An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
In All-Optical Transport Networks (AOTN), fault survivability issues are quite similar to those encountered in electro-optic networks that regenerate signals at the network node. On the other hand, attack survivability issues concerning physical fiber
Christopher E. Dabrowski, Kevin L. Mills, J R. Elder
Current trends suggest future software systems will comprise collections of components that combine and recombine dynamically in reaction to changing conditions. Service-discovery protocols, which enable software components to locate available software
Christopher E. Dabrowski, Kevin L. Mills, J R. Elder
Current trends suggest future software systems will comprise collections of components that combine and recombine dynamically in reaction to changing conditions. Service-discovery protocols, which enable software components to locate available software
As GMPLS and its supporting set of protocols develop into aviable control plane for optical networks, an important function that they will need to support will be the protection and restoration function that has been a major feature of legacy optical
This paper demonstrates that, for large-scale tests, the match and non-match similarity scores have no specific underlying distribution function. The forms of these distribution functions require a nonparametric approach for the analysis of the fingerprint
Christopher E. Dabrowski, Kevin L. Mills, J R. Elder
Current trends suggest future software systems will comprise collections of components that combine and recombine dynamically in reaction to changing conditions. Service-discovery protocols, which enable software components to locate available software
A quantum computer, if built, will be to an ordinary computer as a hydrogen bomb is to gunpowder, at least for some types of computations. Today no quantum computer exists, beyond laboratory prototypes capable of solving only tiny problems, and many
The application of power-driven machinery to manufacturing and other areas of human endeavor characterized the Industrial Revolution in the 18th and 19th centuries. Measurement contributed in many ways to the increasing economic influence of these machines
Active-network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, application-specific processing can be applied to network traffic. To use such technology safely and
This paper presents the design and implementation of a mobile ad-hoc network for video communications. The network architecture is based on cluster-to-cluster operation using IEEE 802.11b FHSS (Frequency Hopping Spread Spectrum). FHSS is considered to
A distributed kinetic spanning tree algorithm is proposed for routing in wireless mobile ad hoc networks. Assuming a piecewise linear motion model for the nodes, the sequence of shortest-path spanning trees is determined, valid until the time of the next
We propose a neural network to answer a point query in Rn partitioned based on the Voronoi diagram. Our novel design offers the potential to reduce both the number of neurons and connection weights of previous designs, employing a cost function which
For a wireless LAN or a cluster of nodes in an ad hoc wireless network, multicast transmissions from a controlling station must be acknowledged by the nodes that are addressed. To ensure reliable reception at all the nodes, the multicast packet may be
In order to provide reliable connections across metropolitan and wide-area optical networks, the network operator must provide some degree of redundancy so that traffic can be switched from damaged working paths to backup paths that are disjoint from the
We propose a neural network to answer a point query in Rn partitioned based on the Voronoi diagram. Our novel design offers the potential to reduce both the number of neurons and connection weights of previous designs, employing a cost function which
This paper presents a receiver design for IEEE 802.11 FHSS (Frequency-Hopping Spread-Spectrum) wireless local area network systems. 802.11 FHSS systems support two basic data rates. 1 Mbps and 2 Mbps systems employ 2GFSK (Gaussian Frequency Shift Keying)
This paper presents the design and implementation of a mobile ad-hoc network for video communications. The network architecture is based on cluster-to-cluster operation using IEEE 802.11b FHSS (Frequency Hopping Spread Spectrum). FHSS is considered to
In many applications such as construction, manufacturing, ground robotic vehicles, and rescue operations, there are many issues that necessitate the capability of transmitting digital video and that such transmissions should be performed wirelessly and in
A cost-based admission control and routing scheme admits an arriving request on the minimum cost route if this cost does not exceed the cost of the request, and rejects the request otherwise. Cost based strategies naturally arise as a result of
As GMPLS and its supporting set of protocols develop into a viable control plane for optical networks, an important function that they will need to support will be the protection and restoration function that has been a major feature of legacy optical
In recent years, access to multimedia data has become much easier due to the rapid growth of the Internet. While this is usually considered an improvement of everyday life, it also makes unauthorized copying and distributing of multimedia data much easier
This paper describes a knowledge-based approach to automate a software design method for concurrent and real-time systems. The approach uses multiple paradigms to represent knowledge embedded within the design method. Semantic data modeling provides the