An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Opportunistic Spectrum Access (OSA) is one of the models proposed for Dynamic Spectrum Access (DSA). In OSA systems, it is important to restrict the interference of Secondary Users (SUs) to the Primary Users (PUs), so that the performance degradation of PU
On February 12, 2014 President Obama issued a statement that, "[c]yber threats pose one the gravest national security dangers that the United States faces. To better defend our nation against this systemic challenge, one year ago I signed an Executive
National security depends on the reliable functioning of critical infrastructures. Security mechanisms and controls for critical infrastructure protection arent useful unless adopted, so NIST seeks, while fostering creation of effective cybersecurity
Ian M. Soboroff, Iadh Ounis, Jimmy Lin, Craig Macdonald
The Microblog track examines search tasks and evaluation meth- odologies for information seeking behaviours in microblogging en- vironments such as Twitter. It was first introduced in 2011, address- ing a real-time adhoc search task, whereby the user
Infrastructure as a Service (IaaS) is one of the three main cloud service types where the cloud consumer consumes a great variety of resources such as computing (Virtual Machines or VMs), virtual network, storage and utility programs (DBMS). Any large
Polar coding is the most recent encoding scheme in the quest for error correction codes that approaches the Shannon limit, has a simple structure, and admits fast decoders. As such, it is an interesting candidate for the quantum key distribution (QKD)
The building industry uses numerous engineering standards, building codes, specifications and regulations and a diverse set of industry vocabularies to describe, assess, and deliver constructed facilities. As part of the expanding use of building
In this report, we present results of a physical layer performance study for all MCSs (from MCS0 to MCS28) in terms of block error rate (BLER) and spectral efficiency. The results are obtained by using the Steepest Ascent LTE toolbox for MATLAB which
Paul D. Over, Jonathan G. Fiscus, Gregory A. Sanders, David M. Joy, Martial Michel, George M. Awad, Alan Smeaton, Wessel Kraaij, Georges Quenot
TRECVID 2013 was a TREC-style video analysis and retrieval evaluation, the goal of which remains to promote progress in content-based exploitation of digital video via open, metrics-based evaluation. Over the last ten years this effort has yielded a better
Vladimir N. Dvornychenko, Stephen B. Meagher, Michael Garris
The term "lights-out" for AFIS ten-print fingerprint operations has been around for many years and is generally understood to mean "no human intervention is involved." But is this appropriate for AFIS latent print operations? Is it truly possible to
NIST SP 800-52, Revision 1 provides guidance to U.S. Government information system managers for the selection and configuration of TLS protocol implementations. U.S. Office of Management and Budget (OMB) Circular A-130, Management of Federal Information
This paper describes pitfalls, issues, and methodology for measuring software performance. Ideally, measurement should be performed and reported in such a way that others will be able to reproduce the results in order to confirm their validity. We aim to
Explores methods for defining a standardized matcher score for Automated Fingerprint Identification Systems (AFIS). A standardized score facilitates evaluating candidate lists from AFIS, and decreases the burden on the human expert. Such scoring will also
Anthony J. Downs, Lisa J. Fronczek, Emile L. Morse, Brian A. Weiss, Ian P. Bashor, Craig I. Schlenoff
Transformative Apps (TransApps) is a Defense Advanced Research Projects Agency (DARPA) funded program whose goal is to develop a range of militarily-relevant software applications ("apps") to enhance the operational effectiveness of military personnel on
William E. Burr, Hildegard Ferraiolo, David A. Waltermire
The US National Institute of Standards and Technology's highly visible work in four key areas--cryptographic standards, role-based access control, identification card standards, and security automation--has and continues to shape computer and information
Bryan M. Barnes, Francois R. Goasmat, Martin Y. Sohn, Hui Zhou, Richard M. Silver, Andras Vladar, Abraham Arceo
We have previously introduced a new data analysis method that more thoroughly utilizes scattered optical intensity data collected during defect inspection using bright-field microscopy. This volumetric approach allows conversion of focus resolved 2-D
Laleh Ghandehari, Jacek Czerwonka, Yu Lei, Soheil Shafiee, Raghu N. Kacker, D. Richard Kuhn
Some conflicting results have been reported on the comparison between t-way combinatorial testing and random testing. In this paper, we report a new study that applies t-way and random testing to the Siemens suite. In particular, we investigate the
Summary: The iPhone liquid crystal displays allows efficient and accurate calibration of an inexpensive array of handheld microscopes for measuring microscopic dynamic events over a large field of view. How does one build an inexpensive array of handheld
[Poster] A t-way covering array can detect t-way faults, however they generally include other combinations beyond t-way as well. For example, a particular test set of all 5-way combinations is shown capable of detecting all seeded faults in a test program
The Department of Homeland Security (DHS) requires general human systems integration (HSI) criteria for the design and development of human-machine interfaces for the technology, systems, equipment, and facilities employed by its user population. HSI is
Jon Hagar, D. Richard Kuhn, Raghu N. Kacker, Thomas Wissink
This poster gives an overview of the experience of eight pilot projects, over two years, applying combinatorial testing in a large aerospace organization. While results varied across the different pilot projects, overall it was estimated that CT would save
Kristen Greene, Melissa A. Gallagher, Franklin Tamborello
Given the high propensity of users motoric errors with smaller touchscreen usa-buttons, knowing the endpoint distributions for finger-based pointing and tapping is especially important for higher-fidelity predictive modeling of tasks on such devices. One
Standards provide the foundation for ensuring interoperability, but if they are not implemented correctly or consistently, their value is diminished leading to problematic installations and higher costs. Conformance and Interoperability testing is
Smart cards (smart identity tokens) are now being extensively deployed for identity verification for controlling access to Information Technology (IT) resources as well as physical resources. Depending upon the sensitivity of the resources and the risk of
Wei Yu, David W. Griffith, Linqiang Ge, Sulabh Bhattarai, Nada T. Golmie
The smart grid is a new type of power grid that will use the advanced communication network technologies to support more efficient energy transmission and distribution. The grid infrastructure was designed for reliability; but security, especially against