An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
This is an editorial article for a special issue on Smart Grid. The main emphasis of this issue is the technical challenges of the Smart Grid from a signal processing perspective. Therefore, the selected articles aim at articulating signal processing
This bulletin summarizes the information that is included in NIST Special Publication (SP) 121, Revision 1, Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology. This guide was revised by John Padgette of
Shahram Orandi, John M. Libert, John D. Grantham, Kenneth Ko, Stephen S. Wood, Jin Chu Wu, Lindsay M. Petersen, Bruce Bandini
This paper presents the findings of a study initially conducted to measure the operational impact of JPEG 2000 lossy compression on 1000 ppi fingerprint imagery at various levels of compression, but later expanded to include lossless compression. Lossless
David R. Kuhn, James M. Higdon, J .M. Lawrence, Raghu N. Kacker, Yu Lei
Many software testing problems involve sequences of events. The methods described in this paper were motivated by testing needs of mission critical systems that may accept multiple communication or sensor inputs and generate output to several communication
Rahul Murmuria, Jeffrey Medsger, Angelos Stavrou, Jeff Voas
Reducing power consumption has become a crucial design tenet for both mobile and other small computing devices that are not constantly connected to a power source. However, unlike devices that have a limited and predefined set of functionality, recent
Abstract Measuring the dissimilarity between non-rigid objects is a challenging problem in 3D shape retrieval. One potential solution is to construct the models 3D canonical forms (i.e., isometry-invariant representations in 3D Euclidean domain) on which
Mark H. Linehan, Edward J. Barkmeyer Jr., Stan Hendryx
The Date-Time Vocabulary is a new OMG specification that models continuous time, discrete time, the relationship of events and situations to time, language tense and aspect, time indexicals, timetables, and schedules. It offers a "business vocabulary" (i.e
While cloud security concerns have consistently ranked as one of the top challenges to cloud adoption, it is not clear what security issues are special with respect to cloud computing. To approach this question, we attempt to derive cloud security issues
As the use of Public Key Infrastructure (PKI) and digital certificates (e.g., the use of Transport Layer Security [TLS] and Secure Sockets Layer [SSL]) for the security of systems has increased, the certification authorities (CAs) that issue certificates
The Common Misuse Scoring System (CMSS) is a set of measures of the severity of software feature misuse vulnerabilities. A software feature is a functional capability provided by software. A software feature misuse vulnerability is a vulnerability in which
Yi-Kai Liu, Matthias Ohliger, Vincent Nesme, David Gross, Jens Eisert
We introduce a novel method to faithfully reconstruct unknown quantum states that are approximately low-rank, using only a few measurement settings. The method is general enough to allow for measurements from a continuous family, and is also applicable to
In this paper, we present an evaluation strategy based on human-generated ground truth to measure the performance of 3D interest point detection techniques. We provide quantitative evaluation measures that relate automatically detected interest points to
Vladimir V. Marbukh, Kamran Sayrafian, Hamid Mahboubi, Amir G. Aghdam, Walid Masoudimansour
In this paper, an energy-efficient technique is proposed for tracking a target in a field using a network of mobile sensors while maximizing the life span of the network. The most important energy consumption sources in a mobile sensor network (MSN) are
David W. Griffith, Michael R. Souryal, Nada T. Golmie
This chapter discusses the use of wireless networks in the context of the smart grid. First, it provides an overview of the various applications envisaged in the smart grid and discusses their communication requirements. Sifting through thousands of
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-146, Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology. The publication explains the different cloud
Combinatorial testing is a method that can reduce cost and improve test effectiveness significantly for many applications. The key insight underlying this form of testing is that not every parameter contributes to every failure, and empirical data suggest
Christopher E. Dabrowski, James J. Filliben, Kevin L. Mills
Over the past five years, we investigated methods to characterize global behavior in large distributed systems and applied those methods to predict effects from deploying alternate distributed control algorithms. The methods we used assess global behaviors
This paper presents a novel convexity measurement for 3D meshes. The new convexity measure is calculated by minimizing the ratio of the summed area of valid regions in a meshs six views, which are projected on faces of the bounding box whose edges are
This presentation discusses Grand Challenges of Measurement Science with Big Data. It illustrates the difference between Measurement Science with Little Data and Big Data in the domain of cell biology and microscopy image observations.
Rui Zhuang, Su Zhang, Scott DeLoach, Xinming Ou, Anoop Singhal
Moving-target defense has been hypothesized as a potential game changer in cyber defense, including that for computer networks. However there has been little work to study how much proactively changing a network's configuration can increase the difficulty
The short persepctive explains the concept behind Internet of Things (IoT). The publication is a perspectives piece for an IEEE magazine and not intended to be technical. This is intended to be published in a specific column in the magazine.
In order to contain a differential propagation delay in a block based cooperative MIMO system, a guard interval can be inserted to mitigate the effect of inter-symbol interference. A larger block size could substantially increase the effective symbol rate
Karolina K. Owczarzak, John M. Conroy, Hoa T. Dang, Ani Nenkova
Automatic evaluation has greatly facilitated system development in summarization. At the same time, the use of automatic evaluation has been viewed with mistrust by many, as its accuracy and correct application are not well understood. In this paper we