An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Recent revelations have shed light on the scale of eavesdropping on Internet traffic; violating the privacy of almost every Internet user. In response, protocol designers, engineers and service operators have begun deploying encryption (often opportunistic
John M. Libert, Shahram Orandi, John D. Grantham, Michael D. Garris
This study examines the use of the NIST Spectral Image Validation and Verification (SIVV) metric for the application of detecting the sample rate of a given fingerprint digital image. SIVV operates by reducing an input image to a 1-dimensional power
Recognizing that the national and economic security of the United States depends on the resilience of critical infrastructure, President Obama issued Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, in February 2013. It directed
The white paper provides an overview of NIST Special Publication (SP) 800-53, Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations, which was published April 30, 2013.
The national and economic security of the United States depends on the reliable functioning of critical infrastructure. Cybersecurity threats take advantage of the increased complexity and connectivity of critical infrastructure systems, placing the Nation
Application profiling tools are the instruments used to measure software performance at the function and application levels. The most powerful measurement method available in application profiling tools today is sampling-based profiling, where a
Risk management is a common phrase when managing information, from the CISO to the programmer. We acknowledge that risk management is the identification, assessment and prioritization of risks and reflects how we manage uncertainty. These are some areas of
Dynamic Spectrum Access (DSA) is emerging as a promising technology to mitigate the spectrum scarcity caused by static frequency allocations. Despite the clear need for more efficient allocation, however, DSA faces a number of challenges, chief among them
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng, Steven Noel
By enabling a direct comparison of different security solutions with respect to their relative effectiveness, a network security metric may provide quantifiable evidences to assist security practitioners in securing computer networks. However, research on
P J. Phillips, Alice O'Toole, Vaidehi Natu, Xiaobo An, Rice Allyson, James Ryland
The neural organization of person processing relies on brain regions functionally selective for faces or bodies, with a subset of these regions preferring moving stimuli. Although the response properties of the individual areas are well established, less
Suppose we seek a set of nodes in a network that will enable the fastest spread of information in a decentralized communication environment. If communication resources are limited there are constraints on the number of nodes that can be selected. In this
The sensitivity of microwave kinetic inductance detectors (MKIDs) using dissipation readout is limited by the noise temperature of the cryogenic amplifier, usually a HEMT with T n ∼5 K. A lower noise amplifier is required to improve NEP and reach the
In this paper, a greedy backpressure routing protocol is proposed for multigate mesh networks. This protocol evaluates the greedy backpressure metric (GBM) value of mesh points and routes packets in the direction of the steepest gradient. The GBM value is
In this paper, we present a Support Vector Machine (SVM) based pixel classifier for a semi-automated segmentation algorithm to detect neuronal membrane structures in stacks of electron microscopy images of brain tissue samples. This algorithm uses high-
Rafa Marin-Lopez, Fernando Bernal-Hidalgo, Subir Das, Lidong Chen, Yoshihiro Ohba
When enabling handover between different radio interfaces (e.g., handover from 3G to Wi-Fi), reducing network access authentication latency and securing handover related signaling messages are major challenging problems, amongst many others. The IEEE 802
In this research, we present an (semi-) automated segmentation algo-rithm using a Support Vector Machine classifier. This algorithm uses a high-dimensional feature space generated from patch-based multiple-features and a training dataset in order to detect
Sketch-based 3D shape retrieval has become an important research topic in content-based 3D object retrieval. To foster this research area, two Shape Retrieval Contest (SHREC) tracks on this topic have been organized by us in 2012 and 2013 based on a small
Wireless mesh/sensor networks offer various unique features such as self-configuration, ease of installation, scalability, and self-healing, which makes them very attractive for deployment in various smart grid domains, such as Home Area Networks (HAN)
A prototype to translate web graph and map images into 3D printed models in order to give the blind and visually impaired access to voting and election information.
Domain adaptation algorithms aim at handling the shift between source and target domains. A classifier is trained on images from the source domain; and the classifier recognizes objects in images from the target domain. In this paper, we present a joint
Anirudha Sahoo, Michael R. Souryal, Mudumbai Ranganathan
Dynamic spectrum access (DSA) is emerging as a promising technology to mitigate spectrum scarcity caused by static frequency allocation. Among the different models proposed for DSA, opportunistic spectrum access (OSA) is a promising class of solutions. In
With recent advances in imaging technologies large numbers of bioimages are currently being acquired. Automated classification of these bio-images is a very important and challenging problem. Here we investigate the capabilities of local features and the