Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1551 - 1575 of 2282

Results of Some Applications using IEEE 802.15.4

October 1, 2005
Author(s)
David E. Cypher
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

RFID-Assisted Localization and Communications for First Responders

October 1, 2005
Author(s)
Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Soft Decision Metrics for Turbo-Coded FH M-FSK Ad Hoc Packet Radio Networks

October 1, 2005
Author(s)
B M. Peric, Michael R. Souryal, E G. Larsson, B R. Vojcic
This paper addresses turbo-coded non-coherent FH M-FSK ad hoc networks with a Poisson distribution of interferers where multiple access interference can be modeled as symmetric a-stable (SaS) noise and a is inversely proportional to the path loss exponent

Strategic Directions in Information and Knowledge Management

October 1, 2005
Author(s)
Stephen Quirolgico
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal

The Mobicents Open SLEE Platform: Architecture, Implementation, and Programming

October 1, 2005
Author(s)
Mudumbai Ranganathan, I Ivanov, Francesco Moggia
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal

Unsupervised Anomaly Detection System Using Next-Generation Router Architecture

October 1, 2005
Author(s)
Richard A. Rouil, Nicolas Chevrollier, Nada T. Golmie
Unlike many intrusion detection systems that rely mostly on labeled training data, we propose a novel technique for anomaly detection based on unsupervised learning and we apply it to counter denial-of-service attacks. Initial simulation results suggest

Wireless Enhancements for Storage Area Networks

October 1, 2005
Author(s)
David W. Griffith, Kotikalapudi Sriram, J Gao, Nada T. Golmie
We propose the creation of a wireless storage area network (SAN) and analyze its benefits. The proposed wireless SAN (WSAN) consists of a SAN switch that is connected to multiple wireless access points (APs) that communicate with the storage devices. This

The Exact Multiplicative Complexity of the Hamming Weight Function

September 13, 2005
Author(s)
Rene C. Peralta, Joan Boyar
We consider the problem of computing the Hamming weight of an n-bit vector using a circuit with gates for addition and multiplication modulo 2 (alternatively, XOR and conjunction gates) only. The number of multiplications necessary and sufficient to build

Indoor Positioning Using Spatial Spectrum

September 7, 2005
Author(s)
Kamran Sayrafian
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Analysis of EIED Backoff Algorithm for the 802.11 DCF

September 1, 2005
Author(s)
N-O Song, B-J Kwak, Leonard E. Miller
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Enhanced Schemes for L2 Handover in IEEE 802.11 Networks and their Evaluations

September 1, 2005
Author(s)
Nicolas Montavont, Nicolas Montavont, T Noel
Given the relatively limited coverage area of 802.11 access points, stations moving inside WLAN are often required to perform a handover. The time needed for a STA to switch from one AP to another is too long for real-time applications to continue

Overview of the TREC 2004 Novelty Track

August 1, 2005
Author(s)
Ian M. Soboroff
TREC 2004 marks the third and final year for the Novelty Track. The task is as follows: Given a TREC topic and an ordered list of documents, systems must find relevant and novel sentences that should be returned to the user from this set. This task

Overview of the TREC 2004 Question Answering Track

August 1, 2005
Author(s)
Ellen M. Voorhees
The TREC 2004 Question Answering track contained a single task in which question series were used to define a set of targets. Each series contained factoid and list questions and related to a single target. The final question in the series was an Other

Overview of the TREC 2004 Robust Retrieval Track

August 1, 2005
Author(s)
Ellen M. Voorhees
The robust retrieval track explores methods for improving the consistency of retrieval technology by focusing on poorly performing topics. The retrieval task in the track is a traditional ad hoc retrieval task where the evaluation methodology emphasizes a

Overview of TREC 2004

August 1, 2005
Author(s)
Ellen M. Voorhees
This report provides an overview of the thirteenth Text REtrieval Conference, TREC 2004. TREC 2004 was held at the National Institute of Standards and Technology (NIST) November~16--19, 2004. The conference was co-sponsored by NIST, the U.S. Department of

A Review of Current Research Work on BGP Security

July 1, 2005
Author(s)
Kotikalapudi Sriram
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal

Application of Beamforming in Wireless Location Estimation

July 1, 2005
Author(s)
Kamran Sayrafian
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Comments on IEEE 802.21, IEEE 802.21-05-0289, San Francisco, CA

July 1, 2005
Author(s)
Nicolas Montavont, Richard A. Rouil, Nada T. Golmie
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal

Deploying Wireless PANs and LANs for eHealth

July 1, 2005
Author(s)
Nada T. Golmie
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. Majority of prior studies of multimodal

Evaluation of Indoor Localization Techniques

July 1, 2005
Author(s)
Camillo Gentile, Kamran Sayrafian, Nader Moayeri
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled
Was this page helpful?