MILCOM 2002. Proceedings

7-10 Oct. 2002

Go

Filter Results

Displaying Results 1 - 25 of 142
  • Global Information Grid Enabling Transformation Through 21st Century Communications [front matter]

    Publication Year: 2002, Page(s):0_1 - xix
    Request permission for commercial reuse | PDF file iconPDF (972 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2002, Page(s):1509 - 1513
    Request permission for commercial reuse | PDF file iconPDF (220 KB)
    Freely Available from IEEE
  • Loop control architectures for symbol timing synchronization in sampled data receivers

    Publication Year: 2002, Page(s):987 - 991 vol.2
    Cited by:  Papers (5)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    Symbol timing synchronization is an important component in a receiver designed to recover data from a digitally modulated waveform. Current trends favor sampled data architectures to perform the synchronization, matched filtering, and detection required to recover the data. Symbol timing synchronizers in sampled data receivers differ from their continuous-time counterparts: the functionality in a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable multicast for flat hierarchy networks based on adaptive air caching

    Publication Year: 2002, Page(s):1295 - 1299 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    The evolution of satellite networks in the commercial and military world has pushed the research community towards the solution of important problems related to this kind of network. One of those important problems is how to design an efficient reliable multicast protocol in a network where there is no hierarchy involved, and the link presents characteristics like high propagation delay and high B... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Polyphase filterbanks for symbol timing synchronization in sampled data receivers

    Publication Year: 2002, Page(s):982 - 986 vol.2
    Cited by:  Papers (3)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (435 KB) | HTML iconHTML

    Symbol timing synchronization is an important component in a receiver designed to recover data from a digitally modulated waveform. Current trends favor sampled data architectures to perform the synchronization, matched filtering, and detection required to recover the data. Symbol timing synchronizers in a sampled data receiver differ from their continuous-time counterparts: the functionality in a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ka-band transceiver for mobile SATCOM terminals

    Publication Year: 2002, Page(s):1291 - 1294 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (707 KB) | HTML iconHTML

    US Monolithics has developed an innovative Ka-band SATCOM transceiver and companion high power amplifier for commercial broadband systems that is directly applicable for future Ka-band mobile military SATCOM systems. The baseline design has already been developed, demonstrated and low cost commercial off-the-shelf (COTS) prototypes have been delivered for terminal level integration. Although a wid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MICLOG RFID tag program enables total asset visibility

    Publication Year: 2002, Page(s):1422 - 1426 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    RFID tagging and tracking efforts sponsored by DLA under the MICLOG program will support total asset visibility for the military. This system can be used to provide programs such as FCS with persistent knowledge of the location and status of every asset. This will provide commanders the assurance they need to verify logistics and plan missions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ingress failure recovery mechanisms in MPLS network

    Publication Year: 2002, Page(s):1150 - 1153 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    With the diversification of the traffic carried on the Internet, improvement of QoS has become very demanding in order to realize large capacity, high speed and reliable communication in IP networks. Various models have been proposed to address this need, MPLS being one of the main architectures, having the broadest deployment on the Internet to achieve these QoS goals. It is expected that, in the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CDMA code synchronization using segmented matched filter with accumulation and best match selection

    Publication Year: 2002, Page(s):976 - 981 vol.2
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB) | HTML iconHTML

    This paper investigates codephase acquisition in direct-sequence spread spectrum (DS-SS) systems under conditions of high co-user noise and significant carrier frequency offset (Doppler). While conventional serial search acquisition is tolerant of these conditions, the process is quite slow. Conventional matched filters can provide fast acquisition but are unable to handle significant carrier freq... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JTRS and the evolution toward software-defined radio

    Publication Year: 2002, Page(s):1286 - 1290 vol.2
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    Various companies have been working on a software-defined radio (SDR) concept for years, pushing the technology envelope to make SDR a reality. From a military perspective, the concept behind SDR has existed for decades with research in military tactical radios culminating in a quest for the USA army's Joint Tactical Radio System (JTRS). Based on open standards, the JTRS program intends to reuse e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Communications network architectures for the army future combat system and objective force

    Publication Year: 2002, Page(s):1417 - 1421 vol.2
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    A key element of the USA army's transformation is the future combat system and objective force (FCS/OF). The FCS/OF will operate as a cohesive, mobile, lethal, survivable, and sustainable land combat force capable of rapid deployment and immediate employment upon arrival and able to defeat threats in the 2010-2025 timeframe. This is to be achieved through network-centric operations wherein the for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture and fuzzy adaptive security algorithm in intelligent firewall

    Publication Year: 2002, Page(s):1145 - 1149 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (409 KB) | HTML iconHTML

    The architecture of an intelligent firewall is presented and then its modules are described in detail. A fuzzy controller is the core module and the characteristics of packets are fuzzified as its inputs. Based on the fuzzy adaptive security algorithm, the overall security level of each kind of packet can be figured out and adjusted according to the varying states of the packets. The intelligent f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The effect of power-control dynamics on the reverse-link capacity of a mobile CDMA cellular network

    Publication Year: 2002, Page(s):917 - 922 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (555 KB) | HTML iconHTML

    The lack of a high-data-rate wireline backbone in a tactical CDMA cellular network limits the ability of the network to hand off mobile terminals rapidly between neighboring base stations. In previous work, it is shown that the limitation on handoff capability can have a severe impact on the reverse-link capacity of the network. The previous results employ an analysis of network capacity in which ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low density parity check codes in a frequency hopped communication system with partial-band interference

    Publication Year: 2002, Page(s):895 - 899 vol.2
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    In this paper the applicability of low density parity check (LDPC) codes to a frequency hopped communications system with partial-band jamming is investigated. We show an irregular LDPC code which exhibits good waterfall and error floor performance with a block length of 1560 bits using binary phase-shift keying. The performance of this code is investigated in a partial band jammed environment wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategies for broadcasting updates by proactive routing protocols in mobile ad hoc networks

    Publication Year: 2002, Page(s):873 - 878 vol.2
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (535 KB) | HTML iconHTML

    Proactive routing protocols for mobile ad hoc networks are table-driven, where each node tries to maintain routing information about every other node in the network at all times. Mobility of the nodes in the network causes creation of new links or breaking of old links, changing network routes dynamically. These changes require a proactive routing protocol to regularly broadcast updates in the net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Name and address decoupling in support of dynamic networks

    Publication Year: 2002, Page(s):970 - 975 vol.2
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB) | HTML iconHTML

    Many of the problems with dynamic networks, such as those envisioned in Future Combat Systems, lie in the fundamental IP architecture. A well-known problem is the coupling of names with the IP addresses used for routing. Names can reflect topology (e.g., domain names reflect their topological domain), which can limit survivability. More important, IP addresses identify hosts in the transport and a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Portable real-time protocols to make real-time communications affordable

    Publication Year: 2002, Page(s):1183 - 1188 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB) | HTML iconHTML

    The cost and capabilities of networking technology is rapidly improving. As a result, the world is rapidly becoming networked for virtually every application. As networking becomes more important, there is a growing corresponding demand for networks to support real-time applications. Current planning for future military engagement networks serves as an example. Taking advantage of the new communic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards the scalable implementation of a user level anomaly detection system

    Publication Year: 2002, Page(s):1503 - 1508 vol.2
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB) | HTML iconHTML

    Traditional intrusion detection systems can be broadly classified as misuse and anomaly detectors. Misuse detectors attempt detection by matching the current system/user activity against known signatures and patterns. As opposed to this, anomaly detection works by developing a reference graph and comparing the ongoing activity against it. Any significant deviation is flagged as an intrusion. Anoma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing real-time security support for multi-level ad-hoc networks

    Publication Year: 2002, Page(s):1350 - 1355 vol.2
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (495 KB) | HTML iconHTML

    Digital battlefields have different settings from the existing communication networks like the Internet or cellular networks, which are established on permanent infrastructures and transaction/session-based applications. The constantly changing tactical environment may demand many real-time needs in both data collection and data delivery. We propose a solution that employs: (i) portable mobile rea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATM and the Teleport

    Publication Year: 2002, Page(s):1472 - 1475 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    This paper provides an overview of the utilization of asynchronous transfer mode (ATM) technology in the Department of Defense (DoD) Teleport to provide seamless access to the six defense information systems network (DISN) services. The DoD Teleport program will offer advanced reach-back capabilities for the deployed warfighter, enabling them to use a wide variety of satellite capabilities to supp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image compression and transmission for HF radio systems

    Publication Year: 2002, Page(s):1281 - 1285 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (387 KB) | HTML iconHTML

    This paper presents a novel image compression technique coupled with three HF transmission schemes. The image compression scheme is based on a phase dispersion technique originally developed for the design of pulse compression radar waveforms. The technique forms the basis for a lossless, invertible transform that converts sub-band coefficients to an intermediate domain. This image compression sch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of ground segment broadcast architectures for the Wideband Gapfiller Satellite (WGS)

    Publication Year: 2002, Page(s):1412 - 1416 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (495 KB) | HTML iconHTML

    The purpose of this paper is to summarize the findings of an assessment tasked by the joint staff regarding the broadcast ground segment architecture for the Wideband Gapfiller Satellite (WGS). WGS has the capability to permit Global Broadcast Service (GBS) injection at either Ka-band (30 GHz) or X-band (8-GHz), and be cross-banded and received by current GBS receive-only suites at 20-GHz. Origina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network management with COTS software

    Publication Year: 2002, Page(s):1223 - 1227 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    The paper analyses the feasibility of the implementation of the management system for the mobile broadband network on the basis of commercial-off-the-shelf (COTS) software, namely, a commercial management platform. Due to the non-COTS nature of some crucial network-elements, large parts of the management system must be still implemented. That is, we treat a platform as a development tool rather th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards secure IFF: preventing mafia fraud attacks

    Publication Year: 2002, Page(s):1139 - 1144 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    Common identification schemes are vulnerable against real-time attacks, known as mafia frauds: unnoticed, an active adversary relays all messages between the participants - causing a misidentification with fatal consequences. No convincing practical solution is known so far, and even common security proofs explicitly omit such scenarios. We present an identification scheme that solves the problem ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-conserving reception protocols for mobile ad hoc networks

    Publication Year: 2002, Page(s):850 - 855 vol.2
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (486 KB) | HTML iconHTML

    The importance of conserving the limited battery energy available in mobile tactical communication systems is well appreciated in their design. Radio transceivers are major energy consumers in such systems, however fundamental advancements to increase battery capacity and/or reduce transceiver power requirements are not expected in the near future; therefore, energy-conserving techniques are the m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.