Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1726 - 1750 of 2269

Pilot-Assisted 16-Level QAM for Wireless Video

February 1, 2002
Author(s)
Hamid Gharavi
This paper presents a twin-class transmission system for narrowband radio access channels suitable for handheld video phone and multimedia portable PC applications. The transmission system is comprised of a hierarchical 16-QAM modulation technique and a

Modeling CPU Demand in Heterogeneous Active Networks

January 1, 2002
Author(s)
V Galtier, Kevin L. Mills, Y Carlinet
tive-network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, application-specific processing can be applied to network traffic. To use such technology safely and

Predicting and Controlling Resource Usage in a Heterogenous Active Network

January 1, 2002
Author(s)
V Galtier, Kevin L. Mills, Y Carlinet, S Bush, A Kulkarni
Active network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, inhomogeneous processing can be applied to network traffic. To use such technology safely and efficiently

Video Transmission for Multi-Hop Networks Using IEEE 802.11 FHSS

January 1, 2002
Author(s)
K Ban, Hamid Gharavi
In many applications such as construction, manufacturing, ground robotic vehicles, and rescue operations, there are many issues that necessitate the capability of transmitting digital video and that such transmissions should be performed wirelessly and in

Segmentation for Robust Tracking in the Presence of Severe Occlusion

December 3, 2001
Author(s)
Camillo A. Gentile, M Sznaier, O Camps
Tracking an object in a sequence of images can fail due to partial occlusion or clutter. Robustness can be increased by tracking a set of parts, provided that a suitable set can be identified. In this paper we propose a novel segmentation, specifically

2001 ITL Technical Accomplishments

December 1, 2001
Author(s)
Elizabeth B. Lennon, M Helfer
This report presents the achievements and highlights of NIST¿s Information Technology Laboratory during FY2001. Following the Director¿s Foreword and the ITL overview, technical projects in ITL focus areas are described, followed by services to NIST

Hybrid Fractal Zerotree Wavelet Image Coding

December 1, 2001
Author(s)
R E. Van Dyck, T Kim, D J. Miller
In this paper, a hybrid fractal zerotree wavelet (FZW) image coding algorithm is proposed. The algorithm couples a zerotree-based encoder, such as the embedded zerotree wavelet (EZW) coder or set partitioning in hierarchical trees, and a fractal image

Predicting Resource Demand in Heterogeneous Active Networks

December 1, 2001
Author(s)
V Galtier, Kevin L. Mills, Y Carlinet, S Bush, A Kulkarni
Recent research, such as the Active Virtual Network Management Prediction (AVNMP) system, aims to use simulation models running ahead of real time to predict resource demand among network nodes. If accurate, such predictions can be used to allocate network

Segmentation for Robust Tracking in the Presence of Severe Occlusion

December 1, 2001
Author(s)
Camillo Gentile, M Sznaier, O Camps
Tracking an object in a sequence of images can fail due to partial occlusion or clutter. Robustness can be increased by tracking a set of ¿parts¿, provided that a suitable set can be identified. In this paper we propose a novel segmentation, specifically

Underlying Technical Models for Information Technology Security

December 1, 2001
Author(s)
G Stoneburner
Underlying Technical Models for Information Technology Security provides a description of the technical foundations, termed models, that underlie secure information technology (IT). The intent is to provide, in a concise form, the models that should be

Video Transmission for Third Generation Mobile Communication Systems

December 1, 2001
Author(s)
Hamid Gharavi
This paper presents a method of transmitting video over the cdma2000 mobile systems. In this method, the video bit-stream, after splitting, is transmitted via the supplemental channels of the cdma2000 reverse link. The method takes advantage of the direct

Interference Aware Bluetooth Packet Scheduling

November 1, 2001
Author(s)
Nada T. Golmie, Nicolas Chevrollier, I El bakkouri
Bluetooth is a radio technology for Wireless Personal Area Networks operating in the 2.4 GHz ISM band. Since both Bluetooth and IEEE 802.11 devices use the same frequency band and may likely come together in a laptop or may be close together at a desktop

Techniques to Improve Bluetooth Performance in Interference Environments

October 1, 2001
Author(s)
Nada T. Golmie, Nicolas Chevrollier
Bluetooth is a radio technology for Wireless Personal Area Networks operating in the 2.4 GHz ISM band. Since both Bluetooth and IEEE 802.11 devices use the same frequency band and may likely come together in a laptop or may be close together at a desktop

An Improved Voronoi-Diagram-Based Neural Net for Pattern Classification

September 12, 2001
Author(s)
Camillo A. Gentile, M Sznaier
In this brief paper, we propose a novel two-layer neural network to answer a point query in Rn which is partitioned into polyhedral regions. Such a task solves among others nearest neighbor clustering. As in previous approaches to the problem, our design

Needs and Research Directions in Human-Robot Interactive Systems

September 12, 2001
Author(s)
V Lumelsky, Jean C. Scholtz
The advantages of using robotic systems will only be realized if non-experts in robotics are able to use the systems. This paper outlines some directions needed for research in human-robot interaction (HRI).
Was this page helpful?