NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
In heterogeneous wireless networks, there have been several efforts aimed at having mobile devices equipped with multiple interfaces connect optimally to the access network that minimizes their power consumption. However, a study of existing schemes notes
Interest in dense sensor networks due to falling prices and reduced size has motivated research in sensor location in recent years. To our knowledge, the algorithm which achieves the best performance in sensor location solves an optimization program by
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled
In heterogeneous wireless networks, there have been several efforts aimed at having mobile devices equipped with multiple interfaces connect optimally to the access network that minimizes their power consumption. However, a study of existing schemes notes
Simulating and understanding traffic dynamics in large networks present difficult challenges due to the complexity of such networks, coupled with limitations inherent in simulation modeling. Typically, simulation models used to study traffic dynamics
We developed an active polarization auto-compensation sub-system for fiber-based polarization-encoding QKD system. This sub-system helps to stabilize the system at high performance. The limitations are discussed and further improvements are proposed.
We study the correlation in the sifted key induced by the dead time of Geirger-mode avalanche-photodiodes (APDs) in quantum key distribution systems. A simultaneous holdoff of the APDs (SHA) technique eliminates these correlations.
This paper presents a feedback control scheme for transmission of video signals over mobile ad-hoc channels. The scheme is a combination of cross-layer (local) feedback and receiver feedback. The receiver feedback is based on the real time transport
We study the correlation in the sifted key induced by the dead time of Geirger-mode avalanche-photodiodes (APDs) in quantum key distribution systems. A simultaneous holdoff of the APDs (SHA) technique eliminates these correlations.
Cooperative transmission, in which a source and relay cooperate to send a message to a destination, can provide spatial diversity against fading in wireless networks. We derive analytical expressions for the error probability of amplify-and-forward (AF)
Alan Mink, Xiao Tang, Lijun Ma, Anastase Nakassis, Barry J. Hershman, Joshua C. Bienfang, David H. Su, Ronald F. Boisvert, Charles W. Clark, Carl J. Williams
NIST has developed a high-speed quantum key distribution (QKD) test bed incorporating both free-space and fiber systems. These systems demonstrate a major increase in the attainable rate of QKD systems: over two orders of magnitude faster than other
Source direction estimation inside building is a difficult and challenging task due to severe multipath signal propagation. Numerous algorithms and techniques exist that provide high-resolution direction estimation under certain conditions and channel
Kotikalapudi Sriram, Douglas Montgomery, Oliver Borchert, Okhee Kim, D. Richard Kuhn
BGP peering session attacks are known to drive routes into route flap damping (RFD) suppression states and thus cause isolations between autonomous systems (ASes) and destinations. We present a detailed study of the impact of BGP peering session attacks
Alan Mink, Xiao Tang, Lijun Ma, Anastase Nakassis, Barry J. Hershman, Joshua Bienfang, David H. Su, Ronald Boisvert, Charles W. Clark, Carl J. Williams
NIST has developed a high-speed quantum key distribution (QKD) test bed incorporating both free-space and fiber systems. These systems demonstrate a major increase in the attainable rate of QKD systems: over two orders of magnitude faster than other
Anastase Nakassis, Joshua Bienfang, P. Johnson, Alan Mink, D. Rogers, Xiao Tang, Carl J. Williams
Quantum cryptography asserts that shared secrets can be established over public channels in such a way that the total information of an eavesdropper can be made arbitrarily small with probability arbitrarily close to 1. As we will show below, the current
Michael R. Souryal, Luke Klein-Berndt, Leonard E. Miller, Nader Moayeri
This paper presents the empirical results and analysis of a link variability study for an indoor, stationary 802.11 network subject to external interference. The objective is to characterize the relationships between the packet loss rate on a link and the
David E. Cypher, Nicolas Chevrollier, Nicolas Montavont, Nada T. Golmie
The objectives of this article are to survey the benefits and challenges that poise the deployment and operation of wireless communications in support of healthcare networks. While the main advantages of wireless communications remain to provide ubiquitous
Vincent M. Stanford, C. Rochet, Martial Michel, John S. Garofolo
Properly designed reference data and performance metrics can offer crucial aid to developers of advanced statistical recognition technologies. We focus here on audio data acquisition from close-talk, near field, and far field sensors, and upon its
Leonard E. Miller, Perry F. Wilson, Nelson P. Bryner, Michael H. Francis, Jeffrey R. Guerrieri, D W. Stroup, Luke Klein-Berndt
An indoor localization and communication project is described that proposes to use RFID tags, placed in the building beforehand, as navigation waypoints for an inertial navigation system carried by a first responder. The findings from the first year of the
Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Haolang Xu, Barry J. Hershman, Carl J. Williams, Joshua Bienfang, David H. Su, Ronald Boisvert, Charles W. Clark
Charles D. Fenimore, J Irvine, D Cannon, John W. Roberts, A Aviles, S Israel, Michelle Brennan, L Simon, J Miller, Donna Haverkamp, P F. Tighe, Michael Gross
The development of a motion imagery (MI) quality scale, akin to the National Image Interpretibility Rating Scale (NIIRS) for still imagery, would have great value to designers and users of surveillance and other MI systems. A multi-phase study has adopted
The objective of system security planning is to improve protection of information system resources. All federal systems have some level of sensitivity and require protection as part of good management practice. The protection of a system must be documented
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal