An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Before 1976 Communications of the ACM printed (and numbered!) new algorithms every issue. Quicksort was invented in 1960, Boyer-Moore string search in 1977, and combsort in 1980. I haven't seen a new, general sorting algorithm in over a decade. The latest
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-30 Rev.1, Guide to Conducting Risk Assessments. This publication was developed by the Joint Task Force Transformation Initiative, a joint partnership among the
Jacob M. Taylor, Karl Petersson, L. McFaul, M. Schroer, M. Jung, Andrew Houck, Jason Petta
We develop a circuit quantum electrodynamics architecture for spin qubits by coupling an InAs double quantum dot to a high quality factor superconducting cavity. A charge trapped in the double quantum dot interacts with the electric field of the cavity
P J. Phillips, Alice O'Toole, Xiaobo An, Joseph Dunlop, Vaidehi Natu
We compared face identifcation by humans and machines using images taken under a variety of uncontrolled illumination conditions in both indoor and outdoor settings. Natural variations in a person's day-to-day appearance (e.g., hair style, facial
A network security metric is desirable in evaluating the effectiveness of security solutions in distributed systems. Aggregating CVSS scores of individual vulnerabilities provides a practical approach to network security metric. However, existing
Comparisons of two microscopy images can be accomplished in many different ways. This paper presents a system that recommends appropriate similarity metrics for microscopy image comparisons based on biological application requirements. The motivation stems
This paper addresses the problem of mapping application specific requirements on image similarity metrics to the plethora of existing image similarity computations. The work is motivated by the fact that there is no recommendation method for choosing a
In this paper we firstly propose a block-code based general model to combat the Inter-Symbol Interference (ISI) caused by frequency selective channels in a Multi-Input Multi- Output (MIMO) system and/or by asynchronous cooperative transmissions. The
Considering the medical nature of the information carried in Body Area Networks (BAN), interference from coexisting wireless networks or even other nearby BANs could create serious problems on their operational reliability. As practical implementation of
Non-rigid 3D shape retrieval has become an active and important research topic in content-based 3D object retrieval. The aim of this paper is to measure and compare the performance of state-of-the-art methods for non-rigid 3D shape retrieval. The paper
As the usage of 3D models increases, so does the importance of developing accurate 3D shape retrieval algorithms. A common approach is to calculate a shape descriptor for each object, which can then be compared to determine two objects similarity. However
The performance of a biometric system depends on the quality of interaction of the biometric subject and the system. Past research has shown that fingerprint image quality is improved when the subjects received feedback from the system. However, the
The purpose of Special Publication 800-30 is to provide guidance for conducting risk assessments of federal information systems and organizations, amplifying the guidance provided in Special Publication 800-39. This document provides guidance for carrying
Many of todays extremely complex meta-systems are cross-domain, they require development by multiple stakeholder groups with different goals each implementing a sub-set of the functionality required for the entire meta-system to operate. As these systems
This is an editorial article for a special issue on Smart Grid. The main emphasis of this issue is the technical challenges of the Smart Grid from a signal processing perspective. Therefore, the selected articles aim at articulating signal processing
This bulletin summarizes the information that is included in NIST Special Publication (SP) 121, Revision 1, Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology. This guide was revised by John Padgette of
Shahram Orandi, John M. Libert, John D. Grantham, Kenneth Ko, Stephen S. Wood, Jin Chu Wu, Lindsay M. Petersen, Bruce Bandini
This paper presents the findings of a study initially conducted to measure the operational impact of JPEG 2000 lossy compression on 1000 ppi fingerprint imagery at various levels of compression, but later expanded to include lossless compression. Lossless
David R. Kuhn, James M. Higdon, J .M. Lawrence, Raghu N. Kacker, Yu Lei
Many software testing problems involve sequences of events. The methods described in this paper were motivated by testing needs of mission critical systems that may accept multiple communication or sensor inputs and generate output to several communication
Rahul Murmuria, Jeffrey Medsger, Angelos Stavrou, Jeff Voas
Reducing power consumption has become a crucial design tenet for both mobile and other small computing devices that are not constantly connected to a power source. However, unlike devices that have a limited and predefined set of functionality, recent
Abstract Measuring the dissimilarity between non-rigid objects is a challenging problem in 3D shape retrieval. One potential solution is to construct the models 3D canonical forms (i.e., isometry-invariant representations in 3D Euclidean domain) on which
Mark H. Linehan, Edward J. Barkmeyer Jr., Stan Hendryx
The Date-Time Vocabulary is a new OMG specification that models continuous time, discrete time, the relationship of events and situations to time, language tense and aspect, time indexicals, timetables, and schedules. It offers a "business vocabulary" (i.e
While cloud security concerns have consistently ranked as one of the top challenges to cloud adoption, it is not clear what security issues are special with respect to cloud computing. To approach this question, we attempt to derive cloud security issues