Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

News and Updates

Projects and Programs

5G/6G Core Networks and Services

Ongoing
The main tasks of this program are: Task 1: 6G Core Network Architecture: I nvestigating AI-native architectures that not just execute AI/ML-based network functions but also support the creation, management, cooperation, measurement, and evolution of these functions. Task 2: Key Technologies Task 2

Asynchronous Cooperative Linear Dispersion Coding

Completed
The space–time block coding (STBC) techniques provide full spatial diversity in the context of collocated multiple-input–multiple-output (MIMO) systems, requiring reliable wireless communications at high rates. However, it may not always be practical to accommodate multiple antennas at the mobile

Cooperative Diversity Routing and Transmission for Wireless Sensor Networks

Completed
In order to address the challenges of cooperation, PHY layer cooperation schemes were proposed and, to a limited extent, medium access control (MAC) layer schemes. On the network layer, the network coding techniques can be viewed as a form of cooperation as well. To the best of our knowledge, there

Cooperative Single-Carrier FDMA Communications

Completed
The worldwide growth in both the number of mobile subscribers and their demand for increased rate mobile broadband services provided further impetus for the mobile telecommunication operators to improve both the capacity and the reliability of cellular networks. When communicating over broadband

Publications

Mobile Device Security: Bring Your Own Device (BYOD)

Author(s)
Gema Howell, Katie Boeckl, Nakia R. Grayson, Naomi Lefkovitz, Jason Ajmo, R. Eugene Craft, Milissa McGinnis, Kenneth Sandlin, Oksana Slivina, Julie Snyder, Paul Ward
Many organizations provide employees the flexibility to use their personal mobile devices to perform work-related activities. An ineffectively secured personal
Was this page helpful?