Author index
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Author | Session | Start page | Title |
---|---|---|---|
A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Abdelzaher, Tarek | MILCOM 2012 - Track 6: STC2.5 | Mining Diverse Opinions | |
Abo, Gavin | WSP14.4 | High-Efficiency Ferrite Meander Antenna (HEMA) for LTE Applications | |
Acosta, Jaime | CSTC2.5 | An Efficient Common Substrings Algorithm for On-the-Fly Behavior-Based Malware Detection and Analysis | |
CSTC4.5 | Survivability Prediction of Ad Hoc Networks Under Attack | ||
Adams, Wayne | SYS5.6 | Evaluation of the Expansion of Joint IP Modem to Support DVB-RCS2 | |
Adamson, Brian | NPP2.2 | Elastic Multicast for Tactical Communications | |
NPP2.1 | Temporal Stability for Dynamic Network Relay Sets | ||
NPP7.3 | Adaptive Routing for Tactical Communications | ||
Adebola, Eyidayo | NPP10.1 | Cross-Layer Throughput Optimization for Delay and QoS Constrained Applications | |
WSP15.6 | Some Remarks on the Dirac Delta Function Approximation for ASER Analysis of Digital Modulations Over Fading Channels | ||
Aghinii, Vasile | SYS1.4 | How to Evaluate SOTM Antennas, Modems, and Architectures | |
Agnish, Vivek | SYS8.4 | Laboratory-Based End-To-End Network System of Systems Integration, Design and Risk Reduction: Critical Activity for System of Systems Integration Directorate and the Army | |
Agrawal, Hira | CSTC8.2 | Detection of Global Metamorphic Malware Variants Using Control and Data Flow Analysis | |
Agre, Jonathan | SYS3.5 | C2 Information Quality: An Enterprise Systems Perspective | |
Ahmad, Syed | NPP4.5 | Relay Feedback-based Power Control in Multihop Wireless Networks | |
Ahmed, Ahsen | WSP12.3 | Subcarrier Based Threshold Performance Enhancement in Constant Envelope OFDM | |
Alberts, David | SYS3.5 | C2 Information Quality: An Enterprise Systems Perspective | |
Alfa, Attahiru | CSTC1.5 | Lightweight Key Management in Distributed Multi-Channel Cognitive Radio Networks | |
Alkhweldi, Marwan | WSP16.4 | Distributed Estimation of a Parametric Field Using Sparse Noisy Data | |
Allen, Josef | CSTC9.4 | A Cyber-Physical Approach to a Wide-Area Actionable System for the Power Grid | |
Allen, Stuart | SYS2.2 | Use of Dynamic Flight Paths to Enhance Support to Priority Subscribers on a Communications UAV | |
Alvarez, Jennifer | SYS5.1 | Enabling Fractionated Spacecraft Communications Using F6WICS | |
Alves, Joao | SYS6.3 | A test bed for collaborative development of underwater communications and networking | |
Amuru, SaiDhiraj | WSP1.4 | Cumulant-Based Channel Estimation Algorithm for Modulation Classification in Frequency-Selective Fading Channels | |
An, Chan-ho | WSP13.2 | Enhanced Monopulse MIMO Radar Using Reliable Αβ Filtering | |
An, Taehun | WSP10.2 | Cooperative Spectrum Sensing Based on Generalized Likelihood Ratio Test Under Impulsive Noise Circumstances | |
Andresen, Jason | CSTC6.1 | Identity-Based Internet Protocol Networking | |
Angjelichinoski, Marko | NPP6.3 | Practical assessment of RSS-based localization in indoor environments | |
Annamalai, Annamalai | NPP10.1 | Cross-Layer Throughput Optimization for Delay and QoS Constrained Applications | |
WSP15.6 | Some Remarks on the Dirac Delta Function Approximation for ASER Analysis of Digital Modulations Over Fading Channels | ||
Annavajjala, Ramesh | WSP12.2 | Robust Receiver Algorithms to Mitigate Partial-Band and Partial-Time Interference in LDPC-coded OFDM Systems | |
Apgar, Daniel | SA3.2 | Dynamic Communication Resource Negotiations | |
Arkoudas, Konstantine | SYS4.4 | Policy-Based Spectrum Management Architecture | |
Arslan, Huseyin | WSP1.6 | Identification of OFDM Signals Under Multipath Fading Channels | |
WSP1.2 | Template Matching for Signal Identification in Cognitive Radio Systems | ||
Ashdown, Jonathan | WSP9.4 | High-Rate Ultrasonic Communication Through Metallic Barriers Using MIMO-OFDM Techniques | |
Astucia, Vitor | WSP15.5 | Efficient Receivers for SC-FDE with Offset Modulations | |
Atanasovski, Vladimir | NPP6.3 | Practical assessment of RSS-based localization in indoor environments | |
Atay Onat, Furuzan | SA5.2 | An Embedded Radio Software Emulation Platform Using OPNET and VxWorks to Develop Distributed Algorithms for Military Ad-Hoc Networks | |
Atighetchi, Michael | CSTC3.3 | Evaluation of Survivable Service-Oriented Systems Through Collaborative Red Teaming | |
Atkinson, Randall | SYS10.4 | Secure & Agile Wide-area Virtual Machine Mobility | |
B A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Badger, Michael | SYS6.4 | Automated Performance Assessment Framework Innovation (APAFI) Project | |
SYS8.4 | Laboratory-Based End-To-End Network System of Systems Integration, Design and Risk Reduction: Critical Activity for System of Systems Integration Directorate and the Army | ||
Baek, YoungSeok | CSTC10.2 | Cooperative Jammer Design in Cellular Network with Internal Eavesdroppers | |
Bagrodia, Rajive | SYS8.3 | Operationally Realistic Testing of Network Centric Tactical Applications in a Lab Environment | |
NPP13.3 | JamDetect: A System to Detect RAA Aware Jamming Attacks in IEEE802.11 Networks | ||
Bahler, Lisa | CSTC8.2 | Detection of Global Metamorphic Malware Variants Using Control and Data Flow Analysis | |
Bahn, William | CSTC1.4 | The Glowworm hash: Increased Speed and Security for BBC Unkeyed Jam Resistance | |
Bailey, John | WSP2.5 | Design and Simulation of a High Frequency Exact Solvable Chaotic Oscillator | |
Baird, Leemon | CSTC1.4 | The Glowworm hash: Increased Speed and Security for BBC Unkeyed Jam Resistance | |
Balasubramanian, Shantharam | WSP11.1 | Implementation of Distributed Time Exchange Based Cooperative Forwarding | |
Baldwin, Rusty | CSTC1.2 | Differential Power Analysis Using Wavelet Decomposition | |
CSTC3.4 | Network Performance Impact of Access Control Policies in Tactical Wireless Networks | ||
CSTC10.4 | GPU Accelerated Differential Power Analysis | ||
Barker, Troy | SA7.3 | High Definition Video Transcoding for Transport Over Satellite | |
Barton, David | WSP14.1 | Modeling of Radiowave Propagation in Tunnels | |
Bastos, Luis | SYS2.1 | Tactical Troposcatter Applications in Challenging Climate Zones | |
SYS10.1 | Next Generation NATO Satcom Management and Control Services | ||
Battle, Kevin | NPP9.5 | Loss-Tolerant TCP (LT-TCP): Implementation and Experimental Evaluation | |
Bauch, Gerhard | WSP2.1 | Design of a Multitone Firefly Time Synchronization Scheme for Responsive Vehicle-Protection Jammers | |
Beal, Aubrey | WSP2.5 | Design and Simulation of a High Frequency Exact Solvable Chaotic Oscillator | |
Been, Robert | SYS6.3 | A test bed for collaborative development of underwater communications and networking | |
Beko, Marko | WSP15.5 | Efficient Receivers for SC-FDE with Offset Modulations | |
Benincasa, Giacomo | SA1.1 | Extending Service-oriented Architectures to the Tactical Edge | |
Benjamin, Bruce | CSTC4.4 | IPsec Tunnels vs. Identity-Only Obfuscation Techniques for Moving Target Networks | |
Bennett, Bruce | NPP3.3 | An Enterprise-wide Approach to GIG Internet Protocol Multicast | |
SYS5.6 | Evaluation of the Expansion of Joint IP Modem to Support DVB-RCS2 | ||
SA7.3 | High Definition Video Transcoding for Transport Over Satellite | ||
Bennett, Daniel | NPP10.4 | Optimal Data Scheduling of Mobile Clients Serviced using Beamforming Antennas | |
Benvegnù, Erika | SA1.1 | Extending Service-oriented Architectures to the Tactical Edge | |
Beraud, Paul | CSTC9.2 | Evaluating Network Cyber Resiliency Methods using Cyber Threat, Vulnerability and Defense Modeling and Simulation | |
Beuzelin, Nicolas | WSP8.2 | An Overview of Channel Coding for Underwater Acoustic Communications | |
Bevec, Andrej | SA5.5 | Modeling Mobile Network Connectivity in the Presence of Jamming | |
Bhatti, Saleem | SYS10.4 | Secure & Agile Wide-area Virtual Machine Mobility | |
Bi, Zehui | CSTC6.6 | Software Updates as a Security Metric Passive identification of update trends and effect on machine infection | |
Billah, Mashuk | WSP14.1 | Modeling of Radiowave Propagation in Tunnels | |
Bliss, Daniel | WSP9.2 | Mobile MIMO Capacity in Network Interference: Informed and Uninformed Transmitters | |
Bloebaum, Trude | SA6.2 | Bandwidth optimizations for standards-based publish/subscribe in disadvantaged grids | |
Bocskor, Timothy | WSP14.1 | Modeling of Radiowave Propagation in Tunnels | |
Bogale, Tadilo Endeshaw | WSP12.5 | Multi-cycle Cyclostationary Based Spectrum Sensing Algorithm for OFDM Signals with Noise Uncertainty in Cognitive Radio Networks | |
Boksiner, Jeffrey | SYS4.4 | Policy-Based Spectrum Management Architecture | |
WSP14.1 | Modeling of Radiowave Propagation in Tunnels | ||
Boner, Kevin | SA1.1 | Extending Service-oriented Architectures to the Tactical Edge | |
Booton, Richard | SYS5.3 | Multiple Layered Method of Terminal Slot Contention Resolution for the Integrated Waveform (DAMA UHF SATCOM) | |
Border, John | NPP9.4 | Congestion Control using RED and TCP Window Adjustment | |
Boreli, Roksana | STC1.2 | Inferring User Relationship from Hidden Information in WLANs | |
Bothner, Peter | SA5.5 | Modeling Mobile Network Connectivity in the Presence of Jamming | |
Bouanen, Marwen | WSP2.6 | An LPI Design for Secure OFDM Systems | |
Bråten, Lars | NPP9.3 | TCP challenges in hybrid military satellite networks; measurements and comparison | |
Breese, Steve | SYS9.5 | Transformational Satellite Communications System (TSAT) Lessons Learned | |
Bressler, Bradley | SYS8.3 | Operationally Realistic Testing of Network Centric Tactical Applications in a Lab Environment | |
Brewer, Orlie | NPP2.2 | Elastic Multicast for Tactical Communications | |
NPP7.3 | Adaptive Routing for Tactical Communications | ||
Brossier, Jean-Marc | WSP5.2 | A Low-Complexity Multicarrier Scheme with LDPC Coding for Mobile-to-Mobile Environment | |
Brown, Colin | WSP15.3 | Signal Recovery for CPM in Frequency Flat Fast Fading Channels | |
Brown, John David | CSTC8.6 | Using Covert Timing Channels for Attack Detection in MANETs | |
Brown, Timothy | NPP10.4 | Optimal Data Scheduling of Mobile Clients Serviced using Beamforming Antennas | |
Brunnenmeyer, Dave | SYS9.6 | Ka and Ku Operational Considerations for Military SATCOM Applications | |
Buehrer, R. Michael | WSP1.5 | Improved Modulation Classification Using a Factor-Graph-based Iterative Receiver | |
NPP6.2 | On the Value of Collaboration in Anchorless Robot Self-Localization | ||
Burkhardt, Nicholas | SYS9.2 | IP Networking over the AEHF MILSATCOM System | |
Bushmitch, Dennis | NPP3.2 | The Normalized Bushmitch-Fikus-Hamrick (NBFH) Metric | |
SYS6.4 | Automated Performance Assessment Framework Innovation (APAFI) Project | ||
SYS8.4 | Laboratory-Based End-To-End Network System of Systems Integration, Design and Risk Reduction: Critical Activity for System of Systems Integration Directorate and the Army | ||
C A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Cadeau, Wednel | WSP12.1 | An OFDM-Based Distributed Transmission Scheme for Uncoordinated Transmitters Without Carrier Frequency and Timing Synchronization | |
Cai, Jun | CSTC1.5 | Lightweight Key Management in Distributed Multi-Channel Cognitive Radio Networks | |
Camacho, Marc | SA4.3 | Position, Navigation, and Timing in the Common Operating Environment: Prototyping the PNT User Equipment Modernization Architecture | |
Camilo, Marcelo | WSP2.2 | Anti-Jamming Defense Mechanism in Cognitive Radios Networks | |
Cansever, Derya | CSTC4.4 | IPsec Tunnels vs. Identity-Only Obfuscation Techniques for Moving Target Networks | |
NPP13.1 | Games Applied to Jam Resistant DSA Radios | ||
Cao, Rui | WSP5.5 | Practical Implementation of Hybrid DLT Codes for Cooperative Relay Communications | |
Cao, Ruohan | WSP11.5 | Multi-Group Multiuser Two-Way Relay with Superposition Coding | |
Carl, Glenn | SYS3.1 | Using Hybrid Simulation / Emulation for Experimental Assessment of Routing Policy on Mission Outcomes | |
Carlisle, Martin | CSTC1.4 | The Glowworm hash: Increased Speed and Security for BBC Unkeyed Jam Resistance | |
Carneiro, Vitor | WSP6.3 | Performance Analysis of a 2D Double Hard-Limited OCDMA System Over FSO Link Under Strong Turbulence for Defense Applications | |
Cartmell, John | SYS2.3 | Non-Satellite Based Field Communications System for Battlefield Deployments | |
Carvalho, Marco | CSTC3.1 | NextVC2 - A Next Generation Virtual World Command and Control | |
NPP10.2 | Throughput Maximization in CSMA Networks with Collisions | ||
Cascio, David | SYS9.1 | Performance of Combatant Command Satellite (COCOMSat) Communications in Contested Environments | |
Casini, Enrico | SA1.1 | Extending Service-oriented Architectures to the Tactical Edge | |
Castro, Ceasar | SA4.2 | Naval Task Force Interface for Coalition Networks for Secure Information Sharing (CoNSIS) | |
Catlin, Christopher | SYS5.6 | Evaluation of the Expansion of Joint IP Modem to Support DVB-RCS2 | |
Cha, Hojung | NPP6.5 | A Pedestrian Tracking System Using Group Mobility Information | |
Chadha, Ritu | SYS4.4 | Policy-Based Spectrum Management Architecture | |
CSTC2.3 | Detecting Communication Anomalies in Tactical Networks via Graph Learning | ||
SYS6.5 | TimeSync: Virtual Time for Scalable, High-Fidelity Hybrid Network Emulation | ||
SYS6.1 | Building an Operation Support System for A Fast Reconfigurable Network Experimentation Testbed | ||
SYS10.3 | TITAN: Integrated Network Management in Tactical Mobile Ad Hoc Networks | ||
NPP12.3 | A GNU-Based Packet Radio for Network Management Field Testing | ||
Chakravarthy, Vasu | WSP8.4 | Modulation Detection of Underwater Acoustic Communication Signals Through Cyclostationary Analysis | |
Challa, Obulapathi | SYS9.3 | CubeSat Torrent: Torrent Like Distributed Communications For CubeSat Satellite Clusters | |
Chambers, Dale | STC1.5 | Openness in Military Systems: Part 2 (Case Studies) | |
Chan, Kevin | STC2.3 | The Effect of Zealotry in the Naming Game Model of Opinion Dynamics | |
Chan, Philip | SA5.5 | Modeling Mobile Network Connectivity in the Presence of Jamming | |
Chan, Vincent | NPP7.5 | Link State Distribution Rate Scaling for Maintaining Topology in Mobile Wireless Networks | |
Chang, Kirk | SYS8.4 | Laboratory-Based End-To-End Network System of Systems Integration, Design and Risk Reduction: Critical Activity for System of Systems Integration Directorate and the Army | |
Chang, Yueh-Chi | SYS5.5 | NMT X/Ka Tri-Band Antennas | |
Chang, Zheng | NPP1.5 | Resource Allocation for Cooperative Relay-assisted OFDMA Networks with Imperfect CSI | |
Charland, Randy | SYS7.4 | Comparing Radio-to-Router Interface Implementations on Experimental CoTs and Open Source Routers | |
SYS8.5 | Integrating Radio-to-Router Protocols into EMANE | ||
NPP12.2 | Integrating Multiple Radio-to-Router Interfaces to Open Source Dynamic Routers | ||
