An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Since 1976, when Whitfield Diffie and Martin Helleman, first surmised the possibilities for the potential uses for digital signatures in an IEEE publication, there has been ongoing discussion of building an online identity management structure. As use of
In this treatise, we propose a novel family of Asynchronous Cooperative Linear Dispersion Codes (ACLDCs), which is capable of maintaining full diversity in cooperative scenarios even at the presence of asynchronous reception. The linear dispersion
It is envisioned that one of the most important issues in Smart Grid will be to design a network architecture that is capable of providing secure and reliable two-way communication from meters to other Smart Grid domains. While networking technologies and
When multi-path fading and interference frequently disrupts a mobile radio communication system, it can seriously undermine its reliability for transmission of compressed video signals. In this paper, we present a pixel interlacing based video transmission
This is an editorial article for a special issue on smart grid. The main objective is to report on some, if not all, of smart grid future technical challenges. While acknowledging its limited coverage, this issue offers a wide range of interesting
This paper proposes an effective algorithm for spatial error concealment with accurate edge detection and partitioning interpolation. Firstly, a new method is used for detecting possible edge pixels and their matching pixels around the lost block. Then
In this paper, efficient deployment algorithms are proposed for a mobile sensor network to improve coverage. The proposed algorithms calculate the position of the sensors iteratively based on the existing coverage holes in the target field. The
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2010. It discusses all projects and programs within the Division, staff highlights, and publications.
The methodology described in this document was produced and developed by Lantana Consulting Group for the National Institute of Standards and Technology (NIST). It is part of a series of suitability analsyses on four healthcare standards performed under
This document supplements information about templated CDA in the context of the Healthcare Information Technology (HIT) Standards Analysis Project carried out by Lantana Consulting Group for the National Institute of Standards and Technology (NIST).
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-70 Rev. 2, National Checklist Program for IT ProductsGuidelines for Checklist Users and Developers: Recommendations of the National Institute of Standards and
Understanding queuing dynamics of TCP is important for correct router buffer sizing as well as for optimizing the performance of the TCP protocol itself. However, modeling of buffer content dynamics under TCP has received relatively little attention given
In this paper, a joint vehicle-vehicle/vehicle-roadside communication protocol is proposed for cooperative collision avoiding in Vehicular Ad Hoc Networks (VANETs). In this protocol, emergency warning messages are simultaneously transmitted via Vehicle-to
One of the most important issues in Smart Grid is to provide consumers with the knowledge of their energy usage, as well as allowing the utility to monitor and control the electric system components with real time status. This would require the design of a
This bulletin summarizes the information presented in NIST SP 800-125, Guide To Security for Full Virtualization Technologies: Recommendations of the National Institute of Standards and Technology, which was written by Karen Scarfone of G2, Inc., Murugiah
Paul D. Over, George M. Awad, Jonathan G. Fiscus, Brian Antonishek, Martial Michel, Alan Smeaton, Wessel Kraaij, Georges Quenot
The TREC Video Retrieval Evaluation (TRECVID) 2010 was a TREC-style video analysis and retrieval evaluation, the goal of which remains to promote progress in content-based exploitation of digital video via open, metrics-based evaluation. Over the last 10
In this paper we present the results of the 3D Shape Retrieval Contest 2011 (SHREC11) track on generic shape retrieval. The aim of this track is to evaluate the performance of 3D shape retrieval algorithms that can operate on arbitrary 3D models. The
Helin Dutagaci, Chun Pan (Benny) Cheung, Afzal A. Godil
In this paper, we compare the results of five 3D interest point detection techniques to the interest points marked by human subjects. This comparison is used to quantitatively evaluate the interest point detection algorithms. We asked human subjects to
In this paper we describe a new formulation for the 3D salient local features based on the voxel grid inspired by the Scale Invariant Feature Transform (SIFT). We use it to identify the salient keypoints (invariant points) on a 3D voxelized model and
This report defines version 2.0 of the Open Checklist Interactive Language (OCIL). The intent of OCIL is to provide a standardized basis for expressing questionnaires and related information, such as answers to questions and final questionnaire results, so
Radio Frequency Identification (RFID) usually incorporates a tag into an object for the purpose of identification or localization using radio signals. It has gained a lot of attention recently due to its advantages in terms of low cost and easy deployment
Hylleraas-configuration-interaction (Hy-CI) method variational calculations are reported for the singlet S ground state of neutral beryllium. The best nonrelativistic energy obtained was -14.6673 5641 hartree, which is estimated to be accurate to within a
Scott W. Rose, Anastase Nakassis, Ramaswamy Chandramouli
The Domain Name System (DNS) is the global lookup service for network resources. It is often the first step in an Internet transaction as well as a network attack. An attacker can query an organization's DNS as reconnaissance before attacking hosts on a
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-39, Integrated Enterprise-Wide Risk Management: Organization, Mission and Information System View. This publication was developed by the Joint Task Force Transformation