Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1701 - 1725 of 2269

A New Analytical Model of Shared Backup Path Provisioning in GMPLS Networks

July 1, 2002
Author(s)
Sanghun Lee, David W. Griffith, N-O Song
As GMPLS and its supporting set of protocols develop into aviable control plane for optical networks, an important function that they will need to support will be the protection and restoration function that has been a major feature of legacy optical

Document Understanding Conferences Website

July 1, 2002
Author(s)
Ellen M. Voorhees
This paper demonstrates that, for large-scale tests, the match and non-match similarity scores have no specific underlying distribution function. The forms of these distribution functions require a nonparametric approach for the analysis of the fingerprint

Quantum Computing and Communication

June 28, 2002
Author(s)
Paul E. Black, David R. Kuhn, Carl J. Williams
A quantum computer, if built, will be to an ordinary computer as a hydrogen bomb is to gunpowder, at least for some types of computations. Today no quantum computer exists, beyond laboratory prototypes capable of solving only tiny problems, and many

Measuring the Impact of Information on Complex Systems

June 1, 2002
Author(s)
Larry H. Reeker, Albert W. Jones
The application of power-driven machinery to manufacturing and other areas of human endeavor characterized the Industrial Revolution in the 18th and 19th centuries. Measurement contributed in many ways to the increasing economic influence of these machines

Modeling CPU Demand in Heterogeneous Active Networks

June 1, 2002
Author(s)
V Galtier, Kevin L. Mills, Y Carlinet
Active-network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, application-specific processing can be applied to network traffic. To use such technology safely and

Video Transmission for 3G Mobile Communication Systems

June 1, 2002
Author(s)
Hamid Gharavi, K Ban
This paper presents the design and implementation of a mobile ad-hoc network for video communications. The network architecture is based on cluster-to-cluster operation using IEEE 802.11b FHSS (Frequency Hopping Spread Spectrum). FHSS is considered to

Kinetic Spanning Trees for Minimum-Power Routing in MANETS

May 30, 2002
Author(s)
Camillo Gentile, R E. Van Dyck
A distributed kinetic spanning tree algorithm is proposed for routing in wireless mobile ad hoc networks. Assuming a piecewise linear motion model for the nodes, the sequence of shortest-path spanning trees is determined, valid until the time of the next

Dynamic Expansion of M:N Protection Groups in GMPLS Optical Networks

May 1, 2002
Author(s)
David W. Griffith, Sanghun Lee
In order to provide reliable connections across metropolitan and wide-area optical networks, the network operator must provide some degree of redundancy so that traffic can be switched from damaged working paths to backup paths that are disjoint from the

IEEE 802.11 FHSS Receiver Design for Multihop Sensor Application

May 1, 2002
Author(s)
K Ban, Hamid Gharavi
This paper presents a receiver design for IEEE 802.11 FHSS (Frequency-Hopping Spread-Spectrum) wireless local area network systems. 802.11 FHSS systems support two basic data rates. 1 Mbps and 2 Mbps systems employ 2GFSK (Gaussian Frequency Shift Keying)

Video Transmission for Multi-Hop Networks Using IEEE 802.11 FHSS

May 1, 2002
Author(s)
K Ban, Hamid Gharavi
In many applications such as construction, manufacturing, ground robotic vehicles, and rescue operations, there are many issues that necessitate the capability of transmitting digital video and that such transmissions should be performed wirelessly and in

QoS Routing Under Adversarial Binary Uncertainty

April 1, 2002
Author(s)
Vladimir V. Marbukh
A cost-based admission control and routing scheme admits an arriving request on the minimum cost route if this cost does not exceed the cost of the request, and rejects the request otherwise. Cost based strategies naturally arise as a result of

A New Analytical Model of Shared Backup Path Provisioning in GMPLS Networks

March 31, 2002
Author(s)
San-Nan K. Lee, David W. Griffith, N-O Song
As GMPLS and its supporting set of protocols develop into a viable control plane for optical networks, an important function that they will need to support will be the protection and restoration function that has been a major feature of legacy optical

Knowledge-Based Automation of a Design Method for Concurrent Systems

March 1, 2002
Author(s)
Kevin L. Mills, H Gomaa
This paper describes a knowledge-based approach to automate a software design method for concurrent and real-time systems. The approach uses multiple paradigms to represent knowledge embedded within the design method. Semantic data modeling provides the
Was this page helpful?