Charlesworth, Philip | SYS2.2 | Use of Dynamic Flight Paths to Enhance Support to Priority Subscribers on a Communications UAV | |
Che, Ting-Shuo | SYS9.2 | IP Networking over the AEHF MILSATCOM System | |
Chen, Chihkai | WSP10.1 | Distributed Energy-based Spectrum Sensing with Opportunistic Cooperative Diversity for Cognitive Radio Networks Over Non-Identical Fading Channels | |
Chen, Hsieh-Chung | SYS6.6 | Determining RF Angle of Arrival Using COTS Antenna Arrays: A Field Evaluation | |
Chen, Liping | WSP5.6 | Scrambled Code Multiple Access Waveform for Micro Satellite Terminals | |
Chen, Qing | WSP11.6 | Spectrum and Energy Efficiency in Two-Way Multi-Relay Networks with Selective Relaying | |
Chen, Xue | NPP4.1 | Energy Efficient Stochastic Power Scheduling Scheme for Wireless Cellular Networks | |
Chen, Yong | SYS8.3 | Operationally Realistic Testing of Network Centric Tactical Applications in a Lab Environment | |
Cheng, Bow-Nan | SA3.4 | An Open Source Situational Awareness Display for Administering Heterogeneous Networks on the Tactical Edge | |
NPP5.1 | A Comparison of MANET Routing Protocols on Airborne Tactical Networks | ||
SYS7.4 | Comparing Radio-to-Router Interface Implementations on Experimental CoTs and Open Source Routers | ||
SYS8.5 | Integrating Radio-to-Router Protocols into EMANE | ||
NPP12.2 | Integrating Multiple Radio-to-Router Interfaces to Open Source Dynamic Routers | ||
Cheng, Ningning | STC1.2 | Inferring User Relationship from Hidden Information in WLANs | |
Cheng, Xilin | WSP5.5 | Practical Implementation of Hybrid DLT Codes for Cooperative Relay Communications | |
Chester, David | SA2.3 | Quantifying the Relative Merits of Genetic and Swarm Algorithms for Network Optimization in Cognitive Radio Networks | |
Chi, David | WSP12.3 | Subcarrier Based Threshold Performance Enhancement in Constant Envelope OFDM | |
Chiang, Cho-Yu Jason | SYS4.4 | Policy-Based Spectrum Management Architecture | |
SYS6.5 | TimeSync: Virtual Time for Scalable, High-Fidelity Hybrid Network Emulation | ||
SYS6.1 | Building an Operation Support System for A Fast Reconfigurable Network Experimentation Testbed | ||
SYS10.3 | TITAN: Integrated Network Management in Tactical Mobile Ad Hoc Networks | ||
NPP12.3 | A GNU-Based Packet Radio for Network Management Field Testing | ||
Chiang, Han-Ting | WSP2.4 | Optimal Jamming with Codewords | |
Chiang, Mung | NPP11.4 | Analysis of Slotted ALOHA with Multipacket Messages in Clustered Surveillance Networks | |
Chidambaram, Balaguruna | CSTC9.1 | Cyber Analysis System Toolkit A High-Fidelity, Virtual Cyber Test-Bed for Network Modeling and Experimentation | |
Chike, I. Nigel | SA5.5 | Modeling Mobile Network Connectivity in the Presence of Jamming | |
Chin, Sang (Peter) | WSP4.6 | Chemical Plume Detection in Hyperspectral Imagery Via Joint Sparse Representation | |
Cho, Dong-Ho | NPP11.5 | Cooperative Communication with Joint Optimization of Cluster size and Resource Allocation in Wireless Sensor Networks | |
Cho, Joon Ho | WSP1.1 | Properization of Second-Order Cyclostationary Random Processes and Its Application to Signal Presence Detection | |
Choquette, George | NPP9.4 | Congestion Control using RED and TCP Window Adjustment | |
Chow, Edward | SA3.2 | Dynamic Communication Resource Negotiations | |
Chowdhury, M. I. Sakib | WSP12.4 | Interference Analysis of Interleaved and Localized Mapping Schemes in OFDMA System with Carrier Frequency Offset | |
Christensen, Paul | SYS7.4 | Comparing Radio-to-Router Interface Implementations on Experimental CoTs and Open Source Routers | |
Chrysanthou, Chrysanthos | WSP14.1 | Modeling of Radiowave Propagation in Tunnels | |
Ciblat, Philippe | WSP18.3 | Optimal Resource Allocation in HARQ-based OFDMA Wireless Networks | |
Cimini, Len | NPP1.3 | Spatial Reuse in Multi-Hop Linear Wireless Cooperative Networks | |
NPP1.4 | On Optimum Relay Deployment in a Multi-Hop Linear Network with Cooperation | ||
Clancy, Charles | WSP2.3 | Jamming Attacks Against OFDM Timing Synchronization and Signal Acquisition | |
SYS2.5 | Development of an Open-Source GSM Femtocell and Integrated Core Infrastructure | ||
Clark, Michael | CSTC1.1 | Robust Wireless Channel Based Secret Key Extraction | |
Claypool, David | NPP2.1 | Temporal Stability for Dynamic Network Relay Sets | |
STC2.4 | Dynamic Communities in Evolving Network Graphs | ||
Cleveland, Jeffrey | SA3.5 | Fault Tolerance Requirements of Tactical Information Management Systems | |
Clore, Brittany | SA5.4 | Validating a Custom IPv6 Security Application using OPNET Modeler | |
Cohen, Aaron | SA7.1 | Comparison of TSVCIS Voice at 8000 and 12000 bps versus CVSD at 16000 bps | |
Cohen, Julie | SYS9.5 | Transformational Satellite Communications System (TSAT) Lessons Learned | |
Colby, Glen | WSP17.3 | Signal Processing Advances for the MUTE sEMG Based Silent Speech Recognition System | |
Cole, Robert | NPP13.1 | Games Applied to Jam Resistant DSA Radios | |
Connor, Jeffrey | WSP4.3 | Scalable Spectrum Situational Awareness Using Devices of Opportunity | |
Cook, Trevor | SYS4.5 | Type Based Abstraction for QoI Aware Applications | |
Cooper, Thomas | SYS2.5 | Development of an Open-Source GSM Femtocell and Integrated Core Infrastructure | |
Copeland, John | CSTC6.6 | Software Updates as a Security Metric Passive identification of update trends and effect on machine infection | |
Cornell, Charles | SYS9.5 | Transformational Satellite Communications System (TSAT) Lessons Learned | |
Corron, Ned | WSP2.5 | Design and Simulation of a High Frequency Exact Solvable Chaotic Oscillator | |
Coryell, Louis | SYS1.5 | Low Cost MEMS based INS for land-based MILITARY SATCOM OTM | |
Couillard, Denis | WSP2.6 | An LPI Design for Secure OFDM Systems | |
Counsil, David | WSP3.6 | Focusing a Radio Signal and Simultaneously Nulling It At Another Location Using Time-Reversal: Experimental Results | |
Courtade, Thomas | NPP1.1 | The User Capacity of Barrage Relay Networks | |
Coyle, Andrea | SYS7.4 | Comparing Radio-to-Router Interface Implementations on Experimental CoTs and Open Source Routers | |
Cozby, Richard | SYS6.4 | Automated Performance Assessment Framework Innovation (APAFI) Project | |
SYS8.4 | Laboratory-Based End-To-End Network System of Systems Integration, Design and Risk Reduction: Critical Activity for System of Systems Integration Directorate and the Army | ||
Cruz, Alen | CSTC9.2 | Evaluating Network Cyber Resiliency Methods using Cyber Threat, Vulnerability and Defense Modeling and Simulation | |
Cuevas, Enrique | SYS1.2 | Adjacent Satellite Interference from a Network of MF-TDMA Satellite Communications on-the-Move Terminals | |
Cunche, Mathieu | STC1.2 | Inferring User Relationship from Hidden Information in WLANs | |
Curtis, Jess | NPP6.1 | Particle Filter Based Average Consensus Target Tracking with Preservation of Network Connectivity | |
D A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
da Silva, Claudio | WSP1.4 | Cumulant-Based Channel Estimation Algorithm for Modulation Classification in Frequency-Selective Fading Channels | |
NPP4.5 | Relay Feedback-based Power Control in Multihop Wireless Networks | ||
Daisley, Sean | SYS5.6 | Evaluation of the Expansion of Joint IP Modem to Support DVB-RCS2 | |
Daneshrad, Babak | WSP3.5 | Addressing IQ Mismatch in Spatial Interference Suppression Systems | |
WSP5.3 | PER Prediction for Convolutionally Coded MIMO OFDM Systems — an Analytical Approach | ||
NPP10.5 | Cooperative Spatial Scheduling in Distributed MIMO MAC with Interference/Concurrency Awareness | ||
SYS11.2 | Increasing Network Area Spectral Efficiency by combining multiple PHY techniques | ||
Danilov, Claudiu | NPP2.2 | Elastic Multicast for Tactical Communications | |
NPP7.3 | Adaptive Routing for Tactical Communications | ||
Dao, Minh | WSP4.6 | Chemical Plume Detection in Hyperspectral Imagery Via Joint Sparse Representation | |
DaSilva, Luiz | NPP4.5 | Relay Feedback-based Power Control in Multihop Wireless Networks | |
Davidson, Steven | SYS3.2 | A Policy-based Approach to Automated Data Reduction for Intelligence, Surveillance, and Reconnaissance Systems | |
Dean, Robert | WSP2.5 | Design and Simulation of a High Frequency Exact Solvable Chaotic Oscillator | |
Deng, Pan | CSTC6.4 | Lightweight One-Time Signature for Multicast Authentication | |
Deng, Yunbin | WSP17.3 | Signal Processing Advances for the MUTE sEMG Based Silent Speech Recognition System | |
Deng, Zhui | CSTC6.3 | Guest-Transparent Instruction Authentication for Self-Patching Kernels | |
Denkovski, Daniel | NPP6.3 | Practical assessment of RSS-based localization in indoor environments | |
Depoy, Randy | WSP7.1 | Blind Frequency Offset Estimation and Intercarrier Interference Cancelation for FD-MC-CDMA Systems in Aerial Vehicle Communication | |
Desai, Uday | WSP11.3 | Novel Energy Efficient Relaying Schemes for Wireless Sensor Networks | |
WSP14.6 | MPTA: Modified Polymer Textile Antennas for Green Symbiotic Cloud Communications | ||
DiGennaro, Michael | SYS8.3 | Operationally Realistic Testing of Network Centric Tactical Applications in a Lab Environment | |
Dinh, Thang | CSTC6.5 | An Efficient Spectral Bound for Link Vulnerability Assessment in Large-scale Networks | |
CSTC8.4 | Adaptive Algorithms for Detecting Critical Links and Nodes in Dynamic Networks | ||
Dinis, Rui | WSP3.4 | Iterative FDE Receivers for UWB Systems with Strong Interference Levels | |
WSP7.6 | Frequency-Domain Receiver Design for Fast Varying Channels | ||
WSP8.1 | ML-Based Receivers for Underwater Networks Using OFDM Signals with Strong Nonlinear Distortion Effects | ||
WSP15.5 | Efficient Receivers for SC-FDE with Offset Modulations | ||
Dinsmore, Peter | CSTC4.4 | IPsec Tunnels vs. Identity-Only Obfuscation Techniques for Moving Target Networks | |
Dixon, Warren | NPP6.1 | Particle Filter Based Average Consensus Target Tracking with Preservation of Network Connectivity | |
NPP10.2 | Throughput Maximization in CSMA Networks with Collisions | ||
Djouadi, Seddik | WSP14.2 | Event-based Transmission Line Matrix Method for Simulating Site-Specific Multipath Propagation Characteristics | |
WSP14.3 | Experimental Validation of Stochastic Wireless Urban Channel Model: Estimation and Prediction | ||
SA7.2 | Determining System Parameters for Optimal Performance of Hybrid DS/FFH Spread-Spectrum | ||
Domingo, Alberto | SYS3.6 | A NNEC-Compliant Approach for a Future Mission Network | |
Dorsey, David | NPP11.4 | Analysis of Slotted ALOHA with Multipacket Messages in Clustered Surveillance Networks | |
Doshi, Sheetal | SYS8.3 | Operationally Realistic Testing of Network Centric Tactical Applications in a Lab Environment | |
Duan, Dongliang | WSP1.3 | A New DFT-Based Frequency Estimator for Single-Tone Complex Sinusoidal Signals | |
Dubendorfer, Clay | CSTC5.3 | An RF-DNA Verification Process for ZigBee Networks | |
Dubois, David | SA5.1 | Front End Mission Modeling | |
Dudash, Jason | SYS3.2 | A Policy-based Approach to Automated Data Reduction for Intelligence, Surveillance, and Reconnaissance Systems | |
Dudley, Stephen | SYS10.5 | Network management for Multi-Network Terminals | |
Dunlop, Matthew | SA5.4 | Validating a Custom IPv6 Security Application using OPNET Modeler | |
Durst, Robert | CSTC6.1 | Identity-Based Internet Protocol Networking | |
E A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Edwards, Jonathan | CSTC8.6 | Using Covert Timing Channels for Attack Detection in MANETs | |
Egbogah, Emeka | NPP11.6 | An Energy-efficient Transmission Scheme for Monitoring of Combat Soldier Health in Tactical Mobile Ad Hoc Networks | |
Elghariani, Ali | WSP9.5 | Branch and Bound with M Algorithm for Near Optimal MIMO | |
WSP12.6 | Detection of Code Spread OFDM Based on 0-1 Integer | ||
Ellinger, John | WSP7.1 | Blind Frequency Offset Estimation and Intercarrier Interference Cancelation for FD-MC-CDMA Systems in Aerial Vehicle Communication | |
Elliot, Paul | WSP14.5 | Novel Quadrifilar Helix Antenna Combining GNSS, Iridium, and a UHF Communications Monopole | |
Ellis, Jason | WSP5.4 | Adaptive-Rate Channel Coding for Packet Radio Systems with Higher Layer Fountain Coding | |
Ellis, Jon | SYS6.4 | Automated Performance Assessment Framework Innovation (APAFI) Project | |
Elmasry, George | SYS4.1 | Adaptation of RSVP-AGG Protocol to Tactical Networks - A Tactical Edge Open Architecture Concept | |
NPP9.2 | WRED Performance Analysis and Design for Tactical Satellite Communication | ||
Eroz, Mustafa | WSP5.6 | Scrambled Code Multiple Access Waveform for Micro Satellite Terminals | |
Erramilli, Shobha | SYS8.4 | Laboratory-Based End-To-End Network System of Systems Integration, Design and Risk Reduction: Critical Activity for System of Systems Integration Directorate and the Army | |
Ertekin, Emre | NPP3.3 | An Enterprise-wide Approach to GIG Internet Protocol Multicast | |
SYS10.2 | Impact of Enclave Network Devices to the Tactical Inter-Service Architecture | ||
Estill, Donan | SYS8.2 | Evaluating Communications System Performance Effects at a System of Systems Level | |
Etefia, Basil | SYS7.3 | Supporting Military Communications with Named Data Networking: An Emulation Analysis | |
F A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Fang, Di | WSP3.1 | Joint Quantization Strategy for Uplink Cooperative Cellular Interference Alignment with Limited Feedback | |
Fang, Luoyang | WSP1.3 | A New DFT-Based Frequency Estimator for Single-Tone Complex Sinusoidal Signals | |
Fang, Russell | SYS5.4 | High-Capacity Ka Commercial Communications Satellite Architectures for Defense Applications | |
Fapojuwo, Abraham | NPP11.6 | An Energy-efficient Transmission Scheme for Monitoring of Combat Soldier Health in Tactical Mobile Ad Hoc Networks | |
Farhang-Boroujeny, Behrouz | WSP6.2 | Design and Implementation of a Multicarrier Spread Spectrum Communication System | |
Farroha, Bassam | SYS3.3 | An Adaptive SoS Framework for Integrating Dynamic Cyber Defense | |
CSTC7.6 | Architecting Dynamic Cyber Defense for a Secure Multi_Tenant Environment | ||
CSTC8.1 | The Trust Engineering Framework: Architecting Native Security to Defend Against the Next Generation Threats | ||
SA6.3 | An Agile Enabler Framework: Architecting Services in the Clouds | ||
Farroha, Deborah | SYS3.3 | An Adaptive SoS Framework for Integrating Dynamic Cyber Defense | |
SA6.3 | An Agile Enabler Framework: Architecting Services in the Clouds | ||
CSTC7.6 | Architecting Dynamic Cyber Defense for a Secure Multi_Tenant Environment | ||
CSTC8.1 | The Trust Engineering Framework: Architecting Native Security to Defend Against the Next Generation Threats | ||
Fecko, Mariusz | SA4.4 | SISTO: A Proposal for Serverless Information Services for Tactical Operations | |
Feldman, Jared | WSP12.1 | An OFDM-Based Distributed Transmission Scheme for Uncoordinated Transmitters Without Carrier Frequency and Timing Synchronization | |
