Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications by: Nada T. Golmie (Fed)

Search Title, Abstract, Conference, Citation, Keyword or Author
Displaying 101 - 125 of 162

Using the EAP Framework for Fast Media Independent Handover Authentication

November 17, 2008
Author(s)
Antonio Izquierdo Manzanares, Nada T. Golmie, Katrin Hoeper, Lidong Chen
In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover, namely, re-authentication and pre-authentication. We provide a detailed analysis of each mechanism, and

Timely Effective Handover Mechanism in Heterogeneous Wireless Networks

November 13, 2008
Author(s)
Sang J. Yoo, David E. Cypher, Nada T. Golmie
Next-generation wireless networks should be able to coordinate and integrate different communication systems. It has been a challenging problem to support a seamless handover in these diverse wireless network environments. Link level triggers can provide

QOS-Aware Channel Scanning for IEEE 802.11 Wireless LAN

September 15, 2008
Author(s)
Nada T. Golmie, Sang-Jo Yoo
Channel scanning is an important aspect of seamless handovers since it is required in order to find a target point of attachment (PoA). In the IEEE 802.11 WLAN, scanning of other channels causes service disruptions with the current AP so that the provided

A Call Admission Control Algorithm for WLAN in Heterogeneous Wireless Networks

June 25, 2007
Author(s)
SuKyoung Lee, David W. Griffith, Kyungsoo Kim, Nada T. Golmie
One major challenge in the integration of wireless LAN (WLAN) and cellular networks is call admission control (CAC). Without a suitable CAC mechanism for the integrated network, the two networking systems will work independently and cannot simultaneously

Adaptive Channel Scanning for IEEE 802.16e

October 23, 2006
Author(s)
Richard A. Rouil, Nada T. Golmie
In this article we propose an adaptive algorithm that determines the duration and frequency of channel scanning in order to facilitate the discovery of neighboring base stations and handovers across multiple IEEE 802.16 networks. The proposed algorithm

Unsupervised Anomaly Detection System Using Next-Generation Router Architecture

October 1, 2006
Author(s)
Richard A. Rouil, Nicolas Chevrollier, Nada T. Golmie
Unlike many intrusion detection systems that rely mostly on labeled training data, we propose a novel technique for anomaly detection based on unsupervised learning and we apply it to counter denial-of-service attacks. Initial simulation results suggest

Effective Link Triggers to Improve Handover Performance

September 11, 2006
Author(s)
Steve Woon, Nada T. Golmie, Y. A. Sekercioglu
Effective link layer triggering is key in order to enable fast and reliable handover across different access networks. In this paper, we investigate the use of signal strength as part of the trigger mechanism. We propose an analytical model to estimate the

Prevailing Over Wires in Healthcare Environments: Benefits and Challenges

April 1, 2006
Author(s)
David E. Cypher, Nicolas Chevrollier, Nicolas Montavont, Nada T. Golmie
The objectives of this article are to survey the benefits and challenges that poise the deployment and operation of wireless communications in support of healthcare networks. While the main advantages of wireless communications remain to provide ubiquitous

Handovers and Interference Mitigation in Healthcare Environments

October 17, 2005
Author(s)
Nicolas Chevrollier, Nicolas Montavont, Nada T. Golmie
In this article, we consider candidate wireless technologies such as IEEE 802.11b, and IEEE 802.15.4 that can support medical and healthcare informatics applications. The main questions that we try to answer are: (1) is there any potential for significant

An Efficient Power-Saving Mechanism for Integration of WLAN and WWAN Networks

October 1, 2005
Author(s)
San-Nan K. Lee, S H. Seo, Nada T. Golmie
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Handover and Interference Mitigation in Healthcare Environments

October 1, 2005
Author(s)
Nicolas Chevrollier, Nicolas Montavont, Nada T. Golmie
In this article, we consider candidate wireless technologies such as IEEE 802.11b, and IEEE 802.15.4 that can support medical and healthcare informatics applications. The main questions that we try to answer are: (1) is there any potential for significant

Performance Analysis of Low Rate Wireless Technologies for Medical Applications

October 1, 2005
Author(s)
Nada T. Golmie, David E. Cypher, O Rebala
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Protection Switching for Optical Bursts Using Segmentation and Deflection Routing

October 1, 2005
Author(s)
David W. Griffith, Kotikalapudi Sriram, Nada T. Golmie
Burst segmentation in OBS networks can significantly reduce the amount of data that is lost due to contention events by dropping or deflecting only the portion of a burst that overlaps another contending burst. In this letter, we demonstrate how

Resource Planning and Bandwidth Allocation in Hybrid Fiber-Coax Residential Networks

October 1, 2005
Author(s)
David W. Griffith, Kotikalapudi Sriram, L Krivulina, Nada T. Golmie
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled

Unsupervised Anomaly Detection System Using Next-Generation Router Architecture

October 1, 2005
Author(s)
Richard A. Rouil, Nicolas Chevrollier, Nada T. Golmie
Unlike many intrusion detection systems that rely mostly on labeled training data, we propose a novel technique for anomaly detection based on unsupervised learning and we apply it to counter denial-of-service attacks. Initial simulation results suggest