementable on nearly all
RF-based indoor positioning is a challenging task due to the harsh indoor propagation environment. Techniques based on the received signal strength are simple to implement and offer low cost and effective alternatives for some applications. The main
The falling price and reduced size of sensors for monitoring spatially-sensitive environmental properties such as temperature, light, sound, and vibration have motivated research in location algorithms in recent years. To our knowledge, the algorithm which
SuKyoung Lee, David W. Griffith, Kyungsoo Kim, Nada T. Golmie
One major challenge in the integration of wireless LAN (WLAN) and cellular networks is call admission control (CAC). Without a suitable CAC mechanism for the integrated network, the two networking systems will work independently and cannot simultaneously
.The Common Industry Specification for Usability - Requirements (CISU-R) helps usability professionals, product managers, and others working in product design and development to create usability requirements. It sets standards for specifying usability
Micro dynamics of large-scale communication networks is often described by a Markov process with a large number of locally interacting components. Due to astronomically high number of the Markov process states even for moderate-size networks, finding the
Michael R. Souryal, Johannes Geissbuehler, Leonard E. Miller, Nader Moayeri
When the range of single-hop wireless communication is limited by distance or harsh radio propagation conditions, relays can be used to extend the communication range through multihop relaying. This paper targets the need in certain scenarios for rapid
In this paper we present a 3-D object segmentation and motion estimation scheme of range video data for crash prevention applications. The segmentation is based on slope values of every point in the scene with which atomic regions are constructed by region
We show that the performance of a 1310-nm quantum key distribution (QKD) system with an up-conversion detector pumped at 1550 nm is comparable with or better than that of current 1550-nm QKD systems with 1310-nm pump detectors. The nonlinearly induced dark
Market-based compute grids encompass service providers offering limited resources to potential users with varying quality of service demands and willingness to pay. Providers face problems of pricing and allocating resources to maximize revenue. Previous
Bloom filters are a probabilistic data structure used to evaluate set membership. A group of hash functions are used to map elements into a Bloom filter and to test elements for membership. In this paper, we propose using multiple groups of hash functions
Tom T. Karygiannis, Bernard Eydt, Greg Barber, Lynn Bunn, T. Phillips
This publication seeks to assist organizations in understanding the risks of RFID technology and security measures to mitigate those risks. It provides practical, real-world advice on how to initiate, design, implement and operate RFID systems in a manner
In this paper, we present an innovative recursive motion estimation technique that can take advantage of the in-depth resolution (range) to perform an accurate estimation of objects that have undergone 3-D translational and rotational movements. This
In previous work, we established a linear programming framework to determine sensor location from measured link distances between neighboring nodes in a network. Besides providing greater accuracy compared to other techniques, linear programs in particular
The primary goal of this work is to extend two methodsof random effects models to multiparameter situation. These methods comprise the DerSimonian-Laird estimator, arising in the meta-analysis, and the Mandel-Paule algorithm widely used in interlaboratory
Advanced vehicle-based safety and warning systems use laser scanners to measure road geometry (position, curvature), and range to obstacles in order to warn a driver of an impending crash and/or to activate safety devices (air bags, brakes, steering). In