An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This paper presents a twin-class transmission system for narrowband radio access channels suitable for handheld video phone and multimedia portable PC applications. The transmission system is comprised of a hierarchical 16-QAM modulation technique and a
tive-network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, application-specific processing can be applied to network traffic. To use such technology safely and
V Galtier, Kevin L. Mills, Y Carlinet, S Bush, A Kulkarni
Active network technology envisions deployment of virtual execution environments within network elements, such as switches and routers. As a result, inhomogeneous processing can be applied to network traffic. To use such technology safely and efficiently
Christopher E. Dabrowski, Kevin L. Mills, J R. Elder
Current trends suggest future software systems will comprise collections of components that combine and recombine dynamically in reaction to changing conditions. Service-discovery protocols, which enable software components to locate available software
In many applications such as construction, manufacturing, ground robotic vehicles, and rescue operations, there are many issues that necessitate the capability of transmitting digital video and that such transmissions should be performed wirelessly and in
Tracking an object in a sequence of images can fail due to partial occlusion or clutter. Robustness can be increased by tracking a set of parts, provided that a suitable set can be identified. In this paper we propose a novel segmentation, specifically
This report presents the achievements and highlights of NIST¿s Information Technology Laboratory during FY2001. Following the Director¿s Foreword and the ITL overview, technical projects in ITL focus areas are described, followed by services to NIST
Current trends suggest that future software components will need to discover and adapt to dynamic changes in available software services and network connections. This implies that future systems may appear as collections of components that combine and
The evaluation of existing and future distributed sensor processing system concepts can be done well using simulation, provided that the simulation is faithful in representing both the medium in which the sensors interface with the phenomena that they
In this paper, a hybrid fractal zerotree wavelet (FZW) image coding algorithm is proposed. The algorithm couples a zerotree-based encoder, such as the embedded zerotree wavelet (EZW) coder or set partitioning in hierarchical trees, and a fractal image
In a mobile ad hoc network (MANET) for military or emergency applications, it is required to give priority to certain messages or message sources. In this paper, mechanisms are considered for implementing priority treatment of packets in a MANET using the
V Galtier, Kevin L. Mills, Y Carlinet, S Bush, A Kulkarni
Recent research, such as the Active Virtual Network Management Prediction (AVNMP) system, aims to use simulation models running ahead of real time to predict resource demand among network nodes. If accurate, such predictions can be used to allocate network
Tracking an object in a sequence of images can fail due to partial occlusion or clutter. Robustness can be increased by tracking a set of ¿parts¿, provided that a suitable set can be identified. In this paper we propose a novel segmentation, specifically
Underlying Technical Models for Information Technology Security provides a description of the technical foundations, termed models, that underlie secure information technology (IT). The intent is to provide, in a concise form, the models that should be
This paper presents a method of transmitting video over the cdma2000 mobile systems. In this method, the video bit-stream, after splitting, is transmitted via the supplemental channels of the cdma2000 reverse link. The method takes advantage of the direct
A noncoherent limiter-discriminator receiver is often considered for the Bluetooth system because of its simplicity and low cost. While its performance is more than adequate for some channels, the results are significantly degraded in either an
Nada T. Golmie, Nicolas Chevrollier, I El bakkouri
Bluetooth is a radio technology for Wireless Personal Area Networks operating in the 2.4 GHz ISM band. Since both Bluetooth and IEEE 802.11 devices use the same frequency band and may likely come together in a laptop or may be close together at a desktop
A noncoherent limiter-discriminator receiver is often considered for the Bluetooth system because of its simplicity and low cost. While its performance is more than adequate for some channels, the results are significantly degraded in either an
Bluetooth is a radio technology for Wireless Personal Area Networks operating in the 2.4 GHz ISM band. Since both Bluetooth and IEEE 802.11 devices use the same frequency band and may likely come together in a laptop or may be close together at a desktop
In this paper, we suggest a novel robust image coding and adaptive packetization algorithm suitable for very low bit rate transport. This algorithm can be applied to any zerotree-based encoder such as the embedded zerotree wavelet coder of Shapiro and set
In this brief paper, we propose a novel two-layer neural network to answer a point query in Rn which is partitioned into polyhedral regions. Such a task solves among others nearest neighbor clustering. As in previous approaches to the problem, our design
The advantages of using robotic systems will only be realized if non-experts in robotics are able to use the systems. This paper outlines some directions needed for research in human-robot interaction (HRI).