An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Paul D. Over, Johan Oomen, Wessel Kraaij, Alan Smeaton
Audiovisual archives are investing in large-scale digitisation efforts of their analogue holdings and in parallel ingest an ever-increasing amount of born-digital files in their digital storage facilities. Digitisation opened up new access paradigms and
Ian M. Soboroff, Dean P. McCullough, Jimmy Lin, Craig Macdonald, Iadh Ounis, Richard McCreadie
Twitter offers a phenomenal platform for the social sharing of information. We describe new resources that have been created in the context of the Text Retrieval Conference (TREC) to support the academic study of Twitter as a real-time information source
Spurred by the 2006 Miner Act, reliable two-way communications in mines has drawn the interest of network engineers in recent years. Critical to the design of these systems is an accurate channel propagation model. Given the elementary geometry seen in
Following the seminal success of the H.264/MPEG-4 advanced video coding (AVC) and its significant commercial impact on the IT industry, ISO/IEC SC29/WG11 (MPEG) and ITU-T SG16/Q6 (VCEG) began working together to develop the next generation video coding
In this paper we firstly propose a general model to combat the Inter-Symbol Interference (ISI) caused by frequency selective channels in a Multi-InputMulti-Output (MIMO) system and/or by asynchronous cooperative transmissions. The general model is not only
Camillo A. Gentile, David W. Griffith, Michael R. Souryal
The projected use of the power grid for smart applications such as advanced metering and distributed automation will require highly reliable, secure, well-designed and managed communication networks. While many of the benefits of wireless communications
A large number of Identity Management Systems (IDMSs) are being deployed worldwide that use different technologies for the population of their users. With the diverse set of technologies, and the unique business requirements for organizations to federate
We are witnessing a new revolution in computing and communication. The Internet, which has spanned several networks in a wide variety of domains, is having a significant impact on every aspect of our lives. The next generation of networks will utilize a
David G. Harris, Francis Sullivan, Isabel M. Beichl
The reliability polynomial of a graph measures the number of its connected subgraphs of various sizes. Algortihms based on sequential importance sampling (SIS) have been proposed to estimate a graph's reliahbility polynomial. We develop an improved SIS
Jie Lin, Guobin Xu, David W. Griffith, Xinyu Yang, Wei Yu
The Smart Grid is a new type of power grid that will provide reliable, secure, and efficient energy transmission and distribution. It promises to integrate distributed energy resources with conventional generation plants, and intelligently transmit energy
Before 1976 Communications of the ACM printed (and numbered!) new algorithms every issue. Quicksort was invented in 1960, Boyer-Moore string search in 1977, and combsort in 1980. I haven't seen a new, general sorting algorithm in over a decade. The latest
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-30 Rev.1, Guide to Conducting Risk Assessments. This publication was developed by the Joint Task Force Transformation Initiative, a joint partnership among the
Jacob M. Taylor, Karl Petersson, L. McFaul, M. Schroer, M. Jung, Andrew Houck, Jason Petta
We develop a circuit quantum electrodynamics architecture for spin qubits by coupling an InAs double quantum dot to a high quality factor superconducting cavity. A charge trapped in the double quantum dot interacts with the electric field of the cavity
P J. Phillips, Alice O'Toole, Xiaobo An, Joseph Dunlop, Vaidehi Natu
We compared face identifcation by humans and machines using images taken under a variety of uncontrolled illumination conditions in both indoor and outdoor settings. Natural variations in a person's day-to-day appearance (e.g., hair style, facial
A network security metric is desirable in evaluating the effectiveness of security solutions in distributed systems. Aggregating CVSS scores of individual vulnerabilities provides a practical approach to network security metric. However, existing
Comparisons of two microscopy images can be accomplished in many different ways. This paper presents a system that recommends appropriate similarity metrics for microscopy image comparisons based on biological application requirements. The motivation stems
This paper addresses the problem of mapping application specific requirements on image similarity metrics to the plethora of existing image similarity computations. The work is motivated by the fact that there is no recommendation method for choosing a
In this paper we firstly propose a block-code based general model to combat the Inter-Symbol Interference (ISI) caused by frequency selective channels in a Multi-Input Multi- Output (MIMO) system and/or by asynchronous cooperative transmissions. The
Considering the medical nature of the information carried in Body Area Networks (BAN), interference from coexisting wireless networks or even other nearby BANs could create serious problems on their operational reliability. As practical implementation of
Non-rigid 3D shape retrieval has become an active and important research topic in content-based 3D object retrieval. The aim of this paper is to measure and compare the performance of state-of-the-art methods for non-rigid 3D shape retrieval. The paper
As the usage of 3D models increases, so does the importance of developing accurate 3D shape retrieval algorithms. A common approach is to calculate a shape descriptor for each object, which can then be compared to determine two objects similarity. However
The performance of a biometric system depends on the quality of interaction of the biometric subject and the system. Past research has shown that fingerprint image quality is improved when the subjects received feedback from the system. However, the
The purpose of Special Publication 800-30 is to provide guidance for conducting risk assessments of federal information systems and organizations, amplifying the guidance provided in Special Publication 800-39. This document provides guidance for carrying
Many of todays extremely complex meta-systems are cross-domain, they require development by multiple stakeholder groups with different goals each implementing a sub-set of the functionality required for the entire meta-system to operate. As these systems