Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1676 - 1700 of 2282

Building an Information Technology Security Awareness and Training Program

October 1, 2003
Author(s)
Mark Wilson, Joan Hash
NIST Special Publication 800-50, Building An Information Technology Security Awareness and Training Program, provides guidance for building an effective information technology (IT) security program and supports requirements specified in the Federal

A Link-Level Simulator of the CDMA2000 Reverse-Link Layer

August 1, 2003
Author(s)
Hamid Gharavi, R Wyatt-Millington, F Chin, K Ban
This paper presents the design and implementation of a simulation model for the cdma2000 reverse link. The model includes all the radio configurations and their corresponding data rates in accordance with the IS-2000 specifications. The paper first

A Link-Level Simulator of the cdma2000 Reverse-Link Physical Layer

August 1, 2003
Author(s)
Hamid Gharavi, F Chin, K Ban, R Wyatt-Millington
The cdma2000 system is an evolutionary enhancement of the IS-95 standards which support 3G services defined by the International Telecommunications Union(ITU). cdma2000 comes in two phases: 1XRTT and 3XRTT (1X and 3X indicatesthe number of 1.25 MHz wide

Multihop Sensor Network Design for Wideband Communications

August 1, 2003
Author(s)
Hamid Gharavi, K Ban
This paper presents a master/slave cellular based mobile ad-hoc network architecture for multihop multimedia communications. The proposed network is based on a new paradigm for solving the problem of cluster-based ad-hoc routing when utilizing existing

On the Stability of Exponential Backoff

August 1, 2003
Author(s)
N-O Song, B-J Kwak, Leonard E. Miller
New analytical results are given for the stability and performance of the exponential backoff (EB) algorithm. Previous studies on the stability of the (binary) EB have produced contradictory results instead of a consensus: some proved instability, others

Government Smart Card Interoperability Specification, Version 2.1

July 16, 2003
Author(s)
Teresa T. Schwarzhoff, James F. Dray Jr., John P. Wack, Eric Dalci, Alan H. Goldfine, Michaela Iorga
This Government Smart Card Interoperability Specification (GSC-IS) provides solutions to a number of the interoperability challenges associated with smart card technology. The original version of the GSC-IS (version 1.0, August 2000) was developed by the

ASSET: Security Assessment Tool for Federal Agencies

June 1, 2003
Author(s)
Elizabeth B. Lennon
This ITL Bulletin describes the features and capabilities of the Automated Security Self-Evaluation Tool (ASSET), ITL's governmentwide IT security assessment tool. ASSET automates the completion of the security questionnaire in NIST Special Publication 800

Banishing Quasiparticles From Josephson-Junction Qubits: Why and How To Do It

June 1, 2003
Author(s)
Kristine Lang, Sae Woo Nam, Joe Aumentado, John M. Martinis, C Urbina
Current-biased Josephson junctions are prime candidates for the implementation of quantum bits; however, a present limitation is their coherence time. In this paper we qualitatively describe the role of quasiparticles in decoherence. We discuss two methods

Hierarachical Restoration Scheme for Multiple Failures in GMPLS Networks

May 12, 2003
Author(s)
Sanghun Lee, C Kim, David W. Griffith
It is expected that GMPLS-based recovery could become a viable option for obtaining faster restoration than layer 3 rerouting. Even though dedicated restoration ensures restorability of connections, exclusive use of dedicated scheme would result in wasting

Bluetooth Dynamic Scheduling and Interference Mitigation

May 1, 2003
Author(s)
Nada T. Golmie
Bluetooth is a cable replacement technology for Wireless Personal Area Networks. It is designed to support a wide variety of applications such as voice, streamed audio and video, web browsing, printing, and file sharing, each imposing a number of quality

Hierarchical Restoration Scheme for Multiple Failures in GMPLS Networks

May 1, 2003
Author(s)
San-Nan K. Lee, C Kim, David W. Griffith
It is expected that GMPLS-based recovery could become a viable option for obtaining faster restoration than layer 3 rerouting. Even though dedicated restoration ensures restorability of connections, exclusive use of dedicated scheme would result in wasting

Network Provisioning as a Game Against Nature

May 1, 2003
Author(s)
Vladimir V. Marbukh
Traditional approaches to network provisioning assume availability of the reliable estimates for the expected demands. This assumption, however, oversimplifies many practical situations when some incomplete information on the expected demands is available

On Shortest Random Walks under Adversarial Uncertainty

May 1, 2003
Author(s)
Vladimir V. Marbukh
Finding shortest feasible paths in a weighted graph has numerous applications including admission and routing in communication networks. This paper discusses a game theoretic framework intended to incorporate a concept of path stability into the process of

The Effect of Delay Mismatch in MPLS Networks Using 1+1 Protection

May 1, 2003
Author(s)
David W. Griffith, Sanghun Lee, L Krivulina
High-capacity optical-fiber backbone networks protect information flows belonging to their premium customers by routing two copies of the customer's data over disjoint paths. This scheme, known as 1+1 protection, ensures that the customer will experience

Decoherence of a Superconducting Qubit due to Bias Noise

March 25, 2003
Author(s)
John M. Martinis, Sae Woo Nam, Joe Aumentado, Kristine Lang, C Urbina
We calculate for the current-biased Josephson junction the decoherence of the qubit state from noise and dissipation. The effect of dissipation can be entirely accounted for through a noise model of the current bias that appropriately includes the effect

Biometric Standards -- A Key to a More Secure World

March 1, 2003
Author(s)
Michael D. Hogan, Fernando L. Podio
Biometric technologies are becoming the foundation of an array of highly secure identification and verification solutions. Over the past eighteen months, the U.S has quickly worked to establish formal standards groups for accelerating and harmonizing the

Expected Multi-Hop Power Consumption in Mobile Ad-Hoc Networks

March 1, 2003
Author(s)
Camillo A. Gentile
Mobile Ad-Hoc Networks provide the means to reduce significantly the power required for routing from source to destination through multi-hops between other nodes in the network. In the presence of mobility, only continuous updating can guarantee routes

Joint Distribution of Link Distances

March 1, 2003
Author(s)
Leonard E. Miller
The calculation of two-hop connectivity between two terminals for randomly deployed wireless networks requires the joint probability distribution of the distances between these terminals and the terminal that is acting as a relay. In general the distances
Was this page helpful?