Feng, Hao | NPP1.3 | Spatial Reuse in Multi-Hop Linear Wireless Cooperative Networks | |
NPP1.4 | On Optimum Relay Deployment in a Multi-Hop Linear Network with Cooperation | ||
Ferrante, Steven | NPP8.2 | System Capacity and Coverage of a Cellular Network with D2D Mobile Relays | |
Fette, Bruce | SYS11.2 | Increasing Network Area Spectral Efficiency by combining multiple PHY techniques | |
Fikus, John | NPP3.2 | The Normalized Bushmitch-Fikus-Hamrick (NBFH) Metric | |
SYS6.4 | Automated Performance Assessment Framework Innovation (APAFI) Project | ||
SYS8.4 | Laboratory-Based End-To-End Network System of Systems Integration, Design and Risk Reduction: Critical Activity for System of Systems Integration Directorate and the Army | ||
Fink, Russell | CSTC4.4 | IPsec Tunnels vs. Identity-Only Obfuscation Techniques for Moving Target Networks | |
Fink, Shane | NPP7.5 | Link State Distribution Rate Scaling for Maintaining Topology in Mobile Wireless Networks | |
Firoiu, Victor | NPP2.6 | BRAVO: Potential Field-Based Routing and Network Coding for Efficient Wireless MANETs | |
Ford, Richard | CSTC3.1 | NextVC2 - A Next Generation Virtual World Command and Control | |
Foresta, Saul | SYS1.5 | Low Cost MEMS based INS for land-based MILITARY SATCOM OTM | |
Fox, Kevin | SA3.1 | A Qualitative and Quantitative Method for Predicting Sentiment Toward Deployed U.S. Forces | |
Friedman, Joshua | SYS5.6 | Evaluation of the Expansion of Joint IP Modem to Support DVB-RCS2 | |
Frisbie, Steve | SA3.2 | Dynamic Communication Resource Negotiations | |
Fritz, David | SYS11.3 | A Phased Approach to Policy-Based Spectrum Operations | |
Froberg, Brandon | CSTC3.3 | Evaluation of Survivable Service-Oriented Systems Through Collaborative Red Teaming | |
G A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Gagnon, Francois | WSP2.6 | An LPI Design for Secure OFDM Systems | |
Galdino, Juraci | WSP2.2 | Anti-Jamming Defense Mechanism in Cognitive Radios Networks | |
Ganga, Gangadhar | CSTC9.2 | Evaluating Network Cyber Resiliency Methods using Cyber Threat, Vulnerability and Defense Modeling and Simulation | |
Ganguly, Bishwaroop | NPP9.5 | Loss-Tolerant TCP (LT-TCP): Implementation and Experimental Evaluation | |
Gans, Howard | SA5.1 | Front End Mission Modeling | |
Gao, Hui | WSP3.1 | Joint Quantization Strategy for Uplink Cooperative Cellular Interference Alignment with Limited Feedback | |
Garcia-Luna-Aceves, Jj | NPP7.1 | Link State Routing in Regions of Interest | |
NPP8.1 | VCMA: Efficient Channel Access in Wireless Mesh Networks Using Virtual Coordinates | ||
Gavrilovska, Liljana | NPP6.3 | Practical assessment of RSS-based localization in indoor environments | |
Ge, Feng | SYS10.3 | TITAN: Integrated Network Management in Tactical Mobile Ad Hoc Networks | |
NPP12.3 | A GNU-Based Packet Radio for Network Management Field Testing | ||
Ge, Linqiang | CSTC4.2 | On Effective Sampling Techniques for Host-based Intrusion Detection in MANET | |
Gerla, Mario | NPP7.6 | Network Coding over a MANET Proactive Link State Routing Protocol and TDMA Scheduling | |
STC1.3 | Content Routing In the Vehicle Cloud | ||
SYS7.3 | Supporting Military Communications with Named Data Networking: An Emulation Analysis | ||
NPP10.5 | Cooperative Spatial Scheduling in Distributed MIMO MAC with Interference/Concurrency Awareness | ||
NPP10.6 | Performance Evaluation of Wireless Network Coding in TDMA Networks | ||
Gesmundo, Vincenzo | NPP7.2 | Location Aware Optimized Link State Routing Protocol | |
Ghosh, Abhrajit | SYS10.3 | TITAN: Integrated Network Management in Tactical Mobile Ad Hoc Networks | |
Ghosh, Rumi | NPP7.1 | Link State Routing in Regions of Interest | |
Gilbert, Dan | NPP3.3 | An Enterprise-wide Approach to GIG Internet Protocol Multicast | |
Gillen, Matthew | SYS7.1 | Beyond Line-of-Sight Information Dissemination for Force Protection | |
Goalic, André | WSP8.2 | An Overview of Channel Coding for Underwater Acoustic Communications | |
Goff, Thomas | NPP7.3 | Adaptive Routing for Tactical Communications | |
Gomez, Daniel | CSTC9.2 | Evaluating Network Cyber Resiliency Methods using Cyber Threat, Vulnerability and Defense Modeling and Simulation | |
Gonzalez, Lino | SYS1.4 | How to Evaluate SOTM Antennas, Modems, and Architectures | |
Gopal, Rajeev | WSP5.6 | Scrambled Code Multiple Access Waveform for Micro Satellite Terminals | |
SYS5.4 | High-Capacity Ka Commercial Communications Satellite Architectures for Defense Applications | ||
Gorcin, Ali | WSP1.6 | Identification of OFDM Signals Under Multipath Fading Channels | |
WSP1.2 | Template Matching for Signal Identification in Cognitive Radio Systems | ||
Gottlieb, Yitzchak | SYS6.1 | Building an Operation Support System for A Fast Reconfigurable Network Experimentation Testbed | |
SYS10.3 | TITAN: Integrated Network Management in Tactical Mobile Ad Hoc Networks | ||
Govindan, Kannan | CSTC7.1 | Chaining for Securing Data Provenance in Distributed Information Networks | |
Graff, Charles | NPP3.1 | Capacity Estimation and Waveform Assignment in Military Networks | |
Graff, Charles | SA1.5 | Understanding the Delay and Loss Tradeoffs in Large Wireless Military Networks Using Queuing Analysis and MAC Models | |
SA1.4 | Planning & Design of Routing Architectures for Multi-Tier Military Networks | ||
NPP8.3 | TDMA Scheduling and Channel Assignment for Cognitive Tactical Networks | ||
Graham, Christopher | SYS3.2 | A Policy-based Approach to Automated Data Reduction for Intelligence, Surveillance, and Reconnaissance Systems | |
Gralia, Mars | CSTC4.4 | IPsec Tunnels vs. Identity-Only Obfuscation Techniques for Moving Target Networks | |
Grant, Robert | CSTC3.3 | Evaluation of Survivable Service-Oriented Systems Through Collaborative Red Teaming | |
Graves, Eric | CSTC5.1 | Certification Codes for Maliciousness Detection in Physical-layer Network Coding | |
Greel, Richard | SYS1.4 | How to Evaluate SOTM Antennas, Modems, and Architectures | |
Green, Jacob | SA1.3 | Collaborative Applications at the Tactical Edge through Resilient Group Dissemination in DTN | |
Green, Thomas | WSP4.3 | Scalable Spectrum Situational Awareness Using Devices of Opportunity | |
Greene, David | CSTC5.1 | Certification Codes for Maliciousness Detection in Physical-layer Network Coding | |
Gronosky, Andrew | CSTC3.3 | Evaluation of Survivable Service-Oriented Systems Through Collaborative Red Teaming | |
Growney, Chris | CSTC6.1 | Identity-Based Internet Protocol Networking | |
Guarino, Peter | CSTC2.4 | Clustering of Snort Alerts to Identify Patterns and Reduce Analyst Workload | |
Guérin, Roch | NPP11.4 | Analysis of Slotted ALOHA with Multipacket Messages in Clustered Surveillance Networks | |
Guerreiro, João | WSP8.1 | ML-Based Receivers for Underwater Networks Using OFDM Signals with Strong Nonlinear Distortion Effects | |
Guerrini, Piero | SYS6.3 | A test bed for collaborative development of underwater communications and networking | |
Guettier, Christophe | SYS7.5 | Hybrid Solving Technique for Vehicle Planning with Communication Constraints | |
Gundry, Stephen | NPP6.6 | Fault Tolerant Bio-Inspired Topology Control Mechanism for Autonomous Mobile Node Distribution in MANETs | |
NPP11.1 | Bio-inspired and Voronoi-based Algorithms for Self-positioning Autonomous Mobile Nodes | ||
Gunduzhan, Emre | CSTC4.4 | IPsec Tunnels vs. Identity-Only Obfuscation Techniques for Moving Target Networks | |
Guo, Shanzeng | CSTC2.2 | Performance Analysis of Wireless Intruder Geolocation in Campus Wireless Networks | |
Gupta, Rohit | SYS1.6 | Optimal PSD Limit Accommodation in Heterogeneous SHF SATCOM Networks | |
Gursoy, M. Cenk | WSP11.6 | Spectrum and Energy Efficiency in Two-Way Multi-Relay Networks with Selective Relaying | |
Gwon, Youngjune | SYS6.6 | Determining RF Angle of Arrival Using COTS Antenna Arrays: A Field Evaluation | |
H A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Hackett, Jay | SA3.1 | A Qualitative and Quantitative Method for Predicting Sentiment Toward Deployed U.S. Forces | |
Hahs, Dan | WSP2.5 | Design and Simulation of a High Frequency Exact Solvable Chaotic Oscillator | |
Hale, Sidni | WSP2.5 | Design and Simulation of a High Frequency Exact Solvable Chaotic Oscillator | |
Halford, Thomas | NPP1.1 | The User Capacity of Barrage Relay Networks | |
Hall, Robert | NPP3.5 | A Geocast-based Algorithm for a Field Common Operating Picture | |
Halloran, Frank | SYS8.4 | Laboratory-Based End-To-End Network System of Systems Integration, Design and Risk Reduction: Critical Activity for System of Systems Integration Directorate and the Army | |
Hamilton, Jim | SYS9.5 | Transformational Satellite Communications System (TSAT) Lessons Learned | |
Hamilton, Michael | WSP2.5 | Design and Simulation of a High Frequency Exact Solvable Chaotic Oscillator | |
Hamrick, Michael | NPP3.2 | The Normalized Bushmitch-Fikus-Hamrick (NBFH) Metric | |
Han, Keesook | NPP3.6 | Enhancing the Classification Accuracy of IP Geolocation | |
Hanlin, John | SYS5.5 | NMT X/Ka Tri-Band Antennas | |
Hanlon, Kelly | SYS7.1 | Beyond Line-of-Sight Information Dissemination for Force Protection | |
Hanna, James | SA3.5 | Fault Tolerance Requirements of Tactical Information Management Systems | |
SYS7.2 | Supporting Information Management and Information Superiority via Federation Services | ||
Harang, Richard | CSTC2.4 | Clustering of Snort Alerts to Identify Patterns and Reduce Analyst Workload | |
Harbison, William | SYS1.6 | Optimal PSD Limit Accommodation in Heterogeneous SHF SATCOM Networks | |
Hardy, Rommie | CSTC4.2 | On Effective Sampling Techniques for Host-based Intrusion Detection in MANET | |
Hassell, Suzanne | CSTC9.2 | Evaluating Network Cyber Resiliency Methods using Cyber Threat, Vulnerability and Defense Modeling and Simulation | |
Hauge, Mariann | NPP9.1 | Admission Control and Flow Termination in Mobile Ad-hoc Networks with Pre-congestion Notification | |
Heaton, James | WSP17.3 | Signal Processing Advances for the MUTE sEMG Based Silent Speech Recognition System | |
Heckman, Mark | CSTC7.3 | A High-assurance, Virtual Guard Architecture | |
Hegedus, Jeff | SYS4.2 | A Comparison of Open Architecture Standards for the Development of Complex Military Systems: GRA, FACE, SCA NeXT | |
Heide, David | SA7.1 | Comparison of TSVCIS Voice at 8000 and 12000 bps versus CVSD at 16000 bps | |
Henderson, Thomas | NPP2.2 | Elastic Multicast for Tactical Communications | |
NPP7.3 | Adaptive Routing for Tactical Communications | ||
Henry, Mark | SYS4.2 | A Comparison of Open Architecture Standards for the Development of Complex Military Systems: GRA, FACE, SCA NeXT | |
Herbert, John | NPP3.3 | An Enterprise-wide Approach to GIG Internet Protocol Multicast | |
Hershey, Paul | SYS3.2 | A Policy-based Approach to Automated Data Reduction for Intelligence, Surveillance, and Reconnaissance Systems | |
Hester, Travis | CSTC9.2 | Evaluating Network Cyber Resiliency Methods using Cyber Threat, Vulnerability and Defense Modeling and Simulation | |
Hetrick, James | SYS9.4 | High Throughput Ku-band Satellites for Aeronautical Applications | |
Hoffmann, Rich | SYS1.5 | Low Cost MEMS based INS for land-based MILITARY SATCOM OTM | |
Hoh, Mijeong | SA7.4 | Active Buffer Management Algorithm for Silence Suppressed Voice Applications | |
Holmes, Brian | SYS3.4 | An Architecture to Support Information Availability in the Tactical Domain | |
Holzbauer, Buster | NPP9.5 | Loss-Tolerant TCP (LT-TCP): Implementation and Experimental Evaluation | |
Hong, Daesik | WSP16.2 | Energy-Efficient Spectrum Access for Ultra Low Power Sensor Networks | |
Hong, Yang-Ki | WSP14.4 | High-Efficiency Ferrite Meander Antenna (HEMA) for LTE Applications | |
Hortos, William | NPP11.2 | Effects Of Energy Harvesting on Quality-of-Service in Transient Wireless Sensor Networks | |
Hosseini, Ehsan | WSP7.2 | The Cramer-Rao Bound for Data-Aided Synchronization of SOQPSK | |
Hou, Thomas | CSTC7.4 | MUSHI: Toward Multiple Level Security Cloud with Strong Hardware Level Isolation | |
Hu, Zhen | WSP10.3 | A Combination of Quickest Detection with Oracle Approximating Shrinkage Estimation and Its Application to Spectrum Sensing in Cognitive Radio | |
WSP13.1 | Experimental Demonstration of Cognitive Radar for Target Localization Under Strong Interference | ||
Huang, Jingwei | CSTC3.2 | Security and Provenance in M3GS for Cross-domain Information Sharing | |
Huang, Kaiyu | WSP7.1 | Blind Frequency Offset Estimation and Intercarrier Interference Cancelation for FD-MC-CDMA Systems in Aerial Vehicle Communication | |
Huang, Xiaopeng | WSP8.3 | Resource Allocation for OFDM Underwater Acoustic Cooperative Transmission with Limited Feedback | |
Husain, Mohammad Iftekhar | CSTC8.3 | CD-PHY: Physical Layer Security in Wireless Networks through Constellation Diversity | |
Hutton, Shaun | CSTC2.6 | Hamming Masks: Toward Defending Constrained Networked Systems | |
Hyde, David | CSTC9.2 | Evaluating Network Cyber Resiliency Methods using Cyber Threat, Vulnerability and Defense Modeling and Simulation | |
I A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Ingram, Dustin | SA2.4 | A Comparison of Group-based Data Persistence Techniques in MANETs | |
Ishii, Mark | SYS2.4 | One Force Tactical Communications System: Connecting the Tactical Edge at AEWE Spiral G | |
Islam, Muhammad Nazmul | WSP11.1 | Implementation of Distributed Time Exchange Based Cooperative Forwarding | |
J A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Jain, Manoj | SYS4.1 | Adaptation of RSVP-AGG Protocol to Tactical Networks - A Tactical Edge Open Architecture Concept | |
Jakubisin, Daniel | WSP1.5 | Improved Modulation Classification Using a Factor-Graph-based Iterative Receiver | |
Jasiul, Bartosz | SA6.5 | Efficiency of dynamic content adaptation based on semantic description of web service call context | |
Jayant, Nikil | WSP17.4 | Region-of-interest Video Coding for Enabling Surgical Telementoring in Low-Bandwidth Scenarios | |
Jayasooriya, Chandana | WSP14.4 | High-Efficiency Ferrite Meander Antenna (HEMA) for LTE Applications | |
Jeong, Seongah | CSTC10.2 | Cooperative Jammer Design in Cellular Network with Internal Eavesdroppers | |
Jia, Yupeng | WSP7.3 | Cramer-Rao Bound for Channel Estimation in Amplify-and-Forward Relaying Networks | |
Jimenez, Chalena | SYS4.3 | SCA4 - An Evolved Framework | |
Jin, Jiaxi | NPP5.6 | Prioritized Data Synchronization for Disruption Tolerant Networks | |
Jo, Kenneth | SYS9.1 | Performance of Combatant Command Satellite (COCOMSat) Communications in Contested Environments | |
Johnsen, Frank | SA6.2 | Bandwidth optimizations for standards-based publish/subscribe in disadvantaged grids | |
Jong, James | NPP9.4 | Congestion Control using RED and TCP Window Adjustment | |
Jovancevic, Aleksandar | WSP4.3 | Scalable Spectrum Situational Awareness Using Devices of Opportunity | |
