Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1076 - 1100 of 1204

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver

November 30, 2008
Author(s)
Michael R. Souryal, Huiqing You
We propose a non-coherent receiver for the fixed detect-and-forward relay channel and derive a closed-form tight upper bound on its bit error probability in Rayleigh fading channels. Using this upper bound, we show that the receiver achieves nearly full

Non-Coherent Amplify-and-Forward Generalized Likelihood Ratio Test Receiver

November 30, 2008
Author(s)
Michael R. Souryal
This paper proposes a simple non-coherent amplify-and-forward receiver for the relay channel and evaluates its diversity performance for Rayleigh fading channels. We use the generalized likelihood ratio test to obtain the decision rule in closed form

Performance Evaluation of a Secure Mac Protocol for Vehicular Networks

November 17, 2008
Author(s)
Yi Qian, Kejie Lu, Nader Moayeri
The main benefit of vehicular communication is seen in active safety systems that increase passenger safety by exchanging warning messages between vehicles. Other applications and private services are also permitted in order to lower the cost and to

Using the EAP Framework for Fast Media Independent Handover Authentication

November 17, 2008
Author(s)
Antonio Izquierdo Manzanares, Nada T. Golmie, Katrin Hoeper, Lidong Chen
In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover, namely, re-authentication and pre-authentication. We provide a detailed analysis of each mechanism, and

Forensic Filtering of Cell Phone Protocols

August 27, 2008
Author(s)
Aurelien M. Delaitre, Wayne Jansen
Phone managers are non-forensic software tools designed to carry out a range of tasks for the user, such as reading and updating the contents of a phone, using one or more of the communications protocols supported by the phone. Phone managers are sometimes

Wireless Communications in Tunnels for Urban Search and Rescue Robots

August 18, 2008
Author(s)
Catherine A. Remley, George Hough, Galen H. Koepke, Dennis G. Camell, Robert Johnk, Chriss A. Grosvenor
We report on propagation tests carried out in a subterranean tunnel to support improved wireless communications for urban search and rescue robots. We describe single-frequency and ultrawideband channel-characterization tests that we conducted, as well as

Attenuation of Radio Wave Signals Coupled Into Twelve Large Building Structures

August 1, 2008
Author(s)
Christopher L. Holloway, William F. Young, Galen H. Koepke, Catherine A. Remley, Dennis G. Camell, Yann Becquet
In this report, we investigate radio communication problems faced by emergency responders (firefighters, police and emergency medical personnel) in disaster situations. A fundamental challenge to communications into and out of large buildings is the strong
Displaying 1076 - 1100 of 1204
Was this page helpful?