An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Bluetooth is a cable replacement technology for Wireless Personal Area Networks. It is designed to support a wide variety of applications such as voice, streamed audio and video, web browsing, printing, and file sharing, each imposing a number of quality
It is expected that GMPLS-based recovery could become a viable option for obtaining faster restoration than layer 3 rerouting. Even though dedicated restoration ensures restorability of connections, exclusive use of dedicated scheme would result in wasting
Traditional approaches to network provisioning assume availability of the reliable estimates for the expected demands. This assumption, however, oversimplifies many practical situations when some incomplete information on the expected demands is available
Finding shortest feasible paths in a weighted graph has numerous applications including admission and routing in communication networks. This paper discusses a game theoretic framework intended to incorporate a concept of path stability into the process of
The Internet is evolving from best-effort service toward an integrated or differentiated service framework with Quality-of-Service (QoS) assurances that are required for new multimedia service applications. Given this increasing demand for high bandwidth
A major challenge for the WLAN technology stems from having to share the 2.4 GHz ISM band with other wireless devices such as Bluetooth radios. The main goal of this paper is to investigate the use of techniques to mitigate the effects of interference for
High-capacity optical-fiber backbone networks protect information flows belonging to their premium customers by routing two copies of the customer's data over disjoint paths. This scheme, known as 1+1 protection, ensures that the customer will experience
John M. Martinis, Sae Woo Nam, Joe Aumentado, Kristine Lang, C Urbina
We calculate for the current-biased Josephson junction the decoherence of the qubit state from noise and dissipation. The effect of dissipation can be entirely accounted for through a noise model of the current bias that appropriately includes the effect
This paper proposes a framework for optimized multipath routing in a wireless network with frequently changing topology. The topology changes may be due to node mobility in mobile ad hoc networks, or limited node reliability and power supply in sensor
Biometric technologies are becoming the foundation of an array of highly secure identification and verification solutions. Over the past eighteen months, the U.S has quickly worked to establish formal standards groups for accelerating and harmonizing the
Mobile Ad-Hoc Networks provide the means to reduce significantly the power required for routing from source to destination through multi-hops between other nodes in the network. In the presence of mobility, only continuous updating can guarantee routes
The calculation of two-hop connectivity between two terminals for randomly deployed wireless networks requires the joint probability distribution of the distances between these terminals and the terminal that is acting as a relay. In general the distances
Distributed computing environments require strategies by which components can detect and recover from failures in remote, collaborating components. Many protocols for distributed systems employ a strategy based on leases, which grant a leaseholder with
The recent establishment of the International Organization for Standardization/International Electrotechnical Commission Joint Technical Committee 1/Subcomittee 37 (ISO/IEC JTC 1/SC 37) on Biometrics is a major development in international standardization
This paper aims to improve current understanding of the correlation structure of traffic carried over large networks, such as the Internet. To achieve this aim we use simulation, adopting a methodology of homogenization to achieve a sufficiently large
This paper presents a master-slave cluster based mobile ad-hoc network architecture for multihop communications using the IEEE 802.11 system. The proposed architecture is a mixture of two different types of networks: managed (master-and-slave) and ad-hoc
This paper demonstrates that, for large-scale tests, the match and non-match similarity scores have no specific underlying distribution function. The forms of these distribution functions require a nonparametric approach for the analysis of the fingerprint
As GMPLS and its supporting set of protocols develop into a viable control plane for optical networks, an important function that they will need to support will be the restoration and protection function that has been a major feature of legacy optical
Complex systems, such as manufacturing supply chains, are often modeled as a collection of interacting components with information flows between them. These components are frequently responsible for making a wide range of decisions that are implemented
This paper was inspired by preliminary discussions between NIST and members of the healthcare community who are impacted by the use of emerging information technology. Topics of discussion included the current state of standards work in the healthcare
Recently, we proposed an ad-hoc, cluster-based, multihop network architecture for video communications using IEEE 802.11 FHSS (Frequency Hopping Spread Spectrum) wireless LAN technology with 2GFSK (2-level Gaussian Frequency Shift Keying) modulation
We have previously developed a distributed routing algorithm which minimizes the number of overhead messages necessary to maintain the minimum-power multi-hop routes in a mobile ad-hoc network, assuming a piece-wise linear model for the motion of the nodes
Timothy Grance, Joan Hash, Steven Peck, Jonathan Smith, Karen Korow-Diks
The Security Guide for Interconnecting Information Technology Systems provides guidance for planning, establishing, maintaining, & terminating interconnections between information technology (IT) systems that are owned & operated by different organizations
Today, much of our information-intensive work is carried out at desktop computer workstations; however, increasingly people work and live on the move. Very soon, scads of small information processing appliances will be carried along from place to place as