Jurik, Andrew | CSTC2.6 | Hamming Masks: Toward Defending Constrained Networked Systems | |
K A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Kaafar, Mohamed Ali | STC1.2 | Inferring User Relationship from Hidden Information in WLANs | |
Kaddoum, Georges | WSP2.6 | An LPI Design for Secure OFDM Systems | |
Kailas, Aravind | SYS8.1 | On Accurately Predicting Mote Deaths | |
Kalomiris, Vasilios | SA3.2 | Dynamic Communication Resource Negotiations | |
Kan, Bq | SA2.1 | Towards Minimizing Delay in MHWN Based on Activity Estimation | |
Kan, Zhen | NPP6.1 | Particle Filter Based Average Consensus Target Tracking with Preservation of Network Connectivity | |
Kang, Joonhyuk | CSTC10.2 | Cooperative Jammer Design in Cellular Network with Internal Eavesdroppers | |
Kang, Myong | CSTC7.2 | The Xenon Separation VMM: Secure Virtualization Infrastructure for Military Clouds | |
Kant, Latha | NPP3.1 | Capacity Estimation and Waveform Assignment in Military Networks | |
SA1.5 | Understanding the Delay and Loss Tradeoffs in Large Wireless Military Networks Using Queuing Analysis and MAC Models | ||
SA1.4 | Planning & Design of Routing Architectures for Multi-Tier Military Networks | ||
NPP8.3 | TDMA Scheduling and Channel Assignment for Cognitive Tactical Networks | ||
Kaplan, Michael | CSTC2.3 | Detecting Communication Anomalies in Tactical Networks via Graph Learning | |
SYS10.3 | TITAN: Integrated Network Management in Tactical Mobile Ad Hoc Networks | ||
Kapoor, Shalini | CSTC7.5 | Polite: A Policy Framework for Building Managed Mobile Apps | |
Kar, Koushik | NPP9.5 | Loss-Tolerant TCP (LT-TCP): Implementation and Experimental Evaluation | |
Karadeniz, Baris | SA5.2 | An Embedded Radio Software Emulation Platform Using OPNET and VxWorks to Develop Distributed Algorithms for Military Ad-Hoc Networks | |
Karamchandani, Sunil | WSP14.6 | MPTA: Modified Polymer Textile Antennas for Green Symbiotic Cloud Communications | |
Kasiri, Behzad | CSTC1.5 | Lightweight Key Management in Distributed Multi-Channel Cognitive Radio Networks | |
Kaul, Vikram | SA4.4 | SISTO: A Proposal for Serverless Information Services for Tactical Operations | |
Kavehrad, Mohsen | WSP12.4 | Interference Analysis of Interleaved and Localized Mapping Schemes in OFDMA System with Carrier Frequency Offset | |
Khan, Moazzam | CSTC6.6 | Software Updates as a Security Metric Passive identification of update trends and effect on machine infection | |
Khiabani, Yahya | CSTC1.3 | ARQ-Based Key Scheduling Algorithm over Correlated Erasure Channels | |
Khire, Sourabh | WSP17.4 | Region-of-interest Video Coding for Enabling Surgical Telementoring in Low-Bandwidth Scenarios | |
Khouzam, Anthony | NPP3.2 | The Normalized Bushmitch-Fikus-Hamrick (NBFH) Metric | |
Kidston, David | NPP2.5 | A Multicast Routing Technique for Tactical Networks | |
Kim, Dong Ku | WSP13.2 | Enhanced Monopulse MIMO Radar Using Reliable Αβ Filtering | |
Kim, Dongjin | WSP10.2 | Cooperative Spectrum Sensing Based on Generalized Likelihood Ratio Test Under Impulsive Noise Circumstances | |
Kim, Dongwook | NPP8.5 | Adaptive Virtual Slot for Enhancing QoS of Voice Communication in MIL-STD-188-220 | |
Kim, Eunkyung | NPP8.6 | An Efficient FSN Assignment Scheme for Mitigating Multi-hop Delay in MIL-STD-188-220D Networks | |
Kim, Hyunggi | WSP11.2 | Relay Selection for AF SISO Wireless Relay Networks Under Jamming Environment with Relay Power Constraint | |
Kim, Jae | NPP2.2 | Elastic Multicast for Tactical Communications | |
NPP7.3 | Adaptive Routing for Tactical Communications | ||
Kim, Jae-Hyun | SA7.4 | Active Buffer Management Algorithm for Silence Suppressed Voice Applications | |
Kim, John | NPP3.3 | An Enterprise-wide Approach to GIG Internet Protocol Multicast | |
Kim, Sang Wu | CSTC5.6 | Securing Wireless Network Coding against Pollution Attack at the Physical Layer | |
Kim, Sanghoon | NPP4.3 | On The Effects of Transmit Power Control on the Performance of Wireless Networks | |
Kim, So-Ra | WSP4.2 | Analysis and Design of QAPM Modulation Using Compressive Sensing for Low Power Communication | |
Kim, Sun-il | NPP3.4 | Tiny Bubbles: A Fault-Tolerant Distributed Overlay for Networks with Block-Churn | |
Kim, Taewan | SA7.4 | Active Buffer Management Algorithm for Silence Suppressed Voice Applications | |
Kim, Woo-Chan | NPP11.5 | Cooperative Communication with Joint Optimization of Cluster size and Resource Allocation in Wireless Sensor Networks | |
Kim, Yongdae | STC2.1 | Measuring Bias in the Mixing Time of Social Graphs due to Graph Sampling | |
King, David | CSTC2.1 | A Case for Trusted Sensors: Encryptors with Deep Packet Inspection Capabilities | |
Kinoshita, Kei | WSP16.3 | Energy Minimization of Wireless Sensor Networks Based on Modulation and Coding Optimization Under Finite Frame Length Constraint | |
Kintner, Jasen | NPP3.4 | Tiny Bubbles: A Fault-Tolerant Distributed Overlay for Networks with Block-Churn | |
Kirby, James (Jim) | CSTC7.2 | The Xenon Separation VMM: Secure Virtualization Infrastructure for Military Clouds | |
Kisor, John | SA4.1 | Government Reference Architecture Dataplane Gateway | |
Klingler, Mike | SYS10.5 | Network management for Multi-Network Terminals | |
Knepper, Margaret | SA3.1 | A Qualitative and Quantitative Method for Predicting Sentiment Toward Deployed U.S. Forces | |
Kodeswaran, Palanivel | CSTC7.5 | Polite: A Policy Framework for Building Managed Mobile Apps | |
Koehler, Bernard (Ben) | SYS6.2 | Laboratory Evaluation of Military Radios and Network Architectures | |
Koets, Michael | SYS5.1 | Enabling Fractionated Spacecraft Communications Using F6WICS | |
Kohler, James | CSTC2.1 | A Case for Trusted Sensors: Encryptors with Deep Packet Inspection Capabilities | |
Kohler, Ralph | SA1.2 | Supporting COTS Applications in Tactical Edge Networks | |
SYS7.1 | Beyond Line-of-Sight Information Dissemination for Force Protection | ||
Koike-Akino, Toshiaki | WSP12.2 | Robust Receiver Algorithms to Mitigate Partial-Band and Partial-Time Interference in LDPC-coded OFDM Systems | |
Kolagasioglu, Ertugrul | SA5.2 | An Embedded Radio Software Emulation Platform Using OPNET and VxWorks to Develop Distributed Algorithms for Military Ad-Hoc Networks | |
Kompella, Sastry | WSP11.1 | Implementation of Distributed Time Exchange Based Cooperative Forwarding | |
Koo, Bontae | CSTC10.2 | Cooperative Jammer Design in Cellular Network with Internal Eavesdroppers | |
Kopena, Joseph | SA4.4 | SISTO: A Proposal for Serverless Information Services for Tactical Operations | |
Koss, John | WSP4.3 | Scalable Spectrum Situational Awareness Using Devices of Opportunity | |
Kountanis, Dionysios | SA2.2 | Non-Linear Programming Approach to Simulation of the General Adversarial Agents Problem | |
Krishnamurthy, Srikanth | STC1.2 | Inferring User Relationship from Hidden Information in WLANs | |
Krishnan, Rajesh | WSP4.3 | Scalable Spectrum Situational Awareness Using Devices of Opportunity | |
Kuhn, Stephen | CSTC5.5 | A Forensic Hypervisor for Process Tracking and Exploit Discovery | |
Kumar, Udayan | CSTC7.5 | Polite: A Policy Framework for Building Managed Mobile Apps | |
Kung, HT | WSP4.5 | Output Compression for IC Fault Detection Using Compressive Sensing | |
SYS6.6 | Determining RF Angle of Arrival Using COTS Antenna Arrays: A Field Evaluation | ||
Kung, Ling-Bing | SYS9.6 | Ka and Ku Operational Considerations for Military SATCOM Applications | |
Kunz, Thomas | NPP2.3 | Minimum Connected Dominating Set in Realistic Tactical Radio Network Conditions | |
Kurachik, Kathleen | SYS10.3 | TITAN: Integrated Network Management in Tactical Mobile Ad Hoc Networks | |
Kure, Øivind | NPP9.1 | Admission Control and Flow Termination in Mobile Ad-hoc Networks with Pre-congestion Notification | |
Kuruganti, Teja | WSP14.2 | Event-based Transmission Line Matrix Method for Simulating Site-Specific Multipath Propagation Characteristics | |
WSP14.3 | Experimental Validation of Stochastic Wireless Urban Channel Model: Estimation and Prediction | ||
SA7.2 | Determining System Parameters for Optimal Performance of Hybrid DS/FFH Spread-Spectrum | ||
Kusyk, Janusz | NPP6.6 | Fault Tolerant Bio-Inspired Topology Control Mechanism for Autonomous Mobile Node Distribution in MANETs | |
NPP11.1 | Bio-inspired and Voronoi-based Algorithms for Self-positioning Autonomous Mobile Nodes | ||
Kwon, Hyuck | WSP11.2 | Relay Selection for AF SISO Wireless Relay Networks Under Jamming Environment with Relay Power Constraint | |
WSP14.4 | High-Efficiency Ferrite Meander Antenna (HEMA) for LTE Applications | ||
L A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
La Pan, Matthew | WSP2.3 | Jamming Attacks Against OFDM Timing Synchronization and Signal Acquisition | |
Lai, Lifeng | WSP17.2 | Quickest Change Point Identification Across a Sensor Array | |
Lam, Steven | SA4.2 | Naval Task Force Interface for Coalition Networks for Secure Information Sharing (CoNSIS) | |
Landers, Benjamin | CSTC5.1 | Certification Codes for Maliciousness Detection in Physical-layer Network Coding | |
Landmark, Lars | NPP9.1 | Admission Control and Flow Termination in Mobile Ad-hoc Networks with Pre-congestion Notification | |
Lange, Robert | SYS5.2 | Roadmap to Wide Band Optical GEO Relay Networks | |
Laubie, Ellen | NPP11.3 | Channel Characterization and Throughput Tradeoff for Wireless Sensor Networks | |
Lauf, Adrian | NPP5.2 | Distributed Aerial Reconnaissance Ad-hoc Networking Protocol | |
Lawrence, Victor | WSP8.3 | Resource Allocation for OFDM Underwater Acoustic Cooperative Transmission with Limited Feedback | |
Lawry, Tristan | WSP9.4 | High-Rate Ultrasonic Communication Through Metallic Barriers Using MIMO-OFDM Techniques | |
Lawton, Craig | SYS8.2 | Evaluating Communications System Performance Effects at a System of Systems Level | |
Le, Hai | SYS8.2 | Evaluating Communications System Performance Effects at a System of Systems Level | |
Le Martret, Christophe | WSP18.3 | Optimal Resource Allocation in HARQ-based OFDMA Wireless Networks | |
Lee, Aik Tuan | NPP10.6 | Performance Evaluation of Wireless Network Coding in TDMA Networks | |
Lee, Hyun Jin | SA7.4 | Active Buffer Management Algorithm for Silence Suppressed Voice Applications | |
Lee, Jae-Joon | NPP8.5 | Adaptive Virtual Slot for Enhancing QoS of Voice Communication in MIL-STD-188-220 | |
Lee, Jaejin | WSP14.4 | High-Efficiency Ferrite Meander Antenna (HEMA) for LTE Applications | |
Lee, John | SA1.4 | Planning & Design of Routing Architectures for Multi-Tier Military Networks | |
SYS6.1 | Building an Operation Support System for A Fast Reconfigurable Network Experimentation Testbed | ||
SYS6.5 | TimeSync: Virtual Time for Scalable, High-Fidelity Hybrid Network Emulation | ||
Lee, Jonathan | WSP14.1 | Modeling of Radiowave Propagation in Tunnels | |
Lee, Jongkwan | NPP8.4 | Distributed Dynamic Slot Assignment Scheme for Fast Broadcast Transmission in Tactical Ad Hoc Networks | |
NPP10.3 | Stability of Reservation-Contention Resolution Diversity Slotted ALOHA for Satellite Networks | ||
Lee, Junghoon | NPP9.2 | WRED Performance Analysis and Design for Tactical Satellite Communication | |
Lee, Kanghee | WSP11.2 | Relay Selection for AF SISO Wireless Relay Networks Under Jamming Environment with Relay Power Constraint | |
Lee, Keonkook | CSTC10.2 | Cooperative Jammer Design in Cellular Network with Internal Eavesdroppers | |
Lee, Kyuman | NPP8.4 | Distributed Dynamic Slot Assignment Scheme for Fast Broadcast Transmission in Tactical Ad Hoc Networks | |
Lee, Lin-Nan | WSP5.6 | Scrambled Code Multiple Access Waveform for Micro Satellite Terminals | |
Lee, MinWoo | NPP10.3 | Stability of Reservation-Contention Resolution Diversity Slotted ALOHA for Satellite Networks | |
Lee, Sangku | WSP11.2 | Relay Selection for AF SISO Wireless Relay Networks Under Jamming Environment with Relay Power Constraint | |
Lee, Seokwon | WSP16.2 | Energy-Efficient Spectrum Access for Ultra Low Power Sensor Networks | |
Lee, Seungwon | WSP10.2 | Cooperative Spectrum Sensing Based on Generalized Likelihood Ratio Test Under Impulsive Noise Circumstances | |
Lee, Sihyung | STC2.5 | Mining Diverse Opinions | |
Lee, Sung-Hyung | SA7.4 | Active Buffer Management Algorithm for Silence Suppressed Voice Applications | |
Lee, Unghee | SYS8.3 | Operationally Realistic Testing of Network Centric Tactical Applications in a Lab Environment | |
Lee, Wonju | WSP10.2 | Cooperative Spectrum Sensing Based on Generalized Likelihood Ratio Test Under Impulsive Noise Circumstances | |
Legaspi, Albert | SA4.2 | Naval Task Force Interface for Coalition Networks for Secure Information Sharing (CoNSIS) | |
Lehnert, Jim | WSP2.4 | Optimal Jamming with Codewords | |
Lei, Terence | SA5.1 | Front End Mission Modeling | |
Lenzi, Rita | SA1.1 | Extending Service-oriented Architectures to the Tactical Edge | |
SYS7.2 | Supporting Information Management and Information Superiority via Federation Services | ||
Lescrinier, Steve | NPP9.2 | WRED Performance Analysis and Design for Tactical Satellite Communication | |
Levin, Gary | SYS10.3 | TITAN: Integrated Network Management in Tactical Mobile Ad Hoc Networks | |
Li, Husheng | CSTC10.3 | Quickest Detection of GPS Spoofing Attack | |
CSTC10.1 | GPS Spoofing Attack on Time Synchronization in Wireless Networks and Detection Scheme Design | ||
Li, Jason | NPP4.2 | Low Complexity Multi-layer Optimization for Multi-hop Wireless Networks | |
Li, Li | NPP2.3 | Minimum Connected Dominating Set in Realistic Tactical Radio Network Conditions | |
NPP4.4 | Cross-layer Modeling and Analysis of Multihop Tactical Networking in Convoy Topology | ||
Li, Liangbin | WSP12.2 | Robust Receiver Algorithms to Mitigate Partial-Band and Partial-Time Interference in LDPC-coded OFDM Systems | |
Li, Margery | CSTC7.2 | The Xenon Separation VMM: Secure Virtualization Infrastructure for Military Clouds | |
Li, Ming | NPP7.4 | Enabling Secure and Reliable Policy-based Routing in MANETs | |
Li, Ming | CSTC7.4 | MUSHI: Toward Multiple Level Security Cloud with Strong Hardware Level Isolation | |
Li, Qiaolong | CSTC5.2 | Information-Guided Randomization for Wireless Physical Layer Secure Transmission | |
Li, Xia | WSP13.1 | Experimental Demonstration of Cognitive Radar for Target Localization Under Strong Interference | |
Li, Xiaohua (Edward) | WSP12.1 | An OFDM-Based Distributed Transmission Scheme for Uncoordinated Transmitters Without Carrier Frequency and Timing Synchronization | |
Li, Yanhua | STC2.1 | Measuring Bias in the Mixing Time of Social Graphs due to Graph Sampling | |
Libæk, Bjørnar | NPP9.1 | Admission Control and Flow Termination in Mobile Ad-hoc Networks with Pre-congestion Notification | |
Lightfoot, Leonard | NPP11.3 | Channel Characterization and Throughput Tradeoff for Wireless Sensor Networks | |
