NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
For a wireless LAN or a cluster of nodes in an ad hoc wireless network, multicast transmissions from a controlling station must be acknowledged by the nodes that are addressed. To ensure reliable reception at all the nodes, the multicast packet may be
In order to provide reliable connections across metropolitan and wide-area optical networks, the network operator must provide some degree of redundancy so that traffic can be switched from damaged working paths to backup paths that are disjoint from the
We propose a neural network to answer a point query in Rn partitioned based on the Voronoi diagram. Our novel design offers the potential to reduce both the number of neurons and connection weights of previous designs, employing a cost function which
This paper presents a receiver design for IEEE 802.11 FHSS (Frequency-Hopping Spread-Spectrum) wireless local area network systems. 802.11 FHSS systems support two basic data rates. 1 Mbps and 2 Mbps systems employ 2GFSK (Gaussian Frequency Shift Keying)
This paper presents the design and implementation of a mobile ad-hoc network for video communications. The network architecture is based on cluster-to-cluster operation using IEEE 802.11b FHSS (Frequency Hopping Spread Spectrum). FHSS is considered to
In many applications such as construction, manufacturing, ground robotic vehicles, and rescue operations, there are many issues that necessitate the capability of transmitting digital video and that such transmissions should be performed wirelessly and in
A cost-based admission control and routing scheme admits an arriving request on the minimum cost route if this cost does not exceed the cost of the request, and rejects the request otherwise. Cost based strategies naturally arise as a result of
As GMPLS and its supporting set of protocols develop into a viable control plane for optical networks, an important function that they will need to support will be the protection and restoration function that has been a major feature of legacy optical
In recent years, access to multimedia data has become much easier due to the rapid growth of the Internet. While this is usually considered an improvement of everyday life, it also makes unauthorized copying and distributing of multimedia data much easier
This paper describes a knowledge-based approach to automate a software design method for concurrent and real-time systems. The approach uses multiple paradigms to represent knowledge embedded within the design method. Semantic data modeling provides the
This paper presents a twin-class transmission system for narrowband radio access channels suitable for handheld video phone and multimedia portable PC applications. The transmission system is comprised of a hierarchical 16-QAM modulation technique and a
tive-network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, application-specific processing can be applied to network traffic. To use such technology safely and
V Galtier, Kevin L. Mills, Y Carlinet, S Bush, A Kulkarni
Active network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, inhomogeneous processing can be applied to network traffic. To use such technology safely and efficiently
Christopher E. Dabrowski, Kevin L. Mills, J R. Elder
Current trends suggest future software systems will comprise collections of components that combine and recombine dynamically in reaction to changing conditions. Service-discovery protocols, which enable software components to locate available software
In many applications such as construction, manufacturing, ground robotic vehicles, and rescue operations, there are many issues that necessitate the capability of transmitting digital video and that such transmissions should be performed wirelessly and in
Tracking an object in a sequence of images can fail due to partial occlusion or clutter. Robustness can be increased by tracking a set of parts, provided that a suitable set can be identified. In this paper we propose a novel segmentation, specifically
This report presents the achievements and highlights of NIST¿s Information Technology Laboratory during FY2001. Following the Director¿s Foreword and the ITL overview, technical projects in ITL focus areas are described, followed by services to NIST
Current trends suggest that future software components will need to discover and adapt to dynamic changes in available software services and network connections. This implies that future systems may appear as collections of components that combine and
The evaluation of existing and future distributed sensor processing system concepts can be done well using simulation, provided that the simulation is faithful in representing both the medium in which the sensors interface with the phenomena that they
In this paper, a hybrid fractal zerotree wavelet (FZW) image coding algorithm is proposed. The algorithm couples a zerotree-based encoder, such as the embedded zerotree wavelet (EZW) coder or set partitioning in hierarchical trees, and a fractal image