An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
As the use of Public Key Infrastructure (PKI) and digital certificates (e.g., the use of Transport Layer Security [TLS] and Secure Sockets Layer [SSL]) for the security of systems has increased, the certification authorities (CAs) that issue certificates
The Common Misuse Scoring System (CMSS) is a set of measures of the severity of software feature misuse vulnerabilities. A software feature is a functional capability provided by software. A software feature misuse vulnerability is a vulnerability in which
Yi-Kai Liu, Matthias Ohliger, Vincent Nesme, David Gross, Jens Eisert
We introduce a novel method to faithfully reconstruct unknown quantum states that are approximately low-rank, using only a few measurement settings. The method is general enough to allow for measurements from a continuous family, and is also applicable to
In this paper, we present an evaluation strategy based on human-generated ground truth to measure the performance of 3D interest point detection techniques. We provide quantitative evaluation measures that relate automatically detected interest points to
Vladimir V. Marbukh, Kamran Sayrafian, Hamid Mahboubi, Amir G. Aghdam, Walid Masoudimansour
In this paper, an energy-efficient technique is proposed for tracking a target in a field using a network of mobile sensors while maximizing the life span of the network. The most important energy consumption sources in a mobile sensor network (MSN) are
David W. Griffith, Michael R. Souryal, Nada T. Golmie
This chapter discusses the use of wireless networks in the context of the smart grid. First, it provides an overview of the various applications envisaged in the smart grid and discusses their communication requirements. Sifting through thousands of
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-146, Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology. The publication explains the different cloud
Combinatorial testing is a method that can reduce cost and improve test effectiveness significantly for many applications. The key insight underlying this form of testing is that not every parameter contributes to every failure, and empirical data suggest
Christopher E. Dabrowski, James J. Filliben, Kevin L. Mills
Over the past five years, we investigated methods to characterize global behavior in large distributed systems and applied those methods to predict effects from deploying alternate distributed control algorithms. The methods we used assess global behaviors
This paper presents a novel convexity measurement for 3D meshes. The new convexity measure is calculated by minimizing the ratio of the summed area of valid regions in a meshs six views, which are projected on faces of the bounding box whose edges are
This presentation discusses Grand Challenges of Measurement Science with Big Data. It illustrates the difference between Measurement Science with Little Data and Big Data in the domain of cell biology and microscopy image observations.
Rui Zhuang, Su Zhang, Scott DeLoach, Xinming Ou, Anoop Singhal
Moving-target defense has been hypothesized as a potential game changer in cyber defense, including that for computer networks. However there has been little work to study how much proactively changing a network's configuration can increase the difficulty
The short persepctive explains the concept behind Internet of Things (IoT). The publication is a perspectives piece for an IEEE magazine and not intended to be technical. This is intended to be published in a specific column in the magazine.
In order to contain a differential propagation delay in a block based cooperative MIMO system, a guard interval can be inserted to mitigate the effect of inter-symbol interference. A larger block size could substantially increase the effective symbol rate
Karolina K. Owczarzak, John M. Conroy, Hoa T. Dang, Ani Nenkova
Automatic evaluation has greatly facilitated system development in summarization. At the same time, the use of automatic evaluation has been viewed with mistrust by many, as its accuracy and correct application are not well understood. In this paper we
Power Line Communication (PLC) systems provide a bi-directional communication platform capable of delivering data for a variety of Smart Grid applications such as home energy management and intelligent meter reading and control. One benefit of applying
In this paper, we present a multi-gate mesh network architecture that has been developed to ensure high performance and reliability under emergency conditions when a system expects to receive power outage notifications and exchanges. In order to handle the
Mark L. Badger, Timothy Grance, Robert Patt-Corner, Jeffrey M. Voas
This document reprises the NIST-established definition of cloud computing, describes cloud computing benefits and open issues, presents an overview of major classes of cloud technology, and provides guidelines and recommendations on how organizations
Generic 3D shape retrieval is a fundamental research area in the field of content-based 3D model retrieval. The aim of this track is to measure and compare the performance of generic 3D shape retrieval methods implemented by different participants over the
Sketch-based 3D shape retrieval has become an important research topic in content-based 3D object retrieval. The aim of this track is to measure and compare the performance of sketch-based 3D shape retrieval methods implemented by different participants
This bulletin summarizes the information that is included in revised Federal Information Processing Standard 180-4, Secure Hash Standard. The revised standard, announced in a March 6, 2012, Federal Register notice, was approved by the Secretary of Commerce
It has become common practice to automate data acquisition from programmable instrumentation and a range of different software solutions fulfill this task. Many routine measurements require sequential processing of certain tasks, for instance to adjust the
Marcus T. Cicerone, Khaled A. Aamer, Young J. Lee, Eric Vartiainen
Phase retrieval methods are used to recover Raman spectra from multiplex and broadband CARS signals. Two methods are in widespread use, one based on maximum entropy (MEM), and one based on a modified time-domain Kramers-Kronig (TDKK) method. Here we
This paper presents the findings of a study conducted to compare the effects of WSQ and JPEG 2000 compression on 500 ppi fingerprint imagery at a typical operational compression rate of 0.55 bpp (bits per pixel), corresponding to an effective compression
Secret keys can be established through the use of Quantum channels monitored through classical channels which can be thought of as being error free. Because many of the feasible implementation of the quantum channel are subject to erasures often massive-