Lim, Jae Sung | NPP8.4 | Distributed Dynamic Slot Assignment Scheme for Fast Broadcast Transmission in Tactical Ad Hoc Networks | |
NPP8.5 | Adaptive Virtual Slot for Enhancing QoS of Voice Communication in MIL-STD-188-220 | ||
NPP8.6 | An Efficient FSN Assignment Scheme for Mitigating Multi-hop Delay in MIL-STD-188-220D Networks | ||
NPP10.3 | Stability of Reservation-Contention Resolution Diversity Slotted ALOHA for Satellite Networks | ||
WSP15.1 | Partitioned Cyclic Code Shift Keying for JTIDS | ||
Lin, Chit-Kwan | SYS6.6 | Determining RF Angle of Arrival Using COTS Antenna Arrays: A Field Evaluation | |
Lin, Feng | WSP10.3 | A Combination of Quickest Detection with Oracle Approximating Shrinkage Estimation and Its Application to Spectrum Sensing in Cognitive Radio | |
Lin, Tsung-Han | SYS6.6 | Determining RF Angle of Arrival Using COTS Antenna Arrays: A Field Evaluation | |
Lin, Yow-Jian | SYS10.3 | TITAN: Integrated Network Management in Tactical Mobile Ad Hoc Networks | |
Liu, Deli | WSP18.2 | The Sub-channel Allocation Algorithm in Femtocell Networks Based on Ant Colony Optimization | |
Liu, Haiyang | NPP2.6 | BRAVO: Potential Field-Based Routing and Network Coding for Efficient Wireless MANETs | |
Liu, Hui | CSTC4.2 | On Effective Sampling Techniques for Host-based Intrusion Detection in MANET | |
Liu, Mingyan | WSP18.1 | Online Learning in Decentralized Multi-user Spectrum Access with Synchronized Explorations | |
Liu, Xiuwen | CSTC9.4 | A Cyber-Physical Approach to a Wide-Area Actionable System for the Power Grid | |
Liu, Yonggang | SA3.3 | A Solution for Co-Service of Real-time and Non-realtime Traffic in Cellular Cognitive Radio Networks | |
Liu, Zhiqiang | WSP8.5 | Time Reversal Multicarrier Communications Over Long Multipath Fading Channels | |
WSP8.4 | Modulation Detection of Underwater Acoustic Communication Signals Through Cyclostationary Analysis | ||
Loera, Jose | WSP6.2 | Design and Implementation of a Multicarrier Spread Spectrum Communication System | |
Long, Jeffrey | WSP17.1 | High Throughput Farrow Resamplers Utilizing Reduced Complexity FIR Filters | |
Long, Wei | WSP3.1 | Joint Quantization Strategy for Uplink Cooperative Cellular Interference Alignment with Limited Feedback | |
Loos, Patrick | WSP2.1 | Design of a Multitone Firefly Time Synchronization Scheme for Responsive Vehicle-Protection Jammers | |
Lou, Chung-Yu | WSP5.3 | PER Prediction for Convolutionally Coded MIMO OFDM Systems — an Analytical Approach | |
Lou, Wenjing | CSTC7.4 | MUSHI: Toward Multiple Level Security Cloud with Strong Hardware Level Isolation | |
Lowe, Jessica | STC1.5 | Openness in Military Systems: Part 2 (Case Studies) | |
STC1.4 | Openness in Military Systems: Part 1 (Analysis & Applications) | ||
Loyall, Joseph | SA3.5 | Fault Tolerance Requirements of Tactical Information Management Systems | |
CSTC3.3 | Evaluation of Survivable Service-Oriented Systems Through Collaborative Red Teaming | ||
SYS7.1 | Beyond Line-of-Sight Information Dissemination for Force Protection | ||
Lozano, Ivan | CSTC9.4 | A Cyber-Physical Approach to a Wide-Area Actionable System for the Power Grid | |
Lu, You | NPP10.5 | Cooperative Spatial Scheduling in Distributed MIMO MAC with Interference/Concurrency Awareness | |
Lucas, François | SYS7.5 | Hybrid Solving Technique for Vehicle Planning with Communication Constraints | |
Lui, Wendy | SYS1.4 | How to Evaluate SOTM Antennas, Modems, and Architectures | |
Lund, Ketil | SA6.2 | Bandwidth optimizations for standards-based publish/subscribe in disadvantaged grids | |
Lundberg, Michael | SYS10.2 | Impact of Enclave Network Devices to the Tactical Inter-Service Architecture | |
Luo, Pengkui | STC2.1 | Measuring Bias in the Mixing Time of Social Graphs due to Graph Sampling | |
Luzio, Miguel | WSP15.5 | Efficient Receivers for SC-FDE with Offset Modulations | |
Lv, Tiejun | WSP3.1 | Joint Quantization Strategy for Uplink Cooperative Cellular Interference Alignment with Limited Feedback | |
WSP11.5 | Multi-Group Multiuser Two-Way Relay with Superposition Coding | ||
M A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
M. Y. Sanadidi | STC1.3 | Content Routing In the Vehicle Cloud | |
Ma, Jamie | CSTC6.1 | Identity-Based Internet Protocol Networking | |
Ma, Xiao | WSP14.3 | Experimental Validation of Stochastic Wireless Urban Channel Model: Estimation and Prediction | |
SA7.2 | Determining System Parameters for Optimal Performance of Hybrid DS/FFH Spread-Spectrum | ||
Macker, Joseph | SA2.4 | A Comparison of Group-based Data Persistence Techniques in MANETs | |
NPP2.1 | Temporal Stability for Dynamic Network Relay Sets | ||
NPP2.2 | Elastic Multicast for Tactical Communications | ||
NPP7.3 | Adaptive Routing for Tactical Communications | ||
STC2.4 | Dynamic Communities in Evolving Network Graphs | ||
Mahant, Suyash | CSTC8.3 | CD-PHY: Physical Layer Security in Wireless Networks through Constellation Diversity | |
Maiya, Arun | STC1.1 | Supervised Learning in the Wild: Text Classification for Critical Technologies | |
Majumdar, Chitradeep | WSP11.3 | Novel Energy Efficient Relaying Schemes for Wireless Sensor Networks | |
Manandhar, Madhabi | WSP6.5 | Iterative Decoding in SFH Communications with Reed-Solomon Codes and Channel Estimation | |
Mandayam, Narayan | WSP11.1 | Implementation of Distributed Time Exchange Based Cooperative Forwarding | |
Mange, Jeremy | SA2.2 | Non-Linear Programming Approach to Simulation of the General Adversarial Agents Problem | |
Manousakis, Kyriakos | SA4.4 | SISTO: A Proposal for Serverless Information Services for Tactical Operations | |
Mao, Xiang | SA3.3 | A Solution for Co-Service of Real-time and Non-realtime Traffic in Cellular Cognitive Radio Networks | |
Marcenaro, Lucio | NPP7.2 | Location Aware Optimized Link State Routing Protocol | |
Marchany, Randy | SA5.4 | Validating a Custom IPv6 Security Application using OPNET Modeler | |
Marcille, Sébastien | WSP18.3 | Optimal Resource Allocation in HARQ-based OFDMA Wireless Networks | |
Markowski, Michael | SA5.5 | Modeling Mobile Network Connectivity in the Presence of Jamming | |
Marques da Silva, Mario | WSP3.4 | Iterative FDE Receivers for UWB Systems with Strong Interference Levels | |
Marrotta, Rachel | SYS6.4 | Automated Performance Assessment Framework Innovation (APAFI) Project | |
Martin, Steve | CSTC9.2 | Evaluating Network Cyber Resiliency Methods using Cyber Threat, Vulnerability and Defense Modeling and Simulation | |
Masciulli, Michael | SA5.5 | Modeling Mobile Network Connectivity in the Presence of Jamming | |
Mason, Peter | CSTC8.6 | Using Covert Timing Channels for Attack Detection in MANETs | |
Mason, Thomas | SA4.3 | Position, Navigation, and Timing in the Common Operating Environment: Prototyping the PNT User Equipment Modernization Architecture | |
Mastropietro, Brian | CSTC9.2 | Evaluating Network Cyber Resiliency Methods using Cyber Threat, Vulnerability and Defense Modeling and Simulation | |
Maziku, Hellen | NPP3.6 | Enhancing the Classification Accuracy of IP Geolocation | |
McAtee, Florence | NPP5.5 | Performance Analysis of Message Prioritization in Delay Tolerant Networks | |
McAuley, Anthony | NPP3.1 | Capacity Estimation and Waveform Assignment in Military Networks | |
SA1.5 | Understanding the Delay and Loss Tradeoffs in Large Wireless Military Networks Using Queuing Analysis and MAC Models | ||
SA1.4 | Planning & Design of Routing Architectures for Multi-Tier Military Networks | ||
McCabe, Paul | SYS8.4 | Laboratory-Based End-To-End Network System of Systems Integration, Design and Risk Reduction: Critical Activity for System of Systems Integration Directorate and the Army | |
McDermott, John | CSTC7.2 | The Xenon Separation VMM: Secure Virtualization Infrastructure for Military Clouds | |
McDonald, Howard | SYS4.4 | Policy-Based Spectrum Management Architecture | |
SYS11.3 | A Phased Approach to Policy-Based Spectrum Operations | ||
McGuffin, Bruce | WSP9.2 | Mobile MIMO Capacity in Network Interference: Informed and Uninformed Transmitters | |
WSP9.6 | Spectral Efficiency of Signal Processing Radios in Interference Limited Environments: Array Processing, MIMO, and MUD | ||
SYS11.4 | Simulation of Moderate Time-Scale Dynamic Spectrum Access with Wide-Area Spectrum Sensors | ||
McGwier, Robert | SYS2.5 | Development of an Open-Source GSM Femtocell and Integrated Core Infrastructure | |
WSP2.3 | Jamming Attacks Against OFDM Timing Synchronization and Signal Acquisition | ||
McInnes, John | STC1.5 | Openness in Military Systems: Part 2 (Case Studies) | |
STC1.4 | Openness in Military Systems: Part 1 (Analysis & Applications) | ||
McLain, Christopher | SYS9.4 | High Throughput Ku-band Satellites for Aeronautical Applications | |
McNair, Janise | SA3.3 | A Solution for Co-Service of Real-time and Non-realtime Traffic in Cellular Cognitive Radio Networks | |
SYS9.3 | CubeSat Torrent: Torrent Like Distributed Communications For CubeSat Satellite Clusters | ||
Medina, Brenda | CSTC2.5 | An Efficient Common Substrings Algorithm for On-the-Fly Behavior-Based Malware Detection and Analysis | |
CSTC4.5 | Survivability Prediction of Ad Hoc Networks Under Attack | ||
Melchior, Andrew | SYS5.6 | Evaluation of the Expansion of Joint IP Modem to Support DVB-RCS2 | |
Meltzner, Geoffrey | WSP17.3 | Signal Processing Advances for the MUTE sEMG Based Silent Speech Recognition System | |
Mendoza, Humberto | CSTC2.5 | An Efficient Common Substrings Algorithm for On-the-Fly Behavior-Based Malware Detection and Analysis | |
Merchant, Shabbir | WSP11.3 | Novel Energy Efficient Relaying Schemes for Wireless Sensor Networks | |
WSP14.6 | MPTA: Modified Polymer Textile Antennas for Green Symbiotic Cloud Communications | ||
Metzler, James | SYS3.4 | An Architecture to Support Information Availability in the Tactical Domain | |
Meusling, Askold | WSP2.1 | Design of a Multitone Firefly Time Synchronization Scheme for Responsive Vehicle-Protection Jammers | |
Micallef, Josephine | CSTC8.2 | Detection of Global Metamorphic Malware Variants Using Control and Data Flow Analysis | |
Michaels, Alan | WSP6.1 | Pulse Rotation Modulations for Spread Spectrum Communication Systems | |
Mietzner, Jan | WSP2.1 | Design of a Multitone Firefly Time Synchronization Scheme for Responsive Vehicle-Protection Jammers | |
Mildon, Zach | NPP3.4 | Tiny Bubbles: A Fault-Tolerant Distributed Overlay for Networks with Block-Churn | |
Milligan, James | SYS7.2 | Supporting Information Management and Information Superiority via Federation Services | |
Mills, Scott | SYS9.6 | Ka and Ku Operational Considerations for Military SATCOM Applications | |
Miner, Nadine | SYS8.2 | Evaluating Communications System Performance Effects at a System of Systems Level | |
Mishra, Amitabh | NPP13.1 | Games Applied to Jam Resistant DSA Radios | |
Mody, Apurva | SYS4.4 | Policy-Based Spectrum Management Architecture | |
Moeltner, Kim | CSTC2.3 | Detecting Communication Anomalies in Tactical Networks via Graph Learning | |
SYS10.3 | TITAN: Integrated Network Management in Tactical Mobile Ad Hoc Networks | ||
NPP12.3 | A GNU-Based Packet Radio for Network Management Field Testing | ||
Mohaisen, David | STC2.1 | Measuring Bias in the Mixing Time of Social Graphs due to Graph Sampling | |
Mohapatra, Prasant | STC1.2 | Inferring User Relationship from Hidden Information in WLANs | |
CSTC7.1 | Chaining for Securing Data Provenance in Distributed Information Networks | ||
Molnar, Joe | WSP10.6 | The False Positive Congestion Problem and Probabilistic Spectrum Sensing | |
Montezuma, Paulo | WSP3.4 | Iterative FDE Receivers for UWB Systems with Strong Interference Levels | |
WSP7.6 | Frequency-Domain Receiver Design for Fast Varying Channels | ||
WSP8.1 | ML-Based Receivers for Underwater Networks Using OFDM Signals with Strong Nonlinear Distortion Effects | ||
WSP15.5 | Efficient Receivers for SC-FDE with Offset Modulations | ||
Montrose, Bruce | CSTC7.2 | The Xenon Separation VMM: Secure Virtualization Infrastructure for Military Clouds | |
Moody, Jay | SYS9.5 | Transformational Satellite Communications System (TSAT) Lessons Learned | |
Moore, David | SYS5.1 | Enabling Fractionated Spacecraft Communications Using F6WICS | |
Moore, Scott | NPP5.1 | A Comparison of MANET Routing Protocols on Airborne Tactical Networks | |
Moradi, Hussein | WSP6.2 | Design and Implementation of a Multicarrier Spread Spectrum Communication System | |
Morelli, Alessandro | SA1.1 | Extending Service-oriented Architectures to the Tactical Edge | |
SA1.2 | Supporting COTS Applications in Tactical Edge Networks | ||
Morey, Christopher | SYS6.4 | Automated Performance Assessment Framework Innovation (APAFI) Project | |
Morris, David | NPP3.2 | The Normalized Bushmitch-Fikus-Hamrick (NBFH) Metric | |
Motzigemba, Matthias | SYS5.2 | Roadmap to Wide Band Optical GEO Relay Networks | |
Moura, David | WSP2.2 | Anti-Jamming Defense Mechanism in Cognitive Radios Networks | |
Movva, Aravind | SYS5.5 | NMT X/Ka Tri-Band Antennas | |
Mui, Brandon | SYS5.5 | NMT X/Ka Tri-Band Antennas | |
Murthy, Rohit | SYS1.3 | Performance Criteria Affecting Pointing Error and the Impact on Total Cost of Ownership | |
Mustafa, HD | WSP14.6 | MPTA: Modified Polymer Textile Antennas for Green Symbiotic Cloud Communications | |
N A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
N Masilamani, Ashok | NPP8.1 | VCMA: Efficient Channel Access in Wireless Mesh Networks Using Virtual Coordinates | |
Nahrstedt, Klara | SA6.4 | Sangam - Efficient Cellular-WiFi Group Framework for File Sharing Service | |
Nakamoto, Shu | CSTC6.1 | Identity-Based Internet Protocol Networking | |
Nakarmi, Ukash | WSP4.1 | BCS: Compressive Sensing for Binary Sparse Signals | |
Nandakumar, Vikrant | CSTC7.5 | Polite: A Policy Framework for Building Managed Mobile Apps | |
Naraghi-Pour, Mort | WSP10.4 | Performance Analysis of Spectrum Monitoring for Cognitive Radios | |
WSP10.5 | Spectrum Monitoring for Cognitive Radios in Rayleigh Fading Channel | ||
CSTC8.5 | Distributed Detection in Wireless Sensor Networks in the Presence of Misbehaving Nodes | ||
Narayanan, Sathya | NPP5.5 | Performance Analysis of Message Prioritization in Delay Tolerant Networks | |
Narula-Tam, Aradhana | NPP5.3 | Scheduling vs. Random Access in Frequency Hopped Airborne Networks | |
Nath, Somdatta | SA6.1 | Web Services: Design Choices for Space Ground System Integration | |
Newkirk, Richard | SYS7.1 | Beyond Line-of-Sight Information Dissemination for Force Protection | |
Newman, Scott | SYS6.2 | Laboratory Evaluation of Military Radios and Network Architectures | |
Nguyen, Dung | CSTC3.5 | Sources of Misinformation in Online Social Networks: Who to suspect? | |
Nguyen, Dzung | WSP4.6 | Chemical Plume Detection in Hyperspectral Imagery Via Joint Sparse Representation | |
Nguyen, James | SYS6.1 | Building an Operation Support System for A Fast Reconfigurable Network Experimentation Testbed | |
Nguyen, Lan | WSP6.6 | A Quick Pull-In Timing Recovery Technique for Frequency Hopped Systems | |
Nguyen, Nam | CSTC3.5 | Sources of Misinformation in Online Social Networks: Who to suspect? | |
STC2.2 | Finding Overlapped Communities in Online Social Networks with Nonnegative Matrix Factorization | ||
Nguyen, Truc Anh | NPP5.4 | Opportunistic Transport for Disrupted Airborne Networks | |
Nguyen, Tuan | SA4.2 | Naval Task Force Interface for Coalition Networks for Secure Information Sharing (CoNSIS) | |
Nickel, Patrick | WSP2.1 | Design of a Multitone Firefly Time Synchronization Scheme for Responsive Vehicle-Protection Jammers | |
Nicol, David | CSTC3.2 | Security and Provenance in M3GS for Cross-domain Information Sharing | |
Nilsen, Ryan | SYS6.2 | Laboratory Evaluation of Military Radios and Network Architectures | |
Nilsson, Jan | NPP2.4 | Robust MPR-based Flooding in Mobile Ad-hoc Networks | |
Noh, Gosan | WSP16.2 | Energy-Efficient Spectrum Access for Ultra Low Power Sensor Networks | |
Noh, Hong Jun | NPP10.3 | Stability of Reservation-Contention Resolution Diversity Slotted ALOHA for Satellite Networks | |
WSP15.1 | Partitioned Cyclic Code Shift Keying for JTIDS | ||
Noneaker, Daniel | WSP6.5 | Iterative Decoding in SFH Communications with Reed-Solomon Codes and Channel Estimation | |
Norko, Marissa | WSP4.3 | Scalable Spectrum Situational Awareness Using Devices of Opportunity | |
Numanoglu, Tolga | SA5.2 | An Embedded Radio Software Emulation Platform Using OPNET and VxWorks to Develop Distributed Algorithms for Military Ad-Hoc Networks | |
Nutaro, James | WSP14.2 | Event-based Transmission Line Matrix Method for Simulating Site-Specific Multipath Propagation Characteristics | |
O A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Ochiai, Hideki | WSP16.3 | Energy Minimization of Wireless Sensor Networks Based on Modulation and Coding Optimization Under Finite Frame Length Constraint | |
Offner, James | SYS11.1 | Criteria for Multi-Carrier X-band Intermodulation Products in the Receive Band | |
Ogden, Roger | SA4.2 | Naval Task Force Interface for Coalition Networks for Secure Information Sharing (CoNSIS) | |
Ogle, William | WSP4.3 | Scalable Spectrum Situational Awareness Using Devices of Opportunity | |
Oh, Soon | NPP7.6 | Network Coding over a MANET Proactive Link State Routing Protocol and TDMA Scheduling | |
Oh, Young-Hyun | CSTC5.4 | Limitations of Quorum-based Rendezvous and Key Establishment Schemes against Sophisticated Jamming Attacks | |
Olabiyi, Oluwatobi | WSP15.6 | Some Remarks on the Dirac Delta Function Approximation for ASER Analysis of Digital Modulations Over Fading Channels | |
NPP10.1 | Cross-Layer Throughput Optimization for Delay and QoS Constrained Applications | ||
Olama, Mohammed | SA7.2 | Determining System Parameters for Optimal Performance of Hybrid DS/FFH Spread-Spectrum | |
Olds, Keith | SA2.3 | Quantifying the Relative Merits of Genetic and Swarm Algorithms for Network Optimization in Cognitive Radio Networks | |
Oleska, Joseph | SYS8.3 | Operationally Realistic Testing of Network Centric Tactical Applications in a Lab Environment | |
Orlando, Gerardo | CSTC2.1 | A Case for Trusted Sensors: Encryptors with Deep Packet Inspection Capabilities | |
Orlik, Philip | WSP12.2 | Robust Receiver Algorithms to Mitigate Partial-Band and Partial-Time Interference in LDPC-coded OFDM Systems | |
Orooji, Mahdi | WSP10.4 | Performance Analysis of Spectrum Monitoring for Cognitive Radios | |
WSP10.5 | Spectrum Monitoring for Cognitive Radios in Rayleigh Fading Channel | ||
CSTC8.5 | Distributed Detection in Wireless Sensor Networks in the Presence of Misbehaving Nodes | ||
Oursler, Justin | NPP5.2 | Distributed Aerial Reconnaissance Ad-hoc Networking Protocol | |
Ovsthus, Knut | NPP9.3 | TCP challenges in hybrid military satellite networks; measurements and comparison | |
P A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Pak, Ui Young | WSP13.2 | Enhanced Monopulse MIMO Radar Using Reliable Αβ Filtering | |
Pal, Partha | CSTC3.3 | Evaluation of Survivable Service-Oriented Systems Through Collaborative Red Teaming | |
Paloulian, George | SA3.2 | Dynamic Communication Resource Negotiations | |
Pandey, Parul | WSP3.2 | Leveraging Mobile Grid Computing for Interference Alignment and Cancelation | |
Panthi, Sunil | SYS9.4 | High Throughput Ku-band Satellites for Aeronautical Applications | |
Park, Sang jae | NPP8.6 | An Efficient FSN Assignment Scheme for Mitigating Multi-hop Delay in MIL-STD-188-220D Networks | |
Park, Sungjin | NPP11.5 | Cooperative Communication with Joint Optimization of Cluster size and Resource Allocation in Wireless Sensor Networks | |
Park, Sungjoon | NPP1.2 | Opportunistic Dual Timer Relay Selection in MIMO Relay Networks | |
Park, Sungsoo | WSP16.2 | Energy-Efficient Spectrum Access for Ultra Low Power Sensor Networks | |
Park, Yosub | WSP16.2 | Energy-Efficient Spectrum Access for Ultra Low Power Sensor Networks | |
Pasiliao, Eduardo | NPP6.1 | Particle Filter Based Average Consensus Target Tracking with Preservation of Network Connectivity | |
NPP10.2 | Throughput Maximization in CSMA Networks with Collisions | ||
Patel, Hiren | CSTC1.2 | Differential Power Analysis Using Wavelet Decomposition | |
CSTC10.4 | GPU Accelerated Differential Power Analysis | ||
Patel, Mitesh | NPP3.1 | Capacity Estimation and Waveform Assignment in Military Networks | |
Patel, Mitesh | SA1.5 | Understanding the Delay and Loss Tradeoffs in Large Wireless Military Networks Using Queuing Analysis and MAC Models | |
SA1.4 | Planning & Design of Routing Architectures for Multi-Tier Military Networks | ||
NPP8.3 | TDMA Scheduling and Channel Assignment for Cognitive Tactical Networks | ||
Patel, Samir | SYS9.6 | Ka and Ku Operational Considerations for Military SATCOM Applications | |
Pathapati, Kamakshi | NPP5.4 | Opportunistic Transport for Disrupted Airborne Networks | |
Payne, Charles | CSTC3.3 | Evaluation of Survivable Service-Oriented Systems Through Collaborative Red Teaming | |
Pedan, Igor | SA3.4 | An Open Source Situational Awareness Display for Administering Heterogeneous Networks on the Tactical Edge | |
SYS7.4 | Comparing Radio-to-Router Interface Implementations on Experimental CoTs and Open Source Routers | ||
Pereira, Ashwin | NPP5.2 | Distributed Aerial Reconnaissance Ad-hoc Networking Protocol | |
Pereira, Gaelen | WSP3.5 | Addressing IQ Mismatch in Spatial Interference Suppression Systems | |
SYS11.2 | Increasing Network Area Spectral Efficiency by combining multiple PHY techniques | ||
Perrins, Erik | WSP7.2 | The Cramer-Rao Bound for Data-Aided Synchronization of SOQPSK | |
Peterson, Christopher | NPP3.3 | An Enterprise-wide Approach to GIG Internet Protocol Multicast | |
Pharris, Paul | NPP5.2 | Distributed Aerial Reconnaissance Ad-hoc Networking Protocol | |
Pietryka, Frank | CSTC9.2 | Evaluating Network Cyber Resiliency Methods using Cyber Threat, Vulnerability and Defense Modeling and Simulation | |
Pinola, Jarno | NPP13.2 | An Experimental Study on Jamming Tolerance of 3G/WCDMA | |
Pinto, Robert | SYS1.5 | Low Cost MEMS based INS for land-based MILITARY SATCOM OTM | |
Piri, Esa | NPP13.2 | An Experimental Study on Jamming Tolerance of 3G/WCDMA | |
Pisano, David | CSTC6.1 | Identity-Based Internet Protocol Networking | |
SYS9.2 | IP Networking over the AEHF MILSATCOM System | ||
Pompili, Dario | WSP3.2 | Leveraging Mobile Grid Computing for Interference Alignment and Cancelation | |
Porter, Rick | CSTC6.3 | Guest-Transparent Instruction Authentication for Self-Patching Kernels | |
Posherstnik, Yuriy | SYS4.4 | Policy-Based Spectrum Management Architecture | |
Potier, Paul | SYS10.6 | Performance Management in Cognitive Radio Ad Hoc Networks using Congestion based Metric | |
Potter, John | SYS6.3 | A test bed for collaborative development of underwater communications and networking | |
Poylisher, Alexander | SYS6.1 | Building an Operation Support System for A Fast Reconfigurable Network Experimentation Testbed | |
SYS6.5 | TimeSync: Virtual Time for Scalable, High-Fidelity Hybrid Network Emulation | ||
SYS10.3 | TITAN: Integrated Network Management in Tactical Mobile Ad Hoc Networks | ||
Pozzo, Fabio | NPP7.2 | Location Aware Optimized Link State Routing Protocol | |
Pratt, Thomas | WSP9.1 | Bounding the Ergodic Capacity of Asymmetric 2x2 Dual-Polarized Channels | |
Prince, Gregary | SYS4.2 | A Comparison of Open Architecture Standards for the Development of Complex Military Systems: GRA, FACE, SCA NeXT | |
Prokkola, Jarmo | NPP13.2 | An Experimental Study on Jamming Tolerance of 3G/WCDMA | |
Pruitt, Jeremy | SYS5.1 | Enabling Fractionated Spacecraft Communications Using F6WICS | |
Punihaole, Thomas | STC1.3 | Content Routing In the Vehicle Cloud | |
Punnoose, Ratish | WSP3.6 | Focusing a Radio Signal and Simultaneously Nulling It At Another Location Using Time-Reversal: Experimental Results | |
Pursley, Michael | WSP5.4 | Adaptive-Rate Channel Coding for Packet Radio Systems with Higher Layer Fountain Coding | |
Q A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Qian, Lijun | SYS10.6 | Performance Management in Cognitive Radio Ad Hoc Networks using Congestion based Metric | |
CSTC10.1 | GPS Spoofing Attack on Time Synchronization in Wireless Networks and Detection Scheme Design | ||
CSTC10.3 | Quickest Detection of GPS Spoofing Attack | ||
Qiu, Robert | WSP10.3 | A Combination of Quickest Detection with Oracle Approximating Shrinkage Estimation and Its Application to Spectrum Sensing in Cognitive Radio | |
WSP13.1 | Experimental Demonstration of Cognitive Radar for Target Localization Under Strong Interference | ||
Quang, Randy | CSTC6.1 | Identity-Based Internet Protocol Networking | |
Quock, Kensing | SYS5.6 | Evaluation of the Expansion of Joint IP Modem to Support DVB-RCS2 | |
R A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Raciti, Massimiliano | CSTC4.6 | Best-Effort Data Leakage Prevention in Inter-Organizational Tactical MANETs | |
Rahmes, Mark | SA3.1 | A Qualitative and Quantitative Method for Predicting Sentiment Toward Deployed U.S. Forces | |
Rahnavard, Nazanin | WSP4.1 | BCS: Compressive Sensing for Binary Sparse Signals | |
Ramirez-Mireles, Fernando | WSP15.4 | Analysis of M-ary UWB FSK Detected Using Two Passband Filters Considering Antenna and Multipath Effects | |
Ramsey, Benjamin | CSTC5.3 | An RF-DNA Verification Process for ZigBee Networks | |
Ran, Rong | WSP13.2 | Enhanced Monopulse MIMO Radar Using Reliable Αβ Filtering | |
Ranjha, Bilal | WSP12.4 | Interference Analysis of Interleaved and Localized Mapping Schemes in OFDMA System with Carrier Frequency Offset | |
Rausch, Kurt | SYS6.4 | Automated Performance Assessment Framework Innovation (APAFI) Project | |
Rebholz, Matthew | SYS11.4 | Simulation of Moderate Time-Scale Dynamic Spectrum Access with Wide-Area Spectrum Sensors | |
Redding, Eric | SA4.1 | Government Reference Architecture Dataplane Gateway | |
Reed, Edwards | CSTC7.3 | A High-assurance, Virtual Guard Architecture | |
Reed, Jeffrey | SYS2.5 | Development of an Open-Source GSM Femtocell and Integrated Core Infrastructure | |
Regazzoni, Carlo | NPP7.2 | Location Aware Optimized Link State Routing Protocol | |
Regli, William | SA4.4 | SISTO: A Proposal for Serverless Information Services for Tactical Operations | |
Renodin, Matthew | SYS3.4 | An Architecture to Support Information Availability in the Tactical Domain | |
Reschly, Robert | CSTC4.2 | On Effective Sampling Techniques for Host-based Intrusion Detection in MANET | |
Rhodes, Darnell | SYS10.2 | Impact of Enclave Network Devices to the Tactical Inter-Service Architecture | |
Richardson, Bryan | CSTC9.3 | Supervisory Command and Data Acquisition (SCADA) System Cyber Security Analysis Using a Live, Virtual, and Constructive (LVC) Testbed | |
Richardson, Kevin | SYS4.3 | SCA4 - An Evolved Framework | |
Ripplinger, David | NPP5.3 | Scheduling vs. Random Access in Frequency Hopped Airborne Networks | |
Ristaniemi, Tapani | NPP1.5 | Resource Allocation for Cooperative Relay-assisted OFDMA Networks with Imperfect CSI | |
Rittenbach, Tom | SYS4.2 | A Comparison of Open Architecture Standards for the Development of Complex Military Systems: GRA, FACE, SCA NeXT | |
SA4.1 | Government Reference Architecture Dataplane Gateway | ||
Roberts, Bill | SYS6.4 | Automated Performance Assessment Framework Innovation (APAFI) Project | |
Robertson, Andrew | WSP10.6 | The False Positive Congestion Problem and Probabilistic Spectrum Sensing | |
Robertson, Scott | WSP17.4 | Region-of-interest Video Coding for Enabling Surgical Telementoring in Low-Bandwidth Scenarios | |
Rocco Giraldi, Maria Thereza | WSP6.3 | Performance Analysis of a 2D Double Hard-Limited OCDMA System Over FSO Link Under Strong Turbulence for Defense Applications | |
Rodrigues, Gilberto | WSP6.3 | Performance Analysis of a 2D Double Hard-Limited OCDMA System Over FSO Link Under Strong Turbulence for Defense Applications | |
Rogers, Tamara | NPP3.6 | Enhancing the Classification Accuracy of IP Geolocation | |
Roh, Byeong-hee | SA7.4 | Active Buffer Management Algorithm for Silence Suppressed Voice Applications | |
Rohrer, Justin | NPP5.4 | Opportunistic Transport for Disrupted Airborne Networks | |
Roque, Damien | WSP5.2 | A Low-Complexity Multicarrier Scheme with LDPC Coding for Mobile-to-Mobile Environment | |
Rosenfeld, Aaron | SA2.4 | A Comparison of Group-based Data Persistence Techniques in MANETs | |
Rucker, Gregory | NPP13.1 | Games Applied to Jam Resistant DSA Radios | |
Rutagemwa, Humphrey | NPP2.3 | Minimum Connected Dominating Set in Realistic Tactical Radio Network Conditions | |
NPP4.4 | Cross-layer Modeling and Analysis of Multihop Tactical Networking in Convoy Topology | ||
Ryu, Heung-Gyoon | WSP4.2 | Analysis and Design of QAPM Modulation Using Compressive Sensing for Low Power Communication | |
Ryu, Young-Jae | WSP13.2 | Enhanced Monopulse MIMO Radar Using Reliable Αβ Filtering | |
S A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Saam, Thomas | SYS11.1 | Criteria for Multi-Carrier X-band Intermodulation Products in the Receive Band | |
Sagduyu, Yalin | NPP4.2 | Low Complexity Multi-layer Optimization for Multi-hop Wireless Networks | |
Sahin, Cem | NPP6.6 | Fault Tolerant Bio-Inspired Topology Control Mechanism for Autonomous Mobile Node Distribution in MANETs | |
NPP11.1 | Bio-inspired and Voronoi-based Algorithms for Self-positioning Autonomous Mobile Nodes | ||
Salles, Ronaldo | WSP2.2 | Anti-Jamming Defense Mechanism in Cognitive Radios Networks | |
Salmanian, Mazda | NPP7.4 | Enabling Secure and Reliable Policy-based Routing in MANETs | |
Samtani, Sunil | SA4.4 | SISTO: A Proposal for Serverless Information Services for Tactical Operations | |
Sanderson, Joshua | WSP7.1 | Blind Frequency Offset Estimation and Intercarrier Interference Cancelation for FD-MC-CDMA Systems in Aerial Vehicle Communication | |
Sapello, Christopher | SYS10.3 | TITAN: Integrated Network Management in Tactical Mobile Ad Hoc Networks | |
NPP12.3 | A GNU-Based Packet Radio for Network Management Field Testing | ||
Sass, Paul | SYS6.2 | Laboratory Evaluation of Military Radios and Network Architectures | |
Satake, Hiroshi | SYS4.2 | A Comparison of Open Architecture Standards for the Development of Complex Military Systems: GRA, FACE, SCA NeXT | |
SA4.1 | Government Reference Architecture Dataplane Gateway | ||
Saulnier, Gary | WSP9.4 | High-Rate Ultrasonic Communication Through Metallic Barriers Using MIMO-OFDM Techniques | |
Scally, Andrew | SYS7.1 | Beyond Line-of-Sight Information Dissemination for Force Protection | |
Scarton, Henry | WSP9.4 | High-Rate Ultrasonic Communication Through Metallic Barriers Using MIMO-OFDM Techniques | |
Schell, Roger | CSTC7.3 | A High-assurance, Virtual Guard Architecture | |
Schindler, Jeffrey | SYS6.2 | Laboratory Evaluation of Military Radios and Network Architectures | |
Schloemann, Javier | NPP6.2 | On the Value of Collaboration in Anchorless Robot Self-Localization | |
Schmid, Natalia | WSP16.4 | Distributed Estimation of a Parametric Field Using Sparse Noisy Data | |
Schroeder, Jim | SA2.3 | Quantifying the Relative Merits of Genetic and Swarm Algorithms for Network Optimization in Cognitive Radio Networks | |
Schroth, Katie | SYS9.2 | IP Networking over the AEHF MILSATCOM System | |
Schultz, John | SA1.3 | Collaborative Applications at the Tactical Edge through Resilient Group Dissemination in DTN | |
Scilla, Chris | SYS6.1 | Building an Operation Support System for A Fast Reconfigurable Network Experimentation Testbed | |
Scott, Lisa | SYS4.5 | Type Based Abstraction for QoI Aware Applications | |
Segura, Ramon | SYS10.1 | Next Generation NATO Satcom Management and Control Services | |
Sen, Soumya | NPP11.4 | Analysis of Slotted ALOHA with Multipacket Messages in Clustered Surveillance Networks | |
Serban, Constantin | SYS6.1 | Building an Operation Support System for A Fast Reconfigurable Network Experimentation Testbed | |
SYS6.5 | TimeSync: Virtual Time for Scalable, High-Fidelity Hybrid Network Emulation | ||
SYS10.3 | TITAN: Integrated Network Management in Tactical Mobile Ad Hoc Networks | ||
NPP12.3 | A GNU-Based Packet Radio for Network Management Field Testing | ||
Seskar, Ivan | WSP11.1 | Implementation of Distributed Time Exchange Based Cooperative Forwarding | |
Seyedi, Alireza | WSP16.1 | Detection of a Non-Cooperative Transmitter in Rayleigh Fading with Binary Observations | |
Shah, Dhaval | SA4.1 | Government Reference Architecture Dataplane Gateway | |
Shah, Jiral | SYS6.2 | Laboratory Evaluation of Military Radios and Network Architectures | |
Shahan, Patrick | SA7.1 | Comparison of TSVCIS Voice at 8000 and 12000 bps versus CVSD at 16000 bps | |
Shallcross, David | NPP8.3 | TDMA Scheduling and Channel Assignment for Cognitive Tactical Networks | |
Shea, John | NPP10.2 | Throughput Maximization in CSMA Networks with Collisions | |
Shen, Bao-Hong | NPP7.6 | Network Coding over a MANET Proactive Link State Routing Protocol and TDMA Scheduling | |
Shen, Yilin | CSTC6.5 | An Efficient Spectral Bound for Link Vulnerability Assessment in Large-scale Networks | |
CSTC8.4 | Adaptive Algorithms for Detecting Critical Links and Nodes in Dynamic Networks | ||
Sherman, Matthew | SYS4.4 | Policy-Based Spectrum Management Architecture | |
Shetty, Sachin | NPP3.6 | Enhancing the Classification Accuracy of IP Geolocation | |
Shi, Feng | WSP5.1 | Quasi-Cyclic Low-Density Parity-Check Stabilizer Codes | |
Shi, Liqi | NPP11.6 | An Energy-efficient Transmission Scheme for Monitoring of Combat Soldier Health in Tactical Mobile Ad Hoc Networks | |
Shi, Minghui | NPP2.5 | A Multicast Routing Technique for Tactical Networks | |
Shi, Yi | NPP4.2 | Low Complexity Multi-layer Optimization for Multi-hop Wireless Networks | |
Shin, Hyojeong | NPP6.5 | A Pedestrian Tracking System Using Group Mobility Information | |
Shin, HyunKeun | NPP8.6 | An Efficient FSN Assignment Scheme for Mitigating Multi-hop Delay in MIL-STD-188-220D Networks | |
Shin, Kyung-Seop | NPP11.5 | Cooperative Communication with Joint Optimization of Cluster size and Resource Allocation in Wireless Sensor Networks | |
Shin, Sang-heon | SA7.4 | Active Buffer Management Algorithm for Silence Suppressed Voice Applications | |
Shoari, Arian | WSP16.1 | Detection of a Non-Cooperative Transmitter in Rayleigh Fading with Binary Observations | |
Shroyer, Timothy | SYS1.1 | Satcom-On-the-Move Why One Size Doesn't Fit All | |
Shukla, Shubham | WSP14.6 | MPTA: Modified Polymer Textile Antennas for Green Symbiotic Cloud Communications | |
Shur, David | SA4.4 | SISTO: A Proposal for Serverless Information Services for Tactical Operations | |
Si, Wei | NPP5.6 | Prioritized Data Synchronization for Disruption Tolerant Networks | |
Sica, Michael | SYS3.2 | A Policy-based Approach to Automated Data Reduction for Intelligence, Surveillance, and Reconnaissance Systems | |
Siclet, Cyrille | WSP5.2 | A Low-Complexity Multicarrier Scheme with LDPC Coding for Mobile-to-Mobile Environment | |
Sigholm, Johan | CSTC4.6 | Best-Effort Data Leakage Prevention in Inter-Organizational Tactical MANETs | |
Silva, Fábio | WSP7.6 | Frequency-Domain Receiver Design for Fast Varying Channels | |
Sinclair, Asher | CSTC3.3 | Evaluation of Survivable Service-Oriented Systems Through Collaborative Red Teaming | |
Sinkar, Kaustubh | SA1.5 | Understanding the Delay and Loss Tradeoffs in Large Wireless Military Networks Using Queuing Analysis and MAC Models | |
SA1.4 | Planning & Design of Routing Architectures for Multi-Tier Military Networks | ||
NPP12.3 | A GNU-Based Packet Radio for Network Management Field Testing | ||
Skjervold, Espen | SA6.2 | Bandwidth optimizations for standards-based publish/subscribe in disadvantaged grids | |
Slatt, Edward | SYS6.4 | Automated Performance Assessment Framework Innovation (APAFI) Project | |
Sliwa, Joanna | SA6.5 | Efficiency of dynamic content adaptation based on semantic description of web service call context | |
Smith, Eric | CSTC1.4 | The Glowworm hash: Increased Speed and Security for BBC Unkeyed Jam Resistance | |
Smith, Mark | SYS8.2 | Evaluating Communications System Performance Effects at a System of Systems Level | |
Smith, Stephen | SA7.2 | Determining System Parameters for Optimal Performance of Hybrid DS/FFH Spread-Spectrum | |
Snyder, Shane | CSTC6.3 | Guest-Transparent Instruction Authentication for Self-Patching Kernels | |
CSTC8.2 | Detection of Global Metamorphic Malware Variants Using Control and Data Flow Analysis | ||
Solomon, Abigail | STC1.4 | Openness in Military Systems: Part 1 (Analysis & Applications) | |
STC1.5 | Openness in Military Systems: Part 2 (Case Studies) | ||
Soltanmohammadi, Erfan | WSP10.5 | Spectrum Monitoring for Cognitive Radios in Rayleigh Fading Channel | |
WSP10.4 | Performance Analysis of Spectrum Monitoring for Cognitive Radios | ||
CSTC8.5 | Distributed Detection in Wireless Sensor Networks in the Presence of Misbehaving Nodes | ||
Song, Iickho | WSP10.2 | Cooperative Spectrum Sensing Based on Generalized Likelihood Ratio Test Under Impulsive Noise Circumstances | |
Song, Mei | NPP4.1 | Energy Efficient Stochastic Power Scheduling Scheme for Wireless Cellular Networks | |
Song, Ronggong | CSTC4.3 | LAA: Link-Layer Anonymous Access for Tactical MANETs | |
Sonnenberg, Christian | SA5.3 | Modeling Handheld Usability for Military-Based Devices | |
Sonnenberg, Jerome | SA2.3 | Quantifying the Relative Merits of Genetic and Swarm Algorithms for Network Optimization in Cognitive Radio Networks | |
Sridhar, Anjali | SA6.4 | Sangam - Efficient Cellular-WiFi Group Framework for File Sharing Service | |
Sridhar, Ramalingam | CSTC8.3 | CD-PHY: Physical Layer Security in Wireless Networks through Constellation Diversity | |
Srivastava, Niraj | CSTC9.2 | Evaluating Network Cyber Resiliency Methods using Cyber Threat, Vulnerability and Defense Modeling and Simulation | |
Srivatsa, Mudhakar | STC2.5 | Mining Diverse Opinions | |
Srostlik, Zuzana | SA3.2 | Dynamic Communication Resource Negotiations | |
Stachura, Max | WSP17.4 | Region-of-interest Video Coding for Enabling Surgical Telementoring in Low-Bandwidth Scenarios | |
Stanley, Dannie | CSTC6.3 | Guest-Transparent Instruction Authentication for Self-Patching Kernels | |
Stark, Wayne | NPP1.2 | Opportunistic Dual Timer Relay Selection in MIMO Relay Networks | |
NPP4.3 | On The Effects of Transmit Power Control on the Performance of Wireless Networks | ||
Starobinski, David | NPP5.6 | Prioritized Data Synchronization for Disruption Tolerant Networks | |
Stefanelli, Cesare | SA1.2 | Supporting COTS Applications in Tactical Edge Networks | |
Steinbrecher, Gregory | NPP12.1 | Cross-Layer Design to Maintain Earthquake Sensor Network Connectivity After Loss of Infrastructure | |
Stephens, Donald | SYS4.3 | SCA4 - An Evolved Framework | |
Sterbenz, James | NPP5.4 | Opportunistic Transport for Disrupted Airborne Networks | |
Sterling, Joshua | SYS7.1 | Beyond Line-of-Sight Information Dissemination for Force Protection | |
Sternberg, Gregory | NPP8.2 | System Capacity and Coverage of a Cellular Network with D2D Mobile Relays | |
Sterner, Ulf | NPP2.4 | Robust MPR-based Flooding in Mobile Ad-hoc Networks | |
Still, Garrison | SA5.5 | Modeling Mobile Network Connectivity in the Presence of Jamming | |
Stout, William | CSTC3.4 | Network Performance Impact of Access Control Policies in Tactical Wireless Networks | |
Sturza, Mark | SYS9.4 | High Throughput Ku-band Satellites for Aeronautical Applications | |
Su, Sixi | WSP3.1 | Joint Quantization Strategy for Uplink Cooperative Cellular Interference Alignment with Limited Feedback | |
Suarez, Cesar | SYS9.6 | Ka and Ku Operational Considerations for Military SATCOM Applications | |
Subramanian, Sankrith | NPP10.2 | Throughput Maximization in CSMA Networks with Collisions | |
Sultan, Florin | SYS6.5 | TimeSync: Virtual Time for Scalable, High-Fidelity Hybrid Network Emulation | |
Sultan, Florin | SYS6.1 | Building an Operation Support System for A Fast Reconfigurable Network Experimentation Testbed | |
SYS10.3 | TITAN: Integrated Network Management in Tactical Mobile Ad Hoc Networks | ||
Sungnam, Lee | NPP6.5 | A Pedestrian Tracking System Using Group Mobility Information | |
Suri, Niranjan | SA1.1 | Extending Service-oriented Architectures to the Tactical Edge | |
SA1.2 | Supporting COTS Applications in Tactical Edge Networks | ||
SYS7.2 | Supporting Information Management and Information Superiority via Federation Services | ||
Swain Walsh, Darcy | SYS11.3 | A Phased Approach to Policy-Based Spectrum Operations | |
Swami, Ananthram | STC2.3 | The Effect of Zealotry in the Naming Game Model of Opinion Dynamics | |
Syslo, Ryan | WSP14.4 | High-Efficiency Ferrite Meander Antenna (HEMA) for LTE Applications | |
Szeto, Katherine | NPP5.3 | Scheduling vs. Random Access in Frequency Hopped Airborne Networks | |
T A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Talarico, Salvatore | WSP6.4 | Optimization of a Finite Frequency-Hopping Ad Hoc Network in Nakagami Fading | |
Talebi, Farzad | WSP9.1 | Bounding the Ergodic Capacity of Asymmetric 2x2 Dual-Polarized Channels | |
Tamer, Goksel | WSP17.4 | Region-of-interest Video Coding for Enabling Surgical Telementoring in Low-Bandwidth Scenarios | |
Tang, Helen | CSTC4.1 | A Game Theoretic Approach for Security and Quality of Service (QoS) Co-Design in MANETs with Cooperative Communications | |
CSTC4.3 | LAA: Link-Layer Anonymous Access for Tactical MANETs | ||
Tapley, Mark | SYS5.1 | Enabling Fractionated Spacecraft Communications Using F6WICS | |
Tarr, Julie | CSTC2.6 | Hamming Masks: Toward Defending Constrained Networked Systems | |
Tarsa, Stephen | WSP4.5 | Output Compression for IC Fault Detection Using Compressive Sensing | |
Tauil, Miriam | NPP3.1 | Capacity Estimation and Waveform Assignment in Military Networks | |
Tayem, Nizar | WSP13.5 | Estimation 2D DOA of Coherent Signals Using a New Antenna Array Configuration | |
Taylor, Stephen | CSTC5.5 | A Forensic Hypervisor for Process Tracking and Exploit Discovery | |
Tekin, Cem | WSP18.1 | Online Learning in Decentralized Multi-user Spectrum Access with Synchronized Explorations | |
Temple, Michael | CSTC5.3 | An RF-DNA Verification Process for ZigBee Networks | |
Thai, My | CSTC3.5 | Sources of Misinformation in Online Social Networks: Who to suspect? | |
CSTC6.5 | An Efficient Spectral Bound for Link Vulnerability Assessment in Large-scale Networks | ||
STC2.2 | Finding Overlapped Communities in Online Social Networks with Nonnegative Matrix Factorization | ||
CSTC8.4 | Adaptive Algorithms for Detecting Critical Links and Nodes in Dynamic Networks | ||
Thandapani, Sankarkumar | SYS8.1 | On Accurately Predicting Mote Deaths | |
Thibeault, Claude | WSP2.6 | An LPI Design for Secure OFDM Systems | |
Thompson, Steve | WSP12.3 | Subcarrier Based Threshold Performance Enhancement in Constant Envelope OFDM | |
Thuente, David | CSTC5.4 | Limitations of Quorum-based Rendezvous and Key Establishment Schemes against Sophisticated Jamming Attacks | |
Tinta, Sandra | SYS6.2 | Laboratory Evaluation of Military Radios and Network Architectures | |
Toczynski, Wojciech | SYS5.1 | Enabling Fractionated Spacecraft Communications Using F6WICS | |
Toennies, Justin | CSTC9.2 | Evaluating Network Cyber Resiliency Methods using Cyber Threat, Vulnerability and Defense Modeling and Simulation | |
Tomici, John | SYS2.3 | Non-Satellite Based Field Communications System for Battlefield Deployments | |
Torres, Rob | NPP9.4 | Congestion Control using RED and TCP Window Adjustment | |
Torrieri, Don | WSP3.3 | Guard Zones and the Near-Far Problem in DS-CDMA Ad Hoc Networks | |
WSP6.4 | Optimization of a Finite Frequency-Hopping Ad Hoc Network in Nakagami Fading | ||
WSP13.4 | Direction Finding of a Compromised Node in a Spread-Spectrum Network | ||
Tortonesi, Mauro | SA1.2 | Supporting COTS Applications in Tactical Edge Networks | |
Tracey, Michael | SYS1.4 | How to Evaluate SOTM Antennas, Modems, and Architectures | |
Trachtenberg, Ari | NPP5.6 | Prioritized Data Synchronization for Disruption Tolerant Networks | |
Tran, Cam | SA4.2 | Naval Task Force Interface for Coalition Networks for Secure Information Sharing (CoNSIS) | |
Tran, Trac | WSP4.6 | Chemical Plume Detection in Hyperspectral Imagery Via Joint Sparse Representation | |
Trinkle, Matthew | CSTC10.3 | Quickest Detection of GPS Spoofing Attack | |
Trivedi, Nirav | CSTC6.1 | Identity-Based Internet Protocol Networking | |
Tront, Joseph | SA5.4 | Validating a Custom IPv6 Security Application using OPNET Modeler | |
Trubuil, Joël | WSP8.2 | An Overview of Channel Coding for Underwater Acoustic Communications | |
Tsou, Thomas | SYS2.5 | Development of an Open-Source GSM Femtocell and Integrated Core Infrastructure | |
Tugnait, Jitendra | WSP2.5 | Design and Simulation of a High Frequency Exact Solvable Chaotic Oscillator | |
Turck, Kurt | NPP1.1 | The User Capacity of Barrage Relay Networks | |
U A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Urias, Vincent | CSTC9.3 | Supervisory Command and Data Acquisition (SCADA) System Cyber Security Analysis Using a Live, Virtual, and Constructive (LVC) Testbed | |
Urke, Andreas | NPP9.3 | TCP challenges in hybrid military satellite networks; measurements and comparison | |
Usbeck, Kyle | SYS7.1 | Beyond Line-of-Sight Information Dissemination for Force Protection | |
Uszok, Andrzej | SYS7.2 | Supporting Information Management and Information Superiority via Federation Services | |
Uyar, M. Umit | NPP6.6 | Fault Tolerant Bio-Inspired Topology Control Mechanism for Autonomous Mobile Node Distribution in MANETs | |
NPP11.1 | Bio-inspired and Voronoi-based Algorithms for Self-positioning Autonomous Mobile Nodes | ||
V A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Vachula, George | SYS4.2 | A Comparison of Open Architecture Standards for the Development of Complex Military Systems: GRA, FACE, SCA NeXT | |
Valenti, Matthew | WSP3.3 | Guard Zones and the Near-Far Problem in DS-CDMA Ad Hoc Networks | |
WSP6.4 | Optimization of a Finite Frequency-Hopping Ad Hoc Network in Nakagami Fading | ||
WSP16.4 | Distributed Estimation of a Parametric Field Using Sparse Noisy Data | ||
Van Hook, Joshua | SYS3.1 | Using Hybrid Simulation / Emulation for Experimental Assessment of Routing Policy on Mission Outcomes | |
Van Leeuwen, Brian | SYS8.2 | Evaluating Communications System Performance Effects at a System of Systems Level | |
CSTC9.3 | Supervisory Command and Data Acquisition (SCADA) System Cyber Security Analysis Using a Live, Virtual, and Constructive (LVC) Testbed | ||
Vandendorpe, Luc | WSP12.5 | Multi-cycle Cyclostationary Based Spectrum Sensing Algorithm for OFDM Signals with Noise Uncertainty in Cognitive Radio Networks | |
Vanderpoorten, Joe | SYS9.5 | Transformational Satellite Communications System (TSAT) Lessons Learned | |
Vanganuru, Kiran | NPP8.2 | System Capacity and Coverage of a Cellular Network with D2D Mobile Relays | |
Vashist, Akshay | CSTC2.3 | Detecting Communication Anomalies in Tactical Networks via Graph Learning | |
SYS10.3 | TITAN: Integrated Network Management in Tactical Mobile Ad Hoc Networks | ||
Vassiliou, Marius | SYS3.5 | C2 Information Quality: An Enterprise Systems Perspective | |
Vatan, Farrokh | SA3.2 | Dynamic Communication Resource Negotiations | |
Vazquez, Pablo | CSTC9.2 | Evaluating Network Cyber Resiliency Methods using Cyber Threat, Vulnerability and Defense Modeling and Simulation | |
Ventura, Rolando | SA5.1 | Front End Mission Modeling | |
Verma, Gunjan | STC2.3 | The Effect of Zealotry in the Naming Game Model of Opinion Dynamics | |
Veytser, Leonid | SYS8.5 | Integrating Radio-to-Router Protocols into EMANE | |
SYS7.4 | Comparing Radio-to-Router Interface Implementations on Experimental CoTs and Open Source Routers | ||
NPP12.2 | Integrating Multiple Radio-to-Router Interfaces to Open Source Dynamic Routers | ||
Vigneron, Philip | NPP4.4 | Cross-layer Modeling and Analysis of Multihop Tactical Networking in Convoy Topology | |
Virodov, Alexandr | CSTC8.2 | Detection of Global Metamorphic Malware Variants Using Control and Data Flow Analysis | |
Viswanathan, Hariharasudhan | WSP3.2 | Leveraging Mobile Grid Computing for Interference Alignment and Cancelation | |
Vitt, Michael | SYS4.1 | Adaptation of RSVP-AGG Protocol to Tactical Networks - A Tactical Edge Open Architecture Concept | |
Vosoughi, Azadeh | WSP7.3 | Cramer-Rao Bound for Channel Estimation in Amplify-and-Forward Relaying Networks | |
Vu, Long | SA6.4 | Sangam - Efficient Cellular-WiFi Group Framework for File Sharing Service | |
W A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Walls, Buddy | SYS5.1 | Enabling Fractionated Spacecraft Communications Using F6WICS | |
Wang, Dexin | NPP6.4 | Cooperative Robust Localization against Malicious Anchors Based on Semi-Definite Programming | |
Wang, Mingxi | WSP9.3 | A Low Complexity Algorithm for Linear Precoder Design with Finite Alphabet Inputs | |
Wang, Mu-Cheng | SYS3.2 | A Policy-based Approach to Automated Data Reduction for Intelligence, Surveillance, and Reconnaissance Systems | |
Wang, Ping | NPP4.1 | Energy Efficient Stochastic Power Scheduling Scheme for Wireless Cellular Networks | |
Wang, Sherry | SYS10.6 | Performance Management in Cognitive Radio Ad Hoc Networks using Congestion based Metric | |
Wang, Xinlei (Oscar) | CSTC7.1 | Chaining for Securing Data Provenance in Distributed Information Networks | |
Wang, Xinyu | SYS10.2 | Impact of Enclave Network Devices to the Tactical Inter-Service Architecture | |
Ward, Jon | CSTC6.2 | On the Use of Distributed Relays to Increase Base Station Anonymity in Wireless Sensor Networks | |
Wasden, Daryl | WSP6.2 | Design and Implementation of a Multicarrier Spread Spectrum Communication System | |
Watson, Scott | SA1.1 | Extending Service-oriented Architectures to the Tactical Edge | |
Weaver, Carlyn | SA4.3 | Position, Navigation, and Timing in the Common Operating Environment: Prototyping the PNT User Equipment Modernization Architecture | |
Weerackody, Vijitha | SYS1.2 | Adjacent Satellite Interference from a Network of MF-TDMA Satellite Communications on-the-Move Terminals | |
Wei, Shuangqing | CSTC1.3 | ARQ-Based Key Scheduling Algorithm over Correlated Erasure Channels | |
Weinfield, John | WSP4.3 | Scalable Spectrum Situational Awareness Using Devices of Opportunity | |
Welch, Kimberly | SYS8.2 | Evaluating Communications System Performance Effects at a System of Systems Level | |
Wen, Xiangming | WSP18.2 | The Sub-channel Allocation Algorithm in Femtocell Networks Based on Ant Colony Optimization | |
Wheeler, James | SYS7.4 | Comparing Radio-to-Router Interface Implementations on Experimental CoTs and Open Source Routers | |
Whittaker, Keith | SYS6.1 | Building an Operation Support System for A Fast Reconfigurable Network Experimentation Testbed | |
Whittaker, Keith | SYS6.5 | TimeSync: Virtual Time for Scalable, High-Fidelity Hybrid Network Emulation | |
Whittaker, Keith | NPP9.2 | WRED Performance Analysis and Design for Tactical Satellite Communication | |
Wicks, Michael | WSP10.3 | A Combination of Quickest Detection with Oracle Approximating Shrinkage Estimation and Its Application to Spectrum Sensing in Cognitive Radio | |
WSP13.1 | Experimental Demonstration of Cognitive Radar for Target Localization Under Strong Interference | ||
Wietgrefe, Hermann | SYS2.1 | Tactical Troposcatter Applications in Challenging Climate Zones | |
SYS3.6 | A NNEC-Compliant Approach for a Future Mission Network | ||
Wilder, Kathy | SA3.1 | A Qualitative and Quantitative Method for Predicting Sentiment Toward Deployed U.S. Forces | |
Wilt, Kyle | WSP9.4 | High-Rate Ultrasonic Communication Through Metallic Barriers Using MIMO-OFDM Techniques | |
Windish, John | WSP15.2 | Synchronization Performance Using Scale Time Offset Robust Modulation | |
Witherspoon, Gloria | SA7.3 | High Definition Video Transcoding for Transport Over Satellite | |
Wolberg, Michelle | SYS10.3 | TITAN: Integrated Network Management in Tactical Mobile Ad Hoc Networks | |
Wong, Tan | CSTC5.1 | Certification Codes for Maliciousness Detection in Physical-layer Network Coding | |
Wood, Elena | WSP17.4 | Region-of-interest Video Coding for Enabling Surgical Telementoring in Low-Bandwidth Scenarios | |
Worthington, Olwen | STC1.5 | Openness in Military Systems: Part 2 (Case Studies) | |
STC1.4 | Openness in Military Systems: Part 1 (Analysis & Applications) | ||
Wright, Gary | CSTC9.2 | Evaluating Network Cyber Resiliency Methods using Cyber Threat, Vulnerability and Defense Modeling and Simulation | |
Wu, Renju | WSP11.5 | Multi-Group Multiuser Two-Way Relay with Superposition Coding | |
Wu, Zhiqiang | WSP8.4 | Modulation Detection of Underwater Acoustic Communication Signals Through Cyclostationary Analysis | |
WSP7.1 | Blind Frequency Offset Estimation and Intercarrier Interference Cancelation for FD-MC-CDMA Systems in Aerial Vehicle Communication | ||
X A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Xiao, Chengshan | WSP9.3 | A Low Complexity Algorithm for Linear Precoder Design with Finite Alphabet Inputs | |
Xiao, Yao | NPP1.3 | Spatial Reuse in Multi-Hop Linear Wireless Cooperative Networks | |
Xie, Geoffrey | NPP5.5 | Performance Analysis of Message Prioritization in Delay Tolerant Networks | |
Xie, Hongmei | WSP11.4 | Enhanced Algebraic Error Control for Random Linear Network Coding | |
Xiong, Wenhao | WSP11.2 | Relay Selection for AF SISO Wireless Relay Networks Under Jamming Environment with Relay Power Constraint | |
Xu, Defeng | NPP13.3 | JamDetect: A System to Detect RAA Aware Jamming Attacks in IEEE802.11 Networks | |
Xu, Dongyan | CSTC6.3 | Guest-Transparent Instruction Authentication for Self-Patching Kernels | |
Xu, Jun (Erik) | NPP9.4 | Congestion Control using RED and TCP Window Adjustment | |
Y A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Yan, Zhiyuan | WSP5.1 | Quasi-Cyclic Low-Density Parity-Check Stabilizer Codes | |
WSP11.4 | Enhanced Algebraic Error Control for Random Linear Network Coding | ||
Yang, Fan | WSP7.5 | Time-Domain Preamble-Based SNR Estimation for OFDM Systems in Doubly Selective Channels | |
Yang, Janghoon | WSP13.2 | Enhanced Monopulse MIMO Radar Using Reliable Αβ Filtering | |
Yang, Liuqing | WSP1.3 | A New DFT-Based Frequency Estimator for Single-Tone Complex Sinusoidal Signals | |
WSP5.5 | Practical Implementation of Hybrid DLT Codes for Cooperative Relay Communications | ||
NPP6.4 | Cooperative Robust Localization against Malicious Anchors Based on Semi-Definite Programming | ||
CSTC6.4 | Lightweight One-Time Signature for Multicast Authentication | ||
WSP18.4 | A Bipartite Matching Based User Grouping Method for Grouped OFDM-IDMA Systems | ||
Yang, T | WSP8.4 | Modulation Detection of Underwater Acoustic Communication Signals Through Cyclostationary Analysis | |
Yang, Yueli | CSTC9.1 | Cyber Analysis System Toolkit A High-Fidelity, Virtual Cyber Test-Bed for Network Modeling and Experimentation | |
Yao, Kung | WSP10.1 | Distributed Energy-based Spectrum Sensing with Opportunistic Cooperative Diversity for Cognitive Radio Networks Over Non-Identical Fading Channels | |
Yapıcı, Yavuz | WSP7.4 | Iterative Channel Estimation for Time-Varying Relay Networks with Optimal Energy Allocation | |
Yates, John | SA3.1 | A Qualitative and Quantitative Method for Predicting Sentiment Toward Deployed U.S. Forces | |
Yeo, Jeongho | WSP1.1 | Properization of Second-Order Cyclostationary Random Processes and Its Application to Signal Presence Detection | |
Young, Derek | WSP3.6 | Focusing a Radio Signal and Simultaneously Nulling It At Another Location Using Time-Reversal: Experimental Results | |
Young, Kenneth | NPP8.3 | TDMA Scheduling and Channel Assignment for Cognitive Tactical Networks | |
Young, Lawrence | SYS2.4 | One Force Tactical Communications System: Connecting the Tactical Edge at AEWE Spiral G | |
Younis, Mohamed | CSTC6.2 | On the Use of Distributed Relays to Increase Base Station Anonymity in Wireless Sensor Networks | |
Younis, Ossama | NPP8.3 | TDMA Scheduling and Channel Assignment for Cognitive Tactical Networks | |
Yu, Christopher | NPP7.5 | Link State Distribution Rate Scaling for Maintaining Topology in Mobile Wireless Networks | |
Yu, F. Richard | CSTC4.1 | A Game Theoretic Approach for Security and Quality of Service (QoS) Co-Design in MANETs with Cooperative Communications | |
Yu, Wei | CSTC4.2 | On Effective Sampling Techniques for Host-based Intrusion Detection in MANET | |
Yu, Yu-Ting | STC1.3 | Content Routing In the Vehicle Cloud | |
Yuan, Dongfeng | WSP18.4 | A Bipartite Matching Based User Grouping Method for Grouped OFDM-IDMA Systems | |
Yuan, Xin | CSTC9.4 | A Cyber-Physical Approach to a Wide-Area Actionable System for the Power Grid | |
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | |||
Zappa, Giovanni | SYS6.3 | A test bed for collaborative development of underwater communications and networking | |
Zeidler, James | WSP12.3 | Subcarrier Based Threshold Performance Enhancement in Constant Envelope OFDM | |
Zeng, Kai | CSTC7.1 | Chaining for Securing Data Provenance in Distributed Information Networks | |
Zeng, Qi | CSTC10.1 | GPS Spoofing Attack on Time Synchronization in Wireless Networks and Detection Scheme Design | |
Zeng, Weiliang | WSP9.3 | A Low Complexity Algorithm for Linear Precoder Design with Finite Alphabet Inputs | |
Zhang, Difan | CSTC4.2 | On Effective Sampling Techniques for Host-based Intrusion Detection in MANET | |
Zhang, Haijun | WSP18.2 | The Sub-channel Allocation Algorithm in Femtocell Networks Based on Ant Colony Optimization | |
Zhang, Lixia | SYS7.3 | Supporting Military Communications with Named Data Networking: An Emulation Analysis | |
Zhang, Ning | CSTC7.4 | MUSHI: Toward Multiple Level Security Cloud with Strong Hardware Level Isolation | |
Zhang, Xi | NPP4.1 | Energy Efficient Stochastic Power Scheduling Scheme for Wireless Cellular Networks | |
WSP7.5 | Time-Domain Preamble-Based SNR Estimation for OFDM Systems in Doubly Selective Channels | ||
Zhang, Zhenghao | CSTC10.3 | Quickest Detection of GPS Spoofing Attack | |
Zhang, Zhi-Li | STC2.1 | Measuring Bias in the Mixing Time of Social Graphs due to Graph Sampling | |
Zhang, Zhong-pei | WSP7.5 | Time-Domain Preamble-Based SNR Estimation for OFDM Systems in Doubly Selective Channels | |
Zhao, Pengkai | NPP10.5 | Cooperative Spatial Scheduling in Distributed MIMO MAC with Interference/Concurrency Awareness | |
Zheng, Du | CSTC4.1 | A Game Theoretic Approach for Security and Quality of Service (QoS) Co-Design in MANETs with Cooperative Communications | |
Zheng, Harold | SYS10.6 | Performance Management in Cognitive Radio Ad Hoc Networks using Congestion based Metric | |
Zheng, Wei | WSP18.2 | The Sub-channel Allocation Algorithm in Femtocell Networks Based on Ant Colony Optimization | |
Zheng, Yahong | WSP9.3 | A Low Complexity Algorithm for Linear Precoder Design with Finite Alphabet Inputs | |
Zhou, Xiaotian | WSP18.4 | A Bipartite Matching Based User Grouping Method for Grouped OFDM-IDMA Systems | |
Zoltowski, Michael | WSP9.5 | Branch and Bound with M Algorithm for Near Optimal MIMO | |
WSP12.6 | Detection of Code Spread OFDM Based on 0-1 Integer | ||
Zou, Jianmin | NPP6.6 | Fault Tolerant Bio-Inspired Topology Control Mechanism for Autonomous Mobile Node Distribution in MANETs | |
NPP11.1 | Bio-inspired and Voronoi-based Algorithms for Self-positioning Autonomous Mobile Nodes |