An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Siham Khoussi, Lotfi Benmohamed, Abdella Battou, Junxiao Shi, James J. Filliben, Saddek Bensalem, Ayoub Nouri
Named Data Networking (NDN) is an emerging technology for a future Internet architecture that addresses weaknesses of the Internet Protocol (IP). Since Internet...
Aaron M. Hanke, Teodor Vernica, William Z. Bernstein
Interoperability across emerging visualization modalities, including augmented reality (AR) and virtual reality (VR), remains a challenge with respect to...
Ian Soboroff, Ben Carterette, Rosie Jones, Gareth Jones, Maria Eskevich, Sravana Reddy, Ann Clifton, Yongze Yu, Jussi Karlgren
Rapidly growing online podcast archives contain diverse content on a wide range of topics. These archives form an important resource for entertainment and...
Shared text collections continue to be vital infrastructure for IR research. The COVID-19 pandemic offered an opportunity to create a test collection that...
Newell Moser, Dohyun Leem, Liao Shuheng, Kornel Ehmann, Jian Cao
Double-Sided Incremental Forming (DSIF) is a rapid-prototyping manufacturing process for metal forming that, for low-volume production, is competitively energy...
Ellen M. Voorhees, Ian Soboroff, Nick Craswell, Bhaskar Mitra, Emine Yilmaz, Daniel Campos
The TREC Deep Learning (DL) Track studies ad hoc search in the large data regime, meaning that a large set of human-labeled training data is available. Results...
A thriving manufacturing sector is the essential heart of a vibrant and balanced economy in the United States(U.S.). Small and medium manufacturers (SMMs)...
Mariella Särestöniemi, Carlos Pomalaza Raez, Kamran Sayrafian, Jari Iinatti
This paper presents the results of an in-body propagation study for abdominal implant communication using a bio-matched mini-horn antenna. The wireless signal...
Organizations use phishing training exercises to help employees defend against the phishing threats that get through automatic email filters, reducing potential...
Shanee Dawkins, Kerrianne Buchanan, Yee-Yin Choong, Kristen K. Greene
The public safety communication technology landscape in the United States (U.S.) is evolving to supplement the use of land mobile radios with the use of a...
Anna Conte, Coline Bolland, Lynn Phan, Michael Brundage, Thurston Sexton
Historical data from maintenance work orders (MWOs) is a powerful source of information to improve maintenance decisions and procedures. However, data quality...
Even in the increasingly connected world of smart manufacturing and the Industrial Internet Of Things (IIOT), there will always be a need for human operators...
Peter Bajcsy, Mylene Simon, Sunny Yu, Nick Schaub, Jayapriya Nagarajan, Sudharsan Prativadi, Mohamed Ouladi, Nathan Hotaling
Microscopy image-based measurement variability in high-throughput imaging experiments for biological drug discoveries, such as COVID-19 therapies was addressed...
Justin G. Whiting, Vipin Tondare, Shawn P. Moylan, Alkan Donmez
We describe a simple device called Standard Spreadability Tester (SST). The idea behind the SST is that instead of trying to predict how a powder will spread...
Hany Assasa, Nina Grosheva, Tanguy Ropitault, Steve Blandino, Nada T. Golmie, Joerg Widmer
The IEEE Task Group ay (TGay) has recently defined new physical and medium access control specifications to design the next generation wireless standard in the...
The COVID-19 pandemic has imposed new challenges to maintaining sustainability in our manufacturing operations. With such high variability in demand for...
Evan Black, Samantha Gamboa Quintiliani, Richard A. Rouil
The increased complexity of network protocols and scenarios simulated using ns-3 is making the verification of simulation correctness and the analysis of...
Athira Jayakumar, D. Richard Kuhn, Brandon Simons, Aidan Collins, Smitha Gautham, Richard Hite, Raghu N. Kacker, Abhi Rajagopala, Carl Elks
The major challenge faced by the nuclear industry related to software testing of digital embedded devices is the identification of practical software (SW)...
Aditya Joglekar, Omid Sadjadi, Meena Chandra-Shekar, Christopher Cieri, John Hansen
The Fearless Steps Challenge (FSC) initiative was designed to host a series of progressively complex tasks to promote advanced speech research across...
Resource and performance dependent blocking mechanisms for entanglement routing in quantum networks are identified and characterized in simulations of a DLCZ...
Robots can perform various typed of automated movements in workspace. In recent years, robot applications have been expanded to a much wider scope, including...
Metamorphic testing has been shown to be useful in testing "non-testable" programs in many domains. Modeling & simulation is one such domain, where both...
Bernhard Garn, Daniel S. Lang, Manuel Leithner, D. Richard Kuhn, Raghu N. Kacker, Dimitris Simos
Cross-Site scripting (XSS) is a common class of vulnerabilities in the domain of web applications. As it remains prevalent despite continued efforts by...
Adam J. Kopach, G. F. Nellis, David Bradley, Douglas T. Reindl, Amanda Pertzborn
The Intelligent Building Agents Laboratory (IBAL) at the National Institute of Standards and Technology (NIST) will be used to experimentally study control...
Devastating large outdoor fires have been responsible for destruction of vast amounts of infrastructure and loss of human life. Wildland fires that spread into...
Wildland fires that spread into urban areas, termed wildland-urban interface (WUI) fires, are becoming more and more common across multiple locations of the...
Mohamed Hany, Peter Vouras, Rob Jones, Rick Candell, Kate Remley
Industrial wireless plays a crucial role in cyber-physical system (CPS) advances for the future vision of smart manufacturing. However, industrial wireless...