Abstract

The subject authentication scheme encompasses a large family of authentication systems which may be built over existing transmission systems. By superimposing a carefully designed secret modulation on the waveforms, authentication is added to the signal without requiring additional bandwidth. The authentication information (tag signal) is sent concurrently with data (message signal). The authentication is designed to be stealthy to the uninformed user, robust to interference, and secure for identity verification. The tradeoffs between these three goals are identified and analyzed.


Top

Abstract

A method and apparatus for aggregating terminals into clusters that assists in the construction of a distributed data communication network. Terminal locations to be clustered are used as input along with a weight for each one representing the traffic carried by that location. The terminals are placed into boxes based on their geographic coordinates and only boxes with substantial traffic are retained. Any terminals included in a box not retained are assigned to the closest retained box.


Top

Top

Top

Abstract

The invention is a new apparatus, system, and technique for performing matrix spectral factorization. The method can factorize in real time high-dimensional matrices with high-order polynomial or non-rational entries. It can be used for efficient implementation of engineering solutions to problems in data compression, filtering, wireless communications, radar systems, and so on, which are computationally reducible to matrix spectral factorization.


Top

Systems Engineering and Integration Lab


Top

Sustainable Archives and Leveraging Technologies Lab


Top

Speech Communication Lab


Top

Space Systems Lab


Top

Simulation-Based System Design Laboratory


Top

Pages