An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The value of information exchange standards development is described and defended against other data exchange interoperability options in the context of dimensional metrology in manufacturing.
Frederic J. de Vaulx, Paul Khouri Saba, Marcus W. Newrock, Bertrand C. Stivalet
As mobile devices capabilities keep on improving, todays mobile software ecosystem evolves at an unprecedented speed. This evolution makes mobile software development more common and critical. Moreover, the ever-increasing number of new development
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-63-1, Electronic Authentication Guideline. This revised guideline, which supersedes an earlier guideline, NIST SP 800-63, updates information about, and recommendations
We study the problem of reconstructing an unknown matrix M of rank r and dimension d using O(rd poly log d) Pauli measurements. This has applications in quantum state tomography, and is a non- commutative analogue of a well-known problem in compressed
Cloud computing can and does mean different things to different people. The common characteristics most interpretations share are on-demand scalability of highly available and reliable pooled computing resources, secure access to metered services from
This article explains problems and approaches to designing permission structures for role based access control. RBAC and the RBAC standard are summarized, common approaches to role engineering described, and the current status and plans for the INCITS role
Efficient deployment strategies are proposed for a mobile sensor network, where the coverage priority of different points in the field is specified by a prescribed weight function. According to these strategies, each sensor detects coverage holes within
In this paper, we present a multi-gate mesh network architecture that has been developed to ensure high performance and reliability under emergency conditions when a system expects to receive power outage notifications and exchanges. In order to handle the
Francine K. Amon, Dennis D. Leber, Nicholas Paulter
We describe a method by which the evaluation and characterization of the performance of an imager can be done objectively and scientifically, that is, without routine operator interpretation. Although this method is demonstrated herein for passive long
QCMA is the set of decision problems such that if the answer is yes, there exists a classical bitstring, or proof, that can be efficiently verified by a quantum computer. The verifier is allowed a small probability of rejecting a valid proof or accepting
Kevin L. Mills, James J. Filliben, Christopher E. Dabrowski
Much recent research has been devoted to investigating algorithms for allocating virtual machines (VMs) to physical machines (PMs) in infrastructure clouds. Many such algorithms address distinct problems, such as initial placement, consolidation, or
Computer systems often exhibit degraded performance due to resource leakage caused by erroneous programming or malicious attacks, and computers can even crash in extreme cases of resource exhaustion. The advent of cloud computing provides increased
Mark L. Badger, David Bernstein, Robert B. Bohn, Frederic J. de Vaulx, Michael D. Hogan, Jin Mao, John V. Messina, Kevin L. Mills, Annie W. Sokol, Dawn M. Leaf, Fred Whiteside, Jin Tong
Jin Chu Wu, Alvin F. Martin, Craig S. Greenberg, Raghu N. Kacker
The National Institute of Standards and Technology (NIST) Speaker Recognition Evaluations (SRE) are an ongoing series of projects conducted by NIST. In the NIST SRE, speaker detection performance is measured using a detection cost function, which is
Yooyoung Lee, Ross J. Micheals, James J. Filliben, P J. Phillips, Hassan A. Sahibzada
Due to its distinctiveness, the human eye is a popular biometricv feature used to identity a person with high accuracy. The Grand Challenge in biometrics is to have an effective algorithm for subject verification or identification under a broad range of
With the increasing adoption of cloud computing service models - Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), proper implementation of adequate and appropriate security protection measures has become a
Vladimir V. Marbukh, Kamran Sayrafian, Hamid Mahboubi, Ahmadreza Momeni, Amir G. Aghdam
This paper is concerned with target monitoring using a network of collaborative mobile sensors. The objective is to compute (online) the desired sensing and communication radii of sensors as well as their location at each time instant, such that a set of
Jin Chu Wu, Alvin F. Martin, Craig S. Greenberg, Raghu N. Kacker
The National Institute of Standards and Technology (NIST) has been conducting an ongoing series of Speaker Recognition Evaluations (SRE). Speaker detection performance is measured using a detection cost function defined as a weighted sum of the
R. Feng and H.Wu recently established a certain mean-value formula for the coordinates of the n-division points on an elliptic curve given inWeierstrass form (A mean value formula for elliptic curves, 2010, available at http://eprint.iacr.org/2009/586.pdf)
Giving individuals this kind of information processing power, along with unprecedented connectivity, might be the single most impressive technical achievement of the 21st century. Nobody knows what the full impact of this transformation will be, but it's
Dear Password, Its time for you to retire. Youve served us well, but the reality is that youre woefully outdated and fundamentally insecure. Moreover, our reliance on you is making it difficult to move some very interesting and valuable types of
This paper describes a number of techniques using jQuery to take advantage of the 3D descriptive markup implemented by X3DOM. X3DOM is a project of the Web3D Consortium, primarily being implemented by staff at Fraunhoffer IGD to provide 3D descriptive
Tony V. Cheneau, Maryline Laurent, Andrei V. Sambra
This paper presents a new public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication and Key Exchange Scheme. Its originality lies in performing authentication and key distribution with no need for